Skip to main content

Advertisement

Log in

DCA approaches for simultaneous wireless information power transfer in MISO secrecy channel

  • Research Article
  • Published:
Optimization and Engineering Aims and scope Submit manuscript

Abstract

This paper addresses the emerging practical requirement that wireless information and power transfer are employed simultaneously in a multiple-input single-output (MISO) secrecy channel. Transmit beamforming without artificial noise and that with artificial noise are considered. In addition, perfect and imperfect channel state information of both the legitimate receivers and eavesdroppers are investigated. These four scenarios correspond to four optimization problems. The considered problems aim to maximize the secrecy rate with constraints on the transmit power and the harvested energy at each receiver. Since these optimization problems are nonconvex, we propose the efficient algorithms based on Difference of Convex (DC) functions programming and DC Algorithm (DCA )—an innovative approach in nonconvex optimization. Exploiting the special structure of these problems, we utilize the semidefinite relaxation technique and S-procedure to reformulate them as general DC programs. The efficient algorithms based on general DCA are developed to solve the corresponding general DC programs. Numerical results are presented which illustrate the effectiveness of our proposed algorithms, they outperform the existing approaches in terms of both quality and rapidity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Chen X, Ng DWK, Chen H (2016) Secrecy wireless information and power transfer: challenges and opportunities. IEEE Wirel Commun 23(2):54–61

    Article  Google Scholar 

  • Chen D, He Y, Lin X, Zhao R (2018) Both worst-case and chance-constrained robust secure SWIPT in MISO interference channels. IEEE Trans Inf Forensics Secur 13(2):306–317

    Article  Google Scholar 

  • Chu Z, Zhu Z, Johnston M, Le Goff SY (2016) Simultaneous wireless information power transfer for MISO secrecy channel. IEEE Trans Veh Technol 65(9):6913–6925

    Article  Google Scholar 

  • Feng R, Li Q, Zhang Q, Qin J (2015) Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans Veh Technol 64(1):400–405

    Article  Google Scholar 

  • Feng Y, Yang Z, Zhu W, Li Q, Lv B (2017) Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE Trans Veh Technol 66(3):2354–2366

    Article  Google Scholar 

  • Grant M, Boyd S (2014) CVX: Matlab software for disciplined convex programming, version 2.1. http://cvxr.com/cvx

  • Khandaker MRA, Wong K (2015a) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans Inf Forensics Secur 10(1):40–54

    Article  Google Scholar 

  • Khandaker MRA, Wong K (2015b) Robust secrecy beamforming with energy-harvesting eavesdroppers. IEEE Wirel Commun Lett 4(1):10–13

    Article  Google Scholar 

  • Le Thi HA, Pham Dinh T (2005) The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann Oper Res 133(1):23–46

    MathSciNet  MATH  Google Scholar 

  • Le Thi HA, Huynh VN, Pham Dinh T (2014) DC programming and DCA for general DC programs. In: Advances in intelligent systems and computing, vol 282. Springer, pp 15–35

  • Le Thi HA, Pham Dinh T (2018) DC programming and DCA: thirty years of developments. Math Program 169(1):5–68

    Article  MathSciNet  MATH  Google Scholar 

  • Li Q, Ma W, So AM (2014) Robust artificial noise-aided transmit optimization for achieving secrecy and energy harvesting. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1596–1600

  • Liu L, Zhang R, Chua K (2014) Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans Signal Process 62(7):1850–1863

    Article  MathSciNet  MATH  Google Scholar 

  • Lu X, Wang P, Niyato D, Kim DI, Han Z (2015) Wireless networks with RF energy harvesting: a contemporary survey. IEEE Commun Surv Tutor 17(2):757–789

    Article  Google Scholar 

  • Ng DWK, Schober R (2013) Resource allocation for secure communication in systems with wireless information and power transfer. In: 2013 IEEE globecom workshops (GC Wkshps), pp 1251–1257

  • Ng DWK, Xiang L, Schober R (2013) Multi-objective beamforming for secure communication in systems with wireless information and power transfer. In: 2013 IEEE 24th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), pp 7–12

  • Niu H, Zhang B, Huang Y, Guo D, Chu Z, Zhu Z (2019) Robust secrecy beamforming and power-splitting design for multiuser MISO downlink with SWIPT. IEEE Syst J 13(2):1367–1375

    Article  Google Scholar 

  • Pham Dinh T, Le Thi HA (1997) Convex analysis approach to d.c. programming: theory, algorithm and applications. Acta Math Vietnam 22(1):289–355

    MathSciNet  MATH  Google Scholar 

  • Pham Dinh T, Le Thi HA (1998) D.C. optimization algorithms for solving the trust region subproblem. SIAM J Optim 8(2):476–505

    Article  MathSciNet  MATH  Google Scholar 

  • Pham Dinh T, Le Thi HA (2014) Recent advances in DC programming and DCA. Trans Comput Intell 8342:1–37

    Google Scholar 

  • Rashid U, Tuan HD, Kha HH, Nguyen HH (2014) Joint optimization of source precoding and relay beamforming in wireless MIMO relay networks. IEEE Trans Commun 62(2):488–499

    Article  Google Scholar 

  • Tian M, Huang X, Zhang Q, Qin J (2015) Robust an-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process Lett 22(6):723–727

    Article  Google Scholar 

  • Wang S, Wang B (2015) Robust secure transmit design in MIMO channels with simultaneous wireless information and power transfer. IEEE Signal Process Lett 22(11):2147–2151

    Article  Google Scholar 

  • Wang X, Feng W, Chen Y, Chu Z, Ge N (2018) Energy-efficiency maximization for secure multiuser MIMO SWIPT systems with CSI uncertainty. IEEE Access 6:2097–2109

    Article  Google Scholar 

  • Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387

    Article  MathSciNet  MATH  Google Scholar 

  • Zhang C, Gao H, Liu H, Lv T (2014) Robust beamforming and jamming for secure AF relay networks with multiple eavesdroppers. In: 2014 IEEE military communications conference, pp 495–500

  • Zhang H, Li C, Huang Y, Yang L (2015) Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Commun Lett 19(8):1347–1350

    Article  Google Scholar 

  • Zhang H, Huang Y, Li C, Yang L (2016) Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers. IEEE Trans Wireless Commun 15(11):7807–7819

    Article  Google Scholar 

  • Zhao X, Xiao J, Li Q, Zhang Q, Qin J (2015) Joint optimization of an-aided transmission and power splitting for MISO secure communications with SWIPT. IEEE Commun Lett 19(11):1969–1972

    Article  Google Scholar 

  • Zou Y, Wang X, Shen W (2013) Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior. In: Proceedings of the 2013 IEEE 17th international conference on computer supported cooperative work in design (CSCWD), pp 704–709

  • Zou Y, Wang X, Shen W (2013) Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack. In: 2013 IEEE international conference on communications (ICC), pp 2183–2187

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phuong Anh Nguyen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nguyen, P.A., Le Thi, H.A. DCA approaches for simultaneous wireless information power transfer in MISO secrecy channel. Optim Eng 24, 5–29 (2023). https://doi.org/10.1007/s11081-020-09570-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11081-020-09570-3

Keywords

Navigation