Next Article in Journal
Nanomaterial-Mediated Electrochemical and Optical Biosensors and Their Application in Tumour Marker Detection
Previous Article in Journal
EMPhone: Electromagnetic Covert Channel via Silent Audio Playback on Smartphones
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach

1
Electronic Information School, Hubei Three Gorges Polytechnic, Yichang 443199, China
2
School of Artificial Intelligence, Hubei University, Wuhan 430062, China
3
School of Automation, China University of Geosciences (Wuhan), Wuhan 430074, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(18), 5901; https://doi.org/10.3390/s25185901
Submission received: 11 August 2025 / Revised: 10 September 2025 / Accepted: 19 September 2025 / Published: 21 September 2025
(This article belongs to the Section Communications)

Abstract

This paper investigates a simultaneous wireless information and power transfer (SWIPT) decode-and-forward (DF) relay network, where a source node transmits data to a destination node through the assistance of multi-hop passive relays. We employ the time-switching (TS) protocol, enabling the relays to harvest energy from the received previous hop signal to support data forwarding. We first prove that the system throughput monotonically increases with the transmit power of the source node. Next, by employing logarithmic transformations, we convert the non-convex problem of obtaining optimal TS ratios at each relay to maximize the system throughput into a convex optimization problem. Comprehensively taking into account the convergence rate, computational complexity per iteration, and robustness, we selected the log barrier method—a type of interior point method—to address this convex optimization problem, along with providing a detailed implementation procedure. The simulation results validate the optimality of the proposed method and demonstrate its applicability to practical communication systems. For instance, the proposed scheme achieves 1437.3 bps throughput at 40 dBm maximum source power in a 2-relay network—278.6% higher than that of the scheme with TS ratio fixed at 0.75 (379.68 bps). On the other hand, it converges within a 1.36 ms computation time for 5 relays, 6 orders of magnitude faster than exhaustive search (1730 s).

1. Introduction

1.1. Background

A wireless multi-hop relay network is a communication system that enables data forwarding from a source node to a destination node through the coordinated operation of multiple relay nodes. Its core technical concept involves replacing traditional single-hop links with flexible multi-segment short-hop links. This approach expands wireless communication coverage, addresses challenges caused by signal attenuation and interference, and ultimately enhances system capacity and energy efficiency. With remarkable flexibility in network configuration, this system is widely applicable to wireless sensor networks (WSNs), the Internet of Things (IoT), and emergency communication networks, and has emerged as one of the foundational solutions for these network paradigms [1,2]. For instance, when obstacles between the source and destination nodes prevent line-of-sight (LoS) transmission, relays can establish independent LoS links between consecutive hops in a multi-hop relay network. Although this approach requires additional communication time slots, it significantly enhances the signal-to-noise ratio (SNR) at the destination node.
In wireless multi-hop relay networks, powering relay nodes through built-in batteries introduces the challenge of significant labor costs associated with frequent battery replacements—an issue particularly pronounced in remote areas, industrial monitoring systems, or large-scale IoT deployments. Furthermore, battery lifespan is influenced by environmental temperature, depth of discharge, and other factors, adding complexity to network maintenance. Wireless energy harvesting (EH) technology stands as a robust candidate solution to address these challenges. By harnessing ambient radio frequency (RF) signals—a renewable energy source surrounding relay nodes—this technology enables relay nodes to achieve self-sustaining operation, thereby eliminating reliance on manual intervention [3,4]. Traditional EH technology focuses solely on extracting energy from the environment. Simultaneous wireless information and power transfer (SWIPT) is a subset of EH technology in the RF domain. The core innovation of SWIPT lies in its ability to leverage the same RF signal for simultaneous transmission of both information and energy [5,6]. By implementing SWIPT technology in multi-hop relay networks, relay nodes can assist the source node in delivering information to the destination node through hop-by-hop transmission without relying on batteries or external power supplies. That is, the relay nodes rely entirely on RF signal-based EH, with the harvested energy stored in integrated supercapacitors and fully utilized to power their information transmission to the next node during the information decoding (ID) phase.
Within the framework of SWIPT, the time-switching (TS) protocol and power-splitting (PS) protocol are two dominant approaches. Taking the TS protocol as an example, under this protocol, the receiver periodically toggles between EH and ID states via switching circuitry, thereby dividing each transmission slot into two subintervals: one dedicated to EH and the other to ID [7]. Their time allocation ratio, i.e., the TS ratio, is a critical parameter governing system performance trade-offs: extending the EH interval increases total harvested energy but simultaneously reduces the information transmission duration, leading to communication rate degradation. Therefore, balancing EH efficiency and communication quality by optimizing the TS ratio under the TS protocol or, correspondingly, optimizing the PS ratio under the PS protocol constitutes the core challenge in designing resource allocation algorithms for SWIPT systems [8]. Particularly in multi-hop relay networks with more than one relay node, the joint optimization of wireless resource allocation—including transmit power and multiple TS ratios or PS ratios—presents an even more intractable problem, which constitutes the primary research focus of this paper.

1.2. Related Work

In existing studies on SWIPT-enabled multi-hop relay networks, research efforts have primarily focused on optimizing specific performance metrics through resource allocation or analyzing system performance characteristics. The majority of early-stage investigations were concentrated on dual-hop relay networks employing amplify-and-forward (AF) or decode-and-forward (DF) relaying protocols [9,10,11,12,13,14,15,16]. For instance, reference [9] investigated the application of PS-SWIPT to establish a full-duplex dual-hop relay network where concurrent information reception and transmission are continuously maintained at the relay node. Compared with benchmark schemes, their proposed method more thoroughly utilizes the full-duplex characteristics, thereby significantly improving capacity. In [10], the authors investigated the secure relay beamforming problem for SWIPT in an AF two-way relay network. When the eavesdropper’s channel state information (CSI) is available, the optimization objective is to maximize the achievable secrecy sum rate under transmit power constraints and EH constraints. To reduce computational complexity, they proposed an iterative algorithm based on sequential parameter convex approximation to seek local optimal solutions. When the eavesdropper’s CSI is unavailable, they introduced an artificial noise-assisted secure relay beamforming scheme. In [11], the authors investigated the outage performance of PS-SWIPT relaying systems with a direct link between the source and destination. They first provided an outage probability analysis in closed-form expressions based on a high SNR approximation. It was demonstrated that the diversity order of SWIPT relaying systems remains identical to that of conventional non-SWIPT systems. The closed-form expressions further derived the closed-form solution for the optimal PS factor that minimizes the outage probability. In [12], the authors proposed a dynamic asymmetric PS scheme to minimize system outage probability by leveraging asymmetric instantaneous channel gains between the relay and destination nodes. They reformulated the intractable non-convex optimization problem into a fractional programming problem and developed a Dinkelbach-based iterative algorithm to find the optimal asymmetric PS ratios. Compared with existing static symmetric PS schemes, their proposed scheme with identical CSI overhead achieves a significant reduction in system outage probability. Reference [13] investigated the relay selection problem in full-duplex two-way relay networks, where relays are wirelessly powered by harvesting signal energy from source nodes. The authors demonstrated the quasi-convexity of the PS factor optimization problem and derived the optimal PS factor through linear search to minimize outage probability. Furthermore, corresponding relay selection schemes were developed for both single-relay scenarios and general cooperative scenarios with unrestricted relay quantities. In [14], the authors analyzed SWIPT-enabled battery-aided full-duplex relay networks, where relays supplement harvested energy with stored power to enhance reliability. By considering both TS and PS protocols, comparative analyses of outage probability and throughput were conducted for AF/DF relaying. For both AF/DF configurations, they identified a unique optimal battery energy threshold that maximizes throughput, establishing closed-form expressions for TS/PS parameters. An optimization framework was developed to prolong battery lifetime while achieving the target throughput.
In recent years, research on SWIPT-enabled multi-hop relay networks has shifted beyond single-relay scenarios to gradually encompass multi-relay configurations. However, studies specifically targeting multi-relay scenarios [17,18,19,20,21,22,23,24,25] remain significantly less prevalent compared to those focused on single-relay systems. As outlined in Section 1.1, resource allocation problems in multi-relay scenarios exhibit heightened complexity. This paper conducts a systematic investigation of current research advancements in this domain as follows. For instance, Reference [17] presented a pioneering investigation into multi-relay configurations, focusing on the DF protocol implementation in multi-hop wireless relay networks. This study established a SWIPT-enabled modeling framework incorporating a hybrid TS/PS protocol under fixed source transmit power with the objective of end-to-end throughput maximization. However, while having formulated protocol-specific optimization problems as convex programming models, this work provides no substantive derivation of solution methodologies. In [18], the authors presented a PS-SWIPT-enabled multi-hop DF relaying system with energy-autonomous relays. Employing convex optimization, the authors derived closed-form solutions for two core objectives: (1) minimum source power under node-specific quality of service (QoS) constraints, and (2) maximum achievable rate. Inspired by [18], the authors of [19] investigated the throughput optimization of industrial wireless sensor networks (IWSNs) with EH from interfering RF signals, considering the reliability constraints of industrial information transmission, and adopted the successive convex approximation (SCA) approach. Similarly, inspired by [18], the authors of [20] investigated a multi-hop multi-relay network in which all nodes are battery-assisted EH nodes that harvest energy from a power beacon. In each hop, the node that collects the most energy is selected for relaying and supplements the harvested energy with a portion of its battery energy. Considering the characteristics of nonlinear EH, the authors derived analytical expressions for outage probability, throughput, average battery energy consumption, and battery energy efficiency. In [21], the authors proposed a backpressure-based optimal joint routing and congestion control scheme for energy-autonomous wireless multi-hop networks. In [22], the authors developed a hybrid SWIPT protocol by merging TS and PS architectures, and designed a low-complexity routing scheme to optimize path energy efficiency. In Reference [23], the authors investigated the Age of Information (AoI) scheduling problem in multi-hop EH-WSNs. They designed the generation time of updates for nodes and developed transmission schedules under both the protocol interference model and the physical interference model, aiming to achieve the minimum peak AoI and average AoI for all nodes within a given duration. They proved that this problem is NP-hard and proposed an energy-adaptive, distributed algorithm suitable for general networks. Considering the relay’s energy-carrying capacity and security, the authors of [24] investigated the relay selection problem in energy-harvesting multi-hop device-to-device (D2D) networks with eavesdroppers. To enhance the secure connectivity performance of the relay, they derived the upper bound of the source-to-destination secrecy connectivity probability (SCP). Furthermore, they derived the factor directly related to the maximum SCP. Based on this, a relay selection algorithm was proposed to identify a relay path with higher security connectivity.
Moreover, emerging research paradigms have begun integrating deep learning architectures with multi-hop wireless relay systems, leveraging artificial intelligence (AI) advancements to address the complex resource allocation challenges inherent in these networks [25,26,27]. For example, Reference [25] presented a joint analytical-machine learning framework for multi-hop wirelessly powered IoT networks employing short-packet communications. Introducing a novel best relay-user selection protocol with accumulative energy harvesting, the authors established closed-form reliability-throughput tradeoffs under Rayleigh fading and developed deep neural network (DNN)-based real-time throughput predictors. In [27], the authors designed an efficient deep convolutional neural network (CNN) to improve and predict the performance of EH short-packet communications in multi-hop cognitive IoT networks. However, such AI-driven methodologies exhibit two critical limitations: (1) They rely on complex infrastructure and expensive hardware, typically requiring high-performance graphics processing units (GPUs) for the training and inference of DNNs, which escalates deployment costs and energy consumption beyond the practical constraints of resource-limited multi-hop networks. (2) They demand extensive datasets for training, necessitating the acquisition of historical CSI, traffic patterns, and EH profiles across diverse scenarios—these data acquisition challenges are particularly pronounced in dynamic wireless environments with non-stationary fading, often leading to potential overfitting or generalization failures in real-world deployments. Consequently, the practical application of AI-based approaches remains constrained by hardware overhead and data dependency, rendering them unsuitable for the low-cost, self-sustaining multi-hop relay systems emphasized in this work.

1.3. Motivation, Contribution, and Organization

According to the related work outlined in Section 1.2, current studies on SWIPT-enabled multi-hop relay networks primarily focus on dual-hop scenarios. Consequently, this study focuses on a SWIPT-enabled multi-hop relay network with multiple relays. Employing the DF protocol, the network implements a uniform single-antenna configuration across all nodal elements. In contrast to [17,18], the proposed system model employs a TS protocol, selected for its implementation advantages, including a simpler hardware structure, no requirement for power splitters, and lower implementation costs. Similar to [17,18], but unlike other studies mentioned above, the relay nodes in this model only collect energy from the RF signals transmitted by the previous node and store it in supercapacitors. All energy stored in the supercapacitors is used to forward decoded information to the next node. The typical application scenario of this model is when there is no LOS link between the source and destination nodes, and transmission is established through establishing LOS links over multiple hops. Furthermore, each node collects energy from the RF signals received from the previous node to power its own information signal transmission to the next node, requiring only the source node to be externally powered.
Research involving multiple relays emphasizes performance analysis [20,25,26] and resource allocation to optimize specific performance metrics [17,18,19,21,22,23,24,27]. The present study focuses on addressing the latter aspect by determining optimal solutions for both the source node’s transmission power and the TS ratios at each relay, aiming to maximize the system throughput. We first prove that the system throughput monotonically increases with the source node’s transmission power and that this throughput maximization problem constitutes a non-convex optimization problem. Subsequently, through logarithmic transformation techniques, we successfully convert this non-convex optimization problem into a convex formulation. Therefore, we are able to bypass computationally intensive SCA methods and AI-based optimization approaches that rely on expensive hardware and extensive training data. Different from Reference [17], which merely provided the proof that the system throughput maximization problem under a hybrid TS/PS protocol can be transformed into a convex optimization problem, we further propose a log barrier method-based approach featuring fast convergence, low computational complexity, and strong robustness—specifically, an interior-point iterative optimization algorithm for optimal solution derivation. The proposed log barrier method-based scheme demonstrates significant advantages over the Lagrangian dual method employed in [18] in terms of convergence rate and per-iteration computational complexity. For detailed comparative analysis, please refer to Section 4 of this paper.
WSNs often operate in energy-constrained environments (e.g., industrial IoT, environmental monitoring), where battery replacement is impractical. Our work on TS-SWIPT-enabled relays directly addresses this by enabling self-sustaining sensor nodes that harvest energy from RF signals while forwarding data. This is particularly critical for applications like disaster response networks or agricultural sensing, where multi-hop communication extends coverage without manual intervention.
The main contributions of this paper are summarized as follows:
  • We established a TS-SWIPT-based multi-hop DF relay network requiring only source node power supply, and converted the corresponding non-convex throughput maximization problem into a convex optimization formulation through logarithmic transformation.
  • By employing the log barrier method, the optimal solution of this convex optimization problem can be iteratively obtained with low computational complexity and a superlinear convergence rate.
  • Through comprehensive simulations, we validate the optimality of our proposed scheme. The system performance under various parameters is analyzed, with particular focus on the relationship between the number of relays and the system throughput. Furthermore, the algorithm’s rapid convergence characteristics confirm its practical viability for real-world communication systems.
The remainder of this paper is organized as follows: In Section 2, we present the system model of a multi-hop DF relay network enabled with TS-SWIPT and formulate a joint optimization problem aiming to maximize the system throughput by optimizing the transmit power at the source node and the TS ratio allocation at the relay nodes. Section 3 first proves that this problem is non-convex and then transforms it into a convex optimization problem via logarithmic transformations of the decision variables, along with rigorous convexity proofs. In Section 4, we compare three methods—interior-point method, exterior-point method, and Lagrangian dual method—for solving this convex problem. Section 5 provides a detailed iterative procedure for solving it using the log barrier method, a specialized interior-point method. Section 6 validates the optimality of our scheme through simulations, evaluates its performance, and demonstrates its applicability to practical communication systems. Finally, Section 7 concludes the paper.

2. System Model and Problem Formulation

Table 1 lists the main symbols first introduced in this section. The system model described in this section, as illustrated in Figure 1, comprises a multi-hop wireless relay network. The source node r 0 transmits data via K DF relays r 1 , , r K over K + 1 hops to the destination node r K + 1 . We assume that SWIPT is applied exclusively between adjacent nodes during RF signal transmission. The channel coefficient between two adjacent nodes r k 1 and r k at the k -th hop is denoted as h k , k 1 , , K + 1 , which remains constant during the EH and ID period T . Moreover, we assume non-adjacent channels exhibit sufficiently severe degradation—due to obstructions or deep fading—to be safely neglected [28]. This assumption draws from well-established routing scenarios in sensor networks where path selection algorithms are employed [29]. All the relay nodes are equipped with a single antenna and operate in half-duplex mode, meaning they relay forward received packets only after complete reception.
The proposed system model features the source node r 0 as the sole fixed-energy-supplied entity, while the relay node r k , k 1 , , K , relies entirely on RF signal-based EH. The EH and ID period T at r k is partitioned into two sequential phases: (1) EH phase, lasting θ k T , where θ k 0 , 1 is the TS ratio, and (2) ID phase, lasting ( 1 θ k ) T . Particularly, at the destination node r K + 1 , there is no EH phase, and the ID phase lasts for a duration of T .
Let s k denotes the information symbol at r k , k 0 , , K , where each symbol satisfies unit average power, i.e., E s k 2 = 1 . The received signal at r k + 1 can be expressed as:
y k + 1 = p k h k + 1 s k + n k + 1 ,
where p k denotes the transmit power at r k ; n k + 1 represents the additive white Gaussian noise (AWGN) at r k + 1 , and its power spectral density is assumed to be independent and identically distributed (i.i.d.) complex Gaussian random variables with zero mean and variance δ 2 , i.e., n k + 1 ~ C N 0 , δ 2 .
For the EH phase depicted in Figure 1, the relay node r k , k 1 , , K harvests energy from the RF signal y k over a duration of θ k T . The rectification efficiency of r k (the ratio of the energy harvester’s output power to input power) is denoted by η k , where η k 0 , 1 . Consequently, the harvested energy at relay node r k , k 1 , , K , is given by
e k = p k 1 g k η k θ k T ,
where g k = h k 2 denotes the channel gain between r k 1 and r k .
Assuming the relay node r k fully utilizes all the harvested energy e k during its ID period, the transmit power of r k is given by
p k = e k T = p k 1 g k η k θ k .
Since we can derive p k 1 = p k 2 g k 1 η k 1 θ k 1 from (3), by recursion, it follows that
p k = p 0 i = 1 k g i η i θ i ,
where p 0 denotes the transmit power of the source node r 0 .
For ID, the received signal y 1 contains signal power p 0 g 1 and noise power W δ 2 , where W denotes the transmission bandwidth. Thus, the received SNR at r 1 is expressed as
γ 1 = p 0 g 1 W δ 2 = A 1 p 0 ,
where A 1 = g 1 W δ 2 .
The received signal y k , k 2 , , K + 1 , contains signal power p k 1 g k and noise power W δ 2 . Thus, the received SNR at r k is expressed as
γ k = p k 1 g k W δ 2 = p 0 i = 1 k g i i = 1 k 1 η i θ i W δ 2 = A k p 0 i = 1 k 1 θ i ,
where A k = i = 1 k g i i = 1 k 1 η i W δ 2 .
Thus, the achievable data rate of hop k , k 1 , , K can be expressed as
R k = W 1 θ k ln 1 + γ k .
Specifically, as the destination node does not have an EH phase, as shown in Figure 1, the achievable data rate of hop K + 1 can be represented as
R K + 1 = W ln 1 + γ K + 1 .
Since the data transmission from the source node to the destination node undergoes K + 1 EH and ID periods, the end-to-end achievable data rate in the multi-hop DF relay network, i.e., the system throughput, can be expressed as
R = min R 1 , R K + 1 K + 1 .
Within the TS protocol framework, the transmit power p 0 at the source node r 0 and the TS ratios θ k , k 1 , , K at each relay are configurable parameters.
This paper optimizes p 0 and θ k to maximize the end-to-end achievable data rate R . Denoting θ = θ k θ k 0 , 1 , k = 1 , , K , the throughput maximization problem in our system model is formulated as
max θ , p 0 R
s . t .   0 < θ k < 1 ,   k 1 , , K ,
p m i n p 0 p m a x ,
where p m i n and p m a x denote the minimum transmit power and maximum transmit power of the source node r 0 , respectively.

3. Convex Optimization Problem Transformation

We list the main symbols first introduced in this section in Table 2. Benefiting from theoretical guarantees of global optimality and well-established efficient algorithms, convex optimization problems are generally more tractable in both theory and practice [30]. In this section, our primary focus is to reformulate Problem (10) as a convex optimization problem. First, we prove the following proposition.
Proposition 1.
R is a monotonically increasing function with respect to p 0 .
Proof of Proposition 1.
See Appendix A. □
The optimal solution for p 0 that maximizes R is p m a x . Problem (10) can be reformulated as:
max θ min R 1 , R K + 1
s . t .   0 < θ k < 1 ,   k 1 , , K .
Combining (5) to (8), the expressions for R k , k 1 , , K + 1 in (11) can be rewritten as follows:
R 1 = W 1 θ 1 ln 1 + B 1 ,
R k = W 1 θ k ln 1 + B k i = 1 k 1 θ i ,   k 2 , , K ,
R K + 1 = W ln 1 + B K + 1 i = 1 K θ i ,
where B k = A k p m a x , k 1 , , K + 1 .
According to the definition and judgment criteria of convex optimization problems [30], we can prove the following assumption:
Proposition 2.
Problem (11) is not a convex optimization problem.
Proof of Proposition 2.
See Appendix B. □
To address the non-smoothness (non-differentiability) of the objective function min R 1 , R K + 1 in Problem (11) and transform the complex min–max problem into a standard constrained optimization, we introduce an auxiliary variable r = min R 1 , R K + 1 W . Problem (11) is thereby reformulated in the standard epigraph form [30]:
max θ , r r
s . t .   1 θ 1 ln 1 + B 1 r ,
1 θ k ln 1 + B k i = 1 k 1 θ i r ,   k 2 , , K ,
ln 1 + B K + 1 i = 1 K θ i r ,
0 < θ k < 1 ,   k 1 , , K ,
where (15b) denotes the first-hop constraint derived from (12), (15c) represents the intermediate-hop constraints derived from (13), and (15d) indicates the last-hop constraint derived from (14).
To transform the product term i = 1 k 1 θ i , k 2 , , K + 1 (appearing in (15c) and (15d)) into a tractable form, we introduce new variables x k = ln θ k for k 1 , , K . Since 0 < θ k < 1 , we have x k < 0 . Given that the objective r > 0 and the natural logarithm is monotonically increasing, maximizing r is equivalent to maximizing ln r . Define y = ln r and x = x k x k = ln θ k , 0 , k = 1 , , K . Then, Problem (15) is reformulated into the standard form of convex optimization as follows:
min x , y y
s . t .   y ln 1 e x 1 ln ln 1 + B 1 0 ,
y ln 1 e x k ln ln 1 + B k e i = 1 k 1 x i 0 ,   k 2 , , K ,
y ln ln 1 + B K + 1 e i = 1 K x i 0 ,
x k < 0 ,   k 1 , , K .
where (16b) denotes the transformed first-hop constraint derived from (15b), (16c) represents the transformed intermediate-hop constraints derived from (15c), and (16d) indicates the transformed last-hop constraint derived from (15d).
By the aforementioned transformation, Problem (10) is reformulated as a convex optimization problem. The proof is as follows.
Proposition 3.
Problem (16) is a convex optimization problem.
Proof of Proposition 3.
See Appendix C. □
The convex transformation, as defined in (16), ensures computational efficiency, which is crucial for resource-constrained sensor nodes. For example, in structural health monitoring systems, sensors embedded in bridges or machinery require low-complexity algorithms to optimize energy usage while maintaining throughput.

4. Optimization Method Selection for Solving the Target Convex Problem

Since Problem (16) is a convex optimization problem, its local optimal solution is also the global optimal solution. This global optimum can be obtained via various common iterative methods, such as the interior point method, exterior point method, and Lagrangian dual method. We compare several mainstream methods for solving Problem (16) in terms of initial point requirements, convergence rate, and computational complexity [31]. We then summarize the results in Table 3.
Among these methods, the interior-point method converges rapidly, achieves superlinear convergence, and demonstrates strong robustness. Although inappropriate initial point selection may cause convergence failure, a feasible initial point can be obtained by choosing a feasible θ , which naturally aligns with the structure of Problem (16). Other methods for solving Problem (16) exhibit certain limitations, for instance:
Exterior point method: While flexible in initial point choice, its convergence rate is the slowest. Moreover, its penalty factor adjustment strategy easily triggers numerical ill-conditioning—excessively large factors cause deterioration of the Hessian matrix’s condition number, while overly small factors lead to severe constraint violations.
Lagrangian dual method: This method is only applicable to low-dimensional dual problems, i.e., when N is small and requires solving the dual problem via the subgradient method, resulting in a heavy computational burden and slow convergence with a sublinear convergence rate.
Therefore, we adopt a type of interior point method—the log barrier method—to obtain the global optimal solution for Problem (16). By transforming inequality constraints into penalty terms of the objective function, this method converts the original problem into a series of unconstrained optimization subproblems.

