Abstract

Simultaneous wireless information and power transfer (SWIPT) becomes more and more popular in cognitive radio (CR) networks, as it can increase the resource reuse rate of the system and extend the user’s lifetime. Due to the deployment of energy harvesting nodes, traditional secure beamforming designs are not suitable for SWIPT-enabled CR networks as the power control and energy allocation should be considered. To address this problem, a dedicated green edge power grid is built to realize energy sharing between the primary base stations (PBSs) and cognitive base stations (CBSs) in SWIPT-enabled mobile edge computing (MEC) systems with CR. The energy and computing resource optimal allocation problem is formulated under the constraints of security, energy harvesting, power transfer, and tolerable interference. As the problem is nonconvex with probabilistic constraints, approximations based on generalized Bernstein-type inequalities are adopted to transform the problem into solvable forms. Then, a robust and secure artificial noise- (AN-) aided beamforming algorithm is presented to minimize the total transmit power of the CBS. Simulation results demonstrate that the algorithm achieves a close-to-optimal performance. In addition, the robust and secure AN-aided CR based on SWIPT with green energy sharing is shown to require a lower transmit power compared with traditional systems.

1. Introduction

In future mobile edge computing (MEC) networks, a great number of energy-limited internet of things (IoT) devices will be deployed to collect the data of system status and environment [1, 2]. Providing wireless power transfer capability is of great importance to relieve energy unbalance and prolong the system lifetime. In practice, radio frequency (RF) signals surrounding the communication systems are more controllable and stable to realize the simultaneous wireless information and power transfer (SWIPT) [35] in networks [6], which is a significant way to power the energy-limited edge nodes by transferring wireless energy and information simultaneously with the same waveform.

Cognitive radio (CR) is another meaningful way to utilize a spectrum efficiently for resource reusing in MEC networks. With the spectrum sharing in CR, secondary users (SUs) can coexist with the primary base station (PBS) and primary users (PUs) under the condition that the interference caused by the cognitive base station (CBS) is tolerable to PUs. Recently, many researches are considering about applying SWIPT into the CR network with energy-constrained devices to improve network efficiency and stabilization [711]. In [7], a SWIPT-enabled CR network was designed, in which the CBS provided SWIPT services to the secondary users, and the worst-case of SU for energy harvesting and tolerable interference power for PU were balanced based on the binary search method. This research can alleviate the double near-far problem in the energy harvesting network to a certain extent.

In light of the relay needs for network, [9] proposed an SWIPT-enabled CR framework in which the CBSs were integrated with relay capabilities to provide relay services opportunistically for the primary users. The novel framework in [9] was proposed to integrate the SWIPT-enabled CR technology into new scenarios and applications. [10] and [11], respectively, studied the wideband sensing problem under worst-case and max–min fairness case with a SWIPT-based CR framework, in order to achieve higher spectrum and energy utilization in wireless sensor networks.

Inspired by the SWIPT-enabled CR framework, we propose a novel mobile edge computing with SWIPT-enabled CR to realize the optimal allocation of energy and computing resources in this paper. CBSs and PBSs are selected with abundant energy to join the edge network, and a dedicated green edge power grid is built to achieve the energy flow and balance between those edge nodes. At the same time, we should also consider the security issues [12, 13] in the SWIPT-based network.

The characteristics of the wireless channel determine that the security rate of its physical layer is limited by channel state information (CSI) [14]. In CR networks, the transmission power of CBS in the secondary network is limited to prevent the primary users from interfering, which further affects the security rate [15]. At the same time, the formulation of a network operation strategy should take the limited energy of energy harvesting nodes (EHNs) into account. In fact, there is no cooperation among SUs, PUs, and EHNs in the CR network, so there are errors in channel estimation and quantification on SWIPT-enabled CR links that cannot be ignored. These errors seriously affect the efficiency of beamforming. Therefore, it is necessary to design a robust secure beamforming scheme for SWIPT-enabled CR MEC.

Aiming at the physical layer security of SWIPT, [1618], respectively, studied the total transmission power minimization, safety rate maximization, and maximum minimum fairness optimization problem. On the other hand, in the SWIPT-based CR network, since the physical location of EHNs is closer to the transmitter to meet the demand of wireless power density for energy harvesting, it is possible for EHNs act as malicious eavesdroppers disturbing the reception of information receivers. Therefore, in the SWIPT design, a secure rate becomes an essential factor. In [16], a secure beamforming design in MISO SWIPT was proposed where there are multiple information receivers, energy receivers, and eavesdroppers coexisting. Similar to [16, 19], investigated a worst-case optimal problem under constraints of transmit power and harvested power in MISO SWIPT. Specifically, the secure and robust transmission strategy in the worst-case energy allocation problem for the MISO channel and multiple input and multiple output (MIMO) channel was also studied in [20, 21]. [22, 23] extended the strategy for multiple eavesdroppers with multiple antennas. For instance, an artificial noise- (AN-) aided transmit beamforming was designed in [24], which is an efficient way to improve the system secrecy rate efficiently. In [2426], AN-aided transmission strategies for secret SWIPT were proposed in MISO, single input and single output (SISO), and MIMO channels. In [24], both perfect and imperfect CSI were considered for AN-aided SWIPT design. And with the channel uncertainties, [27] investigates the problem based on the bounded CSI and probabilistic CSI error model, respectively. However, the proposed schemes in [2427] are difficult to be applied into the SWIPT CR network, because the energy harvesting requirement and the interference of a secondary network have not been taken into account.

This paper designs a SWIPT-enabled CR framework for MEC. By considering the energy allocation, power control, and interference constraints, an efficient and robust AN-aided secure beamforming strategy is designed to achieve better system gains. The main contributions of this paper are as follows.

First, a robust secure beamforming strategy for a CR network powered with SWIPT is proposed. The interference caused by the secondary network and the energy harvesting requirement for EHNs are both considered in our framework. By formulating as an inequality constraint in the system models, the security of the SWIPT-enabled CR network is also taken into account to minimize the transmit power.

Second, since the PBSs in the primary network and the CBSs in the secondary network are powered by green energy, we build a dedicated edge power grid made up of those PBSs and CBSs to share their redundant resources with the others. Therefore, energy balancing and computing offloading can be operated efficiently during these edge base stations in the MEC.

Third, a probabilistic CSI model is designed to characterize the CSI error, which is more suitable for delay-sensitive applications than the bounded CSI model. Subsequently, the optimal beamforming solution is solved by software CVX [28], and a 1-D algorithm is designed to approximate the optimal solution of the system with reasonable computational complexity.

Notations. For a square matrix , , , and denote its Hermitian (conjugate) transpose, trace, and rank, respectively. , , and denote the set of all the complex matrices, real matrices, and Hermitian matrices. () indicates that matrix is positive definite or semidefinite. In particular, the distribution of complex Gaussian random vectors with mean and variance is denoted by .

2. System Model

The SWIPT-enabled CR MEC network is shown in Figure 1, in which the PBS and CBS act as MEC servers for users as well as the CBS providing SWIPT services for the cognitive network. There are SUs, PUs, and ERs coexisting in the network. The CBS is equipped with antennas as the PBS has only one. The SUs and ERs are also equipped with single antenna nodes to harvest RF energy from the ambient environment. In practice, the idle users in the cognitive radio network may act as energy receivers (ERs) harvesting energy for further use, which makes the information receivers to may be eavesdrop or intercept during the communication durations. Thus, there are two problems in this system that need to be solved, which are energy sharing during edge nodes and power control for the cognitive network. We first assume that all the PUs are friendly nodes [2931] and all the channels are characterized by quasistatic fading models. Then, system models are performed in the next sections.

2.1. Channel Model

The signals received by , , and , , denoted by and , respectively, can be given aswhere and are the channel vectors between the CBS and the th SU and the th ER, respectively. In (1), is the signal vector transmitted by the CBS to SUs and ERs. and are the complex Gaussian noise at SUs and ERs with zero mean and variances and , which include terminal noise, signal processing noise, interference from PBS, and joint effects of received multicell interference.

In addition, the , , receiver is interfered by CBS, and the interference signal iswhere is channel vector of the CBS to the th PU receiver. The interference from the PBS to the secondary network is negligible as other researches [3032].

2.2. CSI

Based on channel reciprocities [7, 33, and 34], it is assumed that , , is accusable for both CBS and SUs. However, channel vectors and may not be known accurately, as the PUs, CBS, and ERs have no cooperation existing. As a result, we introduce probabilistic CSI models [21, 33, and 35] to characterize the outdated channel vector errors. The channel vectors follow stochastic distributions, which arewhere and are the channel estimated CSI available at the CBS and and denote the channel error vectors, respectively, with zero mean and covariance matrices and , correspondingly. In addition, is independent of others for different , and is independent of others for different .

2.3. Signal and Secure Rate Models

Actually, the ERs in the cognitive network may be illegal eavesdroppers as they have shorter transmit distance from the CBS. Thus, the secrecy of secondary users should be considered. In this paper, we propose a robust AN-aided communication strategy for CBS to efficiently transmit wireless information to end users. The transmitted signal vector is added with an artificial noise vector, which iswhere is the dedicated beamforming vector allocated to and denotes the data symbol for . Without loss of generality, we assumed that , . is the AN vector transmitted by the CBS with , in which is the covariance matrix of AN and , . Thus, the achievable data rate (ADR) of the transmission link between the CBS and isand the signal to interference plus noise ratio (SINR) can be denoted as

On the other hand, the ADR between the CBS and and SINR of are given by

Since the ERs are potential eavesdroppers, the secrecy rate of is .

2.4. System Power Supply Model

As previously described, a dedicated edge power grid is built to solve the energy sharing problem. CBSs and PBSs are selected to form a MEC network with energy sharing abilities. As shown in Figure 2, wind turbines and photovoltaic panels are appropriately prepared for MEC nodes as green energy harvesting devices. Furthermore, redundant energy of those MEC nodes can be shared with each other through the power grid. Theoretically, the SWIPT-enabled CR MEC framework with energy sharing can be easily expended for unlimited scale and infinite computing abilities. Here, we denote that the energy shared by the PBS and CBS is and , respectively. Then, the power loss of the grid caused by lines is given bywhere , , is a -coefficient matrix [34] which represents the energy consumption characters during its conversion process. It is noted that, for a fixed power grid topology with fixed numbers of sources and loads, the -coefficient matrix is constant.

3. Problem Formulation

The energy balance can be realized by the sharing abilities of the MEC node based on the CR framework. In particular, the secure AN-aided SWIPT beamforming strategy is designed in each single CR network to minimize the MEC node transmit power under constraints of secrecy rate outage probability, energy harvesting, interferences, etc.:where denotes the CBS minimum secrecy requirement; , , and are the maximum outage probabilities of secrecy rate, the maximum tolerable interference power at PUs, and the minimum energy harvesting requirement of th ER, respectively; denotes the minimum required power transfer to ; and represents the RF-to-DC conversion efficiency of the ERs. in constraint indicates the allowance max-power for transmission at the CBS. In , and represent the localized power expenditure of the PBS and the CBS; the term is the output power of CBS, and denotes the power efficiency of the power amplifier. The maximum power transmitting to the power grid from energy sources is constrained by .

4. Robust Secure SWIPT Beamforming Design

P1 is an optimization problem with nonconvex forms and probabilistic constraints, which make P1 difficult to solve. Approximations based on Bernstein-type inequalities are first facilitated to transfer the outage probabilistic constraints , , and into clear and closed forms separately and safely. Then, a 1-D algorithm is proposed for computers to calculate the optimal solutions.

Lemma 1 (Bernstein-type inequalities [34, 35]). Let , where , , and . For any , the approximate and convex forms transferred by and can be separately written bywhere and are slack variables.

Let ,, . By applying Lemma 1, can be transferred towhere and are slack variables.

Note. In the equation , the conversion process from to (13) is realized by

Proof. (see the appendix).

Similar to the constraint , based on Lemma 1, can be approximated aswhere and are slack variables. Let , , using Lemma 1, constraint is approximated bywhere and are slack variables.

Although the approximated forms of (13), (18), and (21) are deterministic forms, the problem P1 is still difficult to solve due to the nonconvex caused by fractional and coupling constraints. In particular, we take advantage of the characteristics of fractional parameter , which can be seen that . Thus, for a given , suboptimal computed solutions can be obtained by a proposed 1-D search method. The relaxation of P1 isin which guarantees that . As is a rank-one, a safe relaxation is introduced to make P2 convex by removing from P2’s constraints. Then, the optimal solutions are obtained by convex programming software CVX [28].

Algorithm 1 is the detail of the 1-D algorithm. In this case, parameters , , and have to be initialized and the search interval of the uniform search variable is (0,1]. It is noted that the problem P2 cannot make the matrices rank-one. If the solutions are rank-one for all SUs, the optimal secure beamforming vector can be obtained through eigenvalue decomposing of . If the solutions are not rank-one, Gaussian randomization procedure can be used to find the suboptimal solutions. Meanwhile, the corresponding optimal objective value provides the lower bound of (24) [35].

1: Initialization:.
2: Input:.
3: Set: The iteration index n=1, the step length factor of the
1-D search .
4: Optimization:
5: for=::1
6: solve the P3,
    obtain ;
    set n=n+1.
7: end
8: Comparison: Find the optimal from the n

5. Simulation Results

Based on the proposed 1-D algorithm, this section illustrates the system gains by simulations. The SWIPT-enabled CR MEC network is considered with 2 SUs, 3 ERs, and 4 PUs. The antennas of the CBS are . Table 1 details the parameters for simulations. We discuss the system gains realized by the secure beamforming compared with ideal cases.

The real energy harvesting data are descripted in Figure 3, which are collected by Guangxi Power Grid Co., Ltd with the intervals of fifteen minutes. In practice, the information transmission coherence times are small enough, which can be ignored compared with the power transfer intervals. Thus, is supposed to be a known constant; that is to say, the PBS and CBS can use energy harvested in current intervals based on the knowledge of harvesting status. Those approaches contribute to the constraint in problem formulations; the energy cooperation is realized between PBS and CSB until the problem is solved and the average minimum energy sequences are obtained.

Figure 4 is 500 calculations for the CDF of the CBS optimized transmit power under the probabilistic CSI with minimum secrecy rate (SR) constraint, the probabilistic CSI without minimum SR constraint, the perfect CSI with minimum SR constraint, and the perfect CSI without minimum SR constraint, separately. It can be seen that the minimum power transmitted by the CBS under the probabilistic CSI error models is bigger than the other scenes as the channel uncertainty takes more energy consumptions to meet the expected secrecy rate. Figure 5 indicates the CDF of the secrecy rate of the 500 calculations, from which we can see that with the minimum secrecy rate constraint, the system can achieve higher security rates and the imperfect CSI significantly reduce the system preference. It is worth noting that the cumulative probabilities under probabilistic CSI and perfect CSI scenes are started from the position of the lowest safety rate, and the minimum secrecy rate is 1.5 bit/s/Hz. The vertical parts of the CDF curves are caused by the introduction of secrecy rate constraints.

The minimum power transmitted by CBS is shown in Figure 6 under different secrecy rate requirements and different numbers of ERs. is set as , , or . Figure 6(a) concluded that a higher secure rate results in greater energy consumption. Furthermore, the transmit power of CBS decreases with increases; this is because more antennas degrees the source allocation with higher degrees of freedom. Figure 6(b) describes the relationship between ERs and CBS optimal transmit power.

6. Conclusions

This paper proposes a SWIPT-enabled CR framework for MEC networks. A dedicated edge power grid is built for sharing energy among MEC nodes to balance the energy distribution. In particular, robust AN-aided secure beamforming is designed for CR networks to realize secure communications and optimal power control. Bernstein-type inequalities are introduced to transfer the problem into closed and safely relaxed forms. The solutions are obtained with the designed 1-D algorithm. Simulation results proved the effectiveness and performance of the proposed scheme. System gains are also achieved with the cost of implementation complexities.

Appendix

The Proof of Lemma 1

Let and , we can rewrite the inequality as the following form:

Due to the nonnegative of the denominator in the above inequality, we have

After the equation , , , is substituted and performed some algebraic manipulations; (A.2) can be rewritten as

Let , then the first term of the polynomial of the left side in the inequality (A.3) is rewritten as

Based on the expression in Lemma 1, is equivalent to and is equivalent to . Then, the rest of polynomial is converted as

Therefore, in the expression is equivalent to , and is equivalent to .

Finally, the constraint can be equivalently expressed as (A.6), where and are slack variables:

This completes the proof.

Data Availability

This paper is based on mathematical models of wireless networks including the channel model, communication model, energy model, and computing models.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61762010, in part by the Guangxi University for Nationalities Introduction of Talents Research Project Foundation under Grant 2019KJQD17, in part by the Natural Science Foundation of Guangxi under Grant 2018GXNSFAA294155, and also in part by the Beijing Intelligent Logistics System Collaborative Innovation Center under Grant BILSCIC-2019KF-07.