Next Article in Journal
An INS/Geomagnetic Integrated Navigation Algorithm Based on Matching Strategy and Hierarchical Filtering
Next Article in Special Issue
Dynamic Network Topology Control of Branch-Trimming Robot for Transmission Lines
Previous Article in Journal
Narrowband Interference Separation for Synthetic Aperture Radar via Sensing Matrix Optimization-Based Block Sparse Bayesian Learning
Previous Article in Special Issue
Resource Management Based on OCF for Device Self-Registration and Status Detection in IoT Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks

1
School of Information Engineering, Zhengzhou University, Zhengzhou 450000, China
2
5G Innovation Center (5GIC), Institute for Communication Systems (ICS), University of Surrey, Guildford GU2 7XH, UK
3
School of Electronics and Communication Engineering, Zhengzhou University of Aeronautics, Zhengzhou 450046, China
4
National Digital Switching System Engineering and Technological Research Center, Zhengzhou 450002, China
5
Jiangsu Provincial Engineering Laboratory for Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi 214122, China
6
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
7
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
8
The Shaanxi Key Laboratory of Information Communication Network and Security, Xi’an University of Posts & Telecommunications, Xi’an 710121, Shaanxi, China
*
Authors to whom correspondence should be addressed.
Electronics 2019, 8(4), 459; https://doi.org/10.3390/electronics8040459
Submission received: 4 March 2019 / Revised: 8 April 2019 / Accepted: 17 April 2019 / Published: 25 April 2019

Abstract

:
In this paper, we investigate the physical layer security in a two-tier heterogeneous wireless sensor network (HWSN) depending on simultaneous wireless information and power transfer (SWIPT) approach for multiuser multiple-input multiple-output wiretap channels with artificial noise (AN) transmission, where a more general system framework of HWSN only includes a macrocell and a femtocell. For the sake of implementing security enhancement and green communications, the joint optimization problem of the secure beamforming vector at the macrocell and femtocell, the AN vector, and the power splitting ratio is modeled to maximize the minimal secrecy capacity of the wiretapped macrocell sensor nodes (M-SNs) while considering the fairness among multiple M-SNs. To reduce the performance loss of the rank relaxation from the SDR technique while solving the non-convex max–min program, we apply successive convex approximation (SCA) technique, first-order Taylor series expansion and sequential parametric convex approximation (SPCA) approach to transform the max–min program to a second order cone programming (SOCP) problem to iterate to a near-optimal solution. In addition, we propose a novel SCA-SPCA-based iterative algorithm while its convergence property is proved. The simulation shows that our SCA-SPCA-based method outperforms the conventional methods.

1. Introduction

Recently, Internet-of-Things (IoT) has emerged to be considered as one of the key technological concepts as a basic precondition implementing Industry 4.0 [1]. The recent developments in the IoT application, wireless sensor networks (WSNs), have played a significant role in connecting tens of thousands of wireless devices over the Internet in many applications, especially healthcare services, electronic instrumentation, transportation, and environmental assessment [2]. A WSN generally contains many sensor nodes (SNs) that is capable of perceiving their external environment, which can perform communicate and computations [3]. Unfortunately, because SN are battery-powered, the working lifetime of the entire WSNs is limited by energy consumption due to the energy restriction at SN [4]. In order to overcome these limitation, there are many investigations on enabling technologies for energy sustainablility in WSNs [5].
The emergence of mobile devices has resulted in a continuously growing requirement for wireless applications, such as an ultra-wide radio coverage, an ultra-high data service, and an ultra-large number of smart devices. Recently, a promising solution to cater for this requirement has been the fifth generation (5G) wireless technology [6,7]. Therefore, the deployment of low-cost femtocell base stations (FBSs) underlaid in the macrocell can provide ubiquitous coverage and extremely high data rate [8]. In this regard, to accommodate the explosive cell density and growing data traffic, heterogeneous networks (HetNets) have emerged as one of the most promising approaches in the 5G wireless systems by increasing the off-load portion of their traffic [9,10].
In recent years, by integrating the WPT with traditional wireless information transmission (WIT), simultaneous wireless information and power transfer (SWIPT) have been recognised as among the main candidate technologies for green communications [11,12,13,14,15], which has been shown to be in a position to improve the WPT performance in HetNets [16,17,18]. The idea of using SWIPT to implement wireless recharging of the batteries in HetNets was first studied in [16], where two integer linear programming methods were proposed to help wireless nodes to scavenge ambient energy. Tang et al. [17] provided a essential study of the QoS-constrained energy efficiency optimization problem for coordinated multi-point (CoMP)-SWIPT HetNets, a decoupled approach was proposed in which the power allocation procedure and beamforming design were separated. Considering multiple Power splitting (PS)-based heterogeneous users in [18], Jiang et al. investigated the optimal transmit power minimization design problem of SWIPT systems to achieve green communication design under non-linear energy harvesting model, where the semidefinite relaxation (SDR) are employed to solve and the globe optimal solution was theoretically guaranteed.
On the other hand, depending on the presence of the broadcasting nature of wireless channel and the multi-tier dynamic topology in SWIPT HetNets, the useful messages which intended to the information users may be entirely possible to be eavesdropped by the energy users, which brings huge technical challenges to secure SWIPT in HetNets [19]. Recently, physical-layer security (PLS) has emerged as a prominent technique to guarantee the secrecy communication by exploiting the characteristics of physical wireless channels, while defending against the eavesdroppers [20,21]. Various PLS techniques in SWIPT networks have been studied in MISO and MIMO systems [22,23,24,25,26,27,28,29]. More specifically, Ren et al. [29] studied jointly optimize design of the transmit beamforming and AN of the macrocell base station (MBS) and the femtocell base stations (FBS), the secrecy rate maximization problem of the eavesdropped macrocell users was reformulated by utilizing the one-dimensional line search and successive convex approximation.
In addition, there are some related works integrating the SWIPT in WSNs [30,31,32,33,34,35,36,37]. Guo et al. [30] applied the SWIPT technique to cooperative clustered WSN, a distributed iteration algorithm was proposed by exploiting fractional programming and dual decomposition. Considering different PS abilities of relays in a mobile wireless sensor networks with SWIPT, a resource allocation design (RAD) problem was formulated as a non-convex energy efficiency maximization problem, Guo et al. [31] proposed a cross-layer algorithm for rate control, PS, and power allocation. A unified framework was developed to study the impact of SWIPT on the performance with both time splitting (TS) and power splitting (PS) schemes [32] in a WSN over Nakagami-m fading channels. In the MIMO wireless powered underground sensor network, the optimal RAD problem was considered for throughput the system throughput maximization with quality of service (QoS) assurance in regard to communication reliability and diverse data traffic demands [33]. Focusing on two relaying strategies, a downlink (DL) multiple-input single-output (MISO) WSN with the nonorthogonal multiple access technique (NOMA) and SWIPT was investigated over Nakagami-m fading [34], where three antenna-relay-destination selection algorithms were proposed through analysis on downlink (DL) and UL transmissions. Assuming the sensor nodes always work in harvesting–transmitting mode, Hu et al. [35] studied the PLS of uplink (UL) transmission in SWIPT deployed in WSNs, in which the energy/secrecy outage probabilities were derived through comprehensive analysis on DL and UL transmissions, respectively. As for IoT sensor networks with a PS-enabled SWIPT technology, Chae et al. [36] proposed a novel SWIPT strategy where the access point have a choice over either sending a private/common message, and a hybrid beamforming design algorithm was proposed by considering the total transmit power minimization problem. By exploiting a fountain codes in the SWIPT WSNs, Yi et al. [37] proposed a new PS mechanism to adaptively divide data packets into the information data packets and the energy data packets. To the best of our knowledge, secure beamforming design to achieve secrecy capacity, particularly assuming practical power splitting (PS)-based heterogeneous wireless sensor networks (HWSN) with SWIPT transmission, has not been considered previously.
Motivated by the above analysis, in this paper, we consider a SWIPT-enabled two-tier HWSN with MIMO system, where a macrocell sink node and a femtocell sink node transmit co-channel information to the corresponding macrocell sensor nodes (M-SNs), high-priority sensor nodes (HP-SNs) and low-priority sensor nodes (LP-SNs), respectively. In order to harvest more energy from the ambient environment, the HP-SNs can use a power splitter. According to the ambient interference signals, the LP-SNs not only eavesdrop the confidential messages from the M-SNs, but also harvest wireless energy. By applying the interference, an AN-aided secrecy transmission is utilized at the femtocell sink node. In addition, we study the jointly optimization design of the transmit beamforming vectors at the macrocell sink node and femtocell sink node, the AN and PS ratio to maximize the minimal secrecy capacity (MSC) of the wiretapped M-SNs under the secrecy capacity constraint at the HP-SNs, the harvested energy constraint at the HP-SNs and LP-SNs, the transmit power constraint at the macrocell sink node and femtocell sink node. More explicitly, the main contributions of this paper can be summarized as follows:
  • Firstly, we establish the system model of a two-tier MIMO HWSN, where SWIPT technique is performed at the femtocell sink node to recharge the HP-SNs and LP-SNs. To be specific, each HP-SN is equipped with power splitter. We consider a general system case where both the M-SNs and HP-SNs are faced under threat of secrecy leakage from the LP-SNs, where each LP-SN act as a malicious user.
  • To promote the security performance and harvest more power, the AN is injected designedly into the transmit beamforming at the femtocell sink node. To achieve secrecy enhancement, a joint design problem is formulated for the MSC maximization while considering the fairness among multiple M-SNs. The original problem is non-convex and hard to solve directly.
  • In order to reduce the performance loss of the rank relaxation from the SDR technique while solving the non-convex max–min program [38], we apply SCA technique, first-order Taylor series expansion and SPCA method, and then the recast problem can be converted to an SOCP problem [39] which can be directly solved to achieve a near-optimal solution. Moreover, we propose a novel SCA-SPCA-based iterative algorithm, while its convergence property of the proposed algorithm is proved.
Compared with our previous papers [23,24], major additional works and results incorporated in these papers are summarized in the following. (1) This paper has extended the problem of AN power maximization to both perfect and imperfect CSI cases, which introduces substantial changes in the analyses. (2) An SPCA-based iterative algorithm has been proposed to solve the problem such that the computational complexity is largely reduced compared with the 1-D search method used in the previous work.
The rest of this paper is organized as follows: In Section 2, we presents the HWSN system model and formulates the MSC maximization problem. Section 3 solves the non-convex problem and provide the proposed SCA-SPCA-based iterative algorithm. Section 4 outlines the simulation results. Finally, Section 5 concludes this paper.
Notation: Lower-case letters mean scalars, bold-face lower-case letters are denoted by vectors, and boldface upper-case letters are used for matrices. C M × L indicates the space of M × L complex matrices. | · | defines the absolute value of a complex scalar. A F describes the Frobenius norm of the matrix A , tr ( A ) indicates the trace of A . E { · } describes the mathematical expectation. [ x ] + equals max { x , 0 } .

2. System Model and Problem Formulation

In this section, a two-tier downlink HWSN is considered with MIMO-SWIPT, where a femtocell sink node is deployed with a macrocell sink node, as shown in Figure 1. Following [40], the smart antenna technology is applied for the sink nodes. Moreover, the femtocell sink node serves K HP-SNs and L LP-SNs, whereas the macrocell sink node serves M M-SNs. For the sake of notational simplicity, it is assumed that the m-th M-SN, the k-th HP-SN and the l-th LP-SN are denoted by M-SN m , HP-SN k , and LP-SN l , respectively. The system parameters that we have considered are defined in Table 1. In the smallcell of this HWSN system, two different types of receivers are considered: (i) one cluster of HP-SNs (such as low-power receivers), denoted by K = {HP-SN 1 ,…, HP-SN K }, which is located far from the femtocell sink node, (ii) one cluster of LP-SNs (such as sensors), denoted by L = {LP-SN 1 ,…,LP-SN L }, which are located close to the femtocell sink node. It is assumed that each M-SN and HP-SN have single receive antenna, LP-SN is equipped with N E receive antenna, whereas the macrocell sink node and femtocell sink node are equipped with N M M antennas and N F K + L N E transmit antennas, respectively. This system operates as follows: the macrocells share their frequency spectrum with the femtocell to improve the spectral efficiency, whereas the confidential messages from the macrocell sink node and the femtocell sink node may be intercepted by LP-SNs. Additionally, all HP-SNs employ the PS scheme to perform information decoding (ID) and energy harvesting (EH) simultaneously, as shown in Figure 2.
As an active user in the HWSN, we assume that LP-SN can harvest energy to extend its battery life from the ambient radio frequency (RF) signals. However, LP-SNs may be potential eavesdroppers due to intercepting the information from the femtocell sink node to HP-SNs. Thus, to provide secure transmission in this HWSN, the femtocell sink node applies the AN to transmit beamforming, which not only acts as interference to the LP-SNs, but also supplies energy to the HP-SNs. The secure signal vector s from the macrocell sink node and x s from the femtocell sink node can be written as
s = m = 1 M v m s m , m = 1 , , M , x s = k = 1 K w k s s , k + z , k = 1 , , K ,
where v m C N P and w k C N s define the transmit beamforming vector from the macrocell sink node aiming at M-SN m and from the femtocell sink node aiming at HP-SN k , s m and s s , k are the information-bearing signal intended for M-SN m and HP-SN k with satisfying E { s m 2 } = 1 and E { s s , k 2 } = 1 , respectively, and z represents the energy-carrying AN.
Therefore, the received signal at the M-SN m , the HP-SN k , and the LP-SN l can be given by, respectively,
y m = g m H v m s m d e s i r e d s i g n a l + g m H i = 1 , i m M ( v i s p , i ) i n t r a t i e r i n t e r f e r e n c e + h m H ( k = 1 K w k s s , k + z ) i n t e r t i e r i n t e r f e r e n c e + n m , m = 1 , , M , y c , k = h c , k H w k s s , k d e s i r e d s i g n a l + h c , k H z + h c , k H i = 1 , i k K ( w i s s , i ) i n t r a t i e r i n t e r f e r e n c e + g c , k H m = 1 M v m s m i n t e r t i e r i n t e r f e r e n c e + n c , k , k = 1 , , K , y e , l = H e , l H w l s s , l d e s i r e d s i g n a l + H e , l H z + H e , l H i = 1 , i l K ( w i s s , i ) i n t r a t i e r i n t e r f e r e n c e + G e , l H m = 1 M v m s m i n t e r t i e r i n t e r f e r e n c e + n e , l , l = 1 , , L ,
where g m C and h m C N S are denoted by the channel between macrocell sink node and M-SN m as well as that between femtocell sink node and M-SN m , g c , k C N P × N C and h c , k C N S × N C indicate the channel vectors between macrocell sink node and HP-SN k as well as that between the femtocell sink node and the HP-SN k , G e , l C N P × N E and H e , l C N S × N E are the channel vectors between the macrocell sink node and LP-SN l as well as that between the femtocell sink node and LP-SN l , s m is confidential information-bearing signal for M-SN m from the macrocell sink node satisfying E { s m 2 } = 1 . In addition, n m CN ( 0 , σ m 2 ) , n a , k CN ( 0 , σ a , k 2 ) and n e , l CN ( 0 , σ e , l 2 I ) denote the complex AWGN at the M-SN m , the HP-SN k and the LP-SN l , respectively.
Since the HP-SN utilizes PS scheme to simultaneously implement ID and EH, the received signal at the HP-SN k is divided into ID portion and EH portion by the PS ratio ρ k ( 0 , 1 ] . Hence, the split signal for ID part and EH part at the HP-SN k can be expressed as, respectively,
y c , k I D = ρ k ( h c , k H w k s s , k + h c , k H z + h c , k H i = 1 , i k K ( w i s s , i ) + g c , k H m = 1 M v m s m + n a , k ) + n p , k , y c , k E H = 1 ρ k ( h c , k H w k s s , k + h c , k H z + h c , k H i = 1 , i k K ( w i s s , i ) + g c , k H m = 1 M v m s m + n a , k ) ,
where n p , k CN ( 0 , δ p , k 2 ) is the additional Gaussian noise resulted in the RF-to-signal conversion for the ID part at the HP-SN k .
Thus, the channel capacity of the HP-SN k is expressed as
R c , k = log 1 + ρ k h c , k H w k w k H h c , k ρ k h c , k H ( j k w j w j H + z z H ) h c , k + g c , k H m = 1 M ( v m v m H ) g c , k + σ a , k 2 + δ p , k 2 .
The channel capacity of the LP-SN l for decoding the desired signal of the HP-SN k can be represented as
R c , l k = log | I + σ e , l 2 I + ( H e , l H ( j k w j w j H + z z H ) H e , l + G e , l H m = 1 M ( v m v m H ) G e , l ) 1 H e , l H w k w k H H e , l | .
Thus, the secrecy capacity of the HP-SN k can be written as
C c , k = R c , k max l R c , l k + , k , l .
Additionally, the channel capacity of the M-SN m can be expressed as
R m = log 1 + g m H v m v m H g m h m H j = 1 K w j w j H + z z H h m + σ m 2 + g m H j m M ( v j v j H ) g m .
Suppose that the LP-SN l is an eavesdropper to decode the message for the M-SN m . The channel capacity of the LP-SN l for decoding the M-SN m is given as
R m , l = log I + ( H e , l H ( j = 1 K w j w j H + z z H ) H e , l + G e , l H j m ( v j v j H ) G e , l + σ e , l 2 I ) 1 G e , l H v m v m H G e , l .
Hence, following the concept of secrecy capacity in [20,21,22], the secrecy capacity of the M-SN m can be written as
C m = R m max l R m , l + , l .
where [ a ] + indicates the m a x ( 0 , a ) .
Moreover, the HP-SNs employs the PS ratio to harvest the power carried from the RF signal. In order to harvest the carried energy, the LP-SN receiver does not need to transform the received signal to the baseband. However, due to the law of energy conservation, we assume that the total harvested energy at the HP-SN k and the LP-SN l , i.e., the RF-band power normalized by the baseband symbol, denoted by E c , k and E e , l , respectively, from all N E receive antennas at the LP-SN receiver is proportional to that of the received RF baseband signal, i.e.,
(7a) E c , k = η c , k ( 1 ρ k ) h c , k H ( j = 1 K w j w j H + z z H ) h c , k + g c , k H m = 1 M ( v m v m H ) g c , k + σ a , k 2 , k , (7b) E e , l = η e , l tr ( H e , l H ( j = 1 K w j w j H + z z H ) H e , l ) + tr ( G e , l H m = 1 M ( v m v m H ) G e , l ) + N E σ e , l 2 , l ,
where 0 η c , k 1 and 0 η e , l 1 denote the energy conversion efficiency at the HP-SN k and LP-SN l , respectively.
In this paper, our objective is to secure the WIT to legitimated users (i.e., M-SNs and HP-SNs) in the presence of potential eavesdroppers (i.e., LP-SNs) by jointly designing the AN-aided transmit beamforming. Moverover, we aim to promote the MSC performance by guaranteeing all M-SNs can achieve a certain secrecy capacity level. To this end, we maximize the MSC of the M-SN m under the secrecy capacity constraint at the HP-SNs, the harvested energy constraint at the HP-SNs and LP-SNs, as well as the transmit power constraint at the macrocell sink node and femtocell sink node. Based on the system models, the MSC maximization (MSCM) problem is formulated as
max w k , z , v m , ρ k min m = 1 , , M C m (8a) s . t . min k C c , k R ¯ c , k , (8b) min k E c , k E ¯ c , k , (8c) min l E e , l E ¯ e , l , (8d) k = 1 K w k 2 + z 2 P , k , k = 1 K w k 2 P 1 , m = 1 M v m 2 P 2 , (8e) 0 ρ k 1 ,
where R ¯ c denotes the secrecy capacity requirement of the HP-SN k , E ¯ c and E ¯ e mean the harvested power requirement of the HP-SN k and the LP-SN l , respectively, P represents the total transmit power at the femtocell sink node, P 1 indicates the transmit power about the information signal part at the femtocell sink node, P 2 stands for the total transmit power at the macrocell sink node. The constraints (8a) guarantees that the minimum secrecy rate should be achieved at the HP-SN k . The constraints and (8b) and (8c) guarantee that the minimum harvested power at the HP-SN k and the LP-SN l are no less than E ¯ c and E ¯ e , respectively. The constraint (8d) limits the transmit power. Obviously, it is seen that problem (8) is non-convex due to the existence of coupling among variables ρ k and w k , which is difficult to solved directly.

