Next Article in Journal
Correction: Lu, W. et al. SOOCP: A Platform for Data and Analysis of Space Object Optical Characteristic Information. 2019, 10, 296
Previous Article in Journal
A Responsible Machine Learning Workflow with Focus on Interpretable Models, Post-hoc Explanation, and Discrimination Testing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Beamforming Design for SWIPT-Based Multi-Radio Wireless Mesh Network with Cooperative Jamming

1
School of Electrical & Electronic Engineering, North China Electric Power University, Beijing 102206, China
2
Shandong Electric Power Research Institute of the State Grid Corporation of China, Jinan 100031, China
*
Authors to whom correspondence should be addressed.
Information 2020, 11(3), 138; https://doi.org/10.3390/info11030138
Submission received: 17 January 2020 / Revised: 23 February 2020 / Accepted: 28 February 2020 / Published: 29 February 2020

Abstract

:
Wireless mesh networks (WMNs) can provide flexible wireless connections in a smart city, internet of things (IoT), and device-to-device (D2D) communications. The performance of WMNs can be greatly enhanced by adopting a multi-radio technique, which enables a node to communicate with more nodes simultaneously. However, multi-radio WMNs face two main challenges, namely, energy consumption and physical layer secrecy. In this paper, both simultaneous wireless information and power transfer (SWIPT) and cooperative jamming technologies were adopted to overcome these two problems. We designed the SWIPT and cooperative jamming scheme, minimizing the total transmission power by properly selecting beamforming vectors of the WMN nodes and jammer to satisfy the individual signal-to-interference-plus-noise ratio (SINR) and energy harvesting (EH) constrains. Especially, we considered the channel estimate error caused by the imperfect channel state information. The SINR of eavesdropper (Eve) was suppressed to protect the secrecy of WMN nodes. Due to the fractional form, the problem was proved to be non-convex. We developed a tractable algorithm by transforming it into a convex one, utilizing semi-definite programming (SDP) relaxation and S-procedure methods. The simulation results validated the effectiveness of the proposed algorithm compared with the non-robust design.

1. Introduction

Wireless mesh networks (WMNs) are able to wirelessly cover a large area with low deployment and maintenance costs. Particularly, when combining with multi-radio (MR) technology, the capacity of WMNs is significantly improved [1,2,3]. Due to such a feature, WMNs are suitable for both providing ubiquitous connection to the internet and carrying data generated by multiple services, such as internet of things (IoT), smart grids, vehicle-to-vehicle (V2V), etc. [4,5,6], where mesh nodes need to be deployed without fixed power connections. In this case, most of the mesh nodes are supplied by the batteries, which have limited operation time and need to be replaced or recharged frequently.
Energy harvesting (EH) WMNs yield low battery maintenance costs and less energy storage requirements at each node by harvesting the energy from the environment (e.g., solar or wind power) [7,8,9,10]. However, the intermittent and unpredictable nature of these energy sources makes it difficult to supply a certain amount of power for applications continuously and stably with EH technology, and most conventional EH technologies are only applicable in specific environments. Recently, radiofrequency (RF) EH has opened up the possibility to overcome the above limitations, where the nodes can charge their batteries from electromagnetic radiation. Since RF signals can transmit information and power at the same time, simultaneous wireless information and power transfer (SWIPT) schemes for various networks have been widely researched [11,12,13].
Information security is a prime concern for critical infrastructures or some sensitive services. However, due to the vulnerability of the wireless links, limited physical protection, and the dynamically changing topology, WMNs tend to be generally susceptible to attacks [14]. Traditional security mechanisms, typically involving cryptographic algorithms, implicitly assume that any potential eavesdroppers have limited computational abilities [15,16]. However, the rapid development of computing hardware brings more kinds of attacking methods, making these traditional mechanisms more vulnerable. To address this problem, physical layer security mechanisms have recently attracted significant attention to WMNs [17,18,19]. Among them, the cooperative jamming method is a popular physical layer security solution, which was adopted in our work.
In this paper, we applied the cooperative jamming method and SWIPT technology to multi-radio WMN to enhance network security and alleviate energy consumption problems. Under the premise of imperfect channel state information, we designed a robust beamforming scheme to minimize the total power consumption while satisfying the individual quality-of-service (QoS) and EH requirements, as well as the channel estimate error and transmit power constraints. In addition, to ensure the secrecy of the WMN, the signal-to-interference-plus-noise ratio (SINR) of eavesdropper (Eve) was limited to be less than a certain threshold. The formulated problem was non-convex due to the fractional form and logarithmic function, and we first transformed it to a convex one and then obtained the feasible optimal solution by using the semi-definite programming (SDP) relaxation and S-procedure methods. The simulation results indicated the good performance of the proposed schemes compared to non-robust ones. The main contributions of this paper are listed as follows:
  • In this paper, both SWIPT and cooperative jamming technics were adopted in the multi-radio WMN to enhance its power consumption and physical layer security performance, respectively. While [20,21,22,23,24] only adopted the SWIPT, [25,26,27] only adopted the cooperative jamming. Although [28,29,30,31] proposed some beamforming method, considering both SWIPT and cooperative jamming, all of them were designed for the cognitive radio system.
  • Both imperfect channel state information and non-linear EH model were considered in this paper, making our system model more practical. Moreover, the imperfect channel state information led to the unknown channel estimate error. We utilized the S-procedure method to relax the channel estimate error constraints.
  • The transmit power consumption optimization constrained by the SINR threshold, EH threshold, channel estimate error, and total transmit power was a non-convex problem. We transformed it into a standard SDP format, which was a convex problem.
The rest of the paper is organized as follows. In Section 2, the related works are reviewed. The SWIPT-based multi-radio WMN model with cooperative jamming is presented in Section 3. In Section 4, a robust beamforming problem is formulated, and the optimal scheme is elaborated. Section 5 provides numerical results and discussions. Finally, conclusions are presented in Section 6.
Notations: |   ·   | ,   ·   F , and ( · ) H denote the absolute value, the Frobenius norm, and the Hermitian transpose, respectively. Tr ( · ) and E [ · ] denote the trace expectation operator. 0 N is the N × 1 zero vector. The distribution of a circularly symmetric complex Gaussian (CSCG) random variable with zero mean and variance σ 2 is denoted as C N ( 0 , σ 2 ) . A , B = T r ( A H B ) and [ x ] + = max { x , 0 } . A _ 0 indicates that matrix A is positive semidefinite, and rank ( A ) is the rank of a matrix A .

2. Related Works

Simultaneous wireless information and power transfer (SWIPT) in wireless communications has recently attracted considerable attention, and wireless networks are envisioned to be energy self-sufficient in the future. The concept of SWIPT was first developed in [32], where a trade-off between the rates at which energy and reliable information can be transmitted over a single noisy channel was studied. Later on, this work was extended in [33] to incorporate the effect of frequency-selective channels and additive white Gaussian noise. However, these studies assumed that decoding information and extracting power could be obtained simultaneously from the same received signal, which is unrealistic in practice due to practical circuit design limitations. On the other hand, two practical EH receivers, namely, time switching (TS) and power splitting (PS), were introduced in [34,35]. In the former, the receiver switches between the energy harvester and information receiver, whereas, in the latter scheme, the receiver splits the signal into two streams, one for EH, and the other for information decoding. In this paper, we adopted the PS method in the EH model.
Multi-radio and cooperative communication techniques were exploited to further enhance the performance of SWIPT systems [36]. The capacity of SWIPT was optimized through multiple-input single-output (MISO) and multiple-input multiple-output (MIMO) techniques, which were illustrated in [37,38], respectively. Furthermore, an EH relaying system was studied in [20] for the cases with/without the presence of co-channel interference, where the multiple antennas relay node was powered by the source signal and signals from other sources. Joint optimization of beamforming, transmission power, and harvested energy for the MIMO SWIPT system was investigated in [21]. The broadcasting and interference channel case in the MR SWIPT system with multi-users was analyzed in [22]. An energy efficiency maximization algorithm, considering both the power splitting factor and precoding metric for SWIPT MIMO wireless sensor network, was proposed in [23]. In [24], EH was employed into the MR WMNs, and a minimum power channel assignment and routing algorithm (MP-CACR) was proposed to manage the EH in WMN.
Recently, there has been a growing interest in studying physical layer security in SWIPT systems. The concept of physical layer security was first introduced by Wyner in [25]. It was shown that secret communication was possible when the Eve channel was a degraded version of the destination channel. To counter eavesdropping, a friendly jammer in the network sent out artificial noise (AN) to specifically interfere with Eve’s reception so that the transmitted message could not be decoded. References [26,27] introduced how to choose friendly jammers efficiently. In [28,29], cooperative jamming-aided secure communication for SWIPT networks was studied, where the jammer could help the source to increase the harvested energy by the energy receiver. The authors of [30] proposed a harvest-and-jam (HJ) protocol in a SWIPT cooperative system, consisting of four relay node wiretap channels with multi-antenna HJ helpers to maximize the secrecy rate while subjecting to the relay transmit power and the total harvested energy constraints for each jamming helper. In [31], different secure relay beamforming algorithms for SWIPT non-regenerative relay systems were studied. However, to the best of our knowledge, no investigation or analysis has yet been carried out for the robust beamforming of full duplex SWIPT-based MR WMNs with the cooperative jamming secure method, which motivated the research of this paper.

3. System Model

The model was motivated by the potential of SWIPT and cooperative jamming technic in future wireless communication systems. In this paper, we considered a SWIPT-based MR WMN with cooperative jamming, as shown in Figure 1. The system under consideration consisted of three communication nodes, one Eve, and one cooperative jammer. All the communication nodes consisted of a normal WMN, where all the nodes in the WMN could communicate with any other nodes. To simplify the calculations, we assumed only three communication nodes in our system. A WMN with more communication nodes could be calculated in a similar method. The communication nodes were represented as a , b , and c , while three communication links among them were denoted as l a b , l b c , and l c a , respectively. To improve the energy performance of the WMN system in Figure 1, each communication nodes equipped a power split-based SWIPT model, making the nodes to reuse the energy from the received signal. Due to the lack of the physical layer in WMN, the communication between the WMN nodes was easy to eavesdrop. In this paper, we assumed that there was an eavesdropper, which was eavesdropping the communication between the node c and a . The link l c a was eavesdropped by an eavesdropper with a single antenna. To enhance the security performance of the system, one of the trustworthy WMN nodes was selected to work as a jamming node, which would inject artificial noise signals continuously into the channel to make the eavesdropper incapable of successfully decoding the confidential signals. In this paper, we assumed that the jamming node had been selected and determined, and the procedure of jammer selection was not discussed here because the selection algorithm was out of the research scope of this work, and it could be referred to in literature [37,39]. Each node in the WMN was assumed to be equipped with N + 1 antennas— N for transmitting and one for receiving. Through a power splitter, the received signal was divided into two parts, one for the information decoder, and another for EH. ρ n denotes the PS ratio of the node n ,   n { a , b , c , j } , which means that a portion ρ n of the signal power was used for signal detection, while the remaining portion ( 1 ρ n ) was diverted to EH.
In some practical deployments, it is difficult to obtain accurate channel state information (CSI) at the transmitter because of delay, quantization errors, etc. Thus, the channel estimation error was considered in the system model. h α β N × 1 represents the practical channel response between the node α { a , b , c , j } and β { a , b , c , e } , where α and β denote the transmitter and receiver, respectively. Thus, the actual channel response between two nodes could be expressed as
h α β = h ˜ α β + e α β α { a , b , c , j } ,   β { a , b , c , e } ,
where h ˜ α β N × 1 is the estimated channel vector, and e α β N × 1 is the estimation error vector. When α = β , e α β was sufficiently small, which was treated as zero in this paper. The channel estimation error was assumed to be within a certain range with the upper limit η α β , which could be expressed as
e α β F 2 = h α β h ˜ α β F 2 η α β α { a , b , c , j } ,   β { a , b , c , e } .
The signal received by the WMN communication nodes and Eve was expressed as
y a = ( h c a ) H w c x c + ( h a a ) H w a x a + ( h b a ) H w b x b + ( h j a ) H w j x j + n a ,
y b = ( h a b ) H w a x a + ( h b b ) H w b x b + ( h c b ) H w c x c + ( h j b ) H w j x j + n b ,
y c = ( h b c ) H w b x b + ( h c c ) H w c x c + ( h a c ) H w a x a + ( h j c ) H w j x j + n c ,
y e = ( h a e ) H w a x a + ( h b e ) H w b x b + ( h c e ) H w c x c + ( h j e ) H w j x j + n e ,
where x α is the signal transmitted from the node α { a , b , c , j } , satisfying E [ | x α | 2 ] = 1 . w α N × 1 denotes the beamforming vectors of the node α { a , b , c , j } , and n β , β { a , b , c , e } is the additive white Gaussian noise (AWGN) with zero mean and variance of σ β 2 .
Due to the nodes having the knowledge of their own code words, and the self-interfering channel estimation errors were ignored as we mentioned above, the self-interference term in Equations (3)–(5) could be cancelled through self-interference cancellation technique [40]. The received signal after self-interference cancellation could be written as
y ˜ a = ( h c a ) H w c x c + ( h b a ) H w b x b + ( h j a ) H w j x j + n a ,
y ˜ b = ( h a b ) H w a x a + ( h c b ) H w c x c + ( h j b ) H w j x j + n b ,
y ˜ c = ( h b c ) H w b x b + ( h a c ) H w a x a + ( h j c ) H w j x j + n c ,
y ˜ e = ( h a e ) H w a x a + ( h c e ) H w c x c + ( h j e ) H w j x j + n e .
According to Equations (7)–(10), the SINR of the WMN nodes and Eve could be calculated as
S I N R a = ρ a | ( h c a ) H w c | 2 ρ a ( | ( h b a ) H w b | 2 + | ( h j a ) H w j | 2 ) + σ a 2 ,
SIN R b = ρ b | ( h a b ) H w a | 2 ρ b ( | ( h c b ) H w c | 2 + | ( h j b ) H w j | 2 ) + σ b 2 ,
S I N R c = ρ c | ( h b c ) H w b | 2 ρ c ( | ( h a b ) H w a | 2 + | ( h j c ) H w j | 2 ) + σ c 2 ,
SIN R e = | ( h c e ) H w c | 2 ( | ( h a e ) H w a | 2 + | ( h b e ) H w b | 2 + | ( h j e ) H w j | 2 ) + σ e 2 .
The non-linear parametric EH model was adopted here since it is more practical than the linear one [41,42,43,44]. After energy harvesting, the power harvested at each WMN node n { a , b , c } was modeled as
E H n o u t = M n 1 + exp ( Ω n ( E H n i n Ψ n ) ) M n 1 + exp ( Ω n Ψ n ) 1 1 1 + exp ( Ω n Ψ n ) ,   n { a , b , c } ,
where M n is a constant denoting the maximum harvested power of node n when the EH circuit is saturated, Ψ n is related to the turn-on voltage threshold of the EH circuit, and Ω n reflects the non-linear charging rate with respect to the input power of the EH circuit E H n i n . E H n i n was calculated by the PS ratio ρ n and the energy harvesting efficiency ξ n , which could be expressed as
E H n i n = ξ n ( 1 ρ n ) E { | y n | 2 } ,   n { a , b , c } .

4. Robust Beamforming Design

In this paper, we focused on the beamforming design and PS ratio optimization of the system. Our goal was to minimize the total transmitted power while subjecting to the SINR, EH, and power consumption constraints. The optimization problem could be mathematically characterized as
P 1 :   min w n , ρ i n { a , b , c , j } w n F 2
subject to:
SIN R e γ e
SIN R n γ n ,   n { a , b , c }
E H n o u t θ n ,   n { a , b , c }
w n F 2 P max ,   n { a , b , c , j }
0 ρ n 1 ,   n { a , b , c }
h α β = h ˜ α β + e α β   α { a , b , c , j } ,   β { a , b , c , e }
e n 1 n 2 F 2 η n 1 n 2 ,   n 1 , n 2 { a , b , c , j , e } ,
where γ e represents the upper bound SINR threshold of Eve. γ n ,   n { a , b , c } and θ n ,   n { a , b , c } represent the lower bound SINR and EH threshold of the WMN communication nodes, respectively. P max is the power consumption constraint of each node.
P1 is a non-convex optimization problem and difficult to solve due to the fractional form and logarithmic function in the objective function. To deal with this difficulty, we first introduced a new variable W n w n ( w n ) H ,   n { a , b , c , j } with rank ( W n ) = 1 . Then, it was reformulated into an equivalent non-fractional form P2.
P 2 :   min W n , ρ i n { a , b , c , j } Tr ( W n )
subject to:
Tr ( W n ) P max ,   n { a , b , c , j }
W n _ 0 ,   n { a , b , c , j }
rank ( W n ) = 1 ,   n { a , b , c , j } .
In practice, the exact statistical information of the channel estimation errors is generally unknown, which led P2 to be intractable. We adopted the S-procedure [45,46,47] to transform the constraints that include e α β ,   α { a , b , c , j } ,   β { a , b , c , e } , i.e., Equations (18)–(20) into a semi-definite programming (SDP) form [48,49] by utilizing the upper bounds of the channel estimation errors.
In order to transform constraint Equation (18), we first introduced some auxiliary variables as follows.
m a e = min e a e ( h ˜ a e + e a e ) H W a ( h ˜ a e + e a e ) ,   e a e η a e ,
m b e = min e b e ( h ˜ b e + e b e ) H W b ( h ˜ b e + e b e ) ,   e b e η b e ,
m ^ c e = max e c e ( h ˜ c e + e c e ) H W c ( h ˜ c e + e c e ) ,   e c e η c e .
Then, Equation (18) could be rewritten as
γ e ( h ˜ j e + e j e ) H W j ( h ˜ j e + e j e ) + γ e ( m a e + m b e ) m c e + γ e σ e 2 0 , e n e F 2 η n e , n { a , b , c , j }
m a e ( h ˜ a e + e a e ) H W a ( h ˜ a e + e a e ) ,   e a e η a e ,
m b e ( h ˜ b e + e b e ) H W b ( h ˜ b e + e b e ) ,   e b e η b e ,
m ^ c e ( h ˜ c e + e c e ) H W c ( h ˜ c e + e c e ) ,   e c e η c e ,
By applying the S-procedure, Equation (18) could be transformed into the standard SDP form, as shown in Equations (36)–(39).
( W j + λ j e I W j h ˜ j e ( h ˜ j e ) H W j ( h ˜ j e ) H W j ( h ˜ j e ) γ e ( m a e + m b e ) m c e + γ a σ a 2 λ j e η j e 2 ) _ 0 ,
( W a + λ a e I W a h ˜ a e ( h ˜ a e ) H W a ( h ˜ a e ) H W a ( h ˜ a e ) m a e λ a e η a e 2 ) 0 ,
( W b + λ b e I W b h ˜ b e ( h ˜ b e ) H W b ( h ˜ b e ) H W b ( h ˜ b e ) m b e λ b e η b e 2 ) 0 ,
( W c + λ c e I W c h ˜ c e ( h ˜ c e ) H W c ( h ˜ c e ) H W c ( h ˜ c e ) m ^ c e λ c e η c e 2 ) 0 ,
EEquations (18) and (19) represents the SINR and EH constraints for the WMN communication nodes, respectively. Here, for simplicity, we only took the node a as an example to show the transformation procedure, and the constraints of other nodes could be transformed in the same way. First, several auxiliary variables were introduced as follows
m j a = min e a j ( h ˜ j a + e j a ) H W j ( h ˜ j a + e j a ) ,   e j a η j a ,
m ^ j a = max e a j ( h ˜ j a + e j a ) H W j ( h ˜ j a + e j a ) ,   e j a η j a ,
m b a = min e a b ( h ˜ b a + e b a ) H W b ( h ˜ b a + e b a ) ,   e b a η b a ,
m ^ b a = max e a b ( h ˜ b a + e b a ) H W b ( h ˜ b a + e b a ) ,   e b a η b a ,
m a a = ( h ˜ a a ) H W a ( h ˜ a a ) ,
θ ^ n = Ψ n ln ( M n ( 1 1 1 + exp ( Ω n Ψ n ) ) θ n + M n 1 1 + exp ( Ω n Ψ n ) 1 ) / Ω n , n { a , b , c , j } ,
where θ ^ n is the threshold of the input power of the EH circuit E H n i n , which is obtained from the mathematical transformation of Equations (17) and (18). Then, Equation (19) could be rewritten as
ρ a ( h ˜ c a + e c a ) H W a ( h ˜ c a + e c a ) γ a ρ a ( m ^ b a + m ^ j a ) γ a σ a 2 0 , e a n F 2 η n e , n { b , c , j }
m ^ j a ( h ˜ j a + e j a ) H W j ( h ˜ j a + e j a ) ,   e j a η j a ,
m ^ b a ( h ˜ b a + e b a ) H W b ( h ˜ b a + e b a ) ,   e b a η b a .
By applying the S-procedure, Equation (19) could be expressed as
( W a + λ c a I W a h ˜ c a ( h ˜ c a ) H W a ( h ˜ a c ) H W a ( h ˜ c a ) γ a ρ a ( m b a + m j a ) γ a σ a 2 λ c a η c a 2 ) _ 0 ,
( W a + λ j a I W a h ˜ j a ( h ˜ j a ) H W a m ^ j a ( h ˜ j a ) H W a ( h ˜ j a ) λ j a η j a 2 ) 0 ,
( W a + λ b a I W a h ˜ b a ( h ˜ b a ) H W a m ^ b a ( h ˜ b a ) H W a ( h ˜ b a ) λ b a η b a 2 ) 0 .
Equation (20) could be rewritten as
( h ˜ c a + e c a ) H W c ( h ˜ c a + e c a ) + m a a + m b a + m j a + σ a 2 θ ^ a ξ a ( 1 ρ a ) 0 ,
m ^ j a ( h ˜ j a + e j a ) H W j ( h ˜ j a + e j a ) ,   e j a η j a ,
m ^ b a ( h ˜ b a + e b a ) H W b ( h ˜ b a + e b a ) ,   e b a η b a .
Applying the S-procedure again, Equation (20) could be reformulated as
( W a + μ c a I W a h ˜ c a ( h ˜ c a ) H W a ( h ˜ c a ) H W a ( h ˜ c a ) + m a a + m b a + m j a + σ a 2 θ ^ a ξ a ( 1 ρ a ) μ c a η c a 2 ) _ 0 ,
( W a + μ j a I W a h ˜ j a ( h ˜ j a ) H W a ( h ˜ j a ) H W a ( h ˜ j a ) m j a μ j a η j a 2 ) 0 ,
( W a + μ b a I W a h ˜ b a ( h ˜ b a ) H W a ( h ˜ b a ) H W a ( h ˜ b a ) m b a μ e a η e a 2 ) 0 .
By substituting Equations (18), (19), and (20) in the objective function and dropping the rank-one constraint, we could obtain the convex optimization problem P3 shown below, which could be solved iteratively by the standard convex (CVX) optimization toolbox, a package in Matlab for specifying and solving convex programs [50,51].
P 3 : min W n , ρ i n { a , b , c , j } Tr ( W n )
subject to:
(36),(37),(38),(39),
(49),(50),(51),
(55),(56),(57),
(22),(26),(27),
m ^ n 1 n 2 m n 1 n 2 0 ,   n 1 , n 2 { a , b , c , j , e } ,
λ n 1 n 2 0 ,   n 1 , n 2 { a , b , c , j , e } ,
μ n 1 n 2 0 ,   n 1 , n 2 { a , b , c , j , e } .
As the rank-one constraint of W n is dropped, the resulting W n may not satisfy the rank-one constraint Equation (61), in general. In this case, we adopted the randomization technique in [52,53,54] to obtain the feasible rank-one solution of the result.
Here, we discussed the complexity of the proposed algorithm. The main computational complexity of our algorithm arose from computing the optimal w n , which was transformed into an SDP problem. The number of arithmetic operations required to solve a standard real-valued SDP problem could be expressed as
min x n c T x
subject to:
A 0 + i = 1 n x i A i 0 , x 2 X ,
where A i denotes the symmetric block-diagonal matrices with P diagonal blocks of size e l × e l ,   l = 1 P , upper-bounded by [55].
O ( 1 ) ( 1 + i = 1 P e l ) 1 2 n ( n 2 + n i = 1 P e l 2 + i = 1 P e l 3 ) .
In computing w n , the number of diagonal blocks was equal to 40, e l was equal to 1. The unknown variables to be determined were of a size n = 2 N 2 + 1 , where the first and second parts were the real parts of W n and the slack variable, respectively.

5. Numerical Results and Performance Analysis

In this section, we numerically investigated the performance of the robust beamforming design for SWIPT-based multi-radio WMN with cooperative jamming. For simplicity, the EH, SINR, and channel estimation error thresholds were assumed to be equal for all the WMN nodes, which were denoted as θ , γ , and η , respectively. All the channels were assumed to be independent of Rayleigh fading, and the channel vectors h were generated by independent CSCG random variables distributed as C N ( 0 , σ 2 ) . For the direct communication channels, the variance was set as σ a b 2 = σ b c 2 = σ a c 2 = σ j e 2 = σ c e 2 = 10 4 . For the inter-user interference channels, the variance was set as σ b a 2 = σ a c 2 = σ c b 2 = σ j n 2 = 10 4 τ ,   n { a , b , c } , where τ is the inter-user interference suppression factor. The variance of the self-interference channels was set as σ n n 2 = 10 3 ,   n { a , b , c } . Unless other stated, we set θ = 5   dBm , γ = 5   dBm , γ e = 2   dBm , η = 0.05 , τ = 0.1 , N = 4 . For the practical nonlinear EH model, we set the circuit parameters as M n = 24   mW , Ω n = 150 , and Ψ n = 0.014 [41,42,43,44].
In Figure 2, Figure 3 and Figure 4, a non-robust beamforming method proposed in [46] was taken as the comparison scheme. Figure 2 demonstrates the power consumption versus the EH threshold with different SINR thresholds. It could be seen that the power consumption increased with the increasing of the EH threshold. The increase was non-linear due to the non-linear EH model. In addition, the results in Figure 2 show that the robust beamforming design was much better than the non-robust one.
Figure 3 illustrates the power consumption versus SINR threshold with a different number of transmission antennas. Similar to the relationship with the EH threshold, the power consumption grew non-linearly with the increase in the SINR threshold, and the robust beamforming design had a better power consumption performance than the non-robust one. Meanwhile, it could be observed that with the increase of the number of transmit antennas, the power consumption was also increasing. Although a large number of transmit antennas could improve the capacity, security rate, and bring other benefits to the system, they led a higher total power consumption.
Figure 4 demonstrates the impact of different channel estimation error on power consumption with different EH thresholds. The bound of the channel estimation error threshold was set from 0.1 to 0.5. Although the power consumption of both robust and non-robust designs increased with the increase in channel uncertainty, the non-robust beamforming design increased faster than the robust one, which indicated that the non-robust scheme was more sensitive with different channel estimation error.
In Figure 5, the effect of value τ on power consumption with different EH threshold was investigated. The value of τ represented the channel isolation among the nodes responsible for the inter-user interference. Different channel assignment scheme might lead to a different inter-user interference [7]. It could be seen that the power consumption increased with τ first, but became flat later. It is worth noting that the inter-user interference was stronger when τ was small, and the system could harvest more energy from the interference. However, as τ was increasing, the system could not harvest enough energy from the interference channels.
Figure 6 illustrates the maximum SINR of Eve versus SINR threshold of WMN nodes with a different number of transmission antennas and different channel estimation error thresholds. It was seen that the maximum SINR value of Eve was far less than the SINR of WMN nodes. Although the maximum SINR of Eve grew with the increase of γ , it was always less than 1 dbm. Figure 6 also depicts the impact of the number of transmit antennas and the channel estimation error. It could be observed that a large number of transmit antennas brought some benefit to the physical layer secrecy. When the number of transmit antennas and the SINR threshold were fixed, a larger channel estimation error led to a larger SINR of Eve.
In Figure 7 and Figure 8, a comparison beamforming algorithm in [46] was taken to verify the power consumption and security performance. The comparison algorithm applied the SWIPT technic to the IoT devices, and the imperfect channel estimation was taken into consideration as well. However, the comparison algorithm did not consider the problem of physical layer security. Here, we took its MISO scenario, and all the interference caused by the circuits were neglected. As the comparison algorithm did not consider the jamming node, we only compared the power consumption of communication nodes in Figure 7. From Figure 7, we could observe that the comparison algorithm had a slight superiority in power consumption, which was less than 2 dbm. This was because the security strategy slightly reduced energy efficiency. However, our algorithm had a large improvement in security performance, which could be seen in Figure 8. Because the comparison algorithm did not have any security strategy, it could not inhibit eavesdrop behavior.

6. Conclusions

In this paper, we proposed a robust beamforming design for a SWIPT-based multi-radio WMN with cooperative jamming under imperfect channel state information. Our goal was to minimize the total power consumption while subjecting to the SINR, EH, and total transmit power constraints. The SINR of Eve was also limited to prevent the physical layer secrecy. The non-linear EH model was adopted to better match the practical EH circuit. To solve the problem, we utilized the SDP technique and S-procedure method to transform the initial non-convex optimization to a convex SDP form. Simulation results indicated the good performance of the proposed schemes compared to non-robust ones.

Author Contributions

Formal analysis, L.L.; Funding acquisition, S.G.; Methodology, L.L.; Project administration, L.Z.; Resources, L.L.; Software, Y.Z.; Writing—original draft, L.L.; Writing—review and editing, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Nature Science Foundation of China (NSFC) under Grant No. 61771194 and 61931001, respectively. It’s also supported by the Science and Technology Project of State Grid Corporation of China under Grant Number SGSDDK00KJJS1900405.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheng, Y.; Li, H.; Shila, D.M.; Cao, X. A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks. IEEE/ACM Trans. Netw. 2015, 23, 1342–1355. [Google Scholar] [CrossRef]
  2. Campbell, C.; Khan, S.; Singh, D.; Loo, K. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks. Sensors 2011, 11, 4917–4942. [Google Scholar] [CrossRef] [Green Version]
  3. Lam, J.; Lee, S.; Tan, W. Performance Evaluation of Multi-Channel Wireless Mesh Networks with Embedded Systems. Sensors 2012, 12, 500–517. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Santana, J.; Marrero, D.; Macías, E.; Mena, V.; Suárez, Á. Interference Effects Redress over Power-Efficient Wireless-Friendly Mesh Networks for Ubiquitous Sensor Communications across Smart Cities. Sensors 2017, 17, 1678. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Moayad, A.; Safa, O.; Ismaeel, A.R.; Yaser, J. An Intrusion Detection System for Connected Vehicles in Smart Cities. Ad Hoc Netw. 2019, 10, 1016. [Google Scholar]
  6. Zaeema, I.; Sobia, J.; Hassaan, Q.; Moayad, A. Resource Efficient Allocation and RRH Placement for Backhaul of Moving Small Cells. IEEE Access. 2019, 7, 47379–47389. [Google Scholar]
  7. Alim Al Islam, A.B.M.; Islam, M.J.; Nurain, N.; Raghunathan, V. Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey. IEEE Commun. Surv. Tutor. 2016, 18, 988–1017. [Google Scholar] [CrossRef]
  8. Cheng, Y.; Li, H.; Wan, P. A theoretical framework for optimal cooperative networking in multiradio multichannel wireless networks. IEEE Wirel. Commun. 2012, 19, 66–73. [Google Scholar] [CrossRef]
  9. Xie, K.; Wang, X.; Liu, X.; Wen, J.; Cao, J. Interference-Aware Cooperative Communication in Multi-Radio Multi-Channel Wireless Networks. IEEE Trans. Comput. 2016, 5, 1528–1542. [Google Scholar] [CrossRef]
  10. Park, S.; Kim, B.; Yoon, H.; Choi, S. RA-eV2V: relaying systems for LTE-V2V communications. J. Commun. Netw. 2018, 20, 396–405. [Google Scholar] [CrossRef]
  11. Ponnimbaduge, P.T.D.; Jayakody, D.N.; Sharma, K.S.K.; Chatzinotas, S.; Li, J. Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Commun. Surv. Tutor. 2018, 1, 264–302. [Google Scholar] [CrossRef] [Green Version]
  12. Muhammad, S.K.; Sobia, J.; Moayad, A.; Yaser, J.; Thar, B. EPS-TRA: Energy efficient Peer Selection and Time switching Ratio Allocation for SWIPT-enabled D2D Communication. Available online: https://ieeexplore.ieee.org/document/8952654 (accessed on 29 February 2020).
  13. Haythem, B.S.; Safa, O.; Moayad, A.; Rawan, D.; Ismaeel, A.R.; Yaser, J. Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks. Ad Hoc Netw. 2020, 98, 102035. [Google Scholar]
  14. Bruno, R.; Conti, M.; Gregori, E. Mesh networks: commodity multihop ad hoc networks. IEEE Commun. Mag. 2005, 43, 123–131. [Google Scholar] [CrossRef]
  15. Wang, X.; Yi, P. Security Framework for Wireless Communications in Smart Distribution Grid. IEEE Trans. Smart Grid. 2011, 4, 809–818. [Google Scholar] [CrossRef]
  16. Glass, S.; Portmann, M.; Muthukkumarasamy, V. Securing Wireless Mesh Networks. IEEE Internet Comput. 2008, 4, 30–36. [Google Scholar] [CrossRef] [Green Version]
  17. Zhu, Y.; Wang, L.; Wong, K.; Heath, R.W. Secure Communications in Millimeter Wave Ad Hoc Networks. IEEE Trans. Wirel. Commun. 2017, 5, 3205–3217. [Google Scholar] [CrossRef] [Green Version]
  18. Zhang, X.; Zhou, X.; McKay, M.R. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2013, 11, 1802–1814. [Google Scholar] [CrossRef] [Green Version]
  19. Alcaraz, C.; Lopez, J. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems. IEEE Trans. Syst. 2010, 4, 419–428. [Google Scholar] [CrossRef] [Green Version]
  20. Zhu, G.; Zhong, C.; Suraweera, H.A.; Karagiannidis, G.K.; Zhang, Z.; Tsiftsis, T.A. Wireless information and power transfer in relay systems with multiple antennas and interference. IEEE Trans. Commun. 2015, 4, 1400–1418. [Google Scholar] [CrossRef]
  21. Liu, D.; Wen, Z.; Liu, X.; Li, S.; Zou, J. Joint Source-Relay Optimization for MIMO Full-Duplex Bidirectional Wireless Sensor Networks with SWIPT. Sensors 2019, 19, 1827. [Google Scholar] [CrossRef] [Green Version]
  22. Park, J.; Clerckx, B. Joint wireless information and energy transfer in a two-user MIMO interference channel. IEEE Trans. Wirel. Commun. 2013, 8, 4210–4221. [Google Scholar] [CrossRef] [Green Version]
  23. Xue, L.; Wang, J.; Li, J.; Wang, Y.; Guan, X. Precoding Design for Energy Efficiency Maximization in MIMO Half-Duplex Wireless Sensor Networks with SWIPT. Sensors 2019, 19, 4923. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Avallone, S.; Banchs, A. A Channel Assignment and Routing Algorithm for Energy Harvesting Multiradio Wireless Mesh Networks. IEEE J. Sel. Areas Commun. 2016, 5, 1463–1476. [Google Scholar] [CrossRef]
  25. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 8, 1355–1387. [Google Scholar] [CrossRef]
  26. Gao, Q.; Huo, Y.; Ma, L.; Xing, X.; Cheng, X.; Jing, T.; Liu, H. Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks. IET Commun. 2017, 8, 1264–1274. [Google Scholar]
  27. Wen, Y.; Huo, Y.; Ma, L.; Jing, T.; Gao, Q. A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2019, 4, 3500–3512. [Google Scholar] [CrossRef]
  28. Zhang, Q.; Huang, X.; Li, Q.; Qin, J. Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE Trans. Commun. 2015, 3, 906–915. [Google Scholar] [CrossRef]
  29. Xing, H.; Liu, L.; Zhang, R. Secrecy wireless information and power transfer in fading wiretap channel. IEEE Trans. Veh. Technol. 2016, 1, 180–190. [Google Scholar] [CrossRef] [Green Version]
  30. Xing, H.; Chu, Z.; Ding, Z.; Nallanathan, A. Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks. In Proceedings of the IEEE Global Communication (GLOBECOM), Austin, TX, USA, 8–12 December 2014. [Google Scholar]
  31. Li, Q.; Zhang, Q.; Qin, J. Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks. IEEE Transactions on Vehicular Technology. 2014, 5, 2462–2467. [Google Scholar] [CrossRef]
  32. Varshney, L.R. Transporting information and energy simultaneously. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, CA, USA, 6–11 July 2008. [Google Scholar]
  33. Grover, P.; Sahai, A. Shannon meets Tesla: Wireless information and power transfer. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Austin, TX, USA, 13–18 June 2010. [Google Scholar]
  34. Zhou, X.; Zhang, R.; Ho, C.K. Wireless information and power transfer: Architecture design and rate-energy tradeoff. IEEE Trans. Commun. 2013, 11, 4754–4767. [Google Scholar] [CrossRef] [Green Version]
  35. Liu, L.; Zhang, R.; Chua, K.-C. Wireless information and power transfer: A dynamic power splitting approach. IEEE Trans. Commun. 2013, 9, 3990–4001. [Google Scholar] [CrossRef] [Green Version]
  36. Ding, Z.; Zhong, C.; Ng, D.W.K.; Peng, M.; Suraweera, H.A.; Schober, R.; Poor, H.V. Application of smart antenna technologies in simultaneous wireless information and power transfer. IEEE Commun. Mag. 2015, 4, 86–93. [Google Scholar]
  37. Xu, J.; Liu, L.; Zhang, R. Multiuser MISO beamforming for simultaneous wireless information and power transfer. IEEE Trans. Signal Process. 2014, 18, 4798–4810. [Google Scholar] [CrossRef] [Green Version]
  38. Zhang, R.; Ho, C.K. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun. 2013, 5, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  39. Wen, Y.; Jing, T.; Huo, Y.; Li, Z.; Gao, Q. Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio Network. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA, 5–8 March 2018. [Google Scholar]
  40. Hua, Y.; Ma, Y.; Gholian, A.; Li, Y.; Cirik, A.C.; Liang, P. Radio self-interference cancellation by transmit beamforming, all-analog cancellation and blind digital tuning. Signal Process. 2015, 4, 322–340. [Google Scholar] [CrossRef] [Green Version]
  41. Boshkovska, E.; Ng, D.W.K.; Zlatanov, N.; Koelpin, A.; Schober, R. Robust resource allocation for MIMO wireless powered communication networks based on a non-linear EH model. IEEE Trans. Commun. 2017, 5, 1984–1999. [Google Scholar] [CrossRef] [Green Version]
  42. Nguyen, T.; Nguyen, M.; Do, D.; Voznak, M. Enabling Non-Linear Energy Harvesting in Power Domain Based Multiple Access in Relaying Networks: Outage and Ergodic Capacity Performance Analysis. Electronics 2019, 8, 817. [Google Scholar] [CrossRef] [Green Version]
  43. Zhang, X.; Wang, Y.; Zhou, F.; Al-Dhahir, N.; Deng, X. Robust Resource Allocation for MISO Cognitive Radio Networks Under Two Practical Non-Linear Energy Harvesting Models. IEEE Commun. Lett. 2018, 9, 1874–1877. [Google Scholar] [CrossRef] [Green Version]
  44. Zhao, X.; Zhang, Y.; Geng, S.; Du, F.; Zhou, Z.; Yang, L. Hybrid Precoding for an Adaptive Interference Decoding SWIPT System with Full-Duplex IoT Devices. IEEE Internet Things J. press. 2020, 7, 1164–1177. [Google Scholar] [CrossRef]
  45. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  46. Xue, J.; Biswas, S.; Cirik, A.C.; Du, H.; Yang, Y.; Ratnarajah, T.; Sellathurai, M. Transceiver Design of Optimum Wirelessly Powered Full-Duplex MIMO IoT Devices. IEEE Trans. Commun. 2018, 5, 1955–1969. [Google Scholar] [CrossRef] [Green Version]
  47. Wen, Z.; Guo, Z.; Beaulieu, N.C.; Liu, X. Robust Beamforming Design for Multi-User MISO Full-Duplex SWIPT System with Channel State Information Uncertainty. IEEE Trans. Veh. Technol. 2019, 2, 1942–1947. [Google Scholar] [CrossRef]
  48. Chae, S.H.; Jeong, C.; Lim, S.H. Simultaneous Wireless Information and Power Transfer for Internet of Things Sensor Networks. IEEE Internet Things J. 2018, 4, 2829–2843. [Google Scholar] [CrossRef]
  49. Shi, Q.; Xu, W.; Chang, T.H.; Wang, Y.; Song, E. Joint beamforming and power splitting for MISO interference channel with SWIPT: An SOCP relaxation and decentralized algorithm. IEEE Trans. Signal Process. 2014, 23, 6194–6208. [Google Scholar] [CrossRef]
  50. Grant, M.; Boyd, S. Graph Implementations for Non-smooth Convex Programs. Lect. Notes Control Inf. Sci. 2008, 37, 95–110. [Google Scholar]
  51. Luo, Z.Q.; Ma, W.K.; So, A.M.C.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 2010, 3, 20–34. [Google Scholar] [CrossRef]
  52. Yu, H.; Lau, V.K.N. Rank-constrained Schur-convex optimization with multiple trace/log-det constraints. IEEE Trans. Signal Process. 2011, 1, 304–314. [Google Scholar] [CrossRef] [Green Version]
  53. Cadambe, V.R.; Jafar, S.A. Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation. IEEE Trans. Inf. Theory. 2009, 5, 2334–2344. [Google Scholar] [CrossRef]
  54. Goldsmith, A. Wireless Communications; Cambridge University Press: New York, NY, USA, 2005. [Google Scholar]
  55. Ben-Tal, A.; Nemirovski, A. Lectures on Modern Convex Optimization: Analysis, Algorithms, Engineering Applications; SIAM: Philadelphia, PA, USA, 2001. [Google Scholar]
Figure 1. A system model of the simultaneous wireless information and power transfer (SWIPT)-based multi-radio wireless mesh network (WMN) with cooperative jamming.
Figure 1. A system model of the simultaneous wireless information and power transfer (SWIPT)-based multi-radio wireless mesh network (WMN) with cooperative jamming.
Information 11 00138 g001
Figure 2. Power consumption versus energy harvesting (EH) threshold with different signal-to-interference-plus-noise ratio (SINR) thresholds.
Figure 2. Power consumption versus energy harvesting (EH) threshold with different signal-to-interference-plus-noise ratio (SINR) thresholds.
Information 11 00138 g002
Figure 3. Power consumption versus SINR threshold with a different number of transmit antennas.
Figure 3. Power consumption versus SINR threshold with a different number of transmit antennas.
Information 11 00138 g003
Figure 4. Power consumption versus EH threshold with different channel estimation error thresholds.
Figure 4. Power consumption versus EH threshold with different channel estimation error thresholds.
Information 11 00138 g004
Figure 5. Power consumption versus τ with different EH thresholds.
Figure 5. Power consumption versus τ with different EH thresholds.
Information 11 00138 g005
Figure 6. Maximum SINR of Eve versus SINR threshold of WMN nodes with different number of transmit antennas and channel estimation error thresholds.
Figure 6. Maximum SINR of Eve versus SINR threshold of WMN nodes with different number of transmit antennas and channel estimation error thresholds.
Information 11 00138 g006
Figure 7. Communication nodes’ power consumption comparison with different SINR thresholds.
Figure 7. Communication nodes’ power consumption comparison with different SINR thresholds.
Information 11 00138 g007
Figure 8. Maximum SINR of Eve comparison with a different number of transmit antennas.
Figure 8. Maximum SINR of Eve comparison with a different number of transmit antennas.
Information 11 00138 g008

Share and Cite

MDPI and ACS Style

Li, L.; Zhao, X.; Geng, S.; Zhang, Y.; Zhang, L. Robust Beamforming Design for SWIPT-Based Multi-Radio Wireless Mesh Network with Cooperative Jamming. Information 2020, 11, 138. https://doi.org/10.3390/info11030138

AMA Style

Li L, Zhao X, Geng S, Zhang Y, Zhang L. Robust Beamforming Design for SWIPT-Based Multi-Radio Wireless Mesh Network with Cooperative Jamming. Information. 2020; 11(3):138. https://doi.org/10.3390/info11030138

Chicago/Turabian Style

Li, Liang, Xiongwen Zhao, Suiyan Geng, Yu Zhang, and Lei Zhang. 2020. "Robust Beamforming Design for SWIPT-Based Multi-Radio Wireless Mesh Network with Cooperative Jamming" Information 11, no. 3: 138. https://doi.org/10.3390/info11030138

APA Style

Li, L., Zhao, X., Geng, S., Zhang, Y., & Zhang, L. (2020). Robust Beamforming Design for SWIPT-Based Multi-Radio Wireless Mesh Network with Cooperative Jamming. Information, 11(3), 138. https://doi.org/10.3390/info11030138

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop