Abstract
This paper addresses the emerging practical requirement that wireless information and power transfer are employed simultaneously in a multiple-input single-output (MISO) secrecy channel. Transmit beamforming without artificial noise and that with artificial noise are considered. In addition, perfect and imperfect channel state information of both the legitimate receivers and eavesdroppers are investigated. These four scenarios correspond to four optimization problems. The considered problems aim to maximize the secrecy rate with constraints on the transmit power and the harvested energy at each receiver. Since these optimization problems are nonconvex, we propose the efficient algorithms based on Difference of Convex (DC) functions programming and DC Algorithm (DCA )—an innovative approach in nonconvex optimization. Exploiting the special structure of these problems, we utilize the semidefinite relaxation technique and S-procedure to reformulate them as general DC programs. The efficient algorithms based on general DCA are developed to solve the corresponding general DC programs. Numerical results are presented which illustrate the effectiveness of our proposed algorithms, they outperform the existing approaches in terms of both quality and rapidity.
Similar content being viewed by others
References
Chen X, Ng DWK, Chen H (2016) Secrecy wireless information and power transfer: challenges and opportunities. IEEE Wirel Commun 23(2):54–61
Chen D, He Y, Lin X, Zhao R (2018) Both worst-case and chance-constrained robust secure SWIPT in MISO interference channels. IEEE Trans Inf Forensics Secur 13(2):306–317
Chu Z, Zhu Z, Johnston M, Le Goff SY (2016) Simultaneous wireless information power transfer for MISO secrecy channel. IEEE Trans Veh Technol 65(9):6913–6925
Feng R, Li Q, Zhang Q, Qin J (2015) Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans Veh Technol 64(1):400–405
Feng Y, Yang Z, Zhu W, Li Q, Lv B (2017) Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE Trans Veh Technol 66(3):2354–2366
Grant M, Boyd S (2014) CVX: Matlab software for disciplined convex programming, version 2.1. http://cvxr.com/cvx
Khandaker MRA, Wong K (2015a) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans Inf Forensics Secur 10(1):40–54
Khandaker MRA, Wong K (2015b) Robust secrecy beamforming with energy-harvesting eavesdroppers. IEEE Wirel Commun Lett 4(1):10–13
Le Thi HA, Pham Dinh T (2005) The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann Oper Res 133(1):23–46
Le Thi HA, Huynh VN, Pham Dinh T (2014) DC programming and DCA for general DC programs. In: Advances in intelligent systems and computing, vol 282. Springer, pp 15–35
Le Thi HA, Pham Dinh T (2018) DC programming and DCA: thirty years of developments. Math Program 169(1):5–68
Li Q, Ma W, So AM (2014) Robust artificial noise-aided transmit optimization for achieving secrecy and energy harvesting. In: 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 1596–1600
Liu L, Zhang R, Chua K (2014) Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans Signal Process 62(7):1850–1863
Lu X, Wang P, Niyato D, Kim DI, Han Z (2015) Wireless networks with RF energy harvesting: a contemporary survey. IEEE Commun Surv Tutor 17(2):757–789
Ng DWK, Schober R (2013) Resource allocation for secure communication in systems with wireless information and power transfer. In: 2013 IEEE globecom workshops (GC Wkshps), pp 1251–1257
Ng DWK, Xiang L, Schober R (2013) Multi-objective beamforming for secure communication in systems with wireless information and power transfer. In: 2013 IEEE 24th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), pp 7–12
Niu H, Zhang B, Huang Y, Guo D, Chu Z, Zhu Z (2019) Robust secrecy beamforming and power-splitting design for multiuser MISO downlink with SWIPT. IEEE Syst J 13(2):1367–1375
Pham Dinh T, Le Thi HA (1997) Convex analysis approach to d.c. programming: theory, algorithm and applications. Acta Math Vietnam 22(1):289–355
Pham Dinh T, Le Thi HA (1998) D.C. optimization algorithms for solving the trust region subproblem. SIAM J Optim 8(2):476–505
Pham Dinh T, Le Thi HA (2014) Recent advances in DC programming and DCA. Trans Comput Intell 8342:1–37
Rashid U, Tuan HD, Kha HH, Nguyen HH (2014) Joint optimization of source precoding and relay beamforming in wireless MIMO relay networks. IEEE Trans Commun 62(2):488–499
Tian M, Huang X, Zhang Q, Qin J (2015) Robust an-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process Lett 22(6):723–727
Wang S, Wang B (2015) Robust secure transmit design in MIMO channels with simultaneous wireless information and power transfer. IEEE Signal Process Lett 22(11):2147–2151
Wang X, Feng W, Chen Y, Chu Z, Ge N (2018) Energy-efficiency maximization for secure multiuser MIMO SWIPT systems with CSI uncertainty. IEEE Access 6:2097–2109
Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387
Zhang C, Gao H, Liu H, Lv T (2014) Robust beamforming and jamming for secure AF relay networks with multiple eavesdroppers. In: 2014 IEEE military communications conference, pp 495–500
Zhang H, Li C, Huang Y, Yang L (2015) Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Commun Lett 19(8):1347–1350
Zhang H, Huang Y, Li C, Yang L (2016) Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers. IEEE Trans Wireless Commun 15(11):7807–7819
Zhao X, Xiao J, Li Q, Zhang Q, Qin J (2015) Joint optimization of an-aided transmission and power splitting for MISO secure communications with SWIPT. IEEE Commun Lett 19(11):1969–1972
Zou Y, Wang X, Shen W (2013) Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior. In: Proceedings of the 2013 IEEE 17th international conference on computer supported cooperative work in design (CSCWD), pp 704–709
Zou Y, Wang X, Shen W (2013) Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack. In: 2013 IEEE international conference on communications (ICC), pp 2183–2187
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Nguyen, P.A., Le Thi, H.A. DCA approaches for simultaneous wireless information power transfer in MISO secrecy channel. Optim Eng 24, 5–29 (2023). https://doi.org/10.1007/s11081-020-09570-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11081-020-09570-3