5. Optimal TS Ratio Allocation: A Log Barrier Approach

We list the main symbols first introduced in Section 4 and Section 5 in Table 4. This section delineates the detailed process of applying the interior-point barrier method to optimize TS ratio allocation as follows:
Proposed algorithm. Log barrier method for solving Problem (16).

5.1. Construction of the Barrier Problem

First, by utilizing functions (A6)–(A8) and g k x k = x k , k 1 , , K , we incorporate constraints (16b)–(16e) into the objective function in the form of log barrier terms. The constructed joint log barrier function is as follows:
ϕ x , y = k = 1 K + 1 ln f k k = 1 K ln g k .
By introducing a barrier parameter t > 0 , the barrier objective function is defined as:
ψ x , y ; t = y + 1 t ϕ x , y .
The barrier problem is reformulated as:
x ,   y = arg min x , y ψ x , y ; t .
Here, 1 t controls the weight of the barrier penalty term. As 1 t approaches zero from the positive side ( t + ), the solution to the barrier problem (19) converges to the optimal solution of the original problem (16). In other words, since Problem (16) is convex and satisfies Slater’s condition, the log barrier method generates a continuous central path by solving a sequence of barrier subproblems (19) with increasing t , and converges to the global optimal solution along this path [31].

5.2. Initialization

The log barrier method consists of an outer loop and an inner loop. The outer loop updates the barrier parameter t , while the inner loop employs Newton’s method to solve the unconstrained optimization problem (19) with a fixed t . The process must ensure that the iterations remain strictly feasible at all times, i.e., satisfy (16b)–(16e).
Prior to commencing log barrier method iterations, we perform the following initialization routine:
Select an initial point x 0 ,   y 0 that satisfies the strictly feasible conditions (16b)–(16e).
Set the following parameters: An initial barrier parameter t 0 > 0 ; an update factor μ > 1 for the barrier parameter t in the outer loop; a tolerance ϵ o > 0 for the stopping criterion in the outer loop; a tolerance ϵ i > 0 for the stopping criterion of Newton’s method in the inner loop.
Calculate the initial dual gap for the stopping criterion used in the outer loop: The duality gap in the log barrier method is approximately m t , where m denotes the total number of constraints in Problem (16). Since the total number of constraints is 2 K + 1 , the initial duality gap is 2 K + 1 t 0 .

5.3. Outer Loop

Within each outer iteration of the log barrier method, the following sequence is executed:

5.3.1. Check the Stopping Criteria in the Outer Loop

For the current t n , where n is a non-negative integer, if the duality gap is less than the tolerance of the outer loop, i.e., 2 K + 1 t n < ϵ o , terminate the outer loop; otherwise, the algorithm proceeds to the inner loop of the log barrier method as follows.

5.3.2. Inner Loop

Fix t = t n and solve Subproblem (19) with the current x n ,   y n as the initial value via Newton’s method. We repeat the following seven steps until inner loop convergence is achieved. First, the gradient vector and Hessian matrix of the barrier objective function ψ x , y ; t are computed.
1
Gradient computation
To obtain the gradient ψ = ψ x 1 , , ψ x K , ψ y T , we proceed with the following calculations.
For the element ψ x j , j 1 , , K , in the gradient ψ , we have
ψ x j = 1 t k = 1 K + 1 1 f k f k x j + 1 x j ,
where the calculation of f k x j is categorized into the following cases:
Case 1: When k = 1 ,
f 1 x j = e x 1 1 e x 1 ,   j = 1 0 ,   j 1 .
Case 2: When k 2 , , K ,
f k x j = B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i ,   j < k e x k 1 e x k ,   j = k 0 ,   j > k .
Case 3: When k = K + 1 ,
f K + 1 x j = B K + 1 e i = 1 K x i ln 1 + B K + 1 e i = 1 K x i 1 + B K + 1 e i = 1 K x i .
For the element ψ y in the gradient ψ , we have
ψ y = 1 1 t k = 1 K + 1 1 f k .
2
Hessian matrix computation
The Hessian matrix 2 ψ has a dimension of K + 1 × K + 1 , and its complete matrix form is expressed as follows:
2 ψ = 2 ψ x 1 2 2 ψ x 1 x 2 2 ψ x 1 x K 2 ψ x 1 y 2 ψ x 2 x 1 2 ψ x 2 2 2 ψ x 2 x K 2 ψ x 2 y 2 ψ x K x 1 2 ψ x K x 2 2 ψ x K 2 2 ψ x K y 2 ψ y x 1 2 ψ y x 2 2 ψ y x K 2 ψ y 2 .
where its elements are calculated as follows:
For the diagonal element 2 ψ x j 2 of the Hessian matrix in (25), we have
2 ψ x j 2 = 1 t k = 1 K + 1 1 f k 2 f k x j 2 1 f k 2 f k x j 2 1 x j 2 .
For the term f k x j in (26), we can compute it using (21)–(23). As for the second-order derivative 2 f k x j 2 in (26), we perform case-specific calculations as follows:
Case 1: When k = 1 ,
2 f 1 x j 2 = e x 1 1 e x 1 2 ,   j = 1 0 ,   j 1 .
Case 2: When k 2 , , K ,
2 f k x j 2 = B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i 2 ,   j < k e x k 1 e x k 2 ,   j = k 0 ,   j > k .
Case 3: When k = K + 1 ,
2 f K + 1 x j 2 = B K + 1 e i = 1 K x i ln 1 + B K + 1 e i = 1 K x i 1 + B K + 1 e i = 1 K x i B K + 1 e i = 1 K x i ln 1 + B K + 1 e i = 1 K x i 1 + B K + 1 e i = 1 K x i 2 .
For the diagonal element 2 ψ y 2 of the Hessian matrix in (25), we have
2 ψ y 2 = 1 t k = 1 K + 1 1 f k 2 .
For the off-diagonal element 2 ψ x j x l ( j 1 , , K , l 1 , , K and j l ) of the Hessian matrix in (25), we have
2 ψ x j x l = 1 t k = 1 K + 1 1 f k 2 f k x j f k x l 1 f k 2 f k x j x l .
For the term f k x j f k x l in (31), we compute it by considering different cases as follows:
Case 1: When k = 1 ,
f 1 x j f 1 x l = 0 .
Case 2: When k 2 , , K ,
f k x j f k x l = B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i 2 ,   j < k   and   l < k e x k 1 e x k · B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i ,   j = k   and   l < k e x k 1 e x k · B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i ,   j < k   and   l = k 0 ,   j > k   or   l > k .
Case 3: When k = K + 1 ,
f K + 1 x j f K + 1 x l = B K + 1 e i = 1 K x i ln 1 + B K + 1 e i = 1 K x i 1 + B K + 1 e i = 1 K x i 2 .
For the term 2 f k x j x l in (31), we compute it by considering different cases as follows:
Case 1: When k = 1 ,
2 f 1 x j x l = 0 .
Case 2: When k 2 , , K ,
2 f k x j x l = B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i B k e i = 1 k 1 x i ln 1 + B k e i = 1 k 1 x i 1 + B k e i = 1 k 1 x i 2 ,   j < k   and   l < k 0 ,   j = k   and   l < k 0 ,   j < k   and   l = k 0 ,   j > k   or   l > k .
Case 3: When k = K + 1 ,
2 f K + 1 x j x l = B K + 1 e i = 1 K x i ln 1 + B K + 1 e i = 1 K x i B K + 1 e i = 1 K x i ln 1 + B K + 1 e i = 1 K x i 1 + B K + 1 e i = 1 K x i 2 .
For the off-diagonal element 2 ψ x j y of the Hessian matrix in (25), we have
2 ψ x j y = 1 t k = 1 K + 1 1 f k 2 f k x j ,
where the term f k x j can be obtained from (21)–(23).
With ψ and 2 ψ computed, we proceed to implement Newton’s method within the inner loop of our scheme based on the log barrier method. Subsequently, the Newton direction and Newton decrement expressions are presented as follows.
3
Newton direction computation
When solving the unconstrained optimization problem (19), Newton’s method requires computing a search direction, known as the Newton direction [31]. Based on the obtained gradient ψ and the Hessian matrix 2 ψ , we can derive the Newton direction x , y T by solving the following linear system:
2 ψ · x , y T = ψ ,
where x = x 1 , , x K is the step size for variable vector x , and y denotes the step size of variable y .
4
Newton decrement computation
The Newton decrement is a key convergence metric in Newton’s method, used to measure the distance from the current point to the local optimal solution (since Problem (16) has been proven to be a convex optimization problem, the local optimum coincides with the global optimum). In the inner loop (Newton iterations) of the interior-point method, it serves as a stopping criterion to determine when to terminate the Newton iterations under the current barrier parameter t [31]. Using the obtained x , y T from above, the Newton decrement can be indirectly computed as follows:
λ = ψ T x , y T = ψ T 2 ψ 1 ψ .
5
Backtracking Line Search
In this step, we employ a backtracking line search to obtain a step size α that ensures strict feasibility and sufficient decrease for x and y during the update process. First, we set α = 1 . If any of the following two conditions is not satisfied, update α with α β , namely, α α β , where β is a constant with β 0 , 1 , typically taken as 0.5 :
Strict feasibility condition: In iterative optimization, the step size must be chosen such that all iterates lie strictly inside the feasible domain (satisfying constraints exactly), preventing encroachment on constraint boundaries. That is to say, α must satisfy
f 1 x 1 + α x 1 , y + α y < 0 ,
f k x 1 + α x 1 , , x k + α x k , y + α y < 0 ,   k 2 , , K ,
f K + 1 x 1 + α x 1 , , x K + α x K , y + α y < 0 .
g k x k + α x k < 0 ,   k 1 , , K .
Armijo condition (sufficient decrease): Ensure that the value of the objective function ψ is sufficiently decreased during iterations; i.e., parameter α needs to satisfy
ψ x + α x , y + α y ; t ψ x , y ; t + c α ψ T x , y T ,
where c is a constant with c 0 , 1 , typically taken as 10 4 .
6
Update the primal variables
Based on the α obtained in Step 5, we update the x and y in the inner loop, i.e., x x + α x and y y + α y .
7
Check whether the inner loop should stop
At this stage, we compute the Newton decrement λ by substituting the updated x and y into (40). Subsequently, if the condition λ 2 2 < ϵ i is satisfied, we terminate the inner loop and then obtain the updated primal variables x n + 1 ,   y n + 1 .

5.3.3. Update the Barrier Parameter

After performing the above operations, we have obtained the independent variables x n + 1 ,   y n + 1 . Then, we can update the barrier parameter t n + 1 for outer loop n + 1 as t n + 1 μ t n .
The algorithm then returns to Section 5.3.1 and iterates until it outputs the optimal solution x ,   y . Upon obtaining the optimal solution x , through the transformation θ k = e x k for k = 1 , , K , we derive the optimal TS ratios that maximize the throughput of our SWIPT-enabled multi-hop DF relay network. According to [31], our interior-point barrier method-based scheme achieves a convergence rate of O N log 1 ϵ o with per-iteration computational cost of O N 3 , resulting in an overall complexity O N 3.5 log 1 ϵ o . For clarity, the complete workflow of the proposed algorithm is presented in Algorithm 1.
Algorithm 1. The proposed algorithm
Begin
 Construct joint log barrier function ϕ x , y
 Construct barrier objective function ψ x , y ; t
Initialization:
  Set strictly feasible initial point x 0 ,   y 0 satisfying (16b)–(16e)
  Set initial barrier parameter t 0 > 0 , update factor μ > 1 , tolerance ϵ o > 0 , Newton tolerance ϵ i > 0
while  2 K + 1 t n < ϵ o do  ▷ Outer loop: Barrier parameter update
  Set Newton initial point x , y = x n ,   y n
  repeat   Inner loop: Newton’s method
   Compute gradient ψ
   Compute Hessian matrix 2 ψ
   Solve Newton system 2 ψ · x , y T = ψ for search direction x , y T
   Compute Newton decrement λ = ψ T x , y T
   Set backtracking line search parameters α = 1 , β = 0.5 , c = 10 4
   while true do  ▷ Backtracking line search
    if  x + α x , y + α y strictly feasible and ψ x + α x , y + α y ; t ψ x , y ; t + c α ψ T x , y T
     break
    else
     Update  α α β
    end if
   end while
   Update  x x + α x and y y + α y
  until  λ 2 2 < ϵ i   ▷ Newton convergence criteria
  Update  x n + 1 ,   y n + 1 x , y   ▷ Prepare for next outer iteration
  Update  t n + 1 μ t n   ▷ Increase barrier parameter
end while
 Output optimal solution x ,   y
End

6. Simulation Results and Discussion

This section evaluates the performance of the proposed scheme in our SWIPT multi-hop DF relay network model through simulation. All simulations were executed on a laptop equipped with an AMD Ryzen R9 7945HX CPU and 64 GB RAM. The software environment utilized MATLAB R2022b for algorithm implementation and data analysis.
All simulations in this section use the following parameter settings unless otherwise specified: δ 2 = 174 dBm/Hz; the rectification efficiency of each relay node is set to 0.9, namely, η k = 0.9 for k 1 , , K ; W = 1 MHz; t 0 = 1 ; μ = 10 ; ϵ o = 10 6 ; ϵ i = 10 4 ; the initial value of α is set to 1; β = 0.5 ; c = 10 4 . Since it has been proven in Section 3 that the system throughput monotonically increases with the transmit power p 0 of the source node, it is assumed that the source node transmits at the maximum power p m a x . Moreover, it is assumed that in our multi-hop relay network, the distance between each hop is equal, and the total distance of all hops sums to 10 m.
In terms of channel modeling, for large-scale fading, a log-distance path loss model with a path loss exponent of 3.8 is adopted, where the carrier frequency is 2.4 GHz, and the reference distance is set to 1m. For small-scale fading, LoS links are established between the transmitting and receiving nodes at each hop via relay deployment. Therefore, the channel coefficient h k for each hop follows a Rician fading distribution with a K-factor of 7. The simulation results are generated by averaging over 1000 random channel realizations.
The proposed scheme, based on the log barrier method, is compared against the following benchmark schemes: one is the performance-optimal exhaustive search-based scheme, employing a TS ratio search step size of 0.01; the others are those with identical TS ratios fixed at all relays, specifically at 0.25, 0.5, and 0.75.

6.1. Throughput vs. Maximum Source Transmit Power

First, in Figure 2, we plot the relationship between the end-to-end throughput and the maximum transmit power of the source node p m a x for the SWIPT-enabled multi-hop DF relay network. The range of p m a x is from 20 dBm to 40 dBm. The hop count of the multi-hop relay network is set to K = 2 ; thus, the per-hop distance is 10 K + 1 = 3.33 m. In this figure, it can be clearly observed that the throughput of all schemes increases with the maximum transmit power of the source node. For instance, the throughput of the proposed scheme increases from 14.29 bps at p m a x = 20 dBm to 1420.45 bps at p m a x = 40 dBm. Moreover, the curves of the proposed scheme based on the log barrier method and the exhaustive search-based scheme coincide, indicating identical throughput performance. When tested under other configurations, the curves remain coincident, demonstrating the optimality of the proposed scheme. Additionally, as expected, the proposed scheme significantly outperforms fixed TS ratio schemes in throughput performance. Additional simulations confirm that this advantage persists when TS ratios are fixed at other values. The scheme with TS ratios fixed at 0.87 at all relays exhibits the smallest performance gap from the proposed (optimal) scheme. Even then, its throughput only reaches approximately 47.3% of that of the proposed (optimal) scheme on average. This fully demonstrates the necessity of implementing the proposed scheme to fully exploit the performance potential in our SWIPT-enabled multi-hop DF relay network.

6.2. Throughput vs. Number of Relays

Next, we examine the relationship between system throughput and the number of relays. The maximum transmit power of the source node, p m a x , is fixed at 40 dBm. The number of relays, K , in the multi-hop relay network increases from 1 to 5, corresponding to a hop count growth from 2 to 6 between the source and destination. Given equal per-hop distance and a total distance of 10 m for all hops, the resulting per-hop distances are 5 m, 3.33 m, 2.5 m, 2 m, and 1.67 m, respectively. Figure 3 plots the system throughput versus the number of relays K . From Figure 3, conclusions analogous to those in Figure 2 can be drawn: the proposed scheme possesses optimal performance, and its throughput significantly outperforms that of the fixed TS ratio schemes. For instance, when the number of relays is set to K = 2 , the throughput of both the proposed scheme and the exhaustive search-based scheme reaches an identical value of 1437.3 bps, while that of the scheme with TS ratio fixed at 0.75 is only 379.68 bps. On the other hand, it can be observed that the throughput of all schemes declines rapidly with the increase in the number of relays. Taking the proposed scheme as an example, when K = 1 , its throughput is 2.31 × 10 6 bps, but when K = 5 , its throughput drops to merely 1.17 × 10 8 bps, becoming negligible. This phenomenon can be attributed to Equation (9): as the number of relays increases, transmitting constant-size data requires more EH and ID periods. Furthermore, the system throughput is constrained by the hop with the minimum achievable data rate. This insight suggests that when channel conditions between the source and destination nodes are poor and the SWIPT-enabled multi-hop DF relay network is deployed, the number of hops should be minimized under the premise that favorable channel conditions can be achieved at each hop. Nevertheless, it is also observable that the throughput of the proposed scheme declines more slowly than the fixed TS ratio schemes as the number of relays increases, particularly when the number of relays is high. This further demonstrates the superiority of the proposed scheme.

6.3. Throughput vs. Rectification Efficiency

In Figure 4, we compare the variation trends of the system throughput under varying rectification efficiencies. The rectification efficiency is set to increase from 0.1 to 0.9, with the number of relays between source and destination nodes fixed at K = 2 and p m a x = 40 dBm. Similar to the aforementioned scenarios, the proposed scheme delivers optimal performance and is significantly superior to the fixed TS ratio schemes. Illustrated by the case where η k = 0.5 , the throughput of the proposed scheme is approximately 32 times that of the scheme with the TS ratio fixed at 0.25. Additionally, as the rectification efficiency η k increases from 0.1 to 0.9, the system throughput of the proposed scheme rises from 17.79 bps to 1426.72 bps, representing an improvement by approximately a factor of 80. It follows that a higher rectification efficiency enables the multi-hop relay network architecture to accommodate more relays.

6.4. Computational Efficiency Analysis

The preceding simulation results have demonstrated the throughput performance of the proposed scheme. We now proceed to examine its execution efficiency. We set p m a x = 40 dBm and vary the number of relays K from 1 to 15. Figure 5 demonstrates the number of outer iterations versus the number of relays K for the proposed scheme based on the log barrier method. Notably, under typical relay deployments ( K < 10 ), the proposed scheme consistently converges within 7 outer iterations. This signifies that the proposed scheme achieves convergence with fewer iterations, and its iteration count remains nearly constant as the scale of the multi-hop relay network increases.
In Figure 6, to further investigate the computational efficiency of the proposed scheme, we measure the computational time of all schemes. From this figure, it is observed that the computational time of the optimal exhaustive search-based scheme increases prohibitively with the number of relays. When K = 5 , this scheme requires 1730 s to complete execution, which is a prohibitively high latency for practical communication systems. Conversely, and as anticipated, the three fixed-TS schemes exhibit nearly identical and minimal computation times. For instance, when K = 5 , execution completes in just 1.88 × 10 4 s. Notably, the proposed scheme exhibits computation times only one order of magnitude higher than the fixed-TS schemes. Specifically, when K = 5 , it requires merely 1.36 × 10 3 s. Furthermore, mirroring the characteristics shown in Figure 5, the proposed scheme exhibits comparatively gradual computation time growth with increasing relay nodes.
The above results conclusively demonstrate that the proposed scheme not only delivers optimal performance but also achieves rapid convergence with modest computational demands, making it highly suitable for real-time deployment.

7. Conclusions

This paper establishes a novel convex optimization framework for maximizing end-to-end throughput in multi-hop DF relay networks employing the TS-SWIPT protocol. The originally nonconvex problem was transformed into a tractable convex form via logarithmic conversion, enabling the application of the log barrier method to derive the globally optimal TS ratios. Numerical simulations validate the proposed method’s dual merits: optimal performance and rapid convergence, demonstrating its applicability to practical communication systems. Specifically, the proposed scheme achieves a throughput of 1437.3 bps in a 3-hop relay network at 40 dBm maximum source transmit power, which is 278% higher than that of the fixed TS scheme at 0.75, and it exhibits millisecond-level convergence time. By enabling joint optimization of the TS ratios across relays, our system supports self-sustaining, battery-free relay operation, eliminating battery replacement costs for deployment in remote areas, industrial IoT, and emergency communications. This work provides a computationally efficient framework for optimizing energy–data trade-offs in multi-hop WSNs. By leveraging convex optimization and superlinear convergence, our algorithm is deployable on low-power sensor hardware (e.g., ARM Cortex-M series), making it applicable to real-world scenarios such as smart infrastructure, precision agriculture, and remote health monitoring. Future work will focus on extending our system model to environmentally sustainable communication paradigms, such as minimizing source transmit power while guaranteeing minimum QoS requirements, thereby maximizing network lifetime.

Author Contributions

Y.Y. provided the idea, designed the architecture, and wrote the paper. X.T. performed simulations. G.X. analyzed the experimental results and proofread the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by Hubei Provincial Natural Science Foundation of China under Grant 2025AFC093; the 2025 Yichang Natural Science Research Project under Grant A25-3-013; the 2023 Scientific Research Plan Guiding Project of Hubei Provincial Department of Education under Grant B2023548; the Research Platform Construction Project of Hubei Three Gorges Polytechnic under Grant 2024KYPT0201; and the Key R&D Program of Hubei Province under Grant 2023BABO82.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available upon request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SWIPTSimultaneous wireless information and power transfer
DFDecode-and-forward
TSTime-switching
WSNWireless sensor network
IoTInternet of Things
LoSLine-of-sight
SNRSignal-to-noise ratio
EHEnergy harvesting
RFRadio frequency
PSPower-splitting
IDInformation decoding
AFAmplify-and-forward
CSIChannel state information
QoSQuality of service
IWSNIndustrial wireless sensor network
SCASuccessive convex approximation
AoIAge of Information
D2DDevice-to-device
SCPSecrecy connectivity probability
AIArtificial intelligence
DNNDeep neural network
CNNConvolutional neural network
GPUGraphics processing unit
AWGNAdditive white Gaussian noise

Appendix A

From (5) and (6), it follows that γ k , k 1 , , K + 1 is directly proportional to p 0 . Since ln 1 + γ k is an increasing function of γ k , R k must be a monotonically increasing function of p 0 .
We now examine the monotonicity of the min-function min R 1 , . R K + 1 . Consider two arbitrary values of p 0 : p 0 a and p 0 b with p 0 a < p 0 b . Due to the monotonic increasing property of each R k , k 1 , , K + 1 , it holds that:
R k p 0 a < R k p 0 b .
Consequently, the min-function satisfies:
min R 1 p 0 a , , R K + 1 p 0 a < min R 1 p 0 b , , R K + 1 p 0 b .
Thus, the system throughput R is a monotonically increasing function of p 0 .

Appendix B

The necessary condition for the maximization problem (11) to be convex is that the objective function min R 1 , . R K + 1 is concave. We first analyze the concavity of the subfunctions R k , k 1 , , K + 1 .
For R 1 in (12):
Since W ln 1 + B 1 is a constant term, R 1 is a linear function and thus both convex and concave.
For R k , k 2 , , K + 1 in (13) and (14):
The multiplicative term i = 1 k 1 θ i for k 2 , , K + 1 is neither convex nor concave. Consequently, R k is not concave. Take R 2 as an example:
R 2 = W 1 θ 2 ln 1 + B 2 θ 1 .
Its Hessian matrix is:
H R 2 = 2 R 2 θ 1 2 2 R 2 θ 1 θ 2 2 R 2 θ 2 θ 1 2 R 2 θ 2 2 = W 1 θ 2 B 2 2 1 + B 2 θ 1 2 W B 2 1 + B 2 θ 1 W B 2 1 + B 2 θ 1 0 .
The determinant of H R 2 is:
det H R 2 = W B 2 1 + B 2 θ 1 2 < 0 .
Hence, H R 2 is indefinite, proving that R 2 is neither convex nor concave.
Since there exists at least one non-concave R k (e.g., R 2 ), the pointwise minimum function min R 1 , . R K + 1 cannot be concave. Therefore, Problem (11) is a non-convex optimization problem [30].

Appendix C

The objective function of Problem (16), y , is linear and thus both convex and concave. According to the definition of a convex optimization problem [30], to prove that Problem (16) is convex, it suffices to show that the following functions are convex:
f 1 x 1 , y = y ln 1 e x 1 ln ln 1 + B 1 ,
f k x 1 , , x k , y = y ln 1 e x k ln ln 1 + B k e i = 1 k 1 x i ,   k 2 , , K ,
f K + 1 x 1 , , x K , y = y ln ln 1 + B K + 1 e i = 1 K x i .
Define the auxiliary function u z = ln 1 e z . Its second derivative is:
u z = e z 1 e z 2 > 0 .
Thus, u z is strictly convex for z < 0 . The function f 1 x 1 , y is the sum of u x 1 (convex) and the affine function y ln ln 1 + B 1 . As the sum of convex and affine functions remains convex, f 1 x 1 , y is convex.
Define the auxiliary function v k z = ln ln 1 + B k e z , k 2 , , K + 1 . Its second derivative is:
v k z = B k e z ln 1 + B k e z B k e z 1 + B k e z ln 1 + B k e z 2 .
Note that ln 1 + B k e z B k e z < 0 for B k e z > 0 . Thus, v k z > 0 , proving v k z is convex.
Then, define the affine function w k 1 x 1 , , x k 1 = i = 1 k 1 x i . Since v k z is convex and w k 1 x 1 , , x k 1 is affine, their composition v k w k 1 x 1 , , x k 1 is convex [30]. Therefore, f k x 1 , , x k , y = y + u x k + v k w k 1 x 1 , , x k 1 is a sum of convex functions and thus convex.
Similarly, f K + 1 x 1 , , x K , y = y + v K + 1 w K x 1 , , x K is convex.
In summary, the objective function y is linear (hence convex), and all inequality constraint functions (A6)–(A8) are convex. The feasible set defined by x k < 0 , k 1 , , K is a convex set. Therefore, Problem (16) is a convex optimization problem.

References

  1. Deng, Y.; Chen, Z.; Chen, X.; Fang, Y. Task Offloading in Multi-Hop Relay-Aided Multi-Access Edge Computing. IEEE Trans. Veh. Technol. 2022, 72, 1372–1376. [Google Scholar] [CrossRef]
  2. Huan, X.; Kim, K.S.; Lee, S.; Lim, E.G.; Marshall, A. A Beaconless Asymmetric Energy-Efficient Time Synchronization Scheme for Resource-Constrained Multi-Hop Wireless Sensor Networks. IEEE Trans. Commun. 2019, 68, 1716–1730. [Google Scholar] [CrossRef]
  3. Van Leemput, D.; Hoebeke, J.; De Poorter, E. Integrating Battery-Less Energy Harvesting Devices in Multi-Hop Industrial Wireless Sensor Networks. IEEE Commun. Mag. 2024, 62, 66–73. [Google Scholar] [CrossRef]
  4. Heidari, H.; Onireti, O.; Das, R.; Imran, M. Energy Harvesting and Power Management for IoT Devices in the 5G Era. IEEE Commun. Mag. 2021, 59, 91–97. [Google Scholar] [CrossRef]
  5. Krikidis, I.; Timotheou, S.; Nikolaou, S.; Zheng, G.; Ng, D.W.K.; Schober, R. Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 2014, 52, 104–110. [Google Scholar] [CrossRef]
  6. Costanzo, A.; Masotti, D.; Paolini, G.; Schreurs, D. Evolution of SWIPT for the IoT World: Near- and Far-Field Solutions for Simultaneous Wireless Information and Power Transfer. IEEE Microw. Mag. 2021, 22, 48–59. [Google Scholar] [CrossRef]
  7. Lee, J.B.; Rong, Y.; Gopal, L.; Chiong, C.W.R. Robust Transceiver Design for SWIPT DF MIMO Relay Systems with Time-Switching Protocol. IEEE Syst. J. 2021, 16, 5651–5662. [Google Scholar] [CrossRef]
  8. Sun, W.; Song, Q.; Zhao, J.; Guo, L.; Jamalipour, A. Adaptive Resource Allocation in SWIPT-Enabled Cognitive IoT Networks. IEEE Internet Things J. 2021, 9, 535–545. [Google Scholar] [CrossRef]
  9. Wang, D.; Zhang, R.; Cheng, X.; Yang, L. Capacity-Enhancing Full-Duplex Relay Networks based on Power-Splitting (PS-)SWIPT. IEEE Trans. Veh. Technol. 2016, 66, 5445–5450. [Google Scholar] [CrossRef]
  10. Li, Q.; Zhang, Q.; Qin, J. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks. IEEE Trans. Veh. Technol. 2016, 65, 9006–9019. [Google Scholar] [CrossRef]
  11. Lee, H.; Song, C.; Choi, S.-H.; Lee, I. Outage Probability Analysis and Power Splitter Designs for SWIPT Relaying Systems with Direct Link. IEEE Commun. Lett. 2017, 21, 648–651. [Google Scholar] [CrossRef]
  12. Ye, Y.; Li, Y.; Wang, Z.; Chu, X.; Zhang, H. Dynamic Asymmetric Power Splitting Scheme for SWIPT-Based Two-Way Multiplicative AF Relaying. IEEE Signal Process. Lett. 2018, 25, 1014–1018. [Google Scholar] [CrossRef]
  13. Wang, D.; Zhang, R.; Cheng, X.; Yang, L.; Chen, C. Relay Selection in Full-Duplex Energy-Harvesting Two-Way Relay Networks. IEEE Trans. Green Commun. Netw. 2017, 1, 182–191. [Google Scholar] [CrossRef]
  14. Agrawal, K.; Prakriya, S.; Flanagan, M.F. Optimization of SWIPT With Battery-Assisted Energy Harvesting Full-Duplex Relays. IEEE Trans. Green Commun. Netw. 2020, 5, 243–260. [Google Scholar] [CrossRef]
  15. Wen, Z.; Liu, X.; Beaulieu, N.C.; Wang, R.; Wang, S. Joint Source and Relay Beamforming Design for Full-Duplex MIMO AF Relay SWIPT Systems. IEEE Commun. Lett. 2016, 20, 320–323. [Google Scholar] [CrossRef]
  16. Liu, Y.; Wen, Z.; Beaulieu, N.C.; Liu, D.; Liu, X. Power Allocation for SWIPT in Full-Duplex AF Relay Interference Channels Using Game Theory. IEEE Commun. Lett. 2020, 24, 608–611. [Google Scholar] [CrossRef]
  17. Fan, R.; Atapattu, S.; Chen, W.; Zhang, Y.; Evans, J. Throughput Maximization for Multi-Hop Decode-and-Forward Relay Network with Wireless Energy Harvesting. IEEE Access 2018, 6, 24582–24595. [Google Scholar] [CrossRef]
  18. Asiedu, D.K.P.; Lee, H.; Lee, K.-J. Simultaneous Wireless Information and Power Transfer for Decode-and-Forward Multihop Relay Systems in Energy-Constrained IoT Networks. IEEE Internet Things J. 2019, 6, 9413–9426. [Google Scholar] [CrossRef]
  19. Ma, K.; Li, Z.; Liu, P.; Yang, J.; Geng, Y.; Yang, B.; Guan, X. Reliability-Constrained Throughput Optimization of Industrial Wireless Sensor Networks with Energy Harvesting Relay. IEEE Internet Things J. 2021, 8, 13343–13354. [Google Scholar] [CrossRef]
  20. Mishra, A.K.; Agrawal, K.; Prakriya, S. Performance of a Cluster-Based Multihop IoT Network with Battery-Assisted Energy Harvesting. IEEE Internet Things J. 2024, 12, 5901–5917. [Google Scholar] [CrossRef]
  21. Stai, E.; Karyotis, V. Optimal Resource Allocation in Multihop Wireless Networks Relying on Energy Harvesting. IEEE Commun. Lett. 2020, 25, 224–228. [Google Scholar] [CrossRef]
  22. Pavani, B.; Devi, L.N.; Subbareddy, K.V. Energy enhancement and efficient route selection mechanism using H-SWIPT for multi-hop IoT networks. Intell. Converg. Networks 2022, 3, 173–189. [Google Scholar] [CrossRef]
  23. Chen, K.; Benkhelifa, F.; Gao, H.; McCann, J.A.; Li, J. Minimizing Age of Information in Multihop Energy-Harvesting Wireless Sensor Network. IEEE Internet Things J. 2022, 9, 25736–25751. [Google Scholar] [CrossRef]
  24. Si, G.; Dou, Z.; Lin, Y.; Qi, L.; Wang, M. Relay Selection and Secure Connectivity Analysis in Energy Harvesting Multi-Hop D2D Networks. IEEE Commun. Lett. 2021, 26, 1245–1248. [Google Scholar] [CrossRef]
  25. Nguyen, T.-V.; Nguyen, V.-D.; da Costa, D.B.; An, B. Short-Packet Communications in Multi-Hop WPINs: Performance Analysis and Deep Learning Design. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021. [Google Scholar]
  26. Nguyen, T.-V.; Nguyen, V.-D.; da Costa, D.B.; Huynh-The, T.; Hu, R.Q.; An, B. Short-Packet Communications in Multihop Networks With WET: Performance Analysis and Deep Learning-Aided Optimization. IEEE Trans. Wirel. Commun. 2022, 22, 439–456. [Google Scholar] [CrossRef]
  27. Nguyen, T.-V.; Huynh-The, T.; Nguyen, V.-D.; Da Costa, D.B.; Hu, R.Q.; An, B. An Efficient Deep CNN Design for EH Short-Packet Communications in Multihop Cognitive IoT Networks. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 2102–2107. [Google Scholar]
  28. Chen, E.; Xia, M.; da Costa, D.B.; Aissa, S. Multi-Hop Cooperative Relaying with Energy Harvesting from Cochannel Interferences. IEEE Commun. Lett. 2017, 21, 1199–1202. [Google Scholar] [CrossRef]
  29. Liu, X.; Wen, Z.; Liu, D.; Zou, J.; Li, S. Joint Source and Relay Beamforming Design in Wireless Multi-Hop Sensor Networks with SWIPT. Sensors 2019, 19, 182. [Google Scholar] [CrossRef] [PubMed]
  30. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  31. Rockafellar, R.T. Convex Analysis; Princeton University Press: Princeton, NJ, USA, 1997. [Google Scholar]
Figure 1. The multi-hop DF relay network with TS-SWIPT architecture.
Figure 1. The multi-hop DF relay network with TS-SWIPT architecture.
Sensors 25 05901 g001
Figure 2. System throughput vs. maximum source power ( K = 2 ).
Figure 2. System throughput vs. maximum source power ( K = 2 ).
Sensors 25 05901 g002
Figure 3. System throughput vs. number of relays ( p m a x = 40 dBm).
Figure 3. System throughput vs. number of relays ( p m a x = 40 dBm).
Sensors 25 05901 g003
Figure 4. System throughput vs. rectification efficiency ( K = 2 , p m a x = 40 dBm).
Figure 4. System throughput vs. rectification efficiency ( K = 2 , p m a x = 40 dBm).
Sensors 25 05901 g004
Figure 5. Number of outer iterations vs. number of relays ( p m a x = 40 dBm).
Figure 5. Number of outer iterations vs. number of relays ( p m a x = 40 dBm).
Sensors 25 05901 g005
Figure 6. Computational time vs. number of relays ( p m a x = 40 dBm).
Figure 6. Computational time vs. number of relays ( p m a x = 40 dBm).
Sensors 25 05901 g006
Table 1. List of the main symbols first introduced in Section 2.
Table 1. List of the main symbols first introduced in Section 2.
SymbolDefinition
r 0 The source node
r k The k -th relay node, k 1 , , K
r K + 1 The destination node
K The number of the relay nodes, a positive integer, with typical values being 1, 2, 3, 4, and 5
h k The channel coefficient between r k 1 and r k , k 1 , , K + 1
g k The channel gain between r k 1 and r k , k 1 , , K + 1
T The EH and ID period
θ k The TS ratio at the k -th relay node, k 1 , , K
θ θ = θ k θ k 0 , 1 , k = 1 , , K
s k The information symbol at r k , k 0 , , K
y k The received signal at r k , k 1 , , K + 1
p k The transmit power at r k , k 0 , , K
n k The AWGN at r k , k 1 , , K + 1
δ 2 The variance of the AWGN
η k The rectification efficiency of relay node r k , η k 0 , 1 , k 1 , , K
e k The harvested energy at relay node r k , k 1 , , K
W The transmission bandwidth
γ k The received SNR at r k , k 1 , , K + 1
A 1 A 1 = g 1 W δ 2 (auxiliary constant)
A k A k = i = 1 k g i i = 1 k 1 η i W δ 2 , k 2 , , K + 1 (auxiliary constant)
R k The achievable data rate of hop k , k 1 , , K + 1
R The end-to-end achievable data rate from r 0 to r K + 1
p m i n The minimum transmit power of r 0
p m a x The maximum transmit power of r 0
Table 2. List of the main symbols first introduced in Section 3.
Table 2. List of the main symbols first introduced in Section 3.
SymbolDefinition
p 0 a , p 0 b Two arbitrary values of p 0 , p 0 a < p 0 b
B k B k = A k p m a x , k 1 , , K + 1 (auxiliary constant)
H R 2 The Hessian matrix of R 2
r r = min R 1 , R K + 1 W (auxiliary auxiliary)
x k x k = ln θ k , k 1 , , K (auxiliary auxiliary)
x x = x k x k = ln θ k , 0 , k = 1 , , K
y y = ln r (auxiliary auxiliary)
f 1 x 1 , y f 1 x 1 , y = y ln 1 e x 1 ln ln 1 + B 1 (auxiliary function)
f k x 1 , , x k , y f k x 1 , , x k , y = y ln 1 e x k ln ln 1 + B k e i = 1 k 1 x i , k 2 , , K (auxiliary function)
f K + 1 x 1 , , x K , y f K + 1 x 1 , , x K , y = y ln ln 1 + B K + 1 e i = 1 K x i (auxiliary function)
u z u z = ln 1 e z (auxiliary function)
v k z v k z = ln ln 1 + B k e z , k 2 , , K + 1 (auxiliary function)
w k 1 x 1 , , x k 1 w k 1 x 1 , , x k 1 = i = 1 k 1 x i (auxiliary function)
Table 3. Comparison of several mainstream methods for solving Problem (16).
Table 3. Comparison of several mainstream methods for solving Problem (16).
MethodInitial PointPerformance Characteristics
Interior point methodFeasible point
  • Convergence rate: Superlinear
  • Computational complexity/iteration: O N 3
Exterior point methodArbitrary point
  • Convergence rate: Sublinear/linear
  • Computational complexity/iteration: O N 3
Lagrangian dual methodArbitrary point
  • Convergence rate: Sublinear
  • Computational complexity/iteration: O N 3
N is the number of independent variables in Problem (16), N = K + 1 .
Table 4. List of the main symbols first introduced in Section 4 and Section 5.
Table 4. List of the main symbols first introduced in Section 4 and Section 5.
SymbolDefinition
N The number of independent variables in Problem (16), N = K + 1
g k x k g k x k = x k , k 1 , , K (auxiliary constant)
ϕ x , y The log barrier function, ϕ x , y = k = 1 K + 1 ln f k k = 1 K ln g k
t The barrier parameter, t > 0
ψ x , y ; t The barrier objective function, ψ x , y ; t = y + 1 t ϕ x , y
μ The update factor for t in the outer loop, μ > 1
ϵ o The tolerance for the stopping criterion in the outer loop of the log barrier method, ϵ o > 0
ϵ i The tolerance for the stopping criterion in the inner loop of the log barrier method, ϵ i > 0
m The total number of the constraints in Problem (16), m = 2 K + 1
ψ The gradient of ψ
2 ψ The Hessian matrix of ψ
x The step size of x , x = x 1 , , x K
y The step size of y
λ The Newton decrement, λ = ψ T x , y T
α The step size to update the x and y in the inner loop
β The constant to update α , β 0 , 1
c The constant used in the Armijo condition, c 0 , 1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, Y.; Tang, X.; Xie, G. Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach. Sensors 2025, 25, 5901. https://doi.org/10.3390/s25185901

AMA Style

Yu Y, Tang X, Xie G. Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach. Sensors. 2025; 25(18):5901. https://doi.org/10.3390/s25185901

Chicago/Turabian Style

Yu, Yang, Xiaoqing Tang, and Guihui Xie. 2025. "Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach" Sensors 25, no. 18: 5901. https://doi.org/10.3390/s25185901

APA Style

Yu, Y., Tang, X., & Xie, G. (2025). Interior Point-Driven Throughput Maximization for TS-SWIPT Multi-Hop DF Relays: A Log Barrier Approach. Sensors, 25(18), 5901. https://doi.org/10.3390/s25185901

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop