Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers

被引:0
|
作者
He-hao NIU [1 ]
Bang-ning ZHANG [1 ]
Dao-xing GUO [1 ]
Yu-zhen HUANG [1 ]
Ming-yue LU [1 ]
机构
[1] College of Communications Engineering, PLA University of Science and Technology
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Simultaneous wireless information and power transfer; Physical layer security; Relay networks; Cooperative beamforming; Artificial noise;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication and efficient wireless energy transfer. Specifically, by treating the energy receiver as a potential eavesdropper and assuming that only imperfect channel state information can be obtained, we formulate an optimization problem to maximize the worst-case secrecy rate between the source and the legitimate information receiver under both the power constraint at the relays and the wireless power harvest constraint at the energy receiver. Since such a problem is non-convex and hard to tackle, we propose a two-level optimization approach which involves a one-dimensional search and semidefinite relaxation. Simulation results show that the proposed robust scheme achieves better worst-case secrecy rate performance than other schemes.
引用
收藏
页码:850 / 862
页数:13
相关论文
共 50 条
  • [1] Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
    He-hao Niu
    Bang-ning Zhang
    Dao-xing Guo
    Yu-zhen Huang
    Ming-yue Lu
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 850 - 862
  • [2] Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
    Niu, He-hao
    Zhang, Bang-ning
    Guo, Dao-xing
    Huang, Yu-zhen
    Lu, Ming-yue
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (06) : 850 - 862
  • [3] Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers
    Yang, Ye
    Li, Qiang
    Ma, Wing-Kin
    Ge, Jianhua
    Ching, P. C.
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2013, 20 (01) : 35 - 38
  • [4] Robust Joint Beamforming and Artificial Noise Design for Secure AF Relay Networks
    Wang, Chao
    Wang, Hui-Ming
    [J]. 2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 402 - 406
  • [5] Optimal Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Rate Maximization in AF Relay Networks
    Yang, Ye
    Li, Qiang
    Ma, Wing-Kin
    Ge, Jianhua
    Lin, Meilu
    [J]. 2013 IEEE 14TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2013, : 360 - 364
  • [6] Robust Beamforming and Jamming for Secure AF Relay Networks with Multiple Eavesdroppers
    Zhang, Cong
    Gao, Hui
    Liu, Haijing
    Lv, Tiejun
    [J]. 2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 495 - 500
  • [7] Network Beamforming in Energy-Harvesting Relay Networks
    Wang, Dexin
    Zhang, Rongqing
    Cheng, Xiang
    Yang, Liuqing
    [J]. 2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [8] Joint beamforming and power splitting design for two way AF relay networks with energy harvesting
    Shao, Jun
    Zhu, Jinxin
    [J]. Progress in Electromagnetics Research Letters, 2020, 90 : 37 - 43
  • [9] Joint Beamforming and Power Splitting Design for Two Way AF Relay Networks with Energy Harvesting
    Shao, Jun
    Zhu, Jinxin
    [J]. PROGRESS IN ELECTROMAGNETICS RESEARCH LETTERS, 2020, 90 : 37 - 43
  • [10] Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
    Khandaker, Muhammad R. A.
    Wong, Kai-Kit
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 40 - 54