3. Proposed Algorithm

In this section, we will propose an iterative algorithm to obtain near-optimal solution by applying the SCA method and SPCA technology [41]. To tackle problem (8) we firstly introduce an equivalent reformulation about problem (8). To circumvent this issue, problem (8) can be rewritten as
max w k , z , v m , ρ k min m = 1 , , M log 1 + g m H v m v m H g m h m H ( k = 1 K w k w k H + z z H ) h m + g m H j m ( v j v j H ) g m + σ m 2 (9a) log I + ( H e , l H ( k = 1 K w k w k H + z z H ) H e , l + G e , l H j m ( v j v j H ) G e , l + σ e , l 2 I ) 1 G e , l H v m v m H G e , l s . t . log 1 + ρ k h c , k H w k w k H h c , k ρ k ( h c , k H ( j k w j w j H + z z H ) h c , k + g c , k H m = 1 M ( v m v m H ) g c , k + σ a , k 2 ) + δ p , k 2 (9b) log I + ( σ e , l 2 I + H e , l H ( j k w j w j H + z z H ) H e , l + G e , l H m = 1 M ( v m v m H ) G e , l ) 1 H e , l H w k w k H H e , l R ¯ c , (9c) η k ( 1 ρ k ) ( tr ( h c , k H ( j = 1 K w j w j H + z z H ) h c , k ) + tr ( g c , k H m = 1 M ( v m v m H ) g c , k ) + N C σ a , k 2 ) E ¯ c , k , (9d) η l ( tr ( H e , l H ( j = 1 K w j w j H + z z H ) H e , l ) + tr ( G e , l H m = 1 M ( v m v m H ) G e , l ) + σ e , l 2 ) E ¯ e , l , ( 8 d ) , ( 8 e ) .
It is observed that the determinant functions is in the R c , l k of the objective function (9a). We consider the following Lemma 1, which will be applied to provide a convex approximation form to C l , k .
Lemma 1.
([42]) For any matrix A , which A is positive semi-definite, i.e., A 0 . It holds true that
| I + A | 1 + tr ( A ) ,
where the equality holds if and only if r a n k ( A ) 1 .
Proof. 
See Appendix A. □
We introduce two real-valued slack variables γ c and γ e . By applying the Lemma 1, problem (9) can be rewritten as
(11a) max w k , z , v m , ρ k , γ c , γ e γ c γ e (11b) s . t . g m H v m v m H g m h m H k = 1 K w k w k H + z z H h m + g m H j m ( v j v j H ) g m + σ m 2 2 γ c 1 , (11c) tr ( G e , l H v m v m H G e , l ) tr H e , l H k = 1 K w k w k H + z z H H e , l + G e , l H j m ( v j v j H ) G e , l + σ e , l 2 2 γ e 1 , ( 9 b ) , ( 9 c ) , ( 9 d ) , ( 8 d ) , ( 8 e ) .
In order to make the problem (11) tractable, by introducing the auxiliary variables v m , w m , u m , t l , e l , and q l , we define new matrices G m = g m g m H , H m = h m h m H , G c , k = g c , k g c , k H , H c , k = h c , k h c , k H , G ¯ e , l = G e , l G e , l H , and H ¯ e , l = H e , l H e , l H . The constraints (11b) and (11c) can be written as, respectively,
(12a) v m H G m v m e v m , (12b) e w m k = 1 K w k H H m w k + z H H m z + j m ( v j H G m v j ) + σ m 2 , (12c) e u m 2 γ c 1 , (12d v m w m u m .
(13a) v m H G ¯ e , l v m e t l , m , l , (13b) e e l k = 1 K w k H H ¯ e , l w k + z H H ¯ e , l z + j m ( v j H G ¯ e , l v j ) + σ e , l 2 , (13c) e q l 2 γ e 1 , (13d) t l e l q l .
According to [43], it is well-known that a constraint is such that a concave function is greater than or equal to a convex function, then the constraint is a convex form. Therefore, it is easily seen that (12a) and (13b) are convex now. However, (12b), (12c), (13a) and (13c) are still non-convex. Nevertheless, the functions e w m and e u m on the right-hand side (RHS) of (12b) and (12c) are convex, which makes (12) easier to deal with than (11b). Similarly, the functions e t l and 2 γ e 1 on the left-hand sides (LHS) of (13a) and (13c) are also convex, we obtain that (13) is easier to handle than (11c).
Following the idea of [23,44], we apply the SCA method to deal with (12b), (12c), (13a) and (13c). To this end, let us define w ¯ m ( n ) , u ¯ m ( n ) , t ¯ l ( n ) and γ ¯ e ( n ) as the variables w ¯ m , u ¯ m , t ¯ l and γ ¯ e at the n-th iteration for a novel SCA-SPCA-based iterative algorithm given below. By employing first-order Taylor series expansions on e w m , e u m , e t l and 2 γ e i.e., e w ¯ m ( n ) ( w m w ¯ m ( n ) + 1 ) , e u ¯ m ( n ) ( u m u ¯ m ( n ) + 1 ) , e t ¯ l ( n ) ( t l t ¯ l ( n ) + 1 ) and 2 γ ¯ e ( n ) ( γ e γ ¯ e ( n ) ) ln 2 + 1 , the linearization of the non-convex constraints in (12b), (12c), (13a) and (13c) are given by
(14a) e w ¯ m ( n ) ( w m w ¯ m ( n ) + 1 ) k = 1 K w k H H m w k + z H H m z + j m ( v j H G m v j ) + σ m 2 , (14b) e u ¯ m ( n ) ( u m u ¯ m ( n ) + 1 ) 2 γ c 1 , (14c) e t ¯ l ( n ) ( t l t ¯ l ( n ) + 1 ) v m H G ¯ e , l v m , m , l , (14d) 2 γ ¯ e ( n ) ( γ e γ ¯ e ( n ) ) ln 2 + 1 1 e q l .
In addition, for the constraint (9b), we will reformulate it by using SPCA method. By introducing two slack variables s 1 > 0 and s 2 > 0 , (9b) can be recast as
(15a) log ( s 1 s 2 ) R ¯ c , l , (15b) 1 + ρ k h c , k H w k w k H h c , k ρ k h c , k H ( j k w j w j H + z z H ) h c , k + g c , k H m = 1 M ( v m v m H ) g c , k + σ a , k 2 + δ p , k 2 s 1 , (15c) | I + ( σ e , l 2 I + H e , l H ( j k w j w j H + z z H ) H e , l + G e , l H m = 1 M ( v m v m H ) G e , l ) 1 H e , l H w k w k H H e , l | 1 s 2 .
By apply the Lemma 1, the constraint (15c) can be recast, respectively, as
1 + tr H e , l H w k w k H H e , l σ e , l 2 + tr H e , l H ( j k w j w j H + z z H ) H e , l + G e , l H m = 1 M ( v m v m H ) G e , l 1 s 2 .
Then, (15) can be further simplified as
(17a) s 1 s 2 2 R ¯ c , l , (17b) h c , k H w k w k H h c , k h c , k H ( j k w j w j H + z z H ) h c , k + g c , k H m = 1 M ( v m v m H ) g c , k + σ a , k 2 + δ p , k 2 ρ k s 1 1 , (17c) σ e , l 2 + tr H e , l H ( j k w j w j H + z z H ) H e , l + G e , l H m = 1 M ( v m v m H ) G e , l σ e , l 2 + tr H e , l H ( j = 1 K w j w j H + z z H ) H e , l + G e , l H m = 1 M ( v m v m H ) G e , l s 2 .
The inequality constraint (17a) is equivalent to 2 R ¯ c + 2 + ( s 1 s 2 ) 2 ( s 1 + s 2 ) 2 . Then, we can transform it to a conic quadratic-representable function as (18)
2 R ¯ c + 2 s 1 s 2 s 1 + s 2 , l .
And then, we transform the inequality constraints (17b) and (17c) into the following form as
(19a) j k w j H H c , k w j + z H H c , k z + m = 1 M v m H G c , k v m + σ a , k 2 + δ p , k 2 ρ k w k H H c , k w k s 1 1 , σ e , l 2 + j = 1 K w j H H ¯ e , l w j + z H H ¯ e , l z + m = 1 M v m H G ¯ e , l v m (19b) σ e , l 2 + j k w j H H ¯ e , l w j + z H H ¯ e , l z + m = 1 M v m H G ¯ e , l v m s 2 ,
It is observed that the constraints (19a) and (19b) are non-convex. Fortunately, the RHS of both constraints is the quadratic-over-linear (QoL) function, which are convex form [43]. According to the idea of the constrained convex procedure [45], these QoL functions can be replaced by their first-order Taylor expansions, which can be converted into a convex programming problem. Specifically, we firstly define a function as
f B , b ( w , y ) = u H B u y b ,
where y b and B 0 . Then, the first-order Taylor expansion of (20) at a certain point ( u ˜ , b ˜ ) is written by
F B , b ( u , y , u ˜ , y ˜ ) = 2 { u ˜ H B u } y ˜ b u ˜ H B u ˜ ( y ˜ b ) 2 ( y b ) .
By utilizing the above results of first-order Taylor expansion, for the certain points ( w k , s ˜ 1 ) , ( z , s ˜ 2 ) and ( v m , s ˜ 2 ) , we can respectively convert the constraints (19a) and (19b) into the following convex forms as
(22a) j k w j H H c , k w j + z H H c , k z + m = 1 M ( v m H G c , k v m ) + σ a , k 2 + δ p , k 2 ρ k F H c , k , 1 ( w k , s 1 , w ˜ k , s ˜ 1 ) , σ e , l 2 + j = 1 K w j H H ¯ e , l w j + z H H ¯ e , l z + m = 1 M ( v m H G ¯ e , l v m ) σ e , l 2 ( 2 s ˜ 2 s 2 s ˜ 2 2 ) (22b) + j k F H ¯ e , l , 0 ( w j , s 2 , w ˜ j , s ˜ 2 ) + F H ¯ e , l , 0 ( z , s 2 , z ˜ , s ˜ 2 ) + m = 1 M F G ¯ e , l , 0 ( v m , s 2 , v ˜ m , s ˜ 2 ) , k .
Denoting g s 1 , k = F H c , k , 1 ( w k , s 1 , w ˜ k , s ˜ 1 ) σ a , k 2 δ p , k 2 ρ k and g s 2 , l = σ e , l 2 ( 2 s ˜ 2 s 2 s ˜ 2 2 ) + j k F H ¯ e , l , 0 ( w j , s 2 , w ˜ j , s ˜ 2 ) + F H ¯ e , l , 0 ( z , s 2 , z ˜ , s ˜ 2 ) + m = 1 M F G ¯ e , l , 0 ( v m , s 2 , v ˜ m , s ˜ 2 ) σ e , l 2 , (22a) and (22b) can be rewritten as the second-order cone (SOC) constraints as
[ 2 w 1 H H c , k , , 2 w k 1 H H c , k , 2 w k + 1 H H c , k , , 2 w K H H c , k , 2 z H H c , k , 2 v 1 H G c , k , , 2 v M H G c , k , g s 1 , k 1 ] T (23a) g s 1 , k + 1 , (23b) [ 2 w 1 H H ¯ e , l , , 2 w K H H ¯ e , l , 2 z H H ¯ e , l , 2 v 1 H G ¯ e , l , , 2 v M H G ¯ e , l , g s 2 , l 1 ] T g s 2 , l + 1 .
Moreover, the constraints (9c) and (9d) can be reformulated as
j = 1 K w j H H c , k w j + z H H c , k z + m = 1 M v m H G c , k v m E ¯ c η k ( 1 ρ k ) σ a , k 2 .
j = 1 K w j H H ¯ e , l w j + z H H ¯ e , l z + m = 1 M v m H G ¯ e , l v m E ¯ e η l N E σ e , l 2 , l .
Next, we will apply the SPCA method to obtain convex approximations of (24) and (25). By substituting w j w ˜ j + Δ w j , z z ˜ + Δ z and v m v ˜ m + Δ v m into the LHS of (24) and (25), we have
j = 1 K w j H H c , k w j + z H H c , k z + m = 1 M v m H G c , k v m = j = 1 K ( w ˜ j + Δ w j ) H H c , k ( w ˜ j + Δ w j ) + ( z ˜ + Δ z ) H H c , k ( z ˜ + Δ z ) + m = 1 M ( v ˜ m + Δ v m ) H G c , k ( v ˜ m + Δ v m ) j = 1 K w ˜ j H H c , k w ˜ j + 2 { w ˜ j H H c , k Δ w j } + z ˜ H H c , k z ˜ + 2 { z ˜ H H c , k Δ z } + m = 1 M v ˜ m H G c , k v ˜ m + 2 { v ˜ m H G c , k Δ v m } ,
where the inequality is achieved by removing the quadratic terms j = 1 K Δ w j H H k Δ w j , Δ z H H k Δ z and m = 1 M Δ v m H G c , k Δ v m .
Similarly, for the LHS of (25), it follows
j = 1 K w j H H ¯ e , l w j + z H H ¯ e , l z + m = 1 M v m H G ¯ e , l v m = j = 1 K ( w ˜ j + Δ w j ) H H ¯ e , l ( w ˜ j + Δ w j ) + ( z ˜ + Δ z ) H H ¯ e , l ( z ˜ + Δ z ) + m = 1 M ( v ˜ m + Δ v m ) H G ¯ e , l ( v ˜ m + Δ v m ) j = 1 K w ˜ j H H ¯ e , l w ˜ j + 2 { w ˜ j H H ¯ l Δ w j } + z ˜ H H ¯ e , l z ˜ + 2 { z ˜ H H ¯ e , l Δ z } + m = 1 M ( v ˜ m H G ¯ e , l v ˜ m + 2 { v ˜ m H G ¯ e , l Δ v m } ) .
Based on (26) and (27), the linear approximations of the concave constraints (24) and (25) can be obtained as
j = 1 K w ˜ j H H c , k w ˜ j + 2 { w ˜ j H H c , k Δ w j } + z ˜ H H c , k z ˜ + 2 { z ˜ H H c , k Δ z } + m = 1 M ( v ˜ m H G c , k v ˜ m + 2 { v ˜ m H G c , k Δ v m } ) E ¯ c η k ( 1 ρ k ) σ a , k 2 , k .
j = 1 K w ˜ j H H ¯ e , l w ˜ j + 2 { w ˜ j H H ¯ l Δ w j } + z ˜ H H ¯ e , l z ˜ + 2 { z ˜ H H ¯ e , l Δ z } + m = 1 M ( v ˜ m H G ¯ e , l v ˜ m + 2 { v ˜ m H G ¯ e , l Δ v m } ) E ¯ e η l N E σ e , l 2 , l .
Finally, by rearranging (8d) as
[ w 1 T , , w K T , z T , v 1 T , , v M T ] P , [ w 1 T , , w K T ] P 1 , [ v 1 T , , v M T ] P 2 .
Eventually, the original MSCM problem (8) is transformed into following convex form as
max w k , z , v m , ρ k , γ c , γ e , v m , w m , u m , t l , e l , q l , s 1 , s 2 γ c γ e s . t . ( 12 a ) , ( 12 d ) , ( 13 b ) , ( 13 d ) , ( 14 a ) , ( 14 b ) , ( 14 c ) , ( 14 d ) , ( 18 ) , ( 23 ) , ( 28 ) , ( 29 ) , ( 30 ) , 0 < ρ c , l 1 , l , Δ w k = w k w ˜ k , Δ z = z z ˜ , Δ v m = v m v ˜ m .
Given Ω { w ˜ k , z ˜ , v ˜ m , w ˜ m , u ˜ m , t ˜ l , γ ˜ e , s ˜ 1 , s ˜ 2 } , problem (31) is a SOCP problem [43], which can be efficiently solved by convex optimization software such as CVX tool [46]. According to the SCA method and the SPCA technology, a convex approximation with the optimal solution can be updated iteratively, which implies that problem (8) can be optimally solved. We summarize the proposed SCA-SPCA-based algorithm in Algorithm 1. Note that due to the power constraints (30) at the femtocell sink node and the macrocell sink node, the objective function of the recast problem (31) always has an upper bound. Hence, the proposed SCA-SPCA-based algorithm can be guaranteed to iteratively converge to a global optimal solution, whose the convergence property is proved in the following theorem.
Algorithm 1 Proposed SCA-SPCA-based iterative Algorithm
1. 
Given the tolerance of accuracy ϕ (very small value), and the maximum iteration number N max .
2. 
Set n = 0 and initialize Ω ( 0 ) = w ˜ k ( 0 ) , v ˜ m ( 0 ) , z ˜ ( 0 ) , w ¯ m ( 0 ) , u ¯ m ( 0 ) , t ¯ l ( 0 ) , γ ¯ e ( 0 ) , s ˜ 1 ( n ) , s ˜ 2 ( n ) .
3. 
For n = 1 : N max do
4. 
        Solve problem (31) with Ω ( n ) = w ˜ k ( n ) , v ˜ m ( n ) , z ˜ ( n ) , w ¯ m ( n ) , u ¯ m ( n ) , t ¯ l ( n ) , γ ¯ e ( n ) , s ˜ 1 ( n ) , s ˜ 2 ( n ) and denote the solution Ω by Ω * .
5. 
          Set Ω ( n + 1 ) = Ω * .
6. 
          Update the iteration number n n + 1 .
7. 
            The objective function converges, i.e., γ c ( n + 1 ) γ e ( n + 1 ) γ c ( n ) γ e ( n ) ϕ , or the maximum number of iterations is reached, i.e., n N max .
8. 
end for
9. 
Obtain { w k } k = 1 K , { v m } m = 1 M and z .
Theorem 1.
Suppose that γ c ( n ) and γ e ( n ) are the optimal solution to problem (31) at the n-th iteration. Denoting f n * ( γ c ( n ) , γ e ( n ) ) as the optimal objective function at the q-th iteration, we have f n + 1 * ( γ c ( n + 1 ) , γ e ( n + 1 ) ) f n * ( γ c ( n ) , γ e ( n ) ) . Thus, with the increase of n, Δ w k , Δ z and Δ v m approach 0. Hence, Algorithm 1 will converge.
Proof. 
See Appendix B. □

4. Simulation Results

In this section, the simulation results are provided to validate the performance of our proposed SCA-SPCA-based iterative algorithm. The system simulation parameters that we have considered for the simulations are summarized in Table 2. We assume that one smallcell is in the coverage area of a macrocell, where we set the radius of the macrocell and the smallcell to 20 m and 10 m, respectively [17]. Thus, the channel g m , g c , k , G e , l h m , h c , k , and H e , l are modelled as g m = H ( g m ) g ¯ I , g c , k = H ( g c , k ) g ^ I , G e , l = H ( g e , l ) G ¯ I , h m = H ( h m ) h ¯ I , h c , k = H ( h c , k ) h ^ I , and H e , l = H ( h e , l ) H ¯ I , where H ( d ) = c 4 π f c ( 1 d ) κ 2 , g ¯ I CN ( 0 , I ) , g ^ I CN ( 0 , I ) , G ¯ I CN ( 0 , I ) , h ¯ I CN ( 0 , I ) , h ^ I CN ( 0 , I ) , and H ¯ I CN ( 0 , I ) , respectively. In the simulation results, we will compare the following optimization design schemes: the proposed algorithm, the MSCM scheme with fixed ρ k = 0.5 , the non-AN MSCM scheme which is obtained by setting z = 0 , the null-AN MSCM scheme which means the AN vector lie in the null space of the HP-SNs.
In Figure 3, we illustrate the convergence performance of the proposed SCA-SPCA-based iterative algorithm with respect to (w.r.t.) iteration numbers. We set R ¯ c = 1 bps/Hz, E ¯ c = 10 dBm, E ¯ e = 10 dBm, P = 60 dBm and P 1 = 40 dBm. It is easily seen from Figure 3 that the convergence of all cases can be quickly achieved within three iterations. It is observed that the average minimal secrecy capacity (MSC) at the M-SN becomes great as P 2 increases.
Figure 4 illustrates the average MSC at the M-SN in terms of different target transmit power at macrocell sink node with R ¯ c = 1.5 bps/Hz, E ¯ c = 5 dBm, E ¯ e = 5 dBm, P = 60 dBm and P 1 = 40 dBm over 500 feasible channel realizations. It is observed that the average MSC increases with the target transmit power at macrocell sink node. In addition, the proposed SCA-SPCA-based algorithm outperforms all the conventional baseline schemes. Moreover, we can check that the proposed SCA-SPCA-based algorithm performs better than the non-AN MSCM, null- AN MSCM and the MSCM scheme with ρ k = 0.5 , and the performance gap is always gradually increasing regardless of the target transmit power at macrocell sink node. This reveals that optimizing the PS ratio ρ k is important.
In Figure 5, we compare the average MSC at the M-SN w.r.t. the different target-harvested power at HP-SN by fixing R ¯ c = 1 bps/Hz, E ¯ e = 10 dBm, P = 70 dBm, P 1 = 50 dBm and P 2 = 60 dBm. In this figure, we can observe that all schemes decrease with the increase of E ¯ c . Moreover, the proposed SCA-SPCA-based algorithm always perform better in average MSC than all three conventional baseline schemes. Compared with the non-AN MSCM and the MSCM scheme with ρ k = 0.5 , the averageMSC of the proposed AN-aidedalgorithm is 1.2 bps/Hz and 0.8 bps/Hz higher at 0 dBm. It is observed that the proposed algorithm outperforms the null-AN MSCM.
In Figure 6, we plot the average MSC at the M-SN in terms of different number of transmit antennas at the macrocell sink node with R ¯ c = 0.5 bps/Hz, E ¯ c = 5 dBm, E ¯ e = 10 dBm, P = 60 dBm, P 1 = 40 dBm and P 2 = 60 dBm. We can check that the curves of the proposed SCA-SPCA-based algorithm and the MSCM scheme with fixed ρ k = 0.5 increase with the same slope. Moveover, when N M increases, the performance gap between the non-AN MSCM scheme and the proposed algorithm becomes wider. This indicates that the AN technology is essential in obtaining the performance gains. Furthermore, the proposed algorithm outperforms the null-AN MSCM scheme by 0.8 bps/Hz.
In Figure 7, in terms of the average central processing unit (CPU) running time, the computational complexities of the proposed method and the conventional one-dimensional line search (1-D) method are compared for a channel realization under various MF on a computer (The CPU is Intel Core i7-8500U 1.8GHz, and the size of random access memory (RAM) is 8 GB). In this simulation, we set R ¯ c = 1 bps/Hz, E ¯ c = 50 dBm, E ¯ e = 0 dBm, P = 80 dBm, P 1 = 40 dBm and P 2 = 60 dBm. We can see that our proposed algorithm has much lower complexity than the conventional 1-D method in [29].

5. Conclusions

Considering the security transmission with PS-enabled SWIPT approach, we have investigated the AN-based beamforming design problem in a two-tier MIMO HWSN where a femtocell is underlaying a macrocell. The jointly design problem of the transmit beamforming vectors, the AN and PS ratio has been modeled to maximize the MSC of the M-SNs subject to the secrecy capacity constraint, the harvested energy constraint and the transmit power constraint. To reduce the performance loss from the rank relaxation, an novel SCA-SPCA-based iterative algorithm has been proposed and its convergence property is proved. Numerical results have demonstrated that the proposed SCA-SPCA-based algorithm always outperforms the conventional non-AN, null-AN and “fixed PS ratio” schemes. As a future work, the proposed algorithm can be extended to a multi femtocell scenario in a macrocell. In that case, interference between femtocells needs to be considered. In addition, the dependency of non-linear power-splitting EH model and EH efficiency on the received user characteristic can be an extension of this work.

Author Contributions

Conceptualization, Z.Z. and W.H.; Methodology, W.G., Z.Z. and Z.C.; Software, W.G., Z.Z. and Y.W.; Formal analysis, W.G., Z.Z. and Z.C.; Supervision, Z.W.; Writing–original draft preparation, Z.Z. and W.G.; Writing–review and editing, Z.Z. and W.G.; Visualization Q.W. and W.G.

Funding

This work was supported in part by the National Nature Science Foundation of China under grants 61801434, 61571402, 61771431 and 61801435, in part by the Project funded by China Postdoctoral Science Foundation under Grant 2018M642784, in part by the Scientific and Technological Key Project of Henan Province under Grant 192102310178, 192102210246, in part by the National Science and Technology Major Project under grant 2017ZX03001001. This work of Q. Wu was supported in part by the National Natural Science Foundation of China under Grant No. 61701197, the Project funded by China Postdoctoral Science Foundation under Grant No. 2018M641354, 2018M633733, the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University, under Grant No. 2018D15. This work of Z. Chu was supported in part by the Open Fund of the Shaanxi Key Laboratory of Information Communication Network and Security under Grant ICNS201801.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
HWSNheterogeneous wireless sensor networks
SWIPTsimultaneous wireless information and power transfer
ANartificial noise
SCAsuccessive convex approximation
SPCAsequential parametric convex approximation
SOCPsecond order cone programming
IoTInternet-of-Things
WSNwireless sensor network
MBSmacrocell base station
FBSfemtocell base station
SNsensor node
HP-SNhigh-priority sensor node
LP-SNlow-priority sensor node
M-SNmacrocell sensor node
HetNetheterogeneous networks
WPTwireless power transmission
WITwireless information transmission
MISOmultiple-input single-output
MIMOmultiple-input multiple
CoMPcoordinated multi-point
CSIchannel state imformation
PLSphysical-layer security
PSpower splitting
MSCminimal secrecy capacity
MSCMMSC maximization
AWGNadditive white Gaussian noise)
IDimformation decoding
EHenergy harvesting
QoLquadratic-over-linear

Appendix A

Proof of Lemma 1.
Let a = rank ( A ) . The case of a 0 is trivial. For a 1 , let λ 1 λ 2 λ a > 0 denote the nonzero eigenvalues of A . It follows
| I + A | = i = 1 a ( 1 + λ i ) = 1 + i = 1 a λ i + i k a λ i λ k + 1 + i = 1 a λ i = 1 + tr ( A )
and it can be seen that the inequality above holds if and only if a = 1 . □

Appendix B

Proof of Theorem 1.
Since problem (31) is convex, the optimal solution Ω ( n ) is obtained by solving (31) for a given Ω ( n 1 ) . Due to the solution Ω ( n 1 ) obtained in the n-th iteration, Ω ( n ) can be updated in the ( n + 1 ) -th iteration. Based on (28) and (29), we can obtain the following inequalities in the ( n + 1 ) -th iteration.
j = 1 K w j H H c , k w j + z H H c , k z + m = 1 M v m H G c , k v m j = 1 K w ˜ j * H H c , k w ˜ j + 2 { w ˜ j * H H c , k Δ w j } + z ˜ * H H c , k z ˜ + 2 { z ˜ * H H c , k Δ z } + m = 1 M ( v ˜ m * H G c , k v ˜ m + 2 { v ˜ m * H G c , k Δ v m } ) E ¯ c η k ( 1 ρ k ) σ a , k 2 , k ,
j = 1 K w j H H ¯ e , l w j + z H H ¯ e , l z + m = 1 M ( v m H G ¯ e , l v m ) j = 1 K w ˜ j * H H ¯ e , l w ˜ j + 2 { w ˜ j * H H ¯ l Δ w j } + z ˜ * H H ¯ e , l z ˜ + 2 { z ˜ * H H ¯ e , l Δ z } + m = 1 M ( v ˜ m * H G ¯ e , l v ˜ m + 2 { v ˜ m * H G ¯ e , l Δ v m } ) E ¯ e η l N E σ e , l 2 , l ,
which are conservative convex approximations with w j = w ˜ j * + Δ w j , z = z ˜ * + Δ z and v m = v ˜ m * + Δ v m .
According to the linear approximations employed in (A1) and (A2), the rule for updating in Algorithm 1 ensures that { w j * } , { z * } and { v m * } has always been feasible to problem (31) at the ( q + 1 ) -th iteration. Thus, we immediately have f n + 1 * ( γ c ( n + 1 ) , γ e ( n + 1 ) ) f n * ( γ c ( n ) , γ e ( n ) ) . In other words, this behaviour of Ω ( n ) reveals that the proposed algorithm has always a monotonically non-decreasing sequence of the objective values. On account of the transmit power constraint at the macrocell sink node and femtocell sink node, problem (31) has an upper bound on the MSC. Therefore, the proposed algorithm can be guaranteed to converge to some optimum solution, i.e., Δ w j = 0 , Δ z = 0 , Δ v m = 0 , and f n + 1 * ( γ c ( n + 1 ) , γ e ( n + 1 ) ) = f n * ( γ c ( n ) , γ e ( n ) ) . □

References

  1. Wang, S.; Wan, J.; Zhang, D.; Li, D.; Zhang, C. Towards smart factory for industry 4.0: A self-organized multi-agent system with big data based feedback and coordination. Comput. Netw. 2016, 101, 158–168. [Google Scholar] [CrossRef]
  2. Williams, J.M.; Khanna, R.; Ruiz-Rosero, J.P.; Pisharody, G.; Qian, Y.; Carlson, C.R.; Liu, H.; Ramirez-Gonzalez, G. Weaving the wireless Web: Toward a low-power, dense wireless sensor network for the industrial IoT. IEEE Microw. Mag. 2017, 18, 40–63. [Google Scholar] [CrossRef]
  3. Khan, I.; Belqasmi, F.; Glitho, R.; Crespi, N.; Morrow, M.; Polakos, P. Wireless sensor network virtualization: A survey. IEEE Commun. Surv. Tutor. 2015, 18, 553–576. [Google Scholar] [CrossRef]
  4. Liu, H.-H.; Su, J.-J.; Chou, C.-F. On energy-effcient straight-line routing protocol for wireless sensor networks. IEEE Syst. J. 2017, 11, 2374–2382. [Google Scholar] [CrossRef]
  5. Chincoli, M.; Liotta, A. Self-learning power control in wireless sensor networks. Sensors 2018, 18, 375. [Google Scholar] [CrossRef]
  6. Wang, C.X.; Haider, F.; Gao, X.; You, X.-H.; Yang, Y.; Yuan, D.; Aggoune, H.M.; Haas, H.; Fletcher, S.; Hepsaydir, E. Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 2014, 52, 122–130. [Google Scholar] [CrossRef] [Green Version]
  7. Xiong, K.; Zhang, Y.; Fan, P.; Yang, H. Evaluation framework for user experience in 5G systems: On systematic rateless-coded transmissions. IEEE Access 2016, 4, 9108–9118. [Google Scholar] [CrossRef]
  8. Damnjanovic, A.; Montojo, J.; Wei, Y.; Ji, T.; Luo, T.; Vajapeyam, M.; Yoo, T.; Song, O.; Malladi, D. A survey on 3GPP heterogeneous networks. IEEE Wirel. Commun. 2011, 18, 10–21. [Google Scholar] [CrossRef]
  9. Dhillon, H.S.; Ganti, R.K.; Baccelli, F.; Andrews, J.G. Modeling and analysis of K-tier downlink heterogeneous cellular networks. IEEE J. Sel. Areas Commun. 2012, 30, 550–560. [Google Scholar] [CrossRef]
  10. Lopez-Perez, D.; Guvenc, I.; de la Roche, G.; Kountouris, M.; Quek, T.Q.S.; Zhang, J. Enhanced intercell interference coordination challenges in heterogeneous networks. IEEE Wirel. Commun. 2011, 18, 22–30. [Google Scholar] [CrossRef] [Green Version]
  11. Bi, S.; Ho, C.K.; Zhang, R. Wireless powered communication: Opportunities and challenges. IEEE Commun. Mag. 2015, 53, 117–125. [Google Scholar] [CrossRef]
  12. Xiong, K.; Fan, P.; Zhang, C.; Letaief, K.B. Wireless information and energy transfer for two-hop non-regenerative MIMO-OFDM relay networks. IEEE J. Sel. Areas Commun. 2015, 33, 1595–1611. [Google Scholar] [CrossRef]
  13. Xiong, K.; Chen, C.; Qu, G.; Fan, P.; Letaief, K.B. Group cooperation with optimal resource allocation in wireless powered communication networks. IEEE Trans. Wirel. Commun. 2017, 16, 3840–3853. [Google Scholar] [CrossRef]
  14. Zhang, R.; Ho, C. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef]
  15. Xiong, K.; Wang, B.; Liu, K.J.R. Rate-energy region of SWIPT for MIMO broadcasting under nonlinear energy harvesting model. IEEE Trans. Wirel. Commun. 2017, 16, 5147–5161. [Google Scholar] [CrossRef]
  16. Erol-Kantarci, M.; Mouftah, H.T. Radio-frequency-based wireless energy transfer in LTE-A heterogenous networks. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Funchal, Portugal, 23–26 June 2014; pp. 1–6. [Google Scholar]
  17. Tang, J.; Shojaeifard, A.; So, D.K.C.; Wong, K.; Zhao, N. Energy efficiency optimization for CoMP-SWIPT heterogeneous networks. IEEE Trans. Commun. 2018, 66, 6368–6383. [Google Scholar] [CrossRef]
  18. Jiang, R.; Xiong, K.; Fan, P.; Zhang, Y.; Zhong, Z. Optimal design of SWIPT systems with multiple heterogeneous users under non-linear energy harvesting model. IEEE Access 2017, 5, 11479–11489. [Google Scholar] [CrossRef]
  19. Chen, X.; Ng, D.W.K.; Chen, H. Secrecy wireless information and power transfer: Challenges and opportunities. IEEE Wirel. Commun. 2016, 23, 54–61. [Google Scholar] [CrossRef]
  20. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef]
  21. Shiu, Y.; Chang, S.Y.; Wu, H.; Huang, S.C.; Chen, H. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [Google Scholar] [CrossRef]
  22. Liu, L.; Zhang, R.; Chua, K.C. Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans. Signal Process. 2014, 62, 1850–1863. [Google Scholar] [CrossRef]
  23. Zhu, Z.; Chu, Z.; Wang, Z.; Lee, I. Outage constrained robust beamforming for secure broadcasting systems with energy harvesting. IEEE Trans. Wirel. Commun. 2016, 15, 7610–7620. [Google Scholar] [CrossRef]
  24. Zhu, Z.; Chu, Z.; Wang, N.; Huang, S.; Wang, Z.; Lee, I. Beamforming and power splitting designs for AN-aided secure multi-user MIMO SWIPT systems. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2861–2874. [Google Scholar] [CrossRef]
  25. Lu, Y.; Xiong, K.; Fan, P.; Ding, Z.; Zhong, Z.; Letaief, K.B. Global energy efficiency in secure MISO SWIPT systems with non-linear power-splitting EH model. IEEE J. Sel. Areas Commun. 2019, 37, 216–232. [Google Scholar] [CrossRef]
  26. Ng, D.W.K.; Lo, E.S.; Schober, R. Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wirel. Commun. 2014, 13, 4599–4615. [Google Scholar] [CrossRef]
  27. Lu, Y.; Xiong, K.; Fan, P.; Zhong, Z.; Letaief, K.B. Robust transmit beamforming with artificial redundant signals for secure SWIPT system under non-linear EH model. IEEE Trans. Wirel. Commun. 2018, 17, 2218–2232. [Google Scholar] [CrossRef]
  28. Li, B.; Fei, Z.; Chu, Z. Optimal transmit beamforming for secure SWIPT in a Two-Tier HetNet. IEEE Commun. Lett. 2017, 21, 2476–2479. [Google Scholar] [CrossRef]
  29. Ren, Y.; Lv, T.; Gao, H.; Li, Y. Secure wireless information and power transfer in heterogeneous networks. IEEE Access 2017, 5, 4967–4979. [Google Scholar] [CrossRef]
  30. Guo, S.; Wang, F.; Yang, Y.; Xiao, B. Energy-efficient cooperative Tfor simultaneous wireless information and power transfer in clustered wireless sensor networks. IEEE Trans. Commun. 2015, 63, 4405–4417. [Google Scholar] [CrossRef]
  31. Guo, S.; Shi, Y.; Yang, Y.; Xiao, B. Energy efficiency maximization in mobile wireless energy harvesting sensor networks. IEEE Trans. Mob. Comput. 2018, 17, 1524–1537. [Google Scholar] [CrossRef]
  32. Pan, G.; Lei, H.; Yuan, Y.; Ding, Z. Performance analysis and optimization for SWIPT wireless sensor networks. IEEE Trans. Commun. 2017, 65, 2291–2302. [Google Scholar] [CrossRef]
  33. Liu, G.; Sun, Z.; Jiang, T. Joint time and energy allocation for QoS-aware throughput maximization in MIMO-based wireless powered underground sensor networks. IEEE Trans. Commun. 2019, 67, 1400–1412. [Google Scholar] [CrossRef]
  34. Ha, D.B.; So-In, C.; Tran, H.; Nguyen, T.G.; Baig, Z.A.; Sanguanpong, S. Performance analysis of DF/AF cooperative MISO wireless sensor networks with NOMA and SWIPT over nakagami-m fading. IEEE Access 2018, 6, 56142–56161. [Google Scholar]
  35. Hu, X.; Huang, K.; Chen, Y.; Xu, X.; Liang, X. Secrecy analysis of UL transmission for SWIPT in WSNs with densely clustered eavesdroppers. In Proceedings of the 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017. [Google Scholar]
  36. Chae, S.H.; Jeong, C.; Lim, S.H. Simultaneous wireless information and power transfer for Internet-of-Things sensor networks. IEEE Internet Things J. 2018, 5, 2829–2843. [Google Scholar] [CrossRef]
  37. Yi, B.; Xiang, M.; Yao, W.; Qiu, K.; Huang, T.; Xie, Q. Simultaneous wireless information and power transfer in wireless sensor networks with fountain codes. In Proceedings of the IEEE International Conference on Internet-of-Things (iThings), Devon, UK, 21–23 June 2017; pp. 516–521. [Google Scholar]
  38. Luo, Z.-Q.; Ma, W.-K.; So, A.-C.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Trans. Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  39. Lobo, M.S.; Vandenberghe, L.; Boyd, S.; Lebret, H. Applications of Second Order Cone Programming. Linear Algebra Appl. 1998, 284, 193–228. [Google Scholar] [CrossRef]
  40. Ding, Z.; Zhong, C.; Ng, D.W.; Peng, M.; Suraweera, H.A.; Schober, R.; Poor, H.V. Application of smart antenna technologies in simultaneous wireless information and power transfer. IEEE Commun. Mag. 2015, 53, 86–93. [Google Scholar] [CrossRef] [Green Version]
  41. Beck, A.; Ben-Tal, A.; Tetruashvili, L. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems. J. Glob. Optim. 2010, 47, 29–51. [Google Scholar] [CrossRef]
  42. Li, Q.; Ma, W. Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming. IEEE Trans. Signal Process. 2011, 59, 3799–3812. [Google Scholar] [CrossRef]
  43. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  44. Chu, Z.; Cumanan, K.; Ding, Z.; Johnston, M.; le Goff, S. Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 2015, 64, 1833–1847. [Google Scholar] [CrossRef]
  45. Vishwanathan, A.S.; Smola, A.J.; Vishwanathan, S.V.N. Kernel methods for missing variables. In Proceedings of the 10th International Workshop on Artificial Intelligence and Statistics, Bridgetown, Barbados, 6–8 January 2005; pp. 325–332. [Google Scholar]
  46. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming. 2012. Available online: http://cvxr.com/cvx (accessed on 8 August 2018).
Figure 1. The system model of MIMO Secured HWSN with SWIPT.
Figure 1. The system model of MIMO Secured HWSN with SWIPT.
Electronics 08 00459 g001
Figure 2. Power splitting scheme in each HP-SN.
Figure 2. Power splitting scheme in each HP-SN.
Electronics 08 00459 g002
Figure 3. Average MSC at the M-SN with respect to iteration number.
Figure 3. Average MSC at the M-SN with respect to iteration number.
Electronics 08 00459 g003
Figure 4. Average MSC at the M-SN with respect to the total transmit power at macrocell sink node.
Figure 4. Average MSC at the M-SN with respect to the total transmit power at macrocell sink node.
Electronics 08 00459 g004
Figure 5. Average MSC at the M-SN with respect to the target harvested power at HP-SN.
Figure 5. Average MSC at the M-SN with respect to the target harvested power at HP-SN.
Electronics 08 00459 g005
Figure 6. Average MSC at the M-SN with respect to the number of transmit antennas at the macrocell sink node.
Figure 6. Average MSC at the M-SN with respect to the number of transmit antennas at the macrocell sink node.
Electronics 08 00459 g006
Figure 7. Average CPU time with respect to the number of transmit antennas at the macrocell sink node.
Figure 7. Average CPU time with respect to the number of transmit antennas at the macrocell sink node.
Electronics 08 00459 g007
Table 1. System Parameters.
Table 1. System Parameters.
VariablesDefinition
M-SN m the m-th M-SN
HP-SN k the k-th HP-SN
LP-SN l the l-th LP-SN
s m the transmit signal from macrocell sink node to M-SN m
x s the transmit signal from femtocell sink node
v m the transmit beamforming vector from macrocell sink node aiming at M-SN m
w k the transmit beamforming vector from femtocell sink node aiming at HP-SN k
s p , m , s s , k the information-bearing signal intended for M-SN m and HP-SN k
z the energy-carrying AN
g m the channel between macrocell sink node and M-SN m
g c , k the channel between macrocell sink node and HP-SN k
G e , l the channel between macrocell sink node and LP-SN l
h m the channel between femtocell sink node and M-SN m
h c , k the channel between femtocell sink node and HP-SN k
H e , l the channel between femtocell sink node and LP-SN l
n m , n c , k , n e , l the complex Gaussian noise at the M-SN m , the HP-SN k and the LP-SN l
n a , k the additional noise introduced from the RF-to-signal conversion in the ID part at the HP-SN k
Table 2. System Simulation Parameters.
Table 2. System Simulation Parameters.
Number of M-SN, M3
Number of HP-SN, K2
Number of LP-SN, L2
Number of LP-SN antenna, N E 2
Number of transmit antenna at macrocell sink node, N M 4
Number of transmit antenna at femtocell sink node, N F 16
Distance between the macrocell sink node and the M-SN, g m 10 m
Distance between the macrocell sink node and the HP-SN, g c , k 5 m
Distance between the macrocell sink node and the LP-SN, g e , l 3 m
Distance between the femtocell sink node and the M-SN, h m 6 m
Distance between the femtocell sink node and the HP-SN, h c , k 5 m
Distance between the femtocell sink node and the LP-SN, h e , l 2 m
Speed of light, c 3 × 10 8 m s 1
Carrier frequency, f c 900 MHz
Path loss exponent, κ 2.7
Gaussian noise power at all the M-SN, σ m 2 90 dBm
Gaussian noise power at all the HP-SN, σ c , k 2 50 dBm
Gaussian noise power of all the LP-SNs, σ e , l 2 90 dBm
Additional noise power of all the HP-SNs, δ p , k 2 90 dBm
Energy conversion efficiency at all the HP-SN and LP-SN, η c , k = η e , l 0.3

Share and Cite

MDPI and ACS Style

Ge, W.; Zhu, Z.; Hao, W.; Wang, Y.; Wang, Z.; Wu, Q.; Chu, Z. AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks. Electronics 2019, 8, 459. https://doi.org/10.3390/electronics8040459

AMA Style

Ge W, Zhu Z, Hao W, Wang Y, Wang Z, Wu Q, Chu Z. AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks. Electronics. 2019; 8(4):459. https://doi.org/10.3390/electronics8040459

Chicago/Turabian Style

Ge, Weili, Zhengyu Zhu, Wanming Hao, Yi Wang, Zhongyong Wang, Qiong Wu, and Zheng Chu. 2019. "AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks" Electronics 8, no. 4: 459. https://doi.org/10.3390/electronics8040459

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop