Next Article in Journal
GHGs Emission from the Agricultural Sector within EU-28: A Multivariate Analysis Approach
Previous Article in Journal
Chiller Optimization Using Data Mining Based on Prediction Model, Clustering and Association Rule Mining
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy Signal-Aided Secure Beamforming and Self-Energy Recycling in Full-Duplex Wireless-Powered Relay Networks

1
Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
2
Department of Electrical and Electronic Engineering, University of Bristol, Bristol BS8 1UB, UK
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Energies 2021, 14(20), 6497; https://doi.org/10.3390/en14206497
Submission received: 21 August 2021 / Revised: 20 September 2021 / Accepted: 3 October 2021 / Published: 11 October 2021

Abstract

:
In this paper, the object of study is secure transmission and green energy transfer in full-duplex (FD) wireless-powered relay (WPR) secure systems, where an FD relay collects the power from radio-frequency signs and transmits the information in the face of multiple eavesdroppers. In order to improve the efficiency and safety of the contemporaneous wireless energy and information delivery, we propose a joint energy-signal- (ES-) aided secure beamforming and time-switch scheme under the self-power circulation protocol at the relay. The question formulated in this paper is to maximize the confidentiality rate according to energy restrictions at both the relay and energy receiver. As the question is non-salient and hard to resolve directly, we transform it into two sub-problems. For the first sub-problem, a two-level optimization technique is suggested to separately gain the optimal beamforming as well as the ES covariance. The extrinsic rank is a single-variable majorization question, which can be solved by single-dimensional (1D) examination. We attain an optimal solution to the inner level by a semi-definite relaxation (SDR) technique. For the second sub-problem, we again use 1D search to solve this problem. Moreover, we prove that SDR always exists as a level-1 optimal resolution. Mathematical outcomes show that the suggested plan can achieve a considerable gain of confidentiality rate by comparison with other benchmark plans.

1. Introduction

Collecting power from RF signs is regarded as a promising approach to extend the longevity of power-forced wireless systems, especially concerning the high-power depletion of 5G wireless networks [1].
Meanwhile, contemporary wireless information and power transfer (SWIPT) can be realized by RF signals. The main purpose of SWIPT is to extend the longevity of wireless-powered systems and has drawn much attention after operating in various wireless communication fields, such as multiple-input single-output (MISO) [2,3], multiple-input-multiple-output (MIMO) [4], one-way amplify-and-forward (AF) relay systems [5,6], and two-way AF relay systems [7,8].
However, FD relaying produces loopback-interference (LI) limits that could degrade secrecy performance. Although many self-interference elimination techniques [9,10] have been proposed to eliminate self-interference, the implementation of these techniques is at the expense of expensive hardware and additional energy consumption. An effective relay-based self-energy recycling scheme [11] has been put forward to cope with the harmful effects of LI [12]. Regarding relaying systems, the joint secure beamforming scheme [13,14] and antenna distribution scheme [15] are applied to self-energy recycling (S-ER). In addition, Reference [16] expands on [12,15], applying the S-ER strategy to the FD source for self-energy recycling and confidential information transmission, and advancing the optimal beamforming scheme. Moreover, in [17], a fresh two-stage protocol was suggested in which the relay works in an FD pattern for utilizing self-energy.
However, the secure transmission approaches have not taken into account FD wireless-powered relay (FD-WPR) systems. In addition, the main challenge of FD-WPR secure systems is that a relay can harvest energy when transmitting signals, but this parallelism could lead to increasing LI and information leakage. Unfortunately, these issues have not been well addressed in the existing literature to the best of our knowledge.
Motivated by these open issues, we investigated secure transmission and renewable energy harvesting at mobile receivers in FD-WPR secure systems. To avoid the influence of LI and harvest energy overheard loopback interference arising from the FD relay, we designed a two-phase self-energy recycling protocol. The relay emits an energy signal (ES) to prevent information from being stolen by eavesdropping nodes [5]. The ES is a pre-designed pseudo-random signal that is conducive to secrecy information transmission and wireless energy transfer. Therefore, on the foundation of the S-ER relay protocol, we designed a novel two-phase ES-aided secure transmission scheme by jointly optimizing secure beamforming, ES, and TS coefficients to maximize the system confidentiality rate. Precisely, the main values of this essay are the following.
(1)
A novel two-phase ES-aided secure transmission scheme is established by using the FD pattern to realize contemporaneous information as well as energy delivery. We study secure joint beamforming and ES and TS coefficient design for the SRM problem in FD-WPR systems;
(2)
An antenna multiplexing method using the configured antenna to receive information to enhance the intensity of the information signal is proposed;
(3)
To deal with the aforementioned difficult problem, one-dimensional (1D) search and semi-definite relaxation (SDR) techniques are used to resolve the question. Then, an alternative method to transform the original problem into two sub-problems is proposed. By solving these subproblems iteratively, the closed solution of the beamforming, the covariance of the ES, and the optimal time allocation are obtained. Moreover, the tightness of SDR is established with the aid of the Karysh–Kuhn–Tucker (KKT) conditions.
Section 2 describes the related work. Section 3 describes the system patterns and question formulation. Section 4 analyzes the secrecy rate optimization problem. Section 5 simulates and analyzes the performance of the suggested scheme. Section 6 concludes the paper.

2. Related Work

Simultaneous wireless information and power transfer (SWIPT) has been widely used in wireless communication networks [18,19], However, because of the openness of its energy collection, the security of its communication is threatened.
The SWIPT protocol’s security is crucial given that SWIPT wireless networks are susceptible to eavesdropping due to the broadcasting and open characteristics of wireless media. The physical-layer (PHY) security technique that uses the inherent randomness of wireless channels is an efficient approach to improving the secrecy of wireless networks [20] establishes a FSK based swipt system powered by DC power supply for full duplex communication through shared channel. In [21], the end point node working in the full-duplex (FD) pattern in a single-input-single-output (SISO) SWIPT system, to obtain the highest security throughput of the system by a cooperative majorization of time switching (TS) coefficient, as well as codeword transmission rate, was studied. As an extension of [21], the authors of [22] investigated secrecy rate maximization (SRM), beamforming and null-space beamforming for secure communications in AF relay systems. The authors of [23] a scheme by which the destination is able to assist cooperative jamming to maximize the confidentiality rate.
In [24,25], artificial noise (AN) is used to damage the channel quality of the eavesdropping channel. Meanwhile, collaborative relaying has been proven effective in spreading coverage and spatial diversity [26]. Moreover, studies have found that the relay also can enhance wireless PHY security [5,6,8].
Based on the double advantages of AN and relay, a variety of secure transmission schemes were studied in [27,28]. Specifically, in [27], the authors proposed joint cooperative 45 beamforming (CB) and an AN scheme for PHY confidentiality in AF multi-antenna multi-relay systems. Additionally, as an extension of [27] introduced this scheme into SWIPT wireless networks. In [28], robust AN-aided secure beamforming was proposed to minimize the transmission power in wireless-energy relay systems. To ensure secure information delivery and power collecting, the robust and safe AN-assisted beamforming and power-allocation design were studied in the presence of imperfect channel state information (CSI) [27]. Despite having many advantages, the relay is “reluctant” to participate in information transmission due to its lack of energy.
For the above reasons, wireless-powered FD architecture has attracted increasingly more attention in studying secure systems. The FD model can increase the average secrecy rate by 33%–66%, compared with the HD model. In [29], the authors suggested a fresh TS-FD relaying plan to improve secure transmission in wireless-powered systems. Moreover, a cooperative jamming scheme with FD architecture under friendly jammers was proposed, in which jammer nodes transmit jamming signals to reduce the channel quality of an eavesdropper [30].

3. System Pattern and Question Formulation

We studied a typical FD-WPR system, as presented in Figure 1, in which the system consists of a source node (S), a relay node (R), an information receiver node (IR), numerous energy receiver nodes ( ER K ), and innumerable eavesdroppers (EMs). S transmits confidential information to the IR, and ( ER K ) harvests energy with the help of a trusted relay under the existence of E M . The relay has an energy harvester (EH) and an information receiver (Rx). Except for the relay, which has N + 1 feeler, all nodes are installed with one antenna. Specifically, all the antennas in the relay are used to transmit information and harvest energy. Besides, we suppose that all channels are quasistatic block fading channels.
Moreover, the relay knows the channel state information of all channels. We adopted a two-phase TS secure relaying protocol to secure transmission and efficient wireless energy transfer in the system. For this two-phase protocol, the relay not only avoids self-interference but also harvests energy from its message, as shown in Figure 2. In the first phase (see Figure 2a), at time slot n, one antenna is used to receive information transmitted from the S at R x , while N antennas are used to harvest energy from the S transmission at the EH. The received signals at the Rx and EH, as well as the harvested energy at the EH, are, respectively, given as:
y r , 1 R x [ n ] = h 1 x s [ n ] + n 1 [ n ]
y r , 1 E H [ n ] = h 2 x s [ n ] + n 2 [ n ]
E 1 = α T η P S h 2 2 ,
where x S [ n ] denotes the confidential information sent by S, satisfying E | x s [ n ] | 2 = P S ; h 1 and h 2 are the route factors from S to the receiving antenna and N transmitting antennas at R; n 1 and n 2 denote the additive white Gaussian noise (AWGN) satisfying, and n 1 is used in Equation (1), and n 2 is used in Equation (2). CN ( 0 , 1 ) at the Rx and CN ( 0 , I N ) at the EH of R; η ( 0 , 1 ] is a continuous indicating power transfer effectiveness.
Under the second stage, as shown in Figure 2b, the Rx uses N antennas to transmit the confidential information to legitimate users after relay processing, and the signal transmitted by the Rx to the IR with a superimposed ES is given by:
x r [ n ] = y r , 1 R x [ n ] w + z [ n ] ,
where w C N × 1 represents the beamforming matrix at the Rx; z [ n ] denotes the ES phasor following z [ n ] CN ( 0 , Σ ) , and Σ is the covariance of the ES [5]. The processing delay at the relay is trivial compared to the transmission delay and thereby can be safely ignored [22]. At this moment, the transmit energy at R is provided by:
P r = P s w h 1 2 + w 2 + Tr ( Σ ) .
Meanwhile, the EH harvests two parts of the energy: one part is source information from S, and the other is self-power from the LI route. Consequently, the received signals and collected power at the EH is able to be written separately as:
y r , 2 E H [ n ] = h 1 x s [ n ] + h L I H x r [ n ] + n r [ n ]
E 2 = ( 1 α ) T η ( P s | h 1 | 2 + P r h L I H 2 ) ,
where h L I C N × 1 is the LI route between feelers at the FD relay, which is beneficial and generally considered to be a Rayleigh fading channel [31]. Accordingly, this two-phase S-ER protocol at R no longer requires additional power and hardware sources to hold LI back. In a unit time slot T, the total collected power is computed as:
E = E 1 + E 2 = α T η P s h 2 2 + ( 1 α ) T η ( P s | h 1 | 2 + P r h L I H 2 ) .
By replacing (5) into (8), the energy harvested at R is able to be rewritten as:
E = α T η P s h 2 2 + ( 1 α ) T η ( P s | h 1 | 2 + ( P s w h 1 2 + w 2 + Tr ( Σ ) ) h L I H 2 ) .
Therefore, the entire obtainable transmit energy of the relay is ( E / T ), which is denoted:
P m a x = α η P s h 2 2 + ( 1 α ) η ( P s | h 1 | 2 + ( P s w h 1 2 + w 2 + T r ( Σ ) ) h L I H 2 ) .
As described above, the received signals at the IR, kth ER, and mth listener is able to be respectively formulated as:
y d [ n ] = f H x r [ n ] + n 3
y e , k [ n ] = g k H x r [ n ] + n 4 , k = 1 , , K
y e , m [ n ] = t m H x r [ n ] + n 5 , m = 1 , , M ,
where f C N × 1 , g k C N × 1 , and t m C N × 1 represent route replies from the Rx to the IR, ER, and mth listener, separately; n 3 , n 4 , and n 5 denote the AWGN listed below CN ( 0 , 1 ) , respectively.
From the system pattern (11)-(13), the obtained signal-to-noise ratio (SNR) at the IR, m t h eavesdropper and ER harvested energy are derived as:
γ d = w H A w w H B w + 1
γ e , m = w H A e , m w w H B e , m w + t m H Σ t m + 1
E k = η ( 1 α ) T ( w H ( A g + B g ) w + g k H Σ g k ) ,
where A = P S | h 1 | 2 D ( f ) D H ( f ) , B = D ( f ) D H ( f ) , A e , m = P S | h 1 | 2 D ( t m ) D H ( t m ) , B e , m = D ( t m ) D H ( t m ) , A g = P S | h 1 | 2 D ( g k ) D H ( g k ) , and B g = D ( g k ) D H ( g k ) . Therefore, the achievable confidentiality rate is written as:
R s = min m M { log ( 1 + γ d ) log ( 1 + γ e , m ) } s . t . E k / T P m i n , k , P r P m a x , 0 < α < 1 ,
where P m i n , k 0 is the threshold value of individual minimum power transmission required by ER. Our target is to maximize the confidentiality rate and transfer energy to the ER by cooperatively designing the beamforming phasor w at the same time, ES covariance Σ , and TS ratio α , under the limitation of the transmit energy restriction at R and ER. Mathematically, the SRM question can be defined as:
max w , Σ 0 , α min m M { log ( 1 + γ d ) log ( 1 + γ e , m ) } s . t . η ( 1 α ) ( w H ( A g + B g ) w + g k H Σ g k ) P m i n , k , k K C + w H D w + w H E w + F h L I H Σ h L I G w 2 + Tr ( Σ ) 0 < α < 1 ,
where C = α η P S D ( h 2 ) D H ( h 2 ) + ( 1 α ) η P S | h 1 | 2 ; D = ( 1 α ) η P S | h 1 | 2 D ( h L I ) D H ( h L I ) ; E = ( 1 α ) η D ( h L I ) D H ( h L I ) ; F = ( 1 α ) η ; G = P S | h 1 | 2 + 1 .

4. Secrecy Rate Optimization

In this section, the original problem (18) is converted into two sub-problems with respect to ( w , Σ ) and α . As for the first sub-problems, we will reset the problem (18) into a two-rank majorization problem to resolve ( w , Σ ) . As for the second sub-problem, we will use a 1D search to solve α .

4.1. Beamforming Vector and Energy Signal Design

For fixed α , we reformulate the problem (18) into a two-level optimization problem. By bringing in a relaxation variable τ , we modify question (18) as:
R S * = max w , Σ 0 { log ( 1 + γ d ) log ( 1 + 1 τ ) }
s . t . log ( 1 + γ e , m ) log ( 1 τ ) , m M
η ( 1 α ) ( w H ( A g + B g ) w + g k H Σ g k ) P m i n , k K
C + w H D w + w H E w + F h L I H Σ h L I G w 2 + Tr ( Σ ) .
By following the same ideas in [5], the problem above can be transformed into a two-rank question in which the extrinsic layer is a single-variable majorization question with respect to (w.r.t.), for example:
R S * = max τ { log ( 1 + υ ( τ ) ) log ( 1 τ ) } s . t . τ m i n τ 1 ,
and the intrinsic layer is a quadratic fractional question w.r.t. w and Σ for fixed τ , which is given by:
υ ( τ ) = max w , Σ 0 w H A w w H B w + 1 s . t . 1 + w H A e , m w w H B e , m w + t m H Σ t m + 1 1 τ , m M η ( 1 α ) ( w H ( A g + B g ) w + g k H Σ g k ) P m i n , k K C + w H D w + w H E w + F h L I H Σ h L I G w 2 + Tr ( Σ ) .
Next, we determine the variation range of 1D variables in the outer-level problem. According to the constraints in (19b), it is straightforward to have τ 1 τ m i n . On the basis of the limitations in (19a), if we want to ensure a positive secrecy rate, the following relation must be satisfied:
τ ( 1 + w H A w w H B w + 1 ) λ m i n ( B 1 A ) τ m i n .
The essential value of the reformulation is that the extrinsic-layer question (22) is a single-variable majorization question which is resolved by using a 1D line search over τ . Nevertheless, the intrinsic-rank question (21) is still non-salient. Next, we commit to resolving question (21) by utilizing an SDR method [32].
According to a standard routing of SDR [17], by defining W = w w H , M = h L I h L I H , J m = t m t m H , and G k = g k g k H , and dropping the rank-1 restriction level rank ( W = 1 ) for the moment, we gain the relaxation of the question (21):
υ r e l a x ( τ ) = max w 0 , Σ 0 Tr ( AW ) Tr ( BW ) + 1 s . t . Tr ( ( A e , m ρ B e , m ) W ) ρ Tr ( J m Σ ) ρ , m M η ( 1 α ) ( Tr ( ( A g + B g ) W ) + Tr ( G k Σ ) ) P m i n , k K C + Tr ( DW ) + Tr ( EW ) + F Tr ( M Σ ) Tr ( G W ) + Tr ( Σ ) ,
where ρ = 1 / τ 1 . Then, we transform the quasi-salient question (23) into salient semi-definite programs (SDPs) using an efficient Charnes–Cooper transformation [27], notably making the variable substitutions W ¯ = β W , Σ ¯ = β Σ by introducing a relaxation variable β 0 . We recast (23) as:
max W ¯ 0 , Σ ¯ 0 Tr ( A W ¯ ) s . t . Tr ( B W ¯ ) + β = 1 Tr ( ( A e , m ρ B e , m ) W ¯ ) ρ Tr ( J m Σ ¯ ) ρ β , m M η ( 1 α ) ( Tr ( ( A g + B g ) W ¯ ) + Tr ( G k Σ ¯ ) ) β P m i n , k K C β + Tr ( D W ¯ ) + Tr ( E W ¯ ) + F Tr ( M Σ ¯ ) Tr ( G W ¯ ) + Tr ( Σ ¯ ) .
Question (24) is an SDP salient question, which is validly determined using standard optimization packages such as CVX [33]. At this point, problem (24) has been solved. We can obtain the optimum resolution of W * and Σ * by the relations W ¯ = β W and Σ ¯ = β Σ , respectively.
Because we dropped the non-convex rank-1 constraint, the search region of possible solutions is expanded. However, the question of whether the SDR is tight for question (21) remains. To resolve this problem, we suppose the energy minimization question listed in question (25).
max W ¯ 0 , Σ ¯ 0 T r ( G W )
s . t . Tr ( ( A e , m ρ B e , m ) W ) ρ Tr ( J m Σ ) ρ , m M
η ( 1 α ) ( Tr ( ( A g + B g ) W ) + Tr ( G k Σ ) ) P m i n , k K
C + Tr ( DW ) + Tr ( EW ) + F Tr ( M Σ ) Tr ( G W ) + Tr ( Σ )
Tr ( ( A υ r e l a x ( τ ) B ) W ) υ r e l a x ( τ ) .
υ r e l a x ( τ ) is the optimum value of question (24), which is a continuous in question (25). Constraint (25e) is derived from: Tr ( AW ) Tr ( BW ) + 1 υ r e l a x ( τ ) . Therefore, we have the following propositions:
Thesis 1. Any practicable resolution to question (25) is the optimum resolution to question (23). The Evidence is similar to that in [7] [Thesis 2], and the Evidence thus left out here.
Thesis 2. For υ ( τ ) > 0 , any optimum W * ¯ 132 to the question (25) always meets level rank ( W * ¯ ) = 1 .
Proof. 
See Appendix A.1. □
Thesis 3. Assume that the initial problem (21) is practicable υ ( τ ) > 0 . Subsequently, the optimal resolution can be gained by resolving the SDP problem (25). Moreover, the optimum resolution W * ¯ must be of level 1.
Proof. 
Thesis 3 is a straightforward outcome of Propositions 1 and 2. □

4.2. Description of the Solving Algorithm

We now return to the two-level optimization problems (20) and (21); the algorithm for resolving question (19) is specified in Algorithm 1.
Algorithm 1. Algorithm proposed for solving problem (19).
Energies 14 06497 i001

4.3. Time Allocation Ratio Design

We obtained the optimal solutions of ( W * , Σ * ) and τ * . According to the idea of monotonicity between SNR and SRM, for given W * , Σ * , and τ * , we are able to reorganize question (18) as:
R S * = max α { log ( w H A w w H B w + 1 ) log ( w H A e , m w w H B e , m w + t m H Σ t m + 1 ) } .
In this way, we can obtain the optimum solution by utilizing a 1D examination so as to obtain the optimal target value R * .

5. Numerical Results

In this section, we inspect the property of the suggested scheme in FD-WPR systems by numerical imitations. Specifically, with the intention of making the advantage of the suggested scheme more obvious, we contrast the scheme with the benchmarks below: (1) No ES scheme; by setting the covariance matrix Σ = 0 , we only optimize w w and α in (18); (2) AN scheme; the relay simultaneously forwards information and broadcasts AN, where AN cannot be eliminated at the destination. The Monte Carlo Imitation method is employed in order to verify the confidentiality rate of the proposed method. All of the numerical outcomes are the average of 1000 haphazardly produced channels. Unless otherwise noted, the simulation settings are the following: P S = 10 dBW, K = 3 , M = 3 , η = 0.8 , P m a x = 20 dBW, P m i n = 3 dBW, and N = 3 .
The influence of transmission power P S on the confidentiality rate is shown in Figure 3. Naturally, the system confidentiality rate of all plans grows together with increasing P S . It is seen that when P S is very small, the secrecy rate will increase rapidly. As P S increases, the secrecy rate continues to increase, but at a slow pace. Moreover, we also discover that the suggested ES plan outclasses the AN scheme, while the scheme without ES (no ES) performs the worst. Furthermore, it can be observed that the performance of ES-eve is close to ES-noeve. This phenomenon suggests that the legitimate channel will not be impaired by ES. Based on the above observations, we are confident in saying that ES is more appropriate for secure transmission than AN. The relay broadcasts AN to jam eavesdroppers but impairs the quality of the legitimate channel simultaneously.
Figure 4 presents the change of secrecy rate under diverse maximum available powers P m a x at R. It is shown the system secrecy rate of all schemes increases with increasing P m a x , while the proposed ES scheme exhibits the best performance.The reason for the maximum safety rate of our scheme is that we have introduced self energy recovery technology, The energy signal we introduced effectively reduces the signal-to-noise ratio of eavesdropping nodes, so the security rate is higher than other methods. According to Formula (10), the greater P m a x , the more energy collected at the relay, and the greater the transmission power of the relay. Therefore, according to Formulas (11) and (17), the greater the safety rate of the system. so the energy collected at the relay is higher than other schemes. That is, the transmission power of the relay is higher. When P m a x < 5 dBW, the performance of ES-noeve, ES-eve, and AN-eve are very similar. In addition, the performance of the ES-eve scheme is always able to approach that of the ES-noeve system. Furthermore, when P m a x < 15 dBW, the secrecy rate increases rapidly, whereas, when P m a x > 15 dBW, the secrecy rate increases slowly. This implies that the proposed ES schemes can support SWIPT transmission security without additional power.
In Figure 5, we plot the confidentiality rate against the minimum required power threshold at ER. It is presented in Figure 4 that, when P m i n < 3 dBW, the system confidentiality rate is almost unchanged, whereas the system secrecy rate rapidly decreases when P m i n > 3 dBW. Moreover, by comparison with other plans, the suggested plan exhibits a meaningful performance boost with regard to the system secrecy rate. It is discovered that the ES-eve project’s property can approach that of the ES-noeve program. No matter how P m i n changes, the implementation of the ES-eve is close to that of ES-noeve. The performance of the no-ES-eve scheme is the worst, which proves the superiority of the suggested ES plan.
To investigate the performance of the proposed ES scheme more comprehensively, Figure 6 shows the relationship between the energy conversion efficiency factor η versus the secrecy rate. η determines how much receiving power R can actually provide. According to Formulas (9), (16) and (17), when P m i n increases to a certain extent, the shorter the time for signal transmission, resulting in the reduction of the safety rate of the system. Thus, finally, the system confidentiality rate can be enhanced. However, more severe information disclosure will raise harvest energy, ultimately leading to the slow improvement of secrecy performance in the high- η regime. In addition, compared with the AN scheme, the ES scheme significantly increases the secrecy rate. In addition, we apply the ES method to a half-duplex communication system [34,35]. The results show that the effect of a half-duplex is approximately half of that of a full-duplex. We believe that the energy captured by the half-duplex mechanism is halved in the working process.

6. Conclusions

In this paper, on the foundation of the self-power circulation relay agreement, we propose a joint ES-aided secure beamforming and TS scheme in FD-WPR networks in which multiple eavesdroppers exist. In such conditions, this essay aims to resolve the SRM question of the relevant systems. We formulate the optimization problem by jointly optimizing ES covariances, AF beamforming, and TS coefficients. Since the formulated question is non-salient and challenging to deal with directly, we turn it into two sub-problems. A key component of our method is to determine the convexity of some hidden SRM problems by using an SDR technique. Moreover, a relaxation problem always exists for which an optimal solution of rank 1 has been proven. Imitation outcomes demonstrate the advantage of the suggested ES scheme [36].

Author Contributions

L.O. Conceptualization, software and writing—original draft; P.C. methodology, investigation, formal analysis and writing—review and editing; X.L. Project administration and supervision; S.D. validation and resources; Y.S. data curation and visualization. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Proof of Proposition 2

Since (25) is salient and meets Slater’s restriction condition, its dual gap is 0, and there is a strong dichotomy between the primitive and double problems. According to the optimal solution satisfying the KKT condition, we have
L ( x ) = Tr ( G W ) + m = 1 M λ m ( Tr ( ( A e , m ρ B e , m ) W ) ρ Tr ( J m Σ ) ρ ) + k = 1 K θ k ( Tr ( ( A g + B g ) W ) + Tr ( G k Σ ) P m i n ) + μ ( C + Tr ( DW ) + Tr ( EW ) + F Tr ( M Σ ) Tr ( G W ) Tr ( Σ ) ) ω ( Tr ( ( A υ r e l a x ( τ ) B ) W ) υ r e l a x ( τ ) ) Tr ( ZW ) Tr ( L Σ )
where λ m 0 , k , μ 0 , ω 0 , Z 0 , and L 0 are the Lagrangian multipliers associated with constraints (25b)–(25e), respectively. The proofs of the KKT conditions of the problem of (21) are expressed as follows:
ZW = 0 and L Σ = 0
Z = ( 1 μ ) G + m = 1 M λ m ( A e , m ρ B e , m ) + k = 1 K θ k ( A g + B g ) + μ ( D + E ) ω ( A υ r e l a x ( τ ) B )
L = m = 1 M λ m ρ J m Σ + k = 1 K θ k G k + μ ( F M I K )
Note from (29) the oblique part of L can be formulated as
diag ( L ) = m = 1 M λ m ρ J m Σ + k = 1 K θ k B g + μ ( E I K )
Hence, (30) minus (28) can can be formulated as
Z = ( 1 μ ) G + m = 1 M λ m ( A e , m ρ B e , m ) + k = 1 K θ k A g + μ D ω A + υ r e l a x ( τ ) B
In addition, according to the post-multiply property and (28), we can derive
ω AW = ( ( 1 μ ) G + m = 1 M λ m ( A e , m ρ B e , m ) + k = 1 K θ k A g + μ D + ϑ r e l a x ( τ ) B ) W Q
Note that all of the other terms Q are semi-positive definite matrices, and thereby Q 0 is a full-rank matrix. Thus,
rank ( W ) = rank ( QW ) = ω rank ( AW ) rank ( A ) = 1
where we find that rank ( A ) = 1 is based on rank ( B C ) . If rank ( A = 0 , then A = 0 , since there is a positive secrecy rate, namely ϑ r e l a x ( τ ) > 0 , and the constraint (25e) cannot be satisfied. Therefore, rank ( A ) = 1 , which finalizes the evidence of Proposition 2.

Appendix A.2. Notation Description

No.NotationDescription
1 A H conjugate transpose of matrices A
2 T r ( A ) trace of matrices A
3 rank ( A ) rank of matrices A
4 a = vec ( A ) stacking the columns of a matrices {A} into a phasor a
5 | . | , . and . F absolute value, Euclidean norm and Frobenius norm respectively
6Hadamard product
7 A 0 {A} is a positive semi-definite matrices
8 I N N × N identity matrix
9 D ( a ) the oblique matrices with Energies 14 06497 i002 vector on main oblique
10 λ m i n ( . ) the minimum eigenvalue of the matrices involved
11 χ C N ( μ , σ 2 ) a random variable abiding a complicated circular Gaussian distribution with average μ as well as covariance σ 2

References

  1. Zhang, R.; Ho, C.K. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  2. Ng, D.W.K.; Lo, E.S.; Schober, R. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2014, 13, 4599–4615. [Google Scholar] [CrossRef] [Green Version]
  3. Zhu, Z.; Zhang, Y.; Wang, Z.; Zhang, Y.; Gao, X.; Chu, Z. Robust beamforming for multiuser MISO interference channel with energy harvesting constraint. In Proceedings of the International Conference on Communications & Networking in China, Shanghai, China, 15–17 August 2015. [Google Scholar]
  4. Shi, Q.; Xu, W.; Wu, J.; Song, E.; Wang, Y. Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2015, 14, 2841–2853. [Google Scholar] [CrossRef] [Green Version]
  5. Feng, Y.; Yang, Z.; Zhu, W.; Li, Q.; Lv, B. Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks. IEEE Trans. Veh. Technol. 2016, 66, 2354–2366. [Google Scholar] [CrossRef]
  6. Wen, Z.; Liu, X.; Beaulieu, N.C.; Wang, R.; Wang, S. Joint Source and Relay Beamforming Design for Full-Duplex MIMO AF Relay SWIPT Systems. IEEE Commun. Lett. 2016, 20, 320–323. [Google Scholar] [CrossRef]
  7. Wan, Y.; Li, Q.; Zhang, Q.; Qin, J. Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications. IEEE Wirel. Commun. Lett. 2015, 4, 493–496. [Google Scholar] [CrossRef]
  8. Li, Q.; Zhang, Q.; Qin, J. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks. IEEE Trans. Veh. Technol. 2016, 65, 9006–9019. [Google Scholar] [CrossRef]
  9. Sabharwal, A.; Schniter, P.; Guo, D.; Bliss, D.W.; Rangarajan, S.; Wichman, R. In-Band Full-Duplex Wireless: Challenges and Opportunities. IEEE J. Sel. Areas Commun. 2014, 32, 1637–1652. [Google Scholar] [CrossRef] [Green Version]
  10. Zheng, G. Joint Beamforming Optimization and Power Control for Full-Duplex MIMO Two-way Relay Channel. IEEE Trans. Signal Process. 2014, 63, 555–566. [Google Scholar] [CrossRef] [Green Version]
  11. Zeng, Y.; Zhang, R. Full-Duplex Wireless-Powered Relay With Self-Energy Recycling. IEEE Wirel. Commun. Lett. 2015, 4, 201–204. [Google Scholar] [CrossRef] [Green Version]
  12. Kim, H.; Kang, J.; Jeong, S.; Lee, K.E.; Kang, J. Secure beamforming and self-energy recycling with full-duplex wireless-powered relay. In Proceedings of the 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016. [Google Scholar] [CrossRef]
  13. Li, T.; Chen, P.; Wang, Z.; Xiao, N. Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Wireless-Powered Full-Duplex Relay Networks. In Proceedings of the 2019 14th International Conference on Computer Science & Education (ICCSE), Toronto, ON, Canada, 19–21 August 2019. [Google Scholar]
  14. Chen, P.; Li, T.; Fang, X. Secure Beamforming and Artificial Noise Design in Full-Duplex Wireless-Powered Relay Networks. In Proceedings of the 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, 12–15 June 2019. [Google Scholar]
  15. Wu, W.; Wang, B.; Deng, Z.; Zhang, H. Secure Beamforming for Full-Duplex Wireless Powered Communication Systems With Self-Energy Recycling. IEEE Wirel. Commun. Lett. 2017, 6, 146–149. [Google Scholar] [CrossRef]
  16. Hu, S.; Ding, Z.; Ni, Q. Beamforming optimisation in energy harvesting cooperative full-duplex networks with self-energy recycling protocol. IET Commun. 2016, 10, 848–853. [Google Scholar] [CrossRef] [Green Version]
  17. Su, Y.; Jiang, L.; He, C. Decode-and-forward relaying with full-duplex wireless information and power transfer. IET Commun. 2017, 11, 2110–2115. [Google Scholar] [CrossRef]
  18. Chu, Z.; Zhou, F.; Xiao, P.; Zhu, Z.; Mi, D.; Al-Dhahir, N.; Tafazolli, R. Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services with Full Duplex Self-Energy Recycling. IEEE Trans. Wirel. Commun. 2018, 18, 620–636. [Google Scholar] [CrossRef] [Green Version]
  19. Li, J.; Ding, X.; Li, X.; Zhao, K.; Shi, W. Research on the Energy Allocation Scheme Based on SWIPT Relaying System. Mob. Netw. Appl. 2018, 23, 1449–1458. [Google Scholar] [CrossRef]
  20. Wu, J.; Kong, W.; Gao, P.; Jin, N.; Zhang, J.; Tao, J.; Snášel, V. Design Consideration of Bidirectional Wireless Power Transfer and Full-Duplex Communication System via a Shared Inductive Channel. Energies 2021, 14, 4918. [Google Scholar] [CrossRef]
  21. Mou, W.; Cai, Y.; Yang, W.; Yang, W.; Xu, X.; Hu, J. Exploiting full Duplex techniques for secure communication in SWIPT system. In Proceedings of the 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, China, 15–17 October 2015. [Google Scholar]
  22. Deng, Z.; Gao, Y.; Li, W.; Cai, C. Robust secure beamforming for SWIPT systems with full-duplex receivers and energy-harvesting eavesdroppers. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June 2017. [Google Scholar]
  23. Liu, M.; Liu, Y. Power Allocation for Secure SWIPT Systems with Wireless-Powered Cooperative Jamming. IEEE Commun. Lett. 2017, 21, 1353–1356. [Google Scholar] [CrossRef] [Green Version]
  24. Niu, H.H.; Zhang, B.N.; Guo, D. Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers. Front. Inf. Technol. Electron. Eng. 2017, 18, 850–862. [Google Scholar] [CrossRef]
  25. Yu, H.; Wan, S.; Cai, W.; Xu, L.; Zhou, X.; Wang, J.; Wu, Y.; Shu, F.; Wang, J.; Wang, J. GPI-based Secrecy Rate Maximization Beamforming Scheme for Wireless Transmission with AN-aided Directional Modulation. IEEE Access 2017, 6, 12044–12051. [Google Scholar] [CrossRef]
  26. Dang, S.; Chen, G.; Coon, J.P. Outage Performance Analysis of Full-Duplex Relay-Assisted Device-to-Device Systems in Uplink Cellular Networks. IEEE Trans. Veh. Technol. 2016, 99, 4506–4510. [Google Scholar] [CrossRef] [Green Version]
  27. Hehao, N.; Zhang, B.; Guo, D.; Huang, Y. Joint Robust Design for Secure AF relay Networks with SWIPT. IEEE Access 2017, 5, 9369–9377. [Google Scholar] [CrossRef]
  28. Li, B.; Fei, Z.; Chen, H. Robust Artificial Noise-Aided Secure Beamforming in Wireless-Powered Non-Regenerative Relay Networks. IEEE Access 2016, 4, 7921–7929. [Google Scholar] [CrossRef]
  29. Qiao, J.; Zhang, H.; Zhou, X.; Yuan, D. Joint beamforming and time switching design for secrecy rate maximization in wireless-powered FD relay systems. IEEE Trans. Veh. Technol. 2017, 67, 567–579. [Google Scholar] [CrossRef]
  30. Bi, Y.; Chen, H. Accumulate and Jam: Towards Secure Communication via A Wireless-Powered Full-Duplex Jammer. IEEE J. Sel. Top. Signal Process. 2016, 10, 1538–1550. [Google Scholar] [CrossRef]
  31. Qiao, J.; Zhang, H.; Zhao, F.; Yuan, D. Secure Transmission and Self-Energy Recycling with Partial Eavesdropper CSI. IEEE J. Sel. Areas Commun. 2018, 36, 1531–1543. [Google Scholar] [CrossRef] [Green Version]
  32. Luo, Z.; Ma, W.; So, A.M.; Ye, Y.; Zhang, S. Semidefinite Relaxation of Quadratic Optimization Problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  33. Michael Grant and Stephen Boyd. CVX: Matlab Software for Disciplined Convex Programming, Version 2.0 Beta. Available online: http://cvxr.com/cvx (accessed on 20 September 2013).
  34. Nguyen, T.N.; Tran, P.T.; Voznak, M. Wireless energy harvesting meets receiver diversity: A successful approach for two-way half-duplex relay networks over block Rayleigh fading channel. Comput. Netw. 2020, 172, 107176. [Google Scholar] [CrossRef]
  35. Srirutchataboon, G.; Kochi, J.; Sugiura, S. Performance Analysis of Hybrid Buffer-Aided Cooperative Protocol Based on Half-Duplex and Virtual Full-Duplex Relay Selections. IEEE Open J. Commun. Soc. 2021, 2, 1862–1873. [Google Scholar] [CrossRef]
  36. Zhu, G.; Lin, X.; Zhu, K.; Zhang, W.; Yu, J.X. TreeSpan: Efficiently computing similarity all-matching. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 20–24 May 2012; pp. 529–540. [Google Scholar] [CrossRef]
Figure 1. System model of FD-WPR network.
Figure 1. System model of FD-WPR network.
Energies 14 06497 g001
Figure 2. System model two-phase TS protocol for FD-WPR networks.
Figure 2. System model two-phase TS protocol for FD-WPR networks.
Energies 14 06497 g002
Figure 3. Secrecy rate vs. source transmission power.
Figure 3. Secrecy rate vs. source transmission power.
Energies 14 06497 g003
Figure 4. Secrecy rate vs. maximum available power at relay.
Figure 4. Secrecy rate vs. maximum available power at relay.
Energies 14 06497 g004
Figure 5. Secrecy rate vs. minimum essential energy at C.
Figure 5. Secrecy rate vs. minimum essential energy at C.
Energies 14 06497 g005
Figure 6. Secrecy rate vs. energy harvesting efficiency.
Figure 6. Secrecy rate vs. energy harvesting efficiency.
Energies 14 06497 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ou, L.; Chen, P.; Luo, X.; Dang, S.; Sun, Y. Energy Signal-Aided Secure Beamforming and Self-Energy Recycling in Full-Duplex Wireless-Powered Relay Networks. Energies 2021, 14, 6497. https://doi.org/10.3390/en14206497

AMA Style

Ou L, Chen P, Luo X, Dang S, Sun Y. Energy Signal-Aided Secure Beamforming and Self-Energy Recycling in Full-Duplex Wireless-Powered Relay Networks. Energies. 2021; 14(20):6497. https://doi.org/10.3390/en14206497

Chicago/Turabian Style

Ou, Lizhen, Peipei Chen, Xueshan Luo, Shuping Dang, and Yuchen Sun. 2021. "Energy Signal-Aided Secure Beamforming and Self-Energy Recycling in Full-Duplex Wireless-Powered Relay Networks" Energies 14, no. 20: 6497. https://doi.org/10.3390/en14206497

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop