AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks

: In this paper, we investigate the physical layer security in a two-tier heterogeneous wireless sensor network (HWSN) depending on simultaneous wireless information and power transfer (SWIPT) approach for multiuser multiple-input multiple-output wiretap channels with artiﬁcial noise (AN) transmission, where a more general system framework of HWSN only includes a macrocell and a femtocell. For the sake of implementing security enhancement and green communications, the joint optimization problem of the secure beamforming vector at the macrocell and femtocell, the AN vector, and the power splitting ratio is modeled to maximize the minimal secrecy capacity of the wiretapped macrocell sensor nodes (M-SNs) while considering the fairness among multiple M-SNs. To reduce the performance loss of the rank relaxation from the SDR technique while solving the non-convex max–min program, we apply successive convex approximation (SCA) technique, ﬁrst-order Taylor series expansion and sequential parametric convex approximation (SPCA) approach to transform the max–min program to a second order cone programming (SOCP) problem to iterate to a near-optimal solution. In addition, we propose a novel SCA-SPCA-based iterative algorithm while its convergence property is proved. The simulation shows that our SCA-SPCA-based method outperforms the conventional methods.


Introduction
Recently, Internet-of-Things (IoT) has emerged to be considered as one of the key technological concepts as a basic precondition implementing Industry 4.0 [1].The recent developments in the IoT application, wireless sensor networks (WSNs), have played a significant role in connecting tens of thousands of wireless devices over the Internet in many applications, especially healthcare services, electronic instrumentation, transportation, and environmental assessment [2].A WSN generally contains many sensor nodes (SNs) that is capable of perceiving their external environment, which can perform communicate and computations [3].Unfortunately, because SN are battery-powered, the working lifetime of the entire WSNs is limited by energy consumption due to the energy restriction at SN [4].In order to overcome these limitation, there are many investigations on enabling technologies for energy sustainablility in WSNs [5].
The emergence of mobile devices has resulted in a continuously growing requirement for wireless applications, such as an ultra-wide radio coverage, an ultra-high data service, and an ultra-large number of smart devices.Recently, a promising solution to cater for this requirement has been the fifth generation (5G) wireless technology [6,7].Therefore, the deployment of low-cost femtocell base stations (FBSs) underlaid in the macrocell can provide ubiquitous coverage and extremely high data rate [8].In this regard, to accommodate the explosive cell density and growing data traffic, heterogeneous networks (HetNets) have emerged as one of the most promising approaches in the 5G wireless systems by increasing the off-load portion of their traffic [9,10].
In recent years, by integrating the WPT with traditional wireless information transmission (WIT), simultaneous wireless information and power transfer (SWIPT) have been recognised as among the main candidate technologies for green communications [11][12][13][14][15], which has been shown to be in a position to improve the WPT performance in HetNets [16][17][18].The idea of using SWIPT to implement wireless recharging of the batteries in HetNets was first studied in [16], where two integer linear programming methods were proposed to help wireless nodes to scavenge ambient energy.Tang et al. [17] provided a essential study of the QoS-constrained energy efficiency optimization problem for coordinated multi-point (CoMP)-SWIPT HetNets, a decoupled approach was proposed in which the power allocation procedure and beamforming design were separated.Considering multiple Power splitting (PS)-based heterogeneous users in [18], Jiang et al. investigated the optimal transmit power minimization design problem of SWIPT systems to achieve green communication design under non-linear energy harvesting model, where the semidefinite relaxation (SDR) are employed to solve and the globe optimal solution was theoretically guaranteed.
On the other hand, depending on the presence of the broadcasting nature of wireless channel and the multi-tier dynamic topology in SWIPT HetNets, the useful messages which intended to the information users may be entirely possible to be eavesdropped by the energy users, which brings huge technical challenges to secure SWIPT in HetNets [19].Recently, physical-layer security (PLS) has emerged as a prominent technique to guarantee the secrecy communication by exploiting the characteristics of physical wireless channels, while defending against the eavesdroppers [20,21].Various PLS techniques in SWIPT networks have been studied in MISO and MIMO systems [22][23][24][25][26][27][28][29].More specifically, Ren et al. [29] studied jointly optimize design of the transmit beamforming and AN of the macrocell base station (MBS) and the femtocell base stations (FBS), the secrecy rate maximization problem of the eavesdropped macrocell users was reformulated by utilizing the one-dimensional line search and successive convex approximation.
In addition, there are some related works integrating the SWIPT in WSNs [30][31][32][33][34][35][36][37].Guo et al. [30] applied the SWIPT technique to cooperative clustered WSN, a distributed iteration algorithm was proposed by exploiting fractional programming and dual decomposition.Considering different PS abilities of relays in a mobile wireless sensor networks with SWIPT, a resource allocation design (RAD) problem was formulated as a non-convex energy efficiency maximization problem, Guo et al. [31] proposed a cross-layer algorithm for rate control, PS, and power allocation.A unified framework was developed to study the impact of SWIPT on the performance with both time splitting (TS) and power splitting (PS) schemes [32] in a WSN over Nakagami-m fading channels.In the MIMO wireless powered underground sensor network, the optimal RAD problem was considered for throughput the system throughput maximization with quality of service (QoS) assurance in regard to communication reliability and diverse data traffic demands [33].Focusing on two relaying strategies, a downlink (DL) multiple-input single-output (MISO) WSN with the nonorthogonal multiple access technique (NOMA) and SWIPT was investigated over Nakagami-m fading [34], where three antenna-relay-destination selection algorithms were proposed through analysis on downlink (DL) and UL transmissions.Assuming the sensor nodes always work in harvesting-transmitting mode, Hu et al. [35] studied the PLS of uplink (UL) transmission in SWIPT deployed in WSNs, in which the energy/secrecy outage probabilities were derived through comprehensive analysis on DL and UL transmissions, respectively.As for IoT sensor networks with a PS-enabled SWIPT technology, Chae et al. [36] proposed a novel SWIPT strategy where the access point have a choice over either sending a private/common message, and a hybrid beamforming design algorithm was proposed by considering the total transmit power minimization problem.By exploiting a fountain codes in the SWIPT WSNs, Yi et al. [37] proposed a new PS mechanism to adaptively divide data packets into the information data packets and the energy data packets.To the best of our knowledge, secure beamforming design to achieve secrecy capacity, particularly assuming practical power splitting (PS)-based heterogeneous wireless sensor networks (HWSN) with SWIPT transmission, has not been considered previously.
Motivated by the above analysis, in this paper, we consider a SWIPT-enabled two-tier HWSN with MIMO system, where a macrocell sink node and a femtocell sink node transmit co-channel information to the corresponding macrocell sensor nodes (M-SNs), high-priority sensor nodes (HP-SNs) and low-priority sensor nodes (LP-SNs), respectively.In order to harvest more energy from the ambient environment, the HP-SNs can use a power splitter.According to the ambient interference signals, the LP-SNs not only eavesdrop the confidential messages from the M-SNs, but also harvest wireless energy.By applying the interference, an AN-aided secrecy transmission is utilized at the femtocell sink node.In addition, we study the jointly optimization design of the transmit beamforming vectors at the macrocell sink node and femtocell sink node, the AN and PS ratio to maximize the minimal secrecy capacity (MSC) of the wiretapped M-SNs under the secrecy capacity constraint at the HP-SNs, the harvested energy constraint at the HP-SNs and LP-SNs, the transmit power constraint at the macrocell sink node and femtocell sink node.More explicitly, the main contributions of this paper can be summarized as follows: • Firstly, we establish the system model of a two-tier MIMO HWSN, where SWIPT technique is performed at the femtocell sink node to recharge the HP-SNs and LP-SNs.To be specific, each HP-SN is equipped with power splitter.We consider a general system case where both the M-SNs and HP-SNs are faced under threat of secrecy leakage from the LP-SNs, where each LP-SN act as a malicious user.• To promote the security performance and harvest more power, the AN is injected designedly into the transmit beamforming at the femtocell sink node.To achieve secrecy enhancement, a joint design problem is formulated for the MSC maximization while considering the fairness among multiple M-SNs.The original problem is non-convex and hard to solve directly.• In order to reduce the performance loss of the rank relaxation from the SDR technique while solving the non-convex max-min program [38], we apply SCA technique, first-order Taylor series expansion and SPCA method, and then the recast problem can be converted to an SOCP problem [39] which can be directly solved to achieve a near-optimal solution.Moreover, we propose a novel SCA-SPCA-based iterative algorithm, while its convergence property of the proposed algorithm is proved.
Compared with our previous papers [23,24], major additional works and results incorporated in these papers are summarized in the following.(1) This paper has extended the problem of AN power maximization to both perfect and imperfect CSI cases, which introduces substantial changes in the analyses.(2) An SPCA-based iterative algorithm has been proposed to solve the problem such that the computational complexity is largely reduced compared with the 1-D search method used in the previous work.
The rest of this paper is organized as follows: In Section 2, we presents the HWSN system model and formulates the MSC maximization problem.Section 3 solves the non-convex problem and provide the proposed SCA-SPCA-based iterative algorithm.Section 4 outlines the simulation results.Finally, section 5 concludes this paper.
Notation: Lower-case letters mean scalars, bold-face lower-case letters are denoted by vectors, and boldface upper-case letters are used for matrices.C M×L indicates the space of M × L complex matrices.| • | defines the absolute value of a complex scalar.A F describes the Frobenius norm of the matrix A, tr(A) indicates the trace of A. E{•} describes the mathematical expectation.[x] + equals max{x, 0}.

System Model and Problem Formulation
In this section, a two-tier downlink HWSN is considered with MIMO-SWIPT, where a femtocell sink node is deployed with a macrocell sink node, as shown in Figure 1.Following [40], the smart antenna technology is applied for the sink nodes.Moreover, the femtocell sink node serves K HP-SNs and L LP-SNs, whereas the macrocell sink node serves M M-SNs.For the sake of notational simplicity, it is assumed that the m-th M-SN, the k-th HP-SN and the l-th LP-SN are denoted by M-SN m , HP-SN k , and LP-SN l , respectively.The system parameters that we have considered are defined in Table 1.In the smallcell of this HWSN system, two different types of receivers are considered: (i) one cluster of HP-SNs (such as low-power receivers), denoted by K = {HP-SN 1 ,..., HP-SN K }, which is located far from the femtocell sink node, (ii) one cluster of LP-SNs (such as sensors), denoted by L = {LP-SN 1 ,...,LP-SN L }, which are located close to the femtocell sink node.It is assumed that each M-SN and HP-SN have single receive antenna, LP-SN is equipped with N E receive antenna, whereas the macrocell sink node and femtocell sink node are equipped with N M ≥ M antennas and N F ≥ K + LN E transmit antennas, respectively.This system operates as follows: the macrocells share their frequency spectrum with the femtocell to improve the spectral efficiency, whereas the confidential messages from the macrocell sink node and the femtocell sink node may be intercepted by LP-SNs.Additionally, all HP-SNs employ the PS scheme to perform information decoding (ID) and energy harvesting (EH) simultaneously, as shown in Figure 2.    As an active user in the HWSN, we assume that LP-SN can harvest energy to extend its battery life from the ambient radio frequency (RF) signals.However, LP-SNs may be potential eavesdroppers due to intercepting the information from the femtocell sink node to HP-SNs.Thus, to provide secure transmission in this HWSN, the femtocell sink node applies the AN to transmit beamforming, which not only acts as interference to the LP-SNs, but also supplies energy to the HP-SNs.The secure signal vector s from the macrocell sink node and x s from the femtocell sink node can be written as where v m ∈ C N P and w k ∈ C N s define the transmit beamforming vector from the macrocell sink node aiming at M-SN m and from the femtocell sink node aiming at HP-SN k , s m and s s,k are the information-bearing signal intended for M-SN m and HP-SN k with satisfying E{s 2 m } = 1 and E{s 2 s,k } = 1, respectively, and z represents the energy-carrying AN.
Therefore, the received signal at the M-SN m , the HP-SN k , and the LP-SN l can be given by, respectively, intra−tier inter f erence and n e,l ∼ CN (0, σ 2 e,l I) denote the complex AWGN at the M-SN m , the HP-SN k and the LP-SN l , respectively.
Since the HP-SN utilizes PS scheme to simultaneously implement ID and EH, the received signal at the HP-SN k is divided into ID portion and EH portion by the PS ratio ρ k ∈ (0, 1].Hence, the split signal for ID part and EH part at the HP-SN k can be expressed as, respectively, where n p,k ∼ CN (0, δ 2 p,k ) is the additional Gaussian noise resulted in the RF-to-signal conversion for the ID part at the HP-SN k .
Thus, the channel capacity of the HP-SN k is expressed as The channel capacity of the LP-SN l for decoding the desired signal of the HP-SN k can be represented as Thus, the secrecy capacity of the HP-SN k can be written as Additionally, the channel capacity of the M-SN m can be expressed as Suppose that the LP-SN l is an eavesdropper to decode the message for the M-SN m .The channel capacity of the LP-SN l for decoding the M-SN m is given as Hence, following the concept of secrecy capacity in [20][21][22], the secrecy capacity of the M-SN m can be written as where [a] + indicates the max(0, a).Moreover, the HP-SNs employs the PS ratio to harvest the power carried from the RF signal.In order to harvest the carried energy, the LP-SN receiver does not need to transform the received signal to the baseband.However, due to the law of energy conservation, we assume that the total harvested energy at the HP-SN k and the LP-SN l , i.e., the RF-band power normalized by the baseband symbol, denoted by E c,k and E e,l , respectively, from all N E receive antennas at the LP-SN receiver is proportional to that of the received RF baseband signal, i.e., E e,l = η e,l tr H H e,l ( where 0 ≤ η c,k ≤ 1 and 0 ≤ η e,l ≤ 1 denote the energy conversion efficiency at the HP-SN k and LP-SN l , respectively.In this paper, our objective is to secure the WIT to legitimated users (i.e., M-SNs and HP-SNs) in the presence of potential eavesdroppers (i.e., LP-SNs) by jointly designing the AN-aided transmit beamforming.Moverover, we aim to promote the MSC performance by guaranteeing all M-SNs can achieve a certain secrecy capacity level.To this end, we maximize the MSC of the M-SN m under the secrecy capacity constraint at the HP-SNs, the harvested energy constraint at the HP-SNs and LP-SNs, as well as the transmit power constraint at the macrocell sink node and femtocell sink node.Based on the system models, the MSC maximization (MSCM) problem is formulated as max min l E e,l ≥ Ēe , ∀l, where Rc denotes the secrecy capacity requirement of the HP-SN k , Ēc and Ēe mean the harvested power requirement of the HP-SN k and the LP-SN l , respectively, P represents the total transmit power at the femtocell sink node, P 1 indicates the transmit power about the information signal part at the femtocell sink node, P 2 stands for the total transmit power at the macrocell sink node.The constraints (8a) guarantees that the minimum secrecy rate should be achieved at the HP-SN k .The constraints and (8b) and (8c) guarantee that the minimum harvested power at the HP-SN k and the LP-SN l are no less than Ēc and Ēe , respectively.The constraint (8d) limits the transmit power.Obviously, it is seen that problem ( 8) is non-convex due to the existence of coupling among variables ρ k and w k , which is difficult to solved directly.

Proposed Algorithm
In this section, we will propose an iterative algorithm to obtain near-optimal solution by applying the SCA method and SPCA technology [41].To tackle problem (8) we firstly introduce an equivalent reformulation about problem (8).To circumvent this issue, problem (8) can be rewritten as max (8d), (8e).
It is observed that the determinant functions is in the R c,lk of the objective function (9a).We consider the following Lemma 1, which will be applied to provide a convex approximation form to C l,k .

Lemma 1. ([42]
) For any matrix A, which A is positive semi-definite, i.e., A 0. It holds true that where the equality holds if and only if rank(A) ≤ 1.
In order to make the problem (11) tractable, by introducing the auxiliary variables v m , w m , u m , t l , e l , and q l , we define new matrices e,l , and He,l = H e,l H H e,l .The constraints (11b) and (11c) can be written as, respectively, According to [43], it is well-known that a constraint is such that a concave function is greater than or equal to a convex function, then the constraint is a convex form.Therefore, it is easily seen that (12a) and (13b) are convex now.However, (12b), (12c), (13a) and (13c) are still non-convex.Nevertheless, the functions e w m and e u m on the right-hand side (RHS) of (12b) and (12c) are convex, which makes (12) easier to deal with than (11b).Similarly, the functions e t l and 2 γ e − 1 on the left-hand sides (LHS) of (13a) and (13c) are also convex, we obtain that ( 13) is easier to handle than (11c).
To this end, let us define w l and γ(n) e as the variables wm , ūm , tl and γe at the n-th iteration for a novel SCA-SPCA-based iterative algorithm given below.By employing first-order Taylor series expansions on e w m , e u m , e t l and 2 γ e i.e., e In addition, for the constraint (9b), we will reformulate it by using SPCA method.By introducing two slack variables s 1 > 0 and s 2 > 0, (9b) can be recast as log(s 1 s 2 ) ≥ Rc , ∀l, (15a) By apply the Lemma 1, the constraint (15c) can be recast, respectively, as Then, ( 15) can be further simplified as The inequality constraint (17a) is equivalent to 2 Then, we can transform it to a conic quadratic-representable function as ( 18) And then, we transform the inequality constraints (17b) and (17c) into the following form as It is observed that the constraints (19a) and (19b) are non-convex.Fortunately, the RHS of both constraints is the quadratic-over-linear (QoL) function, which are convex form [43].According to the idea of the constrained convex procedure [45], these QoL functions can be replaced by their first-order Taylor expansions, which can be converted into a convex programming problem.Specifically, we firstly define a function as where y ≥ b and B 0. Then, the first-order Taylor expansion of (20) at a certain point ( ũ, b) is written by By utilizing the above results of first-order Taylor expansion, for the certain points (w k , s1 ), (z, s2 ) and (v m , s2 ), we can respectively convert the constraints (19a) and (19b) into the following convex forms as Denoting ) can be rewritten as the second-order cone (SOC) constraints as [2w H 1 He,l , ..., 2w H K He,l , 2z H He,l , 2v Moreover, the constraints (9c) and (9d) can be reformulated as Next, we will apply the SPCA method to obtain convex approximations of ( 24) and (25).By substituting w j wj + ∆w j , z z + ∆z and v m ṽm + ∆v m into the LHS of ( 24) and ( 25), we have where the inequality is achieved by removing the quadratic terms Similarly, for the LHS of ( 25 Based on ( 26) and ( 27), the linear approximations of the concave constraints ( 24) and ( 25) can be obtained as K ∑ j=1 wH j He,l wj + 2 { wH j Hl ∆w j } + zH He,l z + 2 { zH He,l ∆z} Finally, by rearranging (8d) as Eventually, the original MSCM problem ( 8) is transformed into following convex form as max ), (12d), (13b), (13d), (14a), (14b), (14c), (14d), ( 18), ( 23), ( 28), ( 29), (30), Given Ω { wk , z, ṽm , wm , ũm , tl , γe , s1 , s2 }, problem ( 31) is a SOCP problem [43], which can be efficiently solved by convex optimization software such as CVX tool [46].According to the SCA method and the SPCA technology, a convex approximation with the optimal solution can be updated iteratively, which implies that problem (8) can be optimally solved.We summarize the proposed SCA-SPCA-based algorithm in Algorithm 1.Note that due to the power constraints (30) at the femtocell sink node and the macrocell sink node, the objective function of the recast problem (31) always has an upper bound.Hence, the proposed SCA-SPCA-based algorithm can be guaranteed to iteratively converge to a global optimal solution, whose the convergence property is proved in the following theorem.
Algorithm 1 Proposed SCA-SPCA-based iterative Algorithm 1.Given the tolerance of accuracy φ (very small value), and the maximum iteration number N max .

For
Solve problem (31) with 2 and denote the solution Ω by Ω * .

7.
The objective function converges, i.e., γ are the optimal solution to problem (31) at the n-th iteration.
e ) as the optimal objective function at the q-th iteration, we have f * n+1 (γ e ).Thus, with the increase of n, ∆w k , ∆z and ∆v m approach 0. Hence, Algorithm 1 will converge.
Proof.See Appendix B.

Simulation Results
In this section, the simulation results are provided to validate the performance of our proposed SCA-SPCA-based iterative algorithm.The system simulation parameters that we have considered for the simulations are summarized in Table 2.We assume that one smallcell is in the coverage area of a macrocell, where we set the radius of the macrocell and the smallcell to 20 m and 10 m, respectively [17].Thus, the channel g m , g c,k , G e,l h m , h c,k , and H e,l are modelled as g m = H(g m )g I , g c,k = H(g c,k ) ĝI , G e,l = H(g e,l )G I , h m = H (h m )h I , h c,k = H (h c,k ) ĥI , and H e,l = H (h e,l )H I , where , g I ∼ CN (0, I), ĝI ∼ CN (0, I), G I ∼ CN (0, I), h I ∼ CN (0, I), ĥI ∼ CN (0, I), and H I ∼ CN (0, I), respectively.In the simulation results, we will compare the following optimization design schemes: the proposed algorithm, the MSCM scheme with fixed ρ k = 0.5, the non-AN MSCM scheme which is obtained by setting z = 0, the null-AN MSCM scheme which means the AN vector lie in the null space of the HP-SNs.In Figure 3, we illustrate the convergence performance of the proposed SCA-SPCA-based iterative algorithm with respect to (w.r.t.) iteration numbers.We set Rc = 1 bps/Hz, Ēc = 10 dBm, Ēe = 10 dBm, P = 60 dBm and P 1 = 40 dBm.It is easily seen from Figure 3 that the convergence of all cases can be quickly achieved within three iterations.It is observed that the average minimal secrecy capacity (MSC) at the M-SN becomes great as P 2 increases.Figure 4 illustrates the average MSC at the M-SN in terms of different target transmit power at macrocell sink node with Rc = 1.5 bps/Hz, Ēc = 5 dBm, Ēe = 5 dBm, P = 60 dBm and P 1 = 40 dBm over 500 feasible channel realizations.It is observed that the average MSC increases with the target transmit power at macrocell sink node.In addition, the proposed SCA-SPCA-based algorithm outperforms all the conventional baseline schemes.Moreover, we can check that the proposed SCA-SPCA-based algorithm performs better than the non-AN MSCM, null-AN MSCM and the MSCM scheme with ρ k = 0.5, and the performance gap is always gradually increasing regardless of the target transmit power at macrocell sink node.This reveals that optimizing the PS ratio ρ k is important.
In Figure 5, we compare the average MSC at the M-SN w.r.t. the different target-harvested power at HP-SN by fixing Rc = 1 bps/Hz, Ēe = 10 dBm, P = 70 dBm, P 1 = 50 dBm and P 2 = 60 dBm.In this figure, we can observe that all schemes decrease with the increase of Ēc .Moreover, the proposed SCA-SPCA-based algorithm always perform better in average MSC than all three conventional baseline schemes.Compared with the non-AN MSCM and the MSCM scheme with ρ k = 0.5, the averageMSC of the proposed AN-aidedalgorithm is 1.2 bps/Hz and 0.8 bps/Hz higher at 0 dBm.It is observed that the proposed algorithm outperforms the null-AN MSCM.
In Figure 6, we plot the average MSC at the M-SN in terms of different number of transmit antennas at the macrocell sink node with Rc = 0.5 bps/Hz, Ēc = 5 dBm, Ēe = 10 dBm, P = 60 dBm, P 1 = 40 dBm and P 2 = 60 dBm.We can check that the curves of the proposed SCA-SPCA-based algorithm and the MSCM scheme with fixed ρ k = 0.5 increase with the same slope.Moveover, when N M increases, the performance gap between the non-AN MSCM scheme and the proposed algorithm becomes wider.This indicates that the AN technology is essential in obtaining the performance gains.Furthermore, the proposed algorithm outperforms the null-AN MSCM scheme by 0.8 bps/Hz.
In Figure 7, in terms of the average central processing unit (CPU) running time, the computational complexities of the proposed method and the conventional one-dimensional line search (1-D) method are compared for a channel realization under various MF on a computer (The CPU is Intel Core i7-8500U 1.8GHz, and the size of random access memory (RAM) is 8 GB).In this simulation, we set Rc = 1 bps/Hz, Ēc = 50 dBm, Ēe = 0 dBm, P = 80 dBm, P 1 = 40 dBm and P 2 = 60 dBm.We can see that our proposed algorithm has much lower complexity than the conventional 1-D method in [29].

Conclusions
Considering the security transmission with PS-enabled SWIPT approach, we have investigated the AN-based beamforming design problem in a two-tier MIMO HWSN where a femtocell is underlaying a macrocell.The jointly design problem of the transmit beamforming vectors, the AN and PS ratio has been modeled to maximize the MSC of the M-SNs subject to the secrecy capacity constraint, the harvested energy constraint and the transmit power constraint.To reduce the performance loss from the rank relaxation, an novel SCA-SPCA-based iterative algorithm has been proposed and its convergence property is proved.Numerical results have demonstrated that the proposed SCA-SPCA-based algorithm always outperforms the conventional non-AN, null-AN and "fixed PS ratio" schemes.As a future work, the proposed algorithm can be extended to a multi femtocell scenario in a macrocell.In that case, interference between femtocells needs to be considered.In addition, the dependency of non-linear power-splitting EH model and EH efficiency on the received user characteristic can be an extension of this work.sequence of the objective values.On account of the transmit power constraint at the macrocell sink node and femtocell sink node, problem (31) has an upper bound on the MSC.Therefore, the proposed algorithm can be guaranteed to converge to some optimum solution, i.e., ∆w j = 0, ∆z = 0, ∆v m = 0, and f * n+1 (γ (n+1) c , γ

1 M
: Low-priority sensor node HP-SN: High-priority sensor node M-SN: Macrocell sink node M-SN

Figure 1 .
Figure 1.The system model of MIMO Secured HWSN with SWIPT.

Figure 2 .
Figure 2. Power splitting scheme in each HP-SN.

Table 1 .
System Parameters Variables Definition M-SN m the m-th M-SN HP-SN k the k-th HP-SN LP-SN l the l-th LP-SN s m the transmit signal from macrocell sink node to M-SN m x s the transmit signal from femtocell sink node v m the transmit beamforming vector from macrocell sink node aiming at M-SN m w k the transmit beamforming vector from femtocell sink node aiming at HP-SN k s p,m , s s,k the information-bearing signal intended for M-SN m and HP-SN k z the energy-carrying AN g m the channel between macrocell sink node and M-SN m g c,k the channel between macrocell sink node and HP-SN k G e,l the channel between macrocell sink node and LP-SN l h m the channel between femtocell sink node and M-SN m h c,k the channel between femtocell sink node and HP-SN k H e,l the channel between femtocell sink node and LP-SN l n m , n c,k , n e,l the complex Gaussian noise at the M-SN m , the HP-SN k and the LP-SN l n a,k the additional noise introduced from the RF-to-signal conversion in the ID part at the HP-SN k e ) ln 2 + 1 , the linearization of the non-convex constraints in (12b), (12c), (13a) and (13c) are given by e w(n)

( m=1 (
wj +∆w j ) H He,l ( wj +∆w j )+( z+∆z) H He,l ( z+∆z)+ M ∑ ṽm +∆v m ) H Ḡe,l ( ṽm +∆v m ) He,l wj + 2 { wH j Hl ∆w j } + zH He,l z + 2 { zH He,l ∆z} Number of M-SN, M 3 Number of HP-SN, K 2 Number of LP-SN, L 2 Number of LP-SN antenna, N E 2 Number of transmit antenna at macrocell sink node, N M 4 Number of transmit antenna at femtocell sink node, N F 16 Distance between the macrocell sink node and the M-SN, g m 10 m Distance between the macrocell sink node and the HP-SN, g c,k 5 m Distance between the macrocell sink node and the LP-SN, g e,l 3 m Distance between the femtocell sink node and the M-SN, h m 6 m Distance between the femtocell sink node and the HP-SN, h c,k 5 m Distance between the femtocell sink node and the LP-SN, h e,l 2 m Speed of light, c 3 × 10 8 ms −1 Carrier frequency, f c 900 MHz Path loss exponent, κ 2.7 Gaussian noise power at all the M-SN, σ 2 m −90 dBm Gaussian noise power at all the HP-SN, σ 2 c,k −50 dBm Gaussian noise power of all the LP-SNs, σ 2 e,l −90 dBm Additional noise power of all the HP-SNs, δ 2 p,k −90 dBm Energy conversion efficiency at all the HP-SN and LP-SN, η c,k = η e,l 0.3

Figure 3 .AverageFigure 4 .Figure 5 .
Figure 3. Average MSC at the M-SN with respect to iteration number.

Figure 6 .
Figure 6.Average MSC at the M-SN with respect to the number of transmit antennas at the macrocell sink node.

Figure 7 .
Figure 7. Average CPU time with respect to the number of transmit antennas at the macrocell sink node.
, l = 1, ..., L, where g m ∈ C and h m ∈ C N S are denoted by the channel between macrocell sink node and M-SN m as well as that between femtocell sink node and M-SN m , g c,k ∈ C N P ×N C and h c,k ∈ C N S ×N C indicate the channel vectors between macrocell sink node and HP-SN k as well as that between the femtocell sink node and the HP-SN k , G e,l ∈ C N P ×N E and H e,l ∈ C N S ×N E are the channel vectors between the macrocell sink node and LP-SN l as well as that between the femtocell sink node and LP-SN l , s m is confidential information-bearing signal for M-SN m from the macrocell sink node satisfying E{s 2 or the maximum number of iterations is reached, i.e., n ≥ N max .