Next Article in Journal
IoT Privacy and Security Challenges for Smart Home Environments
Next Article in Special Issue
The Role of Physical Layer Security in IoT: A Novel Perspective
Previous Article in Journal
Real-Time Hybrid In-Station Bus Dispatching Strategy Based on Mixed Integer Programming
Previous Article in Special Issue
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate

Chongqing Key Laboratory of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
*
Author to whom correspondence should be addressed.
Information 2016, 7(3), 38; https://doi.org/10.3390/info7030038
Submission received: 27 April 2016 / Revised: 29 June 2016 / Accepted: 1 July 2016 / Published: 13 July 2016
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)

Abstract

:
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards information, and the other converts the received signal into energy. Beamforming is used by the relay to prevent the eavesdropper from intercepting confidential information. For the purpose of maximizing the secrecy rate, antenna grouping and beamforming vectors are designed. A low complexity scheme of antenna grouping is presented. The simulation results show that the secrecy rate can be significantly improved by arranging part of the antennas for energy harvesting, and part for forwarding and optimizing the beamforming vector at the relay. The antenna grouping scheme significantly reduces the computational complexity at the cost of acceptable performance loss.

1. Introduction

Due to the openness of the wireless transmission medium, information faces serious security threats in wireless networks. Physical layer security, based on information theory, utilizes the physical characteristics of channels to achieve secure transmission [1,2]. Secrecy rate is an important parameter to measure the confidential performance of a secure system [3]. Much literature has showed that relay cooperation can enhance the performance of physical layer security effectively. The cooperation protocols include amplify-and-forward (AF), decode-and-forward (DF), and cooperative jamming (CJ). In [4], the security performances of three cooperation protocols have been analyzed when there are one or more eavesdroppers. In [5], AF and artificial noise (AN) are simultaneously employed to improve the secrecy rate under the condition of imperfect channel state information (CSI). In [6], multiple relays are used, one of which is selected for CJ relay and others for AF relay. In [7], two cooperation schemes are proposed in AF relay networks, in which jamming signals can be sent by the destination or a relay.
With the rapid development of wireless network technology, energy consumption in wireless communication networks is also increasing. Energy harvesting is an effective way to prolong the lifetime of wireless nodes. Furthermore, wireless energy transmission is a method to realize energy harvesting and overcome the limitation of energy stored in the battery of a node [8]. Some references have researched the application of wireless energy transmission in relay networks, e.g., [9,10,11,12]. In [9,10], an energy cooperation protocol is proposed to promote throughput. In [11], a multi-antenna relay uses different antennas to receive information and harvest energy simultaneously. The throughput maximization of a wireless powered communication network with cooperation is studied in [12].
The issue of the secure information transmission also exists in energy harvesting networks, and some researchers have studied the physical layer security in them. Two kinds of receivers, i.e., energy receiver and information receiver, are considered in [13,14] and [15]. In these articles, energy and secrecy information are transmitted simultaneously, and energy receivers are treated as eavesdroppers. Some strategies of optimizing secrecy rates have been proposed when the CSIs are both perfect and imperfect. Ref. [16] is an overview of the security problem in wireless powered systems, and the physical security techniques for wireless information and power transfer in relaying systems are reviewed. The security problem in wireless powered relaying systems is studied in [17,18]. Ref. [17] focuses on the beamforming of signal and artificial noise. Ref. [18] studies the wireless transmission for both secure information and power in a large-scale relaying system with imperfect CSI.
In this paper, we focus on the physical layer security in an energy harvesting relay network. There are two receivers in the network, and the information sent to a receiver needs to be kept secret from the other receiver, so each is the eavesdropper of the other. When there are some obstacles between the source and the receivers, since no direct communication link exists, the information should be forwarded by a relay. The power supply of the relay is limited because of its location, so it needs to harvest energy from the received RF signals to increase the forwarding power. In our scheme, the relay’s antennas are divided into two groups, with one group amplifying and forwarding the source’s signal, and the other converting the received signal to energy for the forwarding. With the constraint of the source transmitting power, we propose a low complexity antenna grouping scheme, and optimize the beamforming vector of AF to achieve the maximal secrecy rate.
The remainder of this paper is organized as follows. The second section describes the system model. In the third section, we give the mathematical model of the optimization problem, antenna grouping schemes and the beamforming vector. The simulation results are given in the fourth section. The last section is the conclusion.

2. System Model

A source (s) transmits information to two receiving nodes, but the information transmitted to one node needs to be kept secret from the other node. Hence, for one receiver, the other receiver is an eavesdropper. Without loss of generality, in a timeslot, the node that receives information is called the destination (d), and the other node is called eavesdropper (e). Since obstacles are present between the source and the receivers, there is no direct link between the source and any receiving node, and, as a result, the information must be forwarded by a relay (r). The system model is shown in Figure 1. The relay is equipped with M antennas. Since the signal sent to both receivers needs to be forwarded by the relay, and the relay may ask them to feedback CSI, we assume that the relay can obtain all the CSIs. All channels are unrelated to each other, and they are quasi-static, memoryless, and undergo flat Rayleigh fading. In addition, the noise at any node is additive white complex Gaussian noise with zero-mean and variance σ 2 .
With the constraints of location and environment, in our model, the relay cannot be powered by power lines. Because the energy stored in relay’s battery is limited, the power used for information forwarding is very small, so the data rate will be very low. The rate system will be restricted by the rate of the second hop, in spite of the high achievable rate of the first hop. To alleviate the limit of power supply, we propose an “energy harvesting-AF” strategy. The process of transmission from the source to the destination is divided into two stages. In the first stage, the source sends information; one group of the relay’s antennas receives the confidential information, while the other group receives RF signals and converts it into energy. In the second stage, the relay amplifies and forwards signals with the energy both harvested in the first stage and stored in its battery. In this way, more power is focused on the antennas that are better for forwarding. Although the achievable rate of the first hop will decrease, the rate of the second hop will obviously increase, so that the rate of the system will be promoted.
Ψ is defined as the set of relay antennas and | Ψ | = M , wherein | · | represents the amount of antennas in the set. The set is divided into two subsets of Θ and Ω , and satisfies Ψ = Θ Ω , | Θ | = N , and | Ω | = M N . The antennas in the subset Θ are used to relay information, while the antennas in the subset Ω are used to harvest energy. We denote the channel coefficient vector between the source and the antennas in the subset Θ as h sr , and the channel coefficient vector between the source and the antennas in the subset Ω as g sr . The channel coefficient vectors from the antennas in the subset Θ to the destination and the eavesdropper are denoted by h rd and h re , respectively: h sr N × 1 , g sr ( M N ) × 1 , h rd N × 1 , h re N × 1 .
In the first stage, the source transmits symbol x with unit power, i.e., E [ | x | 2 ] = 1 , where E [ · ] denotes expectation. The source has a transmit power constraint P s . The received signal of the relay can be expressed as:
y r = P s h sr x + n r
where n r C N ( 0 , σ 2 I N ) are the additive noises received by the antennas in the subset Θ . Meanwhile, the relay harvests energy through the antennas in the subset Ω . We assume that P r is the power constraint of the relay when only the energy stored in its battery can be used. When Ω = , all antennas of the relay are used to forward signals. In this case, the practical power constraint of the relay is P r = P r . If Ω , the received signal of the i -th ( i = 1 , 2 , , M N ) antenna in the subset Ω can be expressed as:
r i = P s g sr , i x + n r , i
where n r , i denotes the additive noise received by antenna i . Assume that the signal is converted to energy with the efficiency of α , and α ( 0 , 1 ] . As the harvested energy is also used in AF, the total power of forwarding signals in the second stage will be:
P r = P r + α i = 1 M N | r i | 2 = P r + α i = 1 M N ( P s | g sr , i | 2 + σ 2 ) = P r + α P s g sr 2 + α ( M N ) σ 2
In the second stage, the relay forwards information by the antennas in the subset Θ . The transmitted signal of the relay is denoted by x r = W y r , where W is a diagonal matrix composed of a beamforming vector w = [ w 1 , w 2 , , w N ] T , i.e. W = diag ( w ) . x r can be rewritten as:
x r = W y r = P s W h sr x + W n r = P s diag ( h sr ) w x + diag ( w ) n r
The transmission power of the relay should satisfy the constraint Equation (5) as follows:
x r 2 = P r
The received signals at the destination and the eavesdropper are:
y d = h rd T x r + n d = P s h rd T diag ( h sr ) w x + h rd T diag ( w ) n r + n d = P s h rd T diag ( h sr ) w x + n r T diag ( h rd ) w + n d y e = h re T x r + n e = P s h re T diag ( h sr ) w x + h re T diag ( w ) n r + n e = P s h re T diag ( h sr ) w x + n r T diag ( h re ) w + n e
where the superscript T denotes matrix transpose, n d and n e , respectively, represent the noise at the destination and the eavesdropper. The SNRs (Signal to Noise Ratios) at the destination and the eavesdropper can be calculated as:
γ rd = P s w H diag ( h sr * ) h rd h rd T diag ( h sr ) w σ 2 w H diag ( h rd * ) diag ( h rd ) w + σ 2 γ re = P s w H diag ( h sr * ) h re h re T diag ( h sr ) w σ 2 w H diag ( h re * ) diag ( h re ) w + σ 2

3. Optimization Analysis

In information-theoretical security, the secrecy rate is defined as max { R d R e , 0 } , where R d and R e are, respectively, the rates at the destination and the eavesdropper. In our model, they can be formulated as:
R d = 1 2 log ( 1 + γ rd ) = 1 2 log ( 1 + P s w H diag ( h sr * ) h rd h rd T diag ( h sr ) w σ 2 w H diag ( h rd * ) diag ( h rd ) w + σ 2 ) R e = 1 2 log ( 1 + γ re ) = 1 2 log ( 1 + P s w H diag ( h sr * ) h re h re T diag ( h sr ) w σ 2 w H diag ( h re * ) diag ( h re ) w + σ 2 )
In the formulae, the coefficient 1/2 means the relay forwards data in half the time of a time slot. Thus, the secrecy rate is:
R s = 1 2 log ( 1 + P s w H diag ( h sr * ) h rd h rd T diag ( h sr ) w σ 2 w H diag ( h rd * ) diag ( h rd ) w + σ 2 ) 1 2 log ( 1 + P s w H diag ( h sr * ) h re h re T diag ( h sr ) w σ 2 w H diag ( h re * ) diag ( h re ) w + σ 2 )
The beamforming vector w is constrained by Equation (10) as follows:
w H ( P s diag ( h sr * ) diag ( h sr ) + σ 2 I N ) w = P r
where I N is an N × N identity matrix. The optimization problem can be formulated as:
max N , Θ , Ω , w R s s . t . w H ( P s diag ( h sr * ) diag ( h sr ) + σ 2 I N ) w = P r
As the channels are quasi-static, the channel coefficients over a period of time will be constant. The maximum Rs can be obtained by optimizing four optimization variables: N , Θ , Ω , and w . The first three variables determine the antenna grouping. If the antenna grouping has been determined, i.e., the variables N , Θ and Ω are known, the original optimization problem can be simplified into the optimization of the beamforming vector w . Therefore, the original optimization problem of formula (11) can be split into two parts. The first part is the optimization of w under a certain N , Θ and Ω , and the second is to determine the antenna grouping. An exhaustive antenna grouping scheme, which tries all the possible combinations of N , Θ , and Ω and obtains corresponding w and secrecy rate R s , can be used to get the optimal solution. This scheme has the optimal performance, but with a very high complexity. Therefore, we propose a low complexity antenna grouping scheme. Θ and Ω are determined according to an antenna choosing rule at a given N , and then w is calculated. M secrecy rate R s will be obtained as N increases from 1 to M . The N , Θ , Ω and w that correspond to the maximum R s are the optimized antenna grouping and beamforming scheme we are looking for. The performance of this scheme is sub-optimal because we have not tried all the possible grouping of the antennas, but its computational complexity is significantly lower than that of the previous grouping scheme.

3.1. Beamforming Design

In this section, we optimize the beamforming vector at a given antenna grouping. The original problem of formula (11) can be rewritten as:
max w 1 2 log ( 1 + w H A w w H B w + σ 2 ) 1 2 log ( 1 + w H C w w H D w + σ 2 ) s . t . w H R w = P r
where
A = P s diag ( h sr * ) h rd h rd T diag ( h sr ) , B = σ 2 diag ( h rd * ) diag ( h rd ) C = P s diag ( h sr * ) h re h re T diag ( h sr ) , D = σ 2 diag ( h re * ) diag ( h re ) R = P s diag ( h sr * ) diag ( h sr ) + σ 2 I N
This problem only involves variable w . A and C are positive semi-definite matrices with size N × N , and B , D , R are positive definite matrices with size N × N . The objective function of optimization can be further organized as:
max w 1 2 log ( f 1 f 2 ) s . t . w H R w = P r
where
f 1 = w H A w w H C w , f 2 = w H D w w H B w B = B + σ 2 / P r R , D = D + σ 2 / P r R A = A + B , C = C + D
A , B , C and D are positive definite matrices with size N × N . Since log ( · ) is a monotonically increasing function, formula (13a) is equivalent to maximizing f 1 f 2 .
The overall optimization of f 1 f 2 is difficult. However, the maximum of f 1 and f 2 can be respectively obtained by solving the maximal generalized eigenvalues of ( A , C ) and ( D , B ) . However, these two generalized eigenvectors corresponding to the two maximal generalized eigenvalues may not be equal. Therefore, we use a local optimal beamforming design. We find that h sr , h rd and h re have a more comprehensive impact on f 1 , so we will maximize f 1 by solving the maximal generalized eigenvalue of ( A , C ) to get the generalized eigenvector, and use it as beamforming vector w .
We have f 1 max = sup { λ | det ( λ C A ) = 0 } , where λ represents eigenvalues. Denote the generalized eigenvector corresponding to f 1 max as w 1 . The local optimal beamforming vector based on the power constraints of the relay is:
w o = P r w 1 H R w 1 w 1
The secrecy rate can be obtained by formula (9) when w is substituted by w o .
f 2 may not be maximal when f 1 is maximal, so the value range of f 1 f 2 should be [ f 1 max f 2 min , f 1 max f 2 max ] , the superscripts max and min represent the maximum and minimum of f 1 and f 2 . Since the two matrices in f 2 are diagonal matrices, based on the generalized eigenvalues of ( D , B ) , the maximum and minimum of f 2 can be formulated as:
f 2 max = max k ( 1 + P r ( | h re , k | 2 | h rd , k | 2 ) P s | h sr , k | 2 + P r | h rd , k | 2 + σ 2 ) f 2 min = min k ( 1 + P r ( | h re , k | 2 | h rd , k | 2 ) P s | h sr , k | 2 + P r | h rd , k | 2 + σ 2 )
where k represents the number of antennas in subset Θ .

3.2. Antenna Grouping Scheme

As the number of relay antennas is limited, the optimal antenna grouping scheme can be obtained by trying all possible subsets Θ . The number of the subset Θ is C M N when | Θ | = N . The total number of subset Θ is N = 1 M C M N = 2 M 1 when N varies from 1 to M . A subset Θ corresponds to a beamforming vector w o and secrecy rate R s . The N , Θ , Ω and w o corresponding to the maximal R s are the solutions of the optimization problem. The computation amount of w o and R s is also 2 M 1 . Although this antenna grouping scheme can obtain the optimal solution, its computation complexity is too high. Here, we give a low complexity antenna grouping scheme with the acceptable performance loss.
We find that the change of Θ and Ω will lead to the change of channel coefficients h sr , h rd , h re and g sr in Equation (9). Thus, we design a rule to determine Θ and Ω in a given N . Define h sr , k as the channel coefficient between the source and the k -th antenna of the relay, h rd , k and h re , k , respectively, as the channel coefficients from the k -th antenna of the relay to the destination and the eavesdropper, k = 1 , 2 , , M . h rd , k and h re , k have a great impact on the secrecy transmission performance in the second stage. Obviously, in order to enhance security performance, we should choose the antenna that has a preferable channel performance to the destination but a poorer channel performance to eavesdropper to receive and forward information. Thus, we use | h re , k | / | h rd , k | as a metric to choose the AF antennas. Antenna k with a lower value of | h re , k | / | h rd , k | is more suitable for the forwarding. On the other hand, the amount of the energy harvested in the first stage will determine the transmitting power in the second stage, which has significant impact on secrecy performance, and it is determined by | h sr , k | . Therefore, in theory, we should give priority to the antenna with large | h sr , k | to harvest energy and the antenna with small | h sr , k | to forward information.
From the two aspects above, the antennas of the relay can be grouped according to the channel parameter p = | h sr , k | | h re , k | / | h rd , k | . We sort the antennas according to the descending order of p . The first M N antennas are the members of subset Ω , and remaining antennas are the members of subset Θ . As N varies from 1 to M , there are M subsets Ω , Θ , and corresponding w o . The N and antenna grouping corresponding to the maximum of M secrecy rates will be the sub-optimal antenna grouping scheme.
Here, we compare the complexity between the optimal and the sub-optimal antenna grouping schemes. The former searches and computes 2 M 1 times, and the latter computes only M times. The sub-optimal antenna grouping scheme has evidently lower computational complexity.

4. Simulation Results

The performance of the proposed scheme is simulated in this section. The coordinates of the nodes are shown in Figure 2. We set the source (s), the destination (d) and the eavesdropper (e), respectively, at ( 0 , 0 ) , ( 200 , 150 ) , ( 200 , 150 ) (Unit: m). For all channels, path loss and small-scale fading that obey Rayleigh distribution are considered, i.e. h = β d c / 2 . Where, c = 3 is the path loss exponent, d (unit: m) represents the distance between two nodes, and d c / 2 is the path loss (amplitude). In addition, β is the zero-mean complex Gaussian variable with unit variance, and it represents the small-scale fading factor. We set the variance of noise at all nodes to σ 2 = 120 dBm . In the process of energy harvesting, the received signal power is converted to DC power with the efficiency α = 0.7 [19]. The results showed in this section are the average values of the data obtained in 5000 independent trials.
We compare our strategy with the traditional AF relay strategy, where the relay uses all antennas to forward information. Furthermore, the same beamforming as that in our strategy is used in the traditional AF strategy.
Figure 3 shows the relationship between the relay position and secrecy rate. We set P s = 1 mW , P r = 0.01 mW and M = 6 . The simulation results show that the security performance of the proposed “energy harvesting–AF” strategy is better than the traditional AF strategy. In the traditional AF strategy, the relay forwards information only with the battery energy, so the forwarding power will be very low. Although the relay uses all antennas to forward information, the secrecy rate is still limited. In the proposed “energy harvesting–AF” strategy, the relay can supplement energy through energy harvesting; therefore, it will have higher forwarding power. Because of the logarithmic relationship between the transmission rate and SNR, the increase of transmission power can bring significant improvement of the transmission rate in the low power region. On the other hand, with the increase of distance between the source and the relay, the path loss is also increasing, so the harvested energy is exponentially decreasing, and, consequently, the secrecy rate of the system decreases. Although the relay is closer to the destination, its influence is far less than that of the decrease of the relay forwarding power, so the secrecy rate of the system declines. It also can be seen from Figure 3 that the secrecy rate of the optimal antenna grouping scheme is higher than that of the sub-optimal one, but the gap is not obvious. Therefore, the sub-optimal antenna grouping scheme significantly reduces the computational complexity at only the cost of acceptable performance loss.
Figure 4 shows the secrecy rate with different source transmission power. We also set P r = 0.01 mW and M = 6 , while the coordinate of the relay is fixed at ( 5 , 0 ) . The source transmission power P s increases from 0.1 mW to 1 mW. We find that the secrecy rates of the proposed strategy with two antenna grouping schemes are both increasing when the source transmission power gets higher. This is because the increase of source transmission power on the one hand is beneficial to the improvement of the receiving SNR of the relay, and, on the other hand, can increase the harvested energy of the relay. However, in the traditional AF strategy, although the receiving SNR of the relay can also be improved by increasing source transmission power, the secrecy rate is not obviously improved due to the low forwarding power of the relay. In addition, it can also be found that the secrecy rate gap between the two antenna grouping schemes increases with the increase of source transmission power. The increase of the source transmission power leads to the increase of the receiving SNR and the harvested energy of the relay. The sub-optimal antenna grouping scheme prefers the antennas with better link quality to the source to harvest energy, and the effect of receiving signal SNR of the relay is not considered adequately. This will not have an obvious influence when source transmission power is low, but it will become serious when source transmission power is high. We also give the secrecy rate when the location of the eavesdropper is ( 100 , 75 ) , closer to the relay than the destination. As the eavesdropper only receives a signal in the second stage, where the secure beamforming is used, the secrecy rates are nearly the same.
The relationship between antenna number of the relay and secrecy rate is shown in Figure 5. We set the coordinate of the relay at ( 5 , 0 ) , and set P s = 1 mW and P r = 0.01 mW . M increases from four to 10. For the traditional AF strategy, the increase of M will enhance beamforming gain, so the achievable secrecy rate can be improved. However, in the proposed “energy harvesting–AF” strategy, the increase of M has two benefits. One is that more antennas can be selected into the subset Θ , which means that there are more antennas receiving and forwarding signals. In this case, the beamforming gain of the second stage will improve. The other is that more antennas can be assigned to the subset Ω . Thus, the forwarding power will increase because more energy is harvested by the relay. They are both conducive to enhancing the security performance of the system. Therefore, with the increase of M , the secrecy rate of “energy harvesting–AF” strategy increases significantly. In addition, the “energy harvesting-AF” strategy can use the antennas more flexibly, so its performance is higher than that of the traditional AF strategy.
Figure 6 illustrates the relationship between P r and secrecy rate. We set the coordinate of the relay at ( 5 , 0 ) , and set P s = 1 mW and M = 6 . P r increases from 0.01 mW to 0.1 mW. Obviously, the forwarding power of the relay affects directly the receiving SNR of the destination. Although the receiving SNR of the eavesdropper is also affected, its promotion is less than that at the destination due to the beamforming. Thus, the secrecy rate increases with the raise of P r . From Figure 6, we find that the gap of the secrecy rate between the “energy harvesting–AF” strategy and the traditional AF strategy is reduced when P r increases. Due to the logarithmic relationship between transmission rate and SNR, the performance improvement induced by energy harvesting becomes less evident when P r becomes higher.

5. Conclusions

This paper studies the security transmission in wireless powered relaying systems. In the system model, the source, the destination, and the eavesdropper are respectively equipped with an antenna, and the relay is equipped with multiple antennas to amplify and forward information. The transmission process of confidential information was divided into two stages. In the first stage, the relay converts the received signals in some antennas into energy. In order to avoid the leakage of information, beamforming is used by the relay when it forwards the information to the destination in the second stage. We divide the antennas of the relay into two groups. The antennas in one group forward the received signals with beamforming, and those in the other convert the received signal to energy for the signal forwarding. We optimize the antenna grouping scheme and beamforming vector to promote the achievable secrecy rate. Since the overall optimal beamforming vector is difficult to obtain, we use a local optimal beamforming vector. We also propose a low complexity antenna grouping scheme at only the cost of acceptable performance loss. The simulation results show that the proposed “energy harvesting–AF” strategy has better security performance than the traditional AF strategy, especially when the battery power of the relay is low.

Acknowledgments

We gratefully acknowledge the detailed and helpful comments of the anonymous reviewers, who have enabled us to considerably improve this paper. This work was supported by the National Natural Science Foundation of China (61471076, 61301123), the fund of the Changjiang Scholars and Innovative Team Development Plan (IRT1299), and the Special Fund of Chongqing Key Laboratory (CSTC).

Author Contributions

Weijia Lei and Meihui Zhan conceived and designed the experiments; Meihui Zhan performed the experiments; Weijia Lei and Meihui Zhan analyzed the data; Meihui Zhan wrote the paper; Weijia Lei revised the paper. .

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tut. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  2. Liang, Y.; Poor, H.V. Information theoretic security. Found. Trends Commun. Inf. Theory 2009, 5, 355–580. [Google Scholar] [CrossRef]
  3. Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  4. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  5. Li, Q.; Yang, Y.; Ma, W.K.; Lin, M.; Ge, J.; Lin, J. Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 2015, 63, 206–220. [Google Scholar] [CrossRef]
  6. Wang, H.M.; Liu, F.; Yang, M. Joint cooperative beamforming, jamming and power allocation to secure AF relay systems. IEEE Trans. Veh. Technol. 2015, 64, 4893–4898. [Google Scholar] [CrossRef]
  7. Ding, Z.; Leung, K.K.; Goeckel, D.L.; Towsley, D. Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting. IEEE Trans. Wirel. Commun. 2011, 10, 1725–1729. [Google Scholar] [CrossRef]
  8. Bi, S.; Ho, C.K.; Zhang, R. Wireless powered communication: Opportunities and challenges. IEEE Commun. Mag. 2015, 53, 117–125. [Google Scholar] [CrossRef]
  9. Gurakan, B.; Ozel, O.; Yang, J.; Ulukus, S. Energy cooperation in energy harvesting wireless communications. In Proceedings of IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 965–969.
  10. Gurakan, B.; Ozel, O.; Yang, J.; Ulukus, S. Energy cooperation in energy harvesting communications. IEEE Trans. Commun. 2013, 61, 4884–4898. [Google Scholar] [CrossRef]
  11. Zhou, Z.; Peng, M.; Zhao, Z.; Li, Y. Joint power splitting and antenna selection in energy harvesting relay channels. IEEE Signal Process. Lett. 2015, 22, 823–827. [Google Scholar] [CrossRef]
  12. Ju, H.; Zhang, R. User cooperation in wireless powered communication networks. In Proceedings of IEEE Global Communications Conference, Austin, TX, USA, 7–11 December 2014; pp. 1430–1435.
  13. Liu, L.; Zhang, R.; Chua, K.C. Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans. Signal Process. 2014, 62, 1850–1863. [Google Scholar] [CrossRef]
  14. Feng, R.; Li, Q.; Zhang, Q.; Qin, J. Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans. on Veh. Tech. 2015, 64, 400–405. [Google Scholar] [CrossRef]
  15. Wu, W.; Wang, B. Robust downlink beamforming design for multiuser MISO communication system with SWIPT. In Proceedings of IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 4751–4756.
  16. Chen, X.; Ng, D.W.K.; Chen, H.H. Secrecy wireless information and power transfer: Challenges and opportunities. IEEE Wirel. Commun. 2016, 23, 54–61. [Google Scholar] [CrossRef]
  17. Zhang, G.; Li, X.; Cui, M.; Li, G.; Yang, L. Signal and artificial noise beamforming for secure simultaneous wireless information and power transfer multiple-input multiple-output relaying systems. IET Commun. 2016, 10, 796–804. [Google Scholar] [CrossRef]
  18. Chen, X.; Chen, J.; Liu, T. Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI. In Proceedings of IEEE Global Communications Conference, Austin, TX, USA, 7–11 December 2014; pp. 4131–4136.
  19. Valenta, C.R.; Durgin, G.D. Harvesting wireless power: Survey of energy-harvester conversion efficiency in far-field, wireless power transfer systems. IEEE Microw. Mag. 2014, 15, 108–120. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Information 07 00038 g001
Figure 2. Model used for simulation.
Figure 2. Model used for simulation.
Information 07 00038 g002
Figure 3. Relationship between relay’s position and secrecy rate.
Figure 3. Relationship between relay’s position and secrecy rate.
Information 07 00038 g003
Figure 4. Relationship between source transmission power and secrecy rate.
Figure 4. Relationship between source transmission power and secrecy rate.
Information 07 00038 g004
Figure 5. Relationship between antenna number of relay and secrecy rate.
Figure 5. Relationship between antenna number of relay and secrecy rate.
Information 07 00038 g005
Figure 6. Relationship between P r and secrecy rate.
Figure 6. Relationship between P r and secrecy rate.
Information 07 00038 g006

Share and Cite

MDPI and ACS Style

Lei, W.; Zhan, M. Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate. Information 2016, 7, 38. https://doi.org/10.3390/info7030038

AMA Style

Lei W, Zhan M. Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate. Information. 2016; 7(3):38. https://doi.org/10.3390/info7030038

Chicago/Turabian Style

Lei, Weijia, and Meihui Zhan. 2016. "Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate" Information 7, no. 3: 38. https://doi.org/10.3390/info7030038

APA Style

Lei, W., & Zhan, M. (2016). Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate. Information, 7(3), 38. https://doi.org/10.3390/info7030038

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop