Next Article in Journal
Designing the Calibration Process of Weigh-In-Motion Systems
Next Article in Special Issue
The Effect of Rainfall on the UAV Placement for 5G Spectrum in Malaysia
Previous Article in Journal
Fabrication of Planar Heating Chuck Using Nichrome Thin Film as Heating Element for PECVD Equipment
Previous Article in Special Issue
Accurate and Efficient Evaluation of Bit Error Rate for Dynamic Directional Modulation for Standard Modulation Schemes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Beamforming for IRS-Assisted SWIPT System with an Energy-Harvesting Eavesdropper

College of Internet of Things Engineering, Hohai University, Changzhou 213022, China
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(20), 2536; https://doi.org/10.3390/electronics10202536
Submission received: 19 September 2021 / Revised: 13 October 2021 / Accepted: 15 October 2021 / Published: 18 October 2021

Abstract

:
In this paper, we study a simultaneous wireless information and power transfer (SWIPT) system aided by the intelligent reflecting surface (IRS) technology, where an AP transmits confidential information to the legitimate information receiver (IR) in the presence of an energy harvesting (EH) receiver that could be a potential eavesdropper. We aim to maximize the secrecy rate at the legitimate IR by jointly optimizing the information beamforming vector and the energy transfer beamforming vector at the access point (AP), and the phase shift matrix at the IRS, subject to the minimum harvested power required by the EH receiver. The semi-definite relaxation (SDR) approach and the alternating optimization (AO) method are proposed to convert the original non-convex optimization problem to a series of semi-definite programs (SDPs), which are solved iteratively. Numerical results show that the achievable secrecy rate of the proposed IRS-assisted SWIPT system is higher than that of the SWIPT system without the assistance of the IRS.

1. Introduction

The increasing demand of high data rates on future communication systems leads to more complex signal processing hardware and more energy consumption. Green communication will play an increasing role in future communication networks. The radio signal enabled energy harvesting (EH) technology has drawn great interest in recent years. In simultaneous wireless information and power transfer (SWIPT) systems, the radio frequency signal plays a role in both information transmission and energy transfer [1,2,3,4,5].
Recently, intelligent reflecting surfaces (IRS), a planar array composed of a great number of reconfigurable elements, is regarded as a potential solution for achieving higher efficiency of both the energy and spectrum for the future communication systems, and has been proposed and studied in [6,7]. A sufficient survey on the topic of IRS can be found in [6]. The IRS passively reflects the RF signals with programmable phase shifts of the reflecting elements. By adaptively tuning the phase shifts, the IRS can help to strengthen the desired signals or suppress the undesired signals. Therefore, the beamforming vector at the source can be jointly optimized with the passive reflection coefficients of the IRS to improve, e.g., the signal to noise ratio (SNR) at the receiver for the multiple-input single-output (MISO) channel [7].
The IRS has recently been considered as a new technology for 6G [8,9]. As one of the requirements for 6G is to support air-to-ground communications, the IRS can be deployed to extend the coverage of the cellular networks to the aerial users (AUs) and improve the air-ground communication network performance [9]. Another promising technology for 6G is the Terahertz (THz) communication. However, the THz signals are readily blocked by obstacles, which leads to communication interruption. The IRS can be explored in the 6G system to assist the THz system [10,11]. The fundamental limit of the capacity of an IRS-assisted multiple-input multiple-output (MIMO) channel was characterized by jointly optimizing the transmit covariance matrix and the IRS reflection coefficients in [12]. Assuming the channels were frequency-selective, the authors in [13] studied an IRS-enhanced orthogonal frequency division multiplexing (OFDM) system, in which the IRS elements were grouped, and a practical channel estimation transmission protocol was proposed to reduce the training overhead. Based on the grouping method, the achievable rate was maximized by jointly optimizing the IRS reflection coefficients and the transmit power allocation.
Furthermore, the efficient beamforming gain of the IRS not only benefits the information transmission but is also appealing for the wireless power transfer. By optimizing the energy transfer beamforming vector and the reflecting coefficients of the IRS, the RF signal attenuation of long-distance can be compensated; thus, the efficiency of the RF-enabled wireless energy transfer can be increased. In [14], an IRS-assisted SWIPT system was considered, where an access point (AP) served several information-receiving users and several EH receivers. The weighted sum-power maximization problem under the individual SINR constraints for the information decoding receivers was proposed, and a sub-optimal solution was derived. In particular, it was sufficient that the AP transmits only the information signals while satisfying both the information transmission and energy transfer requirements. Similar to the problem considered in [14], the authors in [15] considered an IRS-assisted SWIPT system assuming the information-receiving users and the EH receivers are equipped with multiple antennas. The weighted sum rate was maximized by jointly optimizing the transmit precoding matrices at the AP and the passive phase shift matrix at the IRS. A more general IRS-assisted SWIPT system was considered in [16], where the energy transfer and information transmission from an AP to multiple energy and information users were assisted by deploying multiple IRSs. A penalty-based optimization method was proposed to solve the joint optimization problem of transmitting precoders and reflecting phase shifts at all IRSs.
However, due to the open nature of the wireless channel, the security problem presents a serious threat to the confidential information transmission in the SWIPT system [17]. Most of the existing works focusing on the physical security layer of the SWIPT systems can be divided into two classes: (1) maximizing the achievable secrecy rate, while the minimum harvested energy requirements are satisfied at the EH receiver [18]; (2) maximizing the energy harvested at the EH receiver, while the achievable secrecy rate of the legitimate users must be larger than the minimum requirement [19,20]. In previous work, considering physical layer security, transmit beamforming vectors were designed to maximize the SNR at the legitimate receivers and keep the SNR at the eavesdroppers as small as possible. However, if the wiretap channel of the eavesdropper is highly correlated with the main channel of the legitimate users, the SNR at the eavesdropper may also be increased with the beamforming vectors designed to maximize the SNR of the legitimate receiver. When the IRSs are deployed, due to the configurable reflection coefficients of the IRS, as mentioned above, we can jointly design information beamforming vectors and the reflection coefficients such that the SNR at the legitimate receiver is increased and the SNR at the eavesdropper is suppressed. Thus, the secrecy performance can be improved. In [21,22], an IRS-assisted secure wireless communication was considered, assuming the eavesdropping channel was correlated with the legitimate channel and was stronger than the legitimate channel. An IRS-aided MISO broadcast system with multiple eavesdroppers was considered in [23], where a minimum-secrecy rate maximization problem was formulated under practical constraints on the reflecting coefficients of the IRS. The authors in [24,25] considered an IRS-assisted MISO wiretap channel and an IRS-assisted MIMO multi-antenna-eavesdropper (MIMOME) wiretap, respectively. In the former scenario, the secrecy rate under a delay-limited quality-of-service (QoS) was maximized by optimizing the beamforming vector at the transmitter and the phase shifts at the IRS. In the latter scenario, the input covariance matrix and the IRS phase shifts were jointly optimized to maximize the secrecy rate. Iterative optimizations were proposed to solve the optimization problems, and numerical results were shown to demonstrate the superiority of the proposed methods. The work in [26,27,28] considered the IRS-assisted SWIPT systems in the MISO channels with external eavesdropper(s) assuming a different number of energy-harvesting receivers, eavesdroppers, or IRSs, respectively. Different methods were proposed to solve the secrecy rate maximization problems. The secrecy rate maximization problem for an IRS aided MIMO channel with SWIPT was considered in [29], assuming all nodes were equipped with multiple antennas. Xue et al. [30] proposed a hybrid scheme to jointly optimize the hybrid precoders of the transceiver and phase shift of the IRS to maximize the secrecy in the mmWave MIMO system with SWIPT.
In this paper, we consider an IRS-assisted SWIPT system with an external EH eavesdropper. The multi-antenna AP transfers energy to the single-antenna EH receiver and simultaneously transmits confidential information to the legitimate information receiver. The EH receiver is also a potential eavesdropper. The confidential information should be kept as secret as possible from the eavesdropper.
We aim at maximizing the achievable secrecy rate of legitimate users, while satisfying the minimum harvested energy requirements at the EH receiver. Specifically, we jointly optimize the energy transfer beamforming vector and the information transmit beamforming vector at the AP and phase shift matrix of the IRS. This is a non-convex optimization problem, which is hard to solve directly. To solve this non-convex optimization problem, we introduce the semi-definite relaxation (SDR) method and alternating optimization (AO) approaches to convert the original optimization problem to a series of semi-definite programs (SDPs), which are solved iteratively. Numerical results are then presented to show the achievable secrecy rate performance of the IRS-assisted SWIPT system. The main contributions of this paper are summarized as follows:
(1) The IRS-assisted SWIPT system—where the energy harvesting receiver is simultaneously a potential eavesdropper—was considered to show the possible application of the IRS in wireless energy transfer and secrecy information transmission.
(2) A joint optimization problem was designed to optimize the active and passive beamforming. The AO algorithm is proposed to iteratively solve the optimization problem by optimizing the active beamforming vectors and the phase shift matrix.
(3) We also show that when information should be kept secret to the energy harvesting receiver, a dedicated energy beam should be designed, which is different to that in the IRS-assisted SWIPT system without eavesdroppers.
The organization of the rest of the paper is as follows. The system model and problem formulation are presented in Section 2. The solution to the optimization problem is given in Section 3. In Section 4, we present the numerical results. Section 5 concludes the paper.
Notations: Scalars, vectors, and matrices are denoted by italic letters, bold-face lower-case letters, and bold-face upper-case letters, respectively. The Euclidean norm of a complex-valued vector x is denoted by x . The notation d i a g ( x ) denotes a diagonal matrix with each diagonal element being the corresponding element in x , and ang ( x ) is a vector, each element of which is the phase of the corresponding element in x . The space of m × n complex-valued matrices is denoted by C m × n . Tr( A ) and A 1 means the trace and inverse of a square matrix A . A 0 means the matrix A is positive and semi-definite. The conjugate, transpose, and rank of any matrix A are denoted by A , A H , and rank( A ), respectively.

2. System Model and Problem Formulation

2.1. System Model

The IRS-assisted SWIPT system considered in this paper is as shown in Figure 1, where an AP equipped with N t antennas transmit secret information to a single-antenna legitimate information receiver (IR) and simultaneously transfers the energy to an EH node, which tries to decode the confidential information from the AP. The EH node is a potential eavesdropper and is denoted by EH Eve. It is equipped with only one antenna and adopts a power split approach to split the received signal into two streams—one for information decoding and the other for energy harvesting. An IRS consisting of intelligent reflecting elements is deployed to assist the secret information transmission and energy transfer for the SWIPT system. A smart controller, which communicates with the AP to exchange information via a separate link, controls the phase shifts of the passive reflecting elements of the IRS.
Denoted by h s d C N t × 1 and h s e C N t × 1 , the channels from the AP to the legitimate information receiver IR and the EH Eve respectively, are h r d C N × 1 and h r e C N × 1 , while the channels from the IRS to the IR and Eve, and G C N × N t is the channel between the AP and IRS. It is assumed that the AP knows the channel state information (CSI) perfectly, for all channels involved. Note that although Eve is a passive eavesdropper, it is possible to assume that the CSI of the EH Eve is known to the AP, since Eve wants to harvest energy from the energy signal transferred from the AP. The AP transmits secret information to the IR and transfers the energy to the EH Eve, simultaneously. The transmitted signal from AP is x t = w s + v e , where w C N t × 1 is the information beamforming vector, s C N ( 0 , 1 ) is a circularly symmetric complex Gaussian (CSCG) random variable denoting the information carrying signal, v C N t × 1 is the energy beamforming vector, and e C N ( 0 , 1 ) is a CSCG random variable that denotes the energy-carrying signal intended for the EH Eve. Without any loss of generality, it is assumed that s and e are independent random variables. Therefore, the transmit power at AP is given by:
E ( x t H x t ) = w 2 + v 2 .
Each element of the IRS reflects the received signal from the AP with an adjustable phase shift and amplitude. The reflection-coefficient matrix is denoted by Θ = d i a g ( β 1 e j θ 1 , β 2 e j θ 2 , , β N e j θ N ) , where β n [ 0 , 1 ] , and θ n [ 0 , 2 π ) , are the reflection amplitude and phase shift of the n-th element, respectively. In the sequel, we set β n = 1 , n for simplicity. Neglecting the signal reflected by the IRS two or more times, the received signals at IR and Eve are respectively expressed as follows:
y d = ( h r d H Θ G + h s d ) x t + z d ,
y e = ( h r e H Θ G + h s e ) x t + z e ,
where z d and z e are independent and identically distributed (i.i.d.) Gaussian random noises at the IR and Eve with zero means and variances of σ d 2 and σ e 2 , respectively. The energy harvested at the EH Eve is shown as:
E = ζ | ( h r e H Θ G + h s e H ) w | 2 + | ( h r e H Θ G + h s e H ) v | 2 = ζ h e H w 2 + h e H v 2 ,
where h e H = h r e H Θ G + h s e H and 0 ζ 1 means the energy conversion efficiency. The signal-to-interference-and-noise (SINR) at IR and Eve is respectively given by:
γ d = ( h r d H Θ G + h s d H ) w 2 ( h r d H Θ G + h s d H ) v 2 + σ D 2 = h d H w 2 h d H v 2 + σ d 2 ,
γ e = ( h r e H Θ G + h s e H ) w 2 ( h r e H Θ G + h s e H ) v 2 + σ e 2 = h e H w 2 h e H v 2 + σ e 2 ,
where h d H = h r d H Θ G + h s d H , h e H = h r e H Θ G + h s e H . Note that the energy beam not only carries energy, but also acts as a jamming signal to interfere the receiving signal at Eve. Unlike the pure energy harvesting system in which the energy-carrying signal is assumed to be known at the intended nodes and can be cancelled before information decoding, the energy-carrying signal in this system is a random variable that cannot be known in advance at the intended nodes. Thus, the achievable secrecy rate of the confidential information transmitted from the AP to the IR is:
R s = log 2 ( 1 + γ d ) log 2 ( 1 + γ e ) + ,
where ( x ) + = max { x , 0 } . Note that the secrecy rate in Equation (7) is a conservative one, since it is unlikely that the EH Eve only eavesdrops information while giving up harvesting energy completely.

2.2. Problem Formulation

In this work, we try to maximize the secrecy rate R s by jointly optimizing the energy beamforming vector v , the information beamforming vector w , and the phase shift matrix Θ , under the transmit power constraint and the minimum required harvested energy at the EH Eve. Thus, the maximization problem is given by:
( P 1 ) : max w , v , Θ R s s . t . w 2 + v 2 P s E E ˜ 0 θ n < 2 π , n = 1 , 2 , , N
where P s is the transmit power at the AP and E ˜ is the minimum required harvested energy at the EH Eve.
Remark 1.
If the EH receiver is a legitimate energy harvesting receiver, i.e., the information is not needed to be kept secret, the optimization problem (P1) is reduced to a special case of the work in [14]. In this case, as proven in [14], it is sufficient to send information signals only for achieving the maximum power at the EH receiver. However, if the EH receiver is a malicious node to which the information should be kept secret, the energy signals may play two roles: energy transfer and artificial noise, which will interfere with the information being received at the EH node. Therefore, the information beamforming vector and the energy beamforming vector should be optimized jointly to achieve a maximal secrecy rate while satisfying the minimum required harvested energy at the EH receiver.

3. Solution to the Secrecy Rate Maximization Problem

The problem (P1) is a non-convex optimization problem, since the beamforming vectors v and w are in quadratic terms and the optimization variables involved are coupled. In addition, the objective function, which is the difference of two logarithmic functions, is a non-convex one. It is hard to solve this optimization problem directly. In this paper, we introduce an SDR-based algorithm to convert the original optimization problem (P1) to SDPs and apply an alternating optimization approach to solve the SDPs by optimizing the phase shift matrix Θ and the beamforming vectors ( w and v ) iteratively with the other fixed.
First, as shown in [31], there always exists a constraint Γ > 0 such that the following problem,
( P 2 ) : max w , v , Θ ( h r d H } b f Θ G + h s d H ) w 2 + ( h r d H Θ G + h sd H ) v 2 + σ D 2 Γ ( h rd H Θ G + h sd H ) v 2 + σ D 2 s . t . w 2 + v 2 P s ζ ( h r e H Θ G + h s e H ) w 2 + ( h r e H Θ G + h s e H ) v 2 E ˜ 1 + ( h r e H Θ G + h s e H ) w 2 ( h r e H Θ G + h s e H ) v 2 + σ e 2 Γ 0 θ n < 2 π , n = 1 , 2 , , N
has the same optimal solution as (P1), where Γ is a slack variable introduced to avoid the non-convexity caused by the differences of two logarithmic functions of the objective function and the third constraint is introduced to restrict the maximum allowable information leaked to the EH Eve. For any given Γ 1 , let the optimal solution to the optimization problem (P2) be denoted by γ * ( Γ ) . Then the optimal value of the original optimization problem is (P1) R s * = max Γ l o g 2 1 + γ * ( Γ ) Γ . Therefore, by a one-dimensional search over 1 Γ Γ m , the maximum secrecy rate R s can be derived, where Γ m is determined by:
1 + h e H w 2 h e H v 2 + σ e 2 = 1 + ( h r e H Θ G + h s e H ) w 2 ( h r e H Θ G + h s e H ) v 2 + σ e 2 1 + h r e H Θ G + h s e H 2 w 2 σ e 2 1 + h r e H Θ G + h s e 2 P s σ e 2 = 1 + u H Z + h s e 2 P s σ e 2 1 + n = 1 N z ( n ) 2 + h s e 2 P s σ e 2 = Γ m
where u H = ( e j θ 1 , , e j θ N ) , Z = d i a g ( h r e H ) G and z ( n ) is the n-th column vector of the matrix Z , the second inequality is due to the facts that h r e H Θ G + h s e H 2 h r e H Θ G + h s e H 2 and w 2 P s .
Next, we turn to solve the problem (P2). The AO approach is applied to solve problem (P2) by iteratively optimizing the phase shift matrix Θ , and the beamforming vectors w and v . First, for any fixed Θ , we employ the SDR-based algorithm [32] to solve the problem (P2). Defining W = w w H and V = v v H , the optimization problem (P2) is re-expressed as:
( P 3 ) : max W , V T r ( H d W ) + T r ( H d V ) + σ d 2 Γ T r ( H d V ) + σ d 2 s . t . T r ( W ) + T r ( V ) P s ζ T r ( H e W ) + T r ( H e V ) E ˜ T r ( H e W ) ( Γ 1 ) T r ( H e V ) + σ E 2 0 W ̲ 0 , V ̲ 0
where H d = h d h d H and H e = h e h e H . The rank-one constraints R a n k ( W ) = 1 and R a n k ( V ) = 1 are omitted. However, as proved in [32], R a n k ( W ) = 1 and R a n k ( V ) = 1 always hold at the optimum of problem (P3) for any fixed Γ . The proof is omitted here for brevity.
The problem (P3) is now a linear fractional optimization problem. We use the Charnes-Cooper transformation [33] to transform the problem (P3) to an SDP. Introducing an auxiliary variable φ , defining the transformation V = V ^ / φ and W = W ^ / φ , and utilizing the Charnes-Cooper transformation, we have:
( P 4 ) : max W ^ , V ^ φ T r ( H d W ^ ) + T r ( H d V ^ ) + φ σ d 2 s . t . T r ( W ^ ) + T r ( V ^ ) φ P s ζ T r ( H e W ^ ) + T r ( H e V ^ ) φ E ˜ T r ( H e W ^ ) ( Γ 1 ) T r ( H e V ^ ) + φ σ E 2 0 T r ( H d V ^ ) + φ σ d 2 = 1 W ^ ̲ 0 , V ^ ̲ 0 , φ 0
The equivalence between the problems (P2) and (P4) for any fixed Θ and Γ can be easily established. The problem (P4) is a semi-definite program and can be solved by the numerical solver CVX [34].
In the following steps, we optimize the problem (P2) over the phase shift matrix for any fixed active beamforming vectors. Again, let u = ( u 1 , u 2 , , u N ) H where u n = e j θ n . The involved expressions in (9) are re-expressed as h r d H Θ G = u H d i a g ( h r d H ) G and h r e H Θ G = u H d i a g ( h r e H ) G . Thus, we have ( h r d H Θ G + h s d H ) w 2 = ( u H d i a g ( h r d H ) G + h s d H ) w 2 = u H a r d w + b s d w 2 where a r d w = d i a g ( h r d H ) Gw and b s d w = h s d H w . Similarly, we have ( h rd H Θ G + h sd H ) v 2 = u H a rdv + b sdv 2 , ( h re H Θ G + h se H ) w 2 = u H a rew + b sew 2 and ( h re H Θ G + h se H ) v 2 = u H a rev + b sev 2 where a r d v = d i a g ( h r d H ) Gv , b s d v = h s d H v , a r e w = d i a g ( h r e H ) Gw , b s e w = h s e H w , a r e v = d i a g ( h r e H ) Gv and b s e v = h s e H v . With these definitions, we further define u ¯ = u t , B d w = a r d w a r d w H a r d w b s d w H b s d w a r d w H 0 , B d v = a r d v a r d v H a r d w b s d v H b s d v a r d v H 0 , B e w = a r e w a r e w H a r e w b s e w H b s e w a r e w H 0 , B e v = a r e v a r e v H a r e v b s e v H b s e v a r e v H 0 . For any given beamforming vectors w and v , the problem (P2) is equivalent to:
( P 5 ) : max u ¯ u ¯ H B d w u ¯ + b s d w 2 u ¯ H B d v u ¯ + b s d v 2 + σ d 2 s . t . ζ u ¯ H B e w u ¯ + b s e w 2 + u ¯ H B e v u ¯ + b s e v 2 E ˜ 1 + u ¯ H B e w u ¯ + b s e w 2 u ¯ H B e v u ¯ + b s e v 2 + σ e 2 Γ u ¯ n = 1 , n = 1 , 2 , , N + 1
We employ the SDR-based algorithm [32] to solve the problem (P5). Defining U ¯ = u ¯ u ¯ H , the optimization problem (P5) is re-expressed as:
( P 6 ) : max U ¯ T r ( B d w U ¯ ) + b s d w 2 T r ( B d v U ¯ ) + b s d v 2 + σ d 2 s . t . ζ T r ( B e w U ¯ ) + T r ( B e v U ¯ ) + b s e w 2 + b s e v 2 E ˜ T r ( B e w U ¯ ) + b s e w 2 ( Γ 1 ) T r ( B e v U ¯ ) + b s e v 2 + σ e 2 0 U ¯ ̲ 0 , U ¯ n n = 1 , n = 1 , , N + 1 .
The constraint R a n k ( U ¯ ) = 1 is omitted. The problem (P6) is a linear fractional program. Taking similar steps as problem (P4), defining the transformation U ¯ = U ^ / λ , and utilizing the Charnes-Cooper transformation [33], we have:
( P 7 ) : max U ¯ , λ T r ( B d w U ^ ) + λ b s d w 2 s . t . ζ T r ( B e w U ^ ) + T r ( B e v U ^ ) + λ b s e w 2 + λ b s e v 2 λ E ˜ T r ( B e w U ^ ) + λ b s e w 2 ( Γ 1 ) T r ( B e v U ^ ) + λ b s e v 2 + λ σ e 2 0 T r ( B d v U ^ ) + λ b s d v 2 + λ σ d 2 = 1 U ^ ̲ 0 , U ^ n n = λ , n = 1 , , N + 1 , λ 0 .
The problem (P7) is an SDP and can be solved optimally by a numerical solver such as the CVX [34]. However, the relaxed constraint R a n k ( U ¯ ) = 1 may not be satisfied in general. In order to derive a rank-one solution from the optimal solution to problem (P7), the Gaussian randomization method, as shown in [7], was used, and the main steps are as follows. First, the optimal solution U ^ * to the problem (P7) is the eigenvalue decomposed as U ^ * = U Σ U H . A sub-optimal solution to (P5) is constructed as u ¯ = U Σ r where r C N + 1 is a Gaussian variable satisfying C N ( 0 , I N + 1 ) with zero meaning and covariance matrix I N + 1 . Accordingly, the sub-optimal solution to the problem (P2) for any fixed beamforming vectors w and v is Θ * = d i a g ( u * ) , where u * = e j ang ( u ¯ / u ¯ N + 1 ) [ 1 : N ] , the function ang ( x ) means the angle of the complex variable x. Independently generating the random vector r a sufficiently large number of times, the vector u * , which achieves the maximal value of the problem (P2) is selected as the solution to (P5) for any fixed w and v .
Finally, with the solutions to problems (P4) and (P7), problem (P2) for any fixed Γ can be solved via alternating optimizations, in which problems (P4) and (P7) are solved iteratively until the convergence. By a one-dimensional search over 0 Γ Γ m , with methods such as the bisection golden search, the optimal value R s * can be achieved. The AO algorithm is summarized in Algorithm 1.
Next, we discuss the convergence of the proposed AO algorithm. The AO algorithm, as shown in Algorithm 1, can be shown to converge as follows. Denote the objective function of the problem (P2) by γ ( w , v , Θ , Γ ) . For any given Γ , the solution to (P2) is derived by solving problem (P4) and (P7) iteratively. It follows that:
γ ( w t + 1 , v t + 1 , Θ t + 1 , Γ ) γ ( w t + 1 , v t + 1 , Θ t , Γ ) γ ( w t , v t , Θ t , Γ ) ,
where the first inequality comes from (12) since w t + 1 and v t + 1 correspond to the maximizer of γ ( w , v , Θ t , Γ ) and the second inequality comes from (15) due to a similar reason.
Since the proposed optimal scheme is based on SDP, its computational complexity of each iteration critically depends on the size and number of the constraints and variables. The total size and number of the constraints and variables of the problems (P4) and (P7) of each iteration are shown in Table 1.
Algorithm 1: Alternating optimization
1:
Initialzation:
2:
   Set k = 0 , Θ ( 0 ) = I N .
3:
repeat
4:
   Set k = k + 1 .
5:
   With given Θ = Θ ( k 1 ) , solve problem (P4) to derive W ( k ) and V ( k ) , find the eigenvectors corresponding to the largest eigenvalues of W ( k ) and V ( k ) respectively, and denote them by λ w ( k ) , λ v ( k ) , ω w ( k ) , ω v ( k ) respectively.
6:
   Set w ( k ) = λ w ω w ( k ) , v ( k ) = λ v ω v ( k ) .
7:
   With given W ( k ) and V ( k ) , solve problem (P7) to derive U ¯ k ) , and let the eigenvalue decomposition of U ¯ k ) be U ¯ ( k ) = U Σ U H .
8:
   Applying Gaussian randomization method to derive u ( k ) = e j ang ( u ¯ / u ¯ N + 1 ) [ 1 : N ] .
9:
   Set Θ ( k ) = d i a g ( u ( k ) ) .
10:
   Set R s ( k ) = log 2 ( 1 + γ d ( k ) ) log 2 ( 1 + γ e ( k ) ) + according to (7).
11:
until R s ( k ) R s ( k 1 ) ε

4. Numerical Results

In this section, we present numerical results to show the achievable secrecy rate performance of the IRS-assisted SWIPT system with an energy-harvesting eavesdropper. In the simulation, we consider a two-dimensional coordinate system where the AP with N t = 6 antennas, the legitimate user, and the energy harvesting eavesdropper (each equipped with one antenna) were located at ( 1 , 0 ) , ( x d , y d ) , and ( x e , y e ) in meter (m) in the X-Y plane, respectively. It is assumed that the IRS composed of N = 50 reflecting elements, the center of which is deployed at ( 0 , 30 ) in the X-Y plane and is 3 meters high from the X-Y plane. We consider two cases: (1) the location of the energy-harvesting eavesdropper fixed at ( 1 , 30 ) , while the legitimate user moves along the horizontal line parallel to the y-axis in the X-Y plane from the location ( 1 , 5 ) to ( 1 , 55 ) ; (2) the location of the legitimate user fixed at ( 1 , 30 ) , while the energy-harvesting eavesdropper moves along the horizontal line parallel to the y-axis from the location ( 1 , 5 ) to ( 1 , 55 ) . The simulation setup is shown in Figure 2. In both cases, we compare the performance of the IRS-assisted SWIPT system considered in this paper with that of the SWIPT system without IRS.
The channels between the AP-User, AP-eavesdropper, IRS-user, and IRS-eavesdropper are assumed to be Rayleigh fading. The LoS channel is assumed between the AP and IRS. The path loss model is given by:
L ( d ) = C 0 d D α ,
where d is the distance of the link, α is the path loss exponent and C 0 is the signal attenuation at a reference distance D = 1 meter. We set C 0 = 30   dB and α = 2 for all channels. The average transmit power at the AP is P s = 30 dBm and the minimum required power at the energy-harvesting eavesdropper is E ˜ = 5 μ W . The number of Gaussian randomizations of the beamforming vectors is set to be 1000. We set ε = 10 6 as the stopping threshold for the alternating optimization approach. The other parameters are set as follows: σ D 2 = σ E 2 = 50   dBm , ζ = 0.8 . All simulation results are averaged over 1000 random fading realizations.
Figure 3, Figure 4, Figure 5 and Figure 6 compare the secrecy performance, transmitted power, and harvested power of the schemes with or without IRS under the above two cases. In all cases, the IRS-assisted scheme considered in this paper achieves a higher secrecy rate than that without the assistance of an IRS.
From Figure 3, it can be found that the achievable secrecy rate decreases as the legitimate user moves away from the AP. This fact is apparent since the achievable rate of the legitimate user gets smaller as it moves far away from the source. It is worthy of noting that when the legitimate user is located close to the IRS and Eve, i.e., at the location ( 1 , 30 ) in the X-Y plane, the secrecy rate decreases rapidly. This is quite different from the results derived in the literatures [6] where no extra Eve exists. It was shown in [6] that when the information decoder is close to the IRS, it leads to a better user SNR. However, when there’s an Eve, as shown in this paper, if the legitimate user and the Eve are both close to the IRS, the Eve SNR may also be better, which causes more information leakage. Therefore, the secrecy rate is decreased in this case. The harvested power shown in Figure 4 also illustrates this fact. In can be observed that the harvested power at the Eve is the largest, though the energy transfer power is the lowest when the legitimate user moves to the location ( 1 , 30 ) in the X-Y plane. We also show the secrecy rate assuming no energy signals. The achievable secrecy rate with no energy signals is much lower than that when the energy signals are jointly optimized with the information signals.
Figure 5 and Figure 6 show the performance comparison when the location of the legitimate user is fixed, while the Eve moves from ( 1 , 5 ) to ( 1 , 55 ) in the X-Y plane. The secrecy rates increases as the Eve moves far away from the AP. It is interesting to find from Figure 6 that the harvested power of both schemes, with or without IRS, are nearly equal to each other. However, the energy transfer power with IRS is larger than that without IRS. This means that by optimizing the phase shift matrix of the IRS and the beamforming vector at the AP, efficient power allocation can be achieved and a higher secrecy rate can be obtained by the IRS-assisted system. From Figure 5, it is interesting to find that the secrecy rate with no energy signals decreases as the EH Eve moves closer to the IRS. This is quite different from the case when the energy and information signals are jointly optimized with or without IRS. As the EH Eve moves far apart from the IRS, the secrecy rate increases. The existence of the IRS makes the channels of the legitimate IR and EH Eve be correlated. This increases the possibility for the EH Eve to eavesdrop the confidential information, especially when the EH Eve and legitimate IR are close to the IRS. This result further verifies the analysis in Remark 1. It is necessary to send dedicated energy signals and jointly optimize them with the information signals. Next, we give an analysis on Remark 1.
In order to show the secrecy rate with different SNR levels, we fix the locations of the IR and EH Eve at ( 1 , 30 ) and ( 1 , 30 ) , respectively. The transmit power Ps at the AP are set to 30 dBm, such that the minimum harvested energy requirements can be satisfied. We illustrate the achievable secrecy rate in Figure 7, assuming the mean power of the Gaussian noise varies from −10 dBm to −30 dBm, i.e., the transmit SNR from 50 dB to 80 dB. It is clear that the achievable secrecy rate increases with the SNR in both cases with or without the assistance of the IRS. From Figure 7, it can be found that the gap of the secrecy rates between the two cases becomes larger as the SNR increases. This further verifies the effectiveness of the proposed IRS-aided SWIPT system considered in this paper.

5. Conclusions

In this paper, we consider an IRS-assisted SWIPT system with an external energy-harvesting eavesdropper, which simultaneously harvests energy from the RF signal and attempts to eavesdrop information of the legitimate users. A joint optimization problem is proposed to maximize the secrecy rate under the minimum required harvested energy at the energy-harvesting eavesdropper. The SDR-based alternating optimization approach is introduced to solve the original non-convex problem by solving a series of SDPs iteratively. Numerical results show that the proposed IRS-assisted scheme achieves higher secrecy rate performance than that without IRS.

Author Contributions

Conceptualization, Z.D.; methodology, Z.D. and Y.P.; writing—original draft preparation, Z.D.; writing—review and editing, Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Fundamental Research Funds for the Central Universities in China under Grant 2019B22614.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Grover, P.; Sahai, A. Shannon meets Tesla: Wireless information and power transfer. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Austin, TX, USA, 13–18 June 2010; pp. 2363–2367. [Google Scholar]
  2. Zhang, R.; Ho, C.K. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  3. RA, K.M.; Wong, K. SWIPT in MISO multicasting systems. IEEE Wirel. Commun. Lett. 2014, 3, 277–280. [Google Scholar]
  4. Xu, J.; Liu, L.; Zhang, R. Multiuser MISO beamforming for simultaneous wireless information and power transfer. IEEE Trans. Signal Proc. 2014, 62, 4798–4810. [Google Scholar] [CrossRef] [Green Version]
  5. Shi, Q.; Liu, L.; Xu, W.; Zhang, R. Joint transmit beamforming and receive power splitting for MISO SWIPT systems. IEEE Trans. Wirel. Commun. 2014, 13, 3269–3280. [Google Scholar] [CrossRef] [Green Version]
  6. Wu, Q.; Zhang, R. Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless networks. IEEE Commun. Mag. 2020, 58, 106–112. [Google Scholar] [CrossRef] [Green Version]
  7. Wu, Q.; Zhang, R. Intelligent rflecting surface enhanced wireless network: Joint active and passive beamforming design. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef] [Green Version]
  8. Rajatheva, N.; Atzeni, I.; Bjornson, E.; Bourdoux, A.; Buzzi, S.; Dore, J.B.; Erkucuk, S.; Fuentes, M.; Guan, K.; Hu, Y.; et al. White Paper on Broadband Connectivity in 6G. arXiv 2020, arXiv:2004.14247. [Google Scholar]
  9. Hashida, H.; Kawamoto, Y.; Kato, N. Intelligent Reflecting Surface Placement Optimization in Air-Ground Communication Networks Toward 6G. IEEE Wirel. Commun. 2020, 27, 146–151. [Google Scholar] [CrossRef]
  10. Chen, Z.; Chen, W.; Ma, X.; Li, Z.; Chi, Y.; Han, C. Taylor Expansion Aided Gradient Descent Schemes for IRS-Enabled Terahertz MIMO Systems. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Seoul, Korea, 6–9 April 2020. [Google Scholar]
  11. Li, Z.; Chen, Z.; Ma, X.; Chen, W.; Han, C. Artificial Gene Reservation Aided Genetic Algorithm for IRS Enabled Terahertz Systems. In Proceedings of the UK-Europe-China Workshop on Millimetre-Waves and Terahertz Technologies (UCMMT), Tianjin, China, 29 August–1 September 2020. [Google Scholar]
  12. Zhang, S.; Zhang, R. Capacity characterization for intelligent reflecting surface aided MIMO communication. IEEE J. Sel. Areas Commun. 2020, 38, 1823–1838. [Google Scholar] [CrossRef]
  13. Yang, Y.; Zheng, B.; Zhang, S.; Zhang, R. Intelligent reflecting surface meets OFDM: Protocol design and rate maximization. IEEE Trans. Commun. 2020, 68, 4522–4535. [Google Scholar] [CrossRef] [Green Version]
  14. Wu, Q.; Zhang, R. Weighted sum power maximization for intelligent reflecting surface aided SWIPT. IEEE Wirel. Commun. Lett. 2020, 9, 586–590. [Google Scholar] [CrossRef] [Green Version]
  15. Pan, C.; Ren, H.; Wang, K. Intelligent reflecting surface enhanced MIMO broadcasting for simultaneous wireless information and power transfer. IEEE J. Sel. Areas Commun. 2020, 38, 1719–1734. [Google Scholar] [CrossRef]
  16. Wu, Q.; Zhang, R. Joint active and passive beamforming optimization for intelligent reflecting surface assisted SWIPT under QoS constraints. IEEE J. Sel. Areas Commun. 2020, 38, 1735–1748. [Google Scholar] [CrossRef]
  17. Mukherjee, A.; Fakoorian, S.; Huang, J.; Windlehurst, A. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 19, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  18. Zhao, X.; Xiao, J.; Li, Q. Joint optimization of AN-aided transmission and power splitting for MISO secure communications with SWIPT. IEEE Wirel. Commun. Lett. 2015, 19, 1969–1972. [Google Scholar] [CrossRef]
  19. Khandaker, M.; Wong, K. Robust secrecy beamforming with energy-harvesting eavesdroppers. IEEE Wirel. Commun. Lett. 2014, 4, 10–13. [Google Scholar] [CrossRef]
  20. Zhang, H.; Li, C.; Huang, Y.; Yang, L. Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Wirel. Commun. Lett. 2015, 19, 1347–1350. [Google Scholar] [CrossRef]
  21. Cui, M.; Zhang, G.; Zhang, R. Secure wireless communication via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef] [Green Version]
  22. Shen, H.; Xu, W.; Gong, S.; He, Z.; Zhao, C. Secrecy rate maximization for intelligent reflecting surface assisted Multi-antenna communications. IEEE Commun. Lett. 2019, 23, 1488–1492. [Google Scholar] [CrossRef] [Green Version]
  23. Chen, J.; Liang, Y.; Pei, Y.; Guo, H. Intelligent reflecting surface: A programmable wireless environment for physical layer security. IEEE Access 2019, 7, 82599–82612. [Google Scholar] [CrossRef]
  24. Kumar, V.; Flanagan, M.F.; Ng, D.W.K.; Tran, L.-N. On the secrecy rate under statistical QoS provisioning for RIS-Assisted MISO wiretap channel. arXiv 2021, arXiv:2105.14641. [Google Scholar]
  25. Mukherjee, A.; Kumar, V.; Tran, L.-N. Secrecy rate maximization for intelligent feflecting surface assisted MIMOME wiretap channels. arXiv 2021, arXiv:2108.10688. [Google Scholar]
  26. Sun, W.; Song, Q.; Guo, L.; Zhao, J. Secrecy rate maximization for intelligent reflecting surface aided SWIPT systems. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020. [Google Scholar]
  27. Xiu, Y.; Wu, J.; Gui, G.; Wei, N.; Zhang, Z. Artificial noise-aided secure SWIPT communication systems using intelligent reflecting surface. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), Chongqing, China, 9–11 August 2020. [Google Scholar]
  28. Yang, J.; Ji, X.; Huang, K.; Sun, X.; Wang, Y.; Sun, X.; Wang, Y. Enhanced secure SWIPT in heterogeneous network via intelligent reflecting surface. Secur. Commun. Netw. 2021, 17, 1–12. [Google Scholar]
  29. Niu, H.; Lei, N. Intelligent reflect surface aided secure transmission in MIMO channel with SWIPT. IEEE Access 2020, 9, 192132–192140. [Google Scholar]
  30. Xue, J.; Zhou, X.; Wang, C.; Wang, D.; Zhao, Y.; Li, Z. Hybrid precoding for IRS-assisted secure mmWave communication system with SWIPT. In Proceedings of the International Conference on Space-Air-Ground Computing (SAGC), Beijing, China, 4–6 December 2020. [Google Scholar]
  31. Zhang, L.; Zhang, R.; Liang, Y.C.; Xin, Y.; Cui, S. On the relationship between the multi-antenna secrecy communications and cognitive radio communications. IEEE Trans. Wirel. Commun. 2010, 58, 1877–1886. [Google Scholar] [CrossRef] [Green Version]
  32. Luo, Z.Q.; Ma, W.K.; So, A.M.C. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  33. Charnes, A.; Cooper, W.W. Programming with linear fractional functionals. Nav. Res. Logist. Q. 1962, 9, 181–186. [Google Scholar] [CrossRef]
  34. CVX: Matlab Software for Disciplined Convex Programming. Available online: http://cvxr.com/cvx/ (accessed on 10 April 2011).
Figure 1. System model.
Figure 1. System model.
Electronics 10 02536 g001
Figure 2. Simulation setup.
Figure 2. Simulation setup.
Electronics 10 02536 g002
Figure 3. The achievable secrecy rate versus the Y-coordinate of the legitimate user.
Figure 3. The achievable secrecy rate versus the Y-coordinate of the legitimate user.
Electronics 10 02536 g003
Figure 4. The transmit power at the AP and the harvested power at the Eve versus the Y-coordinate of the legitimate user.
Figure 4. The transmit power at the AP and the harvested power at the Eve versus the Y-coordinate of the legitimate user.
Electronics 10 02536 g004
Figure 5. The achievable secrecy rate versus the Y-coordinate of the Eve.
Figure 5. The achievable secrecy rate versus the Y-coordinate of the Eve.
Electronics 10 02536 g005
Figure 6. The transmit power at the AP and the harvested power at the Eve versus the Y-coordinate of the Eve.
Figure 6. The transmit power at the AP and the harvested power at the Eve versus the Y-coordinate of the Eve.
Electronics 10 02536 g006
Figure 7. The achievable secrecy rate versus the transmitted SNR.
Figure 7. The achievable secrecy rate versus the transmitted SNR.
Electronics 10 02536 g007
Table 1. Complexity of the optimization algorithm.
Table 1. Complexity of the optimization algorithm.
Number of ConstraintsNumber of Variables
complex semi-definitepositive scalar
(P4) & (P7)
complex semi-definitepositive scalar
(P4) & (P7)
( N + 1 ) × ( N + 1 )
(P7)
N t × N t
(P4)
( N + 1 ) × ( N + 1 )
(P7)
N t × N t
(P4)
46 N + 3 122
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Deng, Z.; Pan, Y. Optimal Beamforming for IRS-Assisted SWIPT System with an Energy-Harvesting Eavesdropper. Electronics 2021, 10, 2536. https://doi.org/10.3390/electronics10202536

AMA Style

Deng Z, Pan Y. Optimal Beamforming for IRS-Assisted SWIPT System with an Energy-Harvesting Eavesdropper. Electronics. 2021; 10(20):2536. https://doi.org/10.3390/electronics10202536

Chicago/Turabian Style

Deng, Zhixiang, and Yan Pan. 2021. "Optimal Beamforming for IRS-Assisted SWIPT System with an Energy-Harvesting Eavesdropper" Electronics 10, no. 20: 2536. https://doi.org/10.3390/electronics10202536

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop