- Research
- Open access
- Published:
Zero-forcing beamforming for physical layer security of energy harvesting wireless communications
EURASIP Journal on Wireless Communications and Networking volume 2015, Article number: 58 (2015)
Abstract
In this paper, we consider the physical layer security for simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) system that is consisted of three nodes: one transmitter with multiple antennas, one information decoding (ID) receiver with single antenna, and one energy harvesting (EH) receiver with single antenna. We propose a new zero-forcing based strategy that contains both the information beamforming and the energy beamforming, pointing to different receivers. To prevent the energy receiver from possibly eavesdropping the information, our target is to maximize the secrecy-rate of the ID receiver while at the same time maintaining a minimum required energy for the EH receiver. For the case that artificial noise is not used, the original non-convex problem can be directly converted into convex subproblems, where the closed-form optimal solutions are derived. For the case that artificial noise is used, the initial non-convex problem can be decomposed into two quasi-convex subproblems where closed-form solutions are derived, and the global optimal solutions are obtained with the aid of one-dimensional search. Simulations results demonstrate the trade-off between the maximum secret information rate and the transferred energy, which is characterized by the boundary of secret rate-energy (R-E) region.
1 Introduction
Since radio-frequency (RF) signals that carry information can, at the same time, be used for transporting energy, simultaneous wireless information and power transfer (SWIPT) is made possible in energy-constrained wireless networks and has become an interesting research area recently [1-5].
In [1], Varshney proposed a capacity-energy function for SWIPT, where a fundamental trade-off between the energy and the reliable information transmitted over a single noisy line is studied. In [2], Grover and Sahai extended the results of [1] to frequency-selective single-antenna additive white Gaussian noise (AWGN) channels, where a similar trade-off in frequency-domain is demonstrated. In [3], the robust case for SWIPT was studied using beamforming. In [4], Zhang revealed some fundamental issues in designing wireless multiple-input multiple-output (MIMO) systems to maximize the efficiency of SWIPT. Both information decoding (ID) receiver and energy harvesting (EH) receiver that are separated or co-located were investigated in [4], and the optimal transmission strategy was derived to achieve different trade-offs between maximal information rate and transferred energy. Most recently, in [5], the authors studied MIMO beamforming with partial channel state information (CSI) under energy harvesting constraints.
On the other hand, information-theoretic approach to guarantee secrecy was initiated by Wyner [6], where the concept of secrecy capacity was, for the first time, defined in degraded discrete memoryless wiretap channels. In [7], the results of [6] was generalized to a broadcast channel. Moreover, information secrecy in multiple access channels (MAC) was studied in [8-10], and information secrecy in single-input single-output (SISO) fading channels was also studied in [11-13]. To guarantee information secrecy using Wyner’s model, the channel condition of the legitimate user is required to be better than that of the eavesdropper. In practice, however, this requirement may not be satisfied. Recently, an interesting way to achieve the secrecy using the aided noise was proposed in [14], where the information secrecy could be guaranteed even when the channel condition of the legitimate user is worse than that of the eavesdropper. Then the idea of aided noise were used in lots of works [15-22] where the physical layer security were studied. For example, [18-20] assume that transmitters cooperate to generate the aided noise, while [15-17,21,22] require the aided noise spread in the null-space of the legitimate receiver’s channel. Moreover, [23] studied the case where the noise covariance could take any spatial pattern. In addition, some other secure transmitting designs with the aided noise were also proposed aiming to provide the legitimate receiver with different quality-of-service (QoS), e.g., the SINR-based design [24] and the mean squared error (MSE)-based design [25].
The physical layer security for SWIPT system was first studied in [26], where secret information beamforming vector and artificial noise transmit covariance were designed. However, in [26], the closed-form solutions for information beamforming vector and energy beamforming vector cannot be derived. In this paper, we study information secrecy of SWIPT using zero-forcing beamforming which has lower computational complexity than the algorithm proposed in [26]. Remarkably, closed-form solutions are derived for both information beamforming vector and artificial noise (also used as energy) beamforming vector. The main contributions of this paper are summarized as follows:
-
1.
For the feasibility problem, we obtain the closed-form solutions for energy beamforming vector, which can be derived with maximal-ratio-combining (MRC) principle.
-
2.
For the conventional physical layer security problem without artificial noise, we first prove that the initial non-convex problem can be divided into two subproblems, based on different values of energy harvest requirements. Then, the closed-form solutions for the subproblems are derived.
-
3.
For SWIPT with joint energy beamforming and information beamforming, we design zero-forcing beamforming for physical layer security. The optimal solutions for the non-convex problem is obtained using one-dimensional search. Remarkably, at each search step, closed-form solutions can be derived for all subproblems.
Notation: Vectors and matrices are boldface small and capital letters, respectively; the transpose, complex conjugate, Hermitian, inverse, and the pseudo-inverse of A are denoted by A T, A ∗, A H, A −1, and A †, respectively; Tr(A) and A 1/2 denote the trace and the square-root, respectively; I and 0 denote an identity matrix and an all-zero matrix, respectively, with appropriate dimensions; A≽0 and A≻0 mean that A is positive semi-definite and positive definite, respectively; \(\mathbb {E}[\cdot ]\) denotes the statistical expectation; The distribution of a CSCG random variable with zero mean and variance σ 2 is denoted as \(\mathcal {CN}(0,\sigma ^{2})\), and ∼ means ‘distributed as’; \(\mathbb {C}^{a\times b}\) denotes the space of a×b matrices with complex entries; ∥x∥ denotes the Euclidean norm of a vector x; the unit-norm vector of a vector x is denoted as \(\vec {\mathbf {x}}=\mathbf {x}/\|\mathbf {x}\|\); the quantity min(a,b) and max(a,b) represents the minimum and maximum between two real numbers.
2 System model and problem formulation
Let us consider a MISO system with one transmitter, one ID receiver, and one EH receiver, as shown in Figure 1. The transmitter is equipped with M≥1 antennas, while the ID receiver and the EH receiver are both equipped with single antenna. Both the information and the energy are transmitted over the same frequency band. Denote the baseband equivalent channels from the transmitter to the ID receiver and the EH receiver as \(\boldsymbol {h} \in \mathbb {C}^{M\times 1}\) and \(\boldsymbol {g} \in \mathbb {C}^{M\times 1}\), respectively. We further assume that the channels are quasi-static fading while at each fading state, both h and g are known to the transmitter.
In case that the EH receiver may be an potential eavesdropper, the transmitter should adjust its strategy such that information secrecy of the ID receiver is guaranteed when operating in SWIPT mode. We then propose to use the aided noise to offer the energy to the EH receiver while at the same time preventing it from decoding the message. Meanwhile, the information beamforming will also be formulated to improve the signal quality at the ID receiver. Hence, the baseband transmitted signal can be expressed as:
where \(\boldsymbol {s}\in \mathbb {C}^{M\times 1}\) and \(\boldsymbol {w}\in \mathbb {C}^{M\times 1}\) denote the information beamforming vector and the energy beamforming vector to be designed; v i is the CSCG random information bearing signal that is assumed to have the distribution \(v_{i}\sim \mathcal {CN}(0,1)\). In order to provide the strongest disturbance to EH receiver, the energy-bearing signal should also be CSCG and has the distribution \(v_{e}\sim \mathcal {CN}(0,1)\).
The signals received by the ID receiver and the EH receiver are then given by:
where \(z_{i}\sim \mathcal {CN}(0,1)\) and \(z_{e}\sim \mathcal {CN}(0,1)\) are the corresponding receiver noise.
The secrecy rate for the general non-degraded discrete memoryless wiretap channel is defined as [7]:
where I(u;y i ) and I(u;y e ) are the mutual information at the ID receiver and the EH receiver, respectively; u is an auxiliary variable satisfying the Markov relation u→x→(y i ,y e ); p(u,x) is the joint distributions of u and x that satisfy the Markov relation.
Denoting S=s s H and W=w w H, the secrecy rate optimization problema can be formulated as:
where P is the transmit power limit and Q is the energy harvesting targetb. P A is a very hard problem, since the objective function and the rank-one constraints are non-convex functions. We then discuss P A in the following cases.
3 The feasibility problem
For the case that there is no ID receiver, Tx can use its whole power to satisfy the EH receiver’s energy constraint in Equation 5. Then P A reduces to the feasibility problem, i.e., if the reduced P A is infeasible, P A will always be infeasible. The reduced P A can be simplified as:
The maximum Q can be obtained by solving the following problem:
It is easily known that the maximum Q can be obtained when the energy beamforming direction is the same as that of channel g. Consequently, Q max=P∥g∥2+1 is obtained and the optimal energy beamforming vector w ∗ can be derived as \(\boldsymbol {w}^{*}=\sqrt {P}\boldsymbol {g}/\|\boldsymbol {g}\|\). Therefore, the optimal energy beamforming vector is identical to that of the conventional MISO transmission with MRC principle. In the rest of this paper, we assume P A is always feasible (i.e., Q≤Q max is satisfied).
4 Secure SWIPT without artificial noise
For the secure SWIPT without artificial noise, P A can be simplified as:
It is easily known that P B in its current form is still neither convex nor concave. Fortunately, P B can be reformulated as a quasi-convex problem or a convex problem based on different energy harvesting limits Q; for both, closed-form solutions can be derived.
Lemma 1.
For the secure SWIPT without artificial noise, if the energy harvesting constraint 1≤Q≤g H S ∗ g+1, P B is equivalent to:
where S ∗ is the optimal transmit covariance matrix of P B − 1. If g S ∗ g H+1<Q≤Q max, P B is equivalent to:
The optimal information beamforming vector for P B − 2 can be written in the form of \(\boldsymbol {s}=\eta _{\boldsymbol {s}} \vec {\boldsymbol {g}}+\xi _{\boldsymbol {s}} \vec {\boldsymbol {g}}_{\perp }\), where \(\vec {\boldsymbol {g}}=\boldsymbol {g}/\|\boldsymbol {g}\|\) and \(\vec {\boldsymbol {g}}_{\perp }=\boldsymbol {g}_{\perp }/\|\boldsymbol {g}_{\perp }\|\); \(\boldsymbol {g}_{\perp }=(\boldsymbol {I}-\vec {\boldsymbol {g}}\vec {\boldsymbol {g}}^{\mathrm {H}})\boldsymbol {h}\) is the projection of h onto the null space of g; η s and ξ s are complex weights.
Proof.
Assuming S ∗ is the optimal transmitting covariance matrix of P B − 1, we know that the energy harvested at EH receiver can be expressed as Q ∗=g H S ∗ g+1. If Q ∗≥Q, it is easily known that P B is not limited by the energy harvesting constraint. Therefore, S ∗ is also optimal for P B when Q ∗≥Q.
If Q>g H S ∗ g+1, it follows that P B is limited by the the energy harvesting constraint. Then, we prove that in P B at the optimal point, g H S ∗ g+1=Q must be satisfied by contradiction. Assuming the optimal S ∗ for P B satisfies g H S ∗ g+1>Q, it corresponds to the case of P B − 1, which contradicts the fact that Q>g H S ∗ g+1 must be satisfied in this case. From Equation 13, we know that at the optimal point, there is g H S ∗ g+1=Q. Substituting g H S ∗ g+1=Q into P B, we know that for the case of Q>g H S ∗ g+1, P B and P B − 2 have the same optimal solutions.
Aiming to prove that there is an optimal structure for the beamforming vector for P B − 2, we first prove that the optimal transmit covariance is rank-one. It is easily shown that P B − 2 has the same optimal information transmit covariance as the following problem:
where H=h h H and G=g g H. After dropping the rank-1 constraint in Equation 23, the Lagrange [27] of P B − 3 is defined as:
where Φ=H−α I−β G; α and β denote the dual variables associated with the constraints in Equations 21 and 22, respectively. Then, the Lagrangian dual function [27] of P B − 3 is defined as:
which must have a bounded optimal value. The dual problem [27] of P B − 3 is defined as:
The Lagrangian dual problem for P B − 3 can be further expressed as:
The Karush-Kuhn-Tucker (KKT) conditions [27] related to S can be formulated as:
where α ∗≥0, β ∗ and Φ ∗≼0 denote the corresponding optimal dual variables.
Lemma 1.1.
The optimal dual variable α ∗ satisfies α ∗>0.
Proof.
Assuming α ∗=0, Equation 29 can be reexpressed as:
Using the constraint Φ ∗≼0, for any x≠0, we have x H Φ ∗ x≤0. Assuming x H G x=0, from Equation 31 we obtain:
Since H≽0, there is x H H x≥0. Thus, we know x H H x=0 must hold. It requires that any x≠0 lies in the null space of G must also be in the null space of H. However, it cannot be true since h and g are independent and randomly generated vectors and should be linearly independent. Consequently, α ∗>0 must hold in this case, which completes the proof of Lemma 1.1.
Since α ∗>0, assuming β ∗≥0, from Equation 29 it follows that −α ∗ I−β ∗ G has a full rank M. Thus, from Equation 29, we obtain Rank(Φ ∗)≥M−1. From Equation 30, we know:
Consequently, we obtain Rank(S ∗)≤1. Assuming β ∗<0, we will draw the contradiction as follows. Consider first the problem in Equation 25 of maximizing the Lagrangian over S with fixed α and β. Discarding the constant terms associated with α and β, problem in Equation 25 can be equivalently rewritten as:
It is easily shown that problem in Equation 34 is unbounded when β→−∞. Thus, β ∗<0 cannot be true. From the above discussions, we know that the optimal S ∗ for P B − 2 is indeed rank-1. Thus, S can be expressed as S=s s H, where s is the information beamforming vector. P B − 2 can be equivalently reformulated as:
Next, let us prove that there exist an optimal structure for the information beamforming vector for P B − 4. We can first assume there is \(\vec {\boldsymbol {k}}\) that satisfies \(\vec {\boldsymbol {k}}^{\mathrm {H}}\vec {\boldsymbol {g}}=0\). Then, the optimal information beamforming vector s ∗ for P C −4 can be expressed as \(\boldsymbol {s}^{*}=\eta _{\boldsymbol {s}^{*}} \vec {\boldsymbol {g}}+\xi _{\boldsymbol {s}^{*}} \vec {\boldsymbol {k}}\). Since \(\vec {\boldsymbol {g}}_{\bot }^{\mathrm {H}}\vec {\boldsymbol {g}}=0\) and \(\|\boldsymbol {h}^{\mathrm {H}}\vec {\boldsymbol {g}}_{\bot }\|\geq \|\boldsymbol {h}^{\mathrm {H}}\vec {\boldsymbol {k}}\|\), replacing \(\vec {\boldsymbol {k}}\) with \(\vec {\boldsymbol {g}}_{\bot }\) does not influence the equality constraint in Equation 36 in P C −4 but always helps to improve the value of Equation 35. Thus, the optimal information beamforming vector can be expressed as \(\boldsymbol {s}^{*}=\eta _{\boldsymbol {s}^{*}} \vec {\boldsymbol {g}}+\xi _{\boldsymbol {s}^{*}} \vec {\boldsymbol {g}}_{\bot }\).
Lemma 1 is thus proved.
Lemma 1 implies that problem P B can be divided into two subproblems depending on Q. The optimal information beamforming vector can be derived. To summarize, the following theorem is established.
Theorem 1.
For the secure SWIPT without artificial noise, if 1≤Q≤g H S ∗ g+1 which corresponding to P B − 1, the optimal information beamforming vector can be obtained as:
where e is any scaled version of the eigenvector of Z corresponding to its largest eigenvalue and Z is defined as:
If g H S ∗ g≤Q≤Q max which corresponding to P B − 2, the optimal information beamforming vector can be expressed as \(\boldsymbol {s}^{*}=\eta _{\boldsymbol {s}}^{*} \vec {\boldsymbol {g}}+\xi _{\boldsymbol {s}}^{*} \vec {\boldsymbol {g}}_{\perp }\) where \(\eta _{\boldsymbol {s}}^{*}\) and \(\xi _{\boldsymbol {s}}^{*}\) can be derived as following:
Proof.
When 1≤Q≤g H S ∗ g+1, we know that P B − 1 has the same optimal solutions as:
where the optimal information beamforming vector can be derived as [28].
When g H S ∗ g≤Q≤Q max, we can first express h as \(\boldsymbol {h}=\eta _{\boldsymbol {h}} \vec {\boldsymbol {g}}+\xi _{\boldsymbol {h}} \vec {\boldsymbol {g}}_{\perp }\). Then, it follows that P B − 2 has the same optimal solutions as:
where the closed-form solutions can be easily derived by using standard geometry.
The proof is thus completed.
5 Zero-forcing-based joint information and energy beamforming
When artificial noise is used, we should design joint information and energy beamforming. Since P A is very hard to be solved, we let the information beamforming vector s be in the null space of g (i.e., g H S g=0). Thus, the EH receiver cannot receive the information signal, and the energy harvest constraint is satisfied by energy beamforming. Let us define an auxiliary variable θ as the proportion of the transmit power assigned to the energy beamforming. Then, P A can be then reformulated as:
By using primal decomposition, P C can be divided into two subproblems. The result is implied by the following proposition.
Proposition 1.
P C has the same optimal solutions S ∗ and W ∗ as that of:
where f 1(θ) is defined as:
and f 2(1−θ) is defined as:
Proof.
Since the objective function of P C can be expressed as the multiplication of two parts, primal decomposition [27] can be used to divide P C into two subproblems. The proof is completed.
To obtain the closed-form solution for f 1(θ), the following two lemmas are needed.
Lemma 2.
The optimal W for f 1(θ) must satisfy Rank(W)=1.
Proof.
We first relax f 1(θ) by dropping the rank-one constraint that Rank(W)=1. Then, the same optimal W for f 1(θ) can be obtained by solving the following problem:
The KKT conditions [27] for \(f_{1}^{\prime } (\theta)\) can be formulated as:
where λ≥0, μ≥0 and Ψ≽0 are the Lagrange multipliers associated with the constraints in Equation 62 to Equation 64, respectively.
When λ=0, it follows from Equation 65 that g must be in parallel to h. Consequently, it is easily shown in \(f_{1}^{\prime } (\theta)\) that the optimal W is W=(Q−1)h h H/∥g H h∥2 and thus Rank(W)=1.
When λ>0, it follows from Equation 65 that the left side has a full rank of M. while the right side of Equation 65 must also have a full rank of M. Consequently, we obtain Rank(Ψ)≥M−1. From Equation 68, we obtain Rank(W)+Rank(Ψ)≤M. Hence, there must be Rank(W)≤1 and the proof is completed.
Lemma 3.
For f 1(θ), the range of the optimal power allocation ratio θ must satisfy:
where \(\vec {\boldsymbol {h}}=\boldsymbol {h}/\|\boldsymbol {h}\|\) is the unit-norm vector of the ID receiver’s channel.
Proof.
Since the optimal transmit covariance is indeed rank-1, we know that W can be expressed as W=w w H. To satisfy the energy harvesting constraint of f 1(θ), ∥g H w∥2+1≥Q should be guaranteed. For any energy beamforming vector w, there must be:
Moreover, the transmit power constraint in Equation 62 can be reformulated as"
From Equations 70 and 71, there is:
On the other hand, since W≽0, there must be h H W h≥0. It is easily shown that the minimum value of Equation 61 is equal to zero when the energy beamforming vector w lies in the null space of the ID receiver’s channel vector h, i.e., h H w=0. Then, let us assume that h H w=0. It follows from Equation 63 that:
must hold. From Equations 71 and 73, there must be:
Then, it is easily shown that for any θ that \(\theta > (Q-1)/(P\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2})\), we can always find a smaller \(\theta ^{\prime }=(Q-1)/(P\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2})\) that maintains h H W h=0. Meanwhile, the saved power can then be used for information beamforming to obtain a bigger secret rate. Consequently, the optimal power allocation ratio should not bigger than \((Q-1)/(P\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2})\). And the proof is completed.
Lemma 3 implies that for P D, the power allocation ratio should be limited to a subset of 0≤θ≤1. The subset limitation is significant for complexity reduction in one-dimensional search. In fact, if \(\|\boldsymbol {g}\|^{2}=\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2}\), we can always obtain the optimal solutions without using one-dimensional search.
Using lemma 2 and lemma 3, we know that f 1(θ) has the same optimal information beamforming vector as:
The optimal w for P D −1 can be expressed in the form of \(\alpha _{\boldsymbol {w}} \vec {\boldsymbol {h}}+\beta _{\boldsymbol {w}} \vec {\boldsymbol {h}}_{\perp }\) where \(\vec {\boldsymbol {h}}=\boldsymbol {h}/\|\boldsymbol {h}\|\) and \(\vec {\boldsymbol {h}}_{\perp }=\boldsymbol {h}_{\perp }/\|\boldsymbol {h}_{\perp }\|\); \(\boldsymbol {h}_{\perp }=(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\) is the projection of g onto the null space of h; α w and β w are complex weights. The proof is similar as lemma 1 and is omitted here for brief. Then, we can let \(\boldsymbol {g}=\alpha _{\boldsymbol {g}} \vec {\boldsymbol {h}}+\beta _{\boldsymbol {g}} \vec {\boldsymbol {h}}_{\perp }\). P D −1 can be equivalently reformulated as:
To derive the closed-form solution for P D −2, the following lemma is needed.
Lemma 4.
The optimal α w and β w for P D −2 must satisfy:
Proof.
It is easily known that when ∥α w ∥2+∥β w ∥2<θ P, we can always decrease θ to improve the power allocated for the information beamforming to obtain a bigger secret rate. Thus, at the optimal point, there must be ∥α w ∥2+∥β w ∥2=θ P.
Next, let us prove that Equation 82 is satisfied using the result of lemma 3.
Case 1: θ=(Q−1)/(P∥g∥2): It follows from Equation 70 that w is parallel to g. Thus, there must be β w =0. Then P D −2 can be simplified as:
where it is easy to observe that \(\|\alpha _{\boldsymbol {w}}^{\mathrm {H}}\alpha _{\boldsymbol {g}}\|^{2}+1= Q\) must be satisfied.
Case 2: \(\theta =(Q-1)/(P\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2})\): It follows from Equation 73 that w is orthogonal to g. Thus, there must be α w =0. Then P D −2 can be simplified as:
Using the proof of lemma 3, we know that at the optimal point \(\|\beta _{\boldsymbol {w}}^{\mathrm {H}}\beta _{\boldsymbol {g}}\|^{2}+1= Q\) must be satisfied to save the transmit power.
Case 3: \((Q-1)/(P\|\boldsymbol {g}\|^{2})< \theta < (Q-1)/(P\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2})\): There must be ∥α w ∥>0 and ∥β w ∥>0. Let us prove that \(\|\alpha _{\boldsymbol {w}}^{\prime }\|^{2}\|\alpha _{\boldsymbol {g}}\|^{2}+\|\beta _{\boldsymbol {w}}^{\prime }\|^{2}\|\beta _{\boldsymbol {g}}\|^{2}+1= Q\) must be satisfied by contradiction. Assume \(\alpha _{\boldsymbol {w}}^{\prime }\) and \(\beta _{\boldsymbol {w}}^{\prime }\) are the optimal complex weights for P D −2, which satisfy \(\|\alpha _{\boldsymbol {w}}^{\prime }\|^{2}\|\alpha _{\boldsymbol {g}}\|^{2}+\|\beta _{\boldsymbol {w}}^{\prime }\|^{2}\|\beta _{\boldsymbol {g}}\|^{2}+1> Q\). Then, we can always find the special weights \(\alpha _{\boldsymbol {w}}^{*}\) and \(\beta _{\boldsymbol {w}}^{*}\) which satisfy:
Using Equation 89, and substituting \(\alpha _{\boldsymbol {w}}^{*}\) and \(\beta _{\boldsymbol {w}}^{*}\) into Equation 78, we obtain:
which contradicts the assumption that \(\alpha _{\boldsymbol {w}}^{\prime }\) and \(\beta _{\boldsymbol {w}}^{\prime }\) are the optimal complex weights for P D −2. Combing the above discussions, at the optimal point, ∥α w ∥2∥α g ∥2+∥β w ∥2∥β g ∥2+1=Q must always be satisfied.
Lemma 4 is thus proved.
Using lemma 2, lemma 3, and lemma 4, the closed-form solutions for f 1(θ) and f 2(1−θ) can be easily derived. To summarize, the following theorem is established.
Theorem 2.
For any given θthat \((Q-1)/(P\|\boldsymbol {g}\|^{2})\leq \theta \leq (Q-1)/(P\|(\boldsymbol {I}-\vec {\boldsymbol {h}}\vec {\boldsymbol {h}}^{\mathrm {H}})\boldsymbol {g}\|^{2})\), the optimal energy beamforming vector for f 1(θ) can be derived as:
where \(\eta _{\boldsymbol {w}}^{*}\) and \(\xi _{\boldsymbol {w}}^{*}\) are the complex weights that can be expressed as:
The optimal information beamforming vector for f 2(1−θ) can be derived as:
where the proof is similarly as in P B −2.
6 Simulation results
In this section, computer simulation results are presented to evaluate the performance of the proposed optimal approaches. Unless otherwise stated, it is assumed that the transmitter is equipped with M=8 antennas, and both the ID receiver and the EH receiver are equipped with single antenna. The entries of the channel vectors h and g are generated by independent circularly symmetric complex Gaussian (CSCG) random variables distributed as \(\mathcal {CN}(0,1)\). The achievable rate C is plotted versus a range of transmit power limit P or harvested energy limit Q, where P is defined in dBm and Q is defined in mW. The results are derived by averaging over 10,000 simulation trails.
In the first example, assuming the transmit power P is constant, we can obtain the secret rate-energy region for the proposed algorithms.
In Figure 2, the transmit power is set to be P=10 dBm. For the algorithm without using artificial noise, the secret rate monotonically decreases with the increasing of harvested energy Q, and will approach zero when Q=18.5 mW. In practice, if the secret rate approaches zero, only the EH receiver can be satisfied, while the communication between the transmitter and the ID receiver should stop. For the algorithm with artificial noise (i.e., joint information and energy beamforming is used), the secret rate is much greater than that obtained by the algorithm without artificial noise. Interestingly, by the algorithm with artificial noise, the secret rate decreases slow when Q≤15 mW, while decreases fast when Q>15 mW, and approaches zero when Q>20 mW. The optimal power allocation ratio θ for the algorithm with artificial noise is demonstrated in Figure 3. It is clear that the optimal power allocation ratio θ increases with Q. When Q=0 mW, which means that there is no energy harvest requirement, no power should be used for energy beamforming. Thus, we obtain θ=0. For the case that Q=20 mW, the optimal power allocation ratio θ is obtained as θ=1, which means that all power will be used for energy beamforming.
In the second example, assuming the harvested energy Q is relatively constant, we can obtain the secret rate-power region for the proposed algorithms.
Assuming Q is set to be Q=Q max/50, the simulation results are demonstrated in Figure 4. With the increase of P, the secret rate for both algorithms will monotonically increase with P increasing. Remarkably, the secret rate obtained by the algorithm with artificial noise is always bigger than that obtained by the algorithm without artificial noise. The secret rate difference approaches 2 b/s/Hz. Interestingly, the secret rate obtained by the algorithm with artificial noise increases fast when P≤5 dBm. The reason lies in that when P≤5 dBm, θ decreases fast, which is demonstrated in Figure 5.
7 Conclusions
This paper investigated the physical layer security for SWIPT. We designed zero-forcing-based joint information beamforming and energy beamforming to maximize the secret rate under the transmit power constraint and the energy harvesting constraint. The initial optimization was divided into subproblems for which closed-form solutions were obtain. The global optimal solution was also derived by using one-dimensional search. The conventional SWIPT without artificial noise was also studied, where closed-form solutions were also obtained. Simulation results were provided to evaluate the efficiency of the proposed algorithms.
8 Endnotes
a Note that the MSE-based design [29] could also be served as an interesting research topic.
b In general, the harvested energy is proportional to the energy of the received signal [4]. Hence, the harvested energy at the EH receiver can be computed from Q=ζ(|g s|2+|g w|2), where ζ is a constant that accounts for the efficiency in the energy conversion. Interestingly, the energy limit Q is very similar to the interference limit in cognitive radio (CR) [30-34], where the interference should be controlled to be below a predefined value.
References
LR Varshney, Transporting information and energy simultaneously. Paper presented at the 2008 IEEE international symposium on information theory. IEEE, Toronto, ON, Canada, 6–11 July 2008.
P Grover, A Sahai, Shannon meets tesla: wireless information and power transfer. Paper presented at the 2010 IEEE International Symposium on Information Theory. IEEE, Austin, TX, USA, 2010, pp. 2363–2367.
Z Xiang, M Tao, Robust beamforming for wireless information and power transmission. IEEE Wireless Commun. Lett. 1(4), 372–375 (2012).
R Zhang, CK Ho, MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wireless Commun. 12(5), 1989–2001 (2013).
C Xing, N Wang, J Ni, Z Fei, J Kuang, MIMO beamforming designs with partial CSI under energy harvesting constraints. IEEE Signal Process. Lett. 20(4), 363–366 (2013).
AD Wyner, The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975).
I Csiszar, J Korner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 24(3), 339–348 (1978).
YC Liang, HV Poor, Generalized multiple access channels with confidential messages Paper presented at the 2006 IEEE international symposium on information theory. IEEE, Seattle, WA, USA, 9–14 July 2006, pp. 952–956.
R Liu, I Maric, RD Yates, P Spasojevic, The discrete memoryless multiple access channel with confidential messages. Paper presented at the 2006 IEEE international symposium on information theory. IEEE, Seattle, WA, USA, 9–14 July 2006, pp. 952–956.
E Tekin, The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming. Paper presented at the 2006 information theory and applications workshop. IEEE, La Jolla, Canada, 2006, 29 January–2 February 2007, pp. 404–413.
J Barros, MRD Rodrigues, Secrecy capacity of wireless channels. Paper presented at the 2006 information theory and applications workshop. IEEE, La Jolla, Canada, 9–14 July 2006, pp. 356–360.
YC Liang, HV Poor, S Shamai, Secure communication over fading channels. IEEE Trans. Inf. Theory. 54(6), 2470–2492 (2008).
PK Gopala, L Lai, HE Gamal, On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory. 54(10), 4687–4698 (2008).
R Negi, S Goel, Secret communication using artificial noise. Paper presented at the 2005 IEEE vehicular technology conference. IEEE, Dallas, Texas, USA, 25–28 September 2005, pp. 1906–1910.
R Negi, S Goel, Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun. 7(6), 2180–2189 (2008).
A Khisti, GW Wornell, Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory. 59(8), 3831–3842 (2010).
Z Xiangyun, MR McKay, Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans. Veh. Technol. 59(8), 3831–3842 (2010).
SAA Fakoorian, L Swindlehurst, Solutions for the MIMO gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59(10), 5013–5022 (2011).
L Jiangyuan, AP Petropulu, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317–1322 (2011).
G Zheng, LC Choo, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317–1322 (2011).
H Jing, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 60(4), 1696–1707 (2012).
S Gerbracht, C Scheunert, EA Jorswieck, Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inf. Forenics Secur. 7(2), 704–716 (2012).
Q Li, WK Ma, Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization. IEEE Trans. Signal Process. 61(10), 2704–2717 (2013).
WC Liao, TH Chang, WK Ma, Chi CY, QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach. IEEE Trans. Signal Process. 59(3), 1202–1216 (2011).
M Pei, J Wei, KK Wong, X Wang, Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI. IEEE Trans. Wireless Commun. 11(2), 544–549 (2012).
L Liu, R Zhangm, KC Chua, Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans. Signal Process.62(7), 1850–1863 (2014).
S Boyd, L Vandenberghe, Convex Optimization (Cambridge University Press, London, 2004).
S Shafiee, S Ulukus. Achievable rates in gaussian MISO channels with secrecy constraints. Paper presented at the 2007 IEEE international symposium on information theory (IEEENice, France, pp. 2466–2470.
C Xing, S Li, Z Fei, J Kuang, How to understand linear minimum mean square error transceiver design for multiple input multiple output systems from quadratic matrix programming. IET Commun. 7(12), 1231–1242 (2013).
P Ren, Y Wang, Q Du, CAD-MAC:A channel-aggregation diversity based MAC protocol for spectrum and energy efficient conitive ad hoc networks. IEEE J. Sel. Areas Commun. 32(3), 237–250 (2014).
W Yin, P Ren, F Li, Q Du, Joint sensing and transmission for AF relay assisted PU transmission in cognitive radio networks. IEEE J. Sel. Areas Commun. 31(11), 2249–2261 (2013).
P Ren, Y Wang, Q Du, J Xu, A survey on dynamic spectrum access protocols for distributed cognitive wireless networks. Eurasip J. Wireless Commun. Netw. 2012(60), 1–21 (2012).
G Wu, P Ren, Q Du, Recall-based dynamic spectrum auction with the protection of primary users. IEEE J. Sel. Areas Commun. 30(10), 2070–2081 (2012).
T Wang, L Song, Z Han, W Saad, Distributed cooperation radio networks: an overlapping coalition formation approach. IEEE Trans. Commun. 62(9), 3144–3160 (2014).
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zhu, F., Gao, F. & Yao, M. Zero-forcing beamforming for physical layer security of energy harvesting wireless communications. J Wireless Com Network 2015, 58 (2015). https://doi.org/10.1186/s13638-015-0278-5
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638-015-0278-5