Conference PaperPDF Available

Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks

Authors:
Secure Transmission Solutions in Energy Harvesting
Enabled Cooperative Cognitive Radio Networks
Mi Xu, Tao Jing, Xin Fan, Yingkun Wen, Yan Huo
School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China
E-mail: {16120153, tjing, fanxin, 16111024, yhuo}@bjtu.edu.cn
Abstract—In this paper, we investigate secure communica-
tions in energy harvesting enabled cooperative cognitive radio
networks (CCRNs). In such CCRNs, a pair of primary users
(PUs) can only communicate with each other through a relay. To
protect data transmission between PUs, we propose a cooperative
jamming strategy with energy harvesting technology. In the first
phase, a PU as the source (PU-S) broadcasts signals, while
another PU as the destination (PU-D) sends artificial noise (AN)
and all secondary uses (SUs) harvest energy from the received
mixed signals. In the second phase, one SU selected as a relay
(SU-R) uses its harvested energy to forward PU’s signals, while
another SU selected as a jammer (SU-J) employs its harvested
energy to send AN. According to this, we formulate a non-convex
problem aiming to improve the secrecy rate of PUs and divide this
problem into three optimization subproblems. Finally we provide
a feasible joint solution by a two-tiered iterative algorithm.
Numerical results demonstrate the secrecy performance of our
proposed jamming strategy.
Index Terms—Energy harvesting; physical layer security; co-
operative cognitive radio networks; amplify-and-forward relay.
I. INTRODUCTION
A cooperative cognitive radio network (CCRN) is an ef-
ficient solution to utilize spectral resources [1]. In CCRNs,
secondary users (SUs) assist primary users (PUs) to guarantee
secure transmissions, in return, the SUs can be allowed to
opportunistically access to PUs’ spectrum for their own data
transmissions [2]. A new challenge about secure transmission
is arose: eavesdroppers scattered in CCRNs may wiretap and
decode legitimate primary signals due to the openness of
the wireless environment. To address this challenge, coop-
erative jamming is an emerging shielding strategy to pro-
tect signal transmission without compromising the existing
cryptographic-technique-based security protection [3], [4].
Yet, an SU in CCRNs may be considered as a low-end
device without enough energy, which is hard to achieve co-
operative communication. Accordingly, simultaneous wireless
information and power transfer (SWIPT) technology [5], [6]
can be utilized in this paradigm. In this case, SUs can be
powered from wireless signals transmitted by PUs so as to
forward signals of these PUs or send jamming signals. For
example, Gao suggests selecting a low-power SU as a relay to
maximize system throughput with the energy constraint and
the signal to interference plus noise ratio (SINR) requirement
in [7].
Yan Huo is the corresponding author.
Some studies introduce SWIPT into cooperative jamming
communication to improve system security [8]–[13]. The
authors in [8] exploit an energy harvesting enabled SU as a
jammer to protect transmissions between PUs and SUs. In [9],
Salem and Hamdi analyze the secrecy capacity of an amplify
and forward (AF) multi-antenna network with an energy
harvesting enabled relay. Then, Xing in [10] presents a feasible
secure transmission strategy in a cooperative wiretap channel
with the aid of a group of energy harvesting enabled helpers.
[11] provides the maximal secrecy rate with the assistance of
several energy harvesting enabled relays which are capable
of simultaneous interference. Furthermore, [12] discusses the
secrecy performance in the scenario of a energy harvesting
enabled relay, while [13] also develops a transmit antenna
selection scheme to analyze the secrecy outage performance.
The above-mentioned studies only consider applying energy
harvesting technology to either a relay or a jammer. Addi-
tionally, these studies focus on secure transmission during the
forward phase in relay networks. To the best of our knowledge,
secure transmission has never been studied for both relays
and jammers jointly in energy harvesting enabled CCRNs.
Motivated by this, we apply energy harvesting technology to a
relay and a jammer simultaneously, and develop a cooperative
jamming strategy to protect the whole transmission. In partic-
ular, our objective is to protect legitimate signals of PUs from
an eavesdropper with the aid of two energy harvesting enabled
SUs. There are three challenges in our work. (1) We assume
that there is no direct link between PUs due to deep fading.
Thus, one of SUs acts as a relay to help PUs to forward signals.
How does the relay find a balance between signal transmit and
energy harvesting? (2) In the presence of an eavesdropper,
how to design a complete secure strategy during the whole
transmission process? (3) How to solve the final non-convex
optimization problem?
Considering these challenges, we select an SU with SWIPT
as a relay to forward legitimate signals. In this case, the
selected SU can harvest energy from a part of the received
signals and achieve signal processing based on the rest part.
Then, we exploit a SWIPT-enabled cooperative SU as a jam-
mer to protect the whole transmission. Specifically, a primary
receiver may broadcast artificial noise (AN) to protect the first
phase of transmission and to transfer power to the relay and
the jammer. The jammer may interfere with eavesdroppers
using the harvesting energy in the second phase. The main
contributions of our work are summarized as follows.
We propose a cooperative jamming strategy that can
protect PUs’ transmission from eavesdropping.
We formulate the secrecy rate optimization problem in a
non-convex form for energy harvesting enabled CCRNs.
We put forward iterative algorithms to analyze the non-
convex optimization problem from three aspects and pro-
vide a feasible solution in the case of joint optimization.
The rest of the paper is organized as follows. Section II
presents the system model and preliminaries. The problem
formulation and the corresponding solutions based on iterative
algorithms are illustrated in Section III. In Section IV, we
conduct a series of simulation and discussion on our work.
Finally, Section V concludes the paper.
Notations:In this paper, we denote upper-case and lower-
case bold letters as matrices and vectors, respectively. (·)H
and ·represent conjugate transpose and square-root. |·|and
||·||stand for the absolute value and Euclidean norm of a
vector. E[·]is the statistical expectation of random variables.
II. SYSTEM MODEL AND PRELIMINARIES
A. Network Model
A CCRN with a relay, depicted as Fig. 1, is composed of a
pair of PUs and several SUs. One PU with a single antenna as a
source (PU-S) intends to send private signals to its destination
(PU-D). Due to deep fading of the direct link between PU-S
and PU-D, an SU with a single antenna is selected as a relay
(SU-R) to forward these signals by the AF mode.
PU-S
SU-R
E
SU-J
...
SJ
h
DJ
h
PU-D
(a) The first phase.
JD
h
JE
h
PU-S PU-D
SU-R
SU-J
...
E
(b) The second phase.
Fig. 1: Network model.
This network may suffer serious secure challenge during
data transmission due to the open wireless environment and
flexible SUs’ access. An eavesdropper (Eve) with a single
antenna may wiretap and decode legitimate signals. To achieve
secure transmission, PU-S may select another SU with N
antennas to send AN so as to interfere with the reception of
Eve. As a reward, the selected SU-R and SU-J are allowed to
use the PUs channel to transmit their own signals1.
Note that the time slot Tof entire transmission duration
is divided into two phases, as shown in Fig. 2. In the first
phase, PU-S transmits a private signal s1to SU-R and PU-
D broadcasts AN v1to prevent eavesdropping. SU-R may
employ a power splitting policy [14] to split the received signal
1In general, SUs with one or more antennas may also be wiretapped. Yet,
we only select multi-antenna SUs as jammers and study secrecy performance
of PUs in this paper. We will consider other scenarios in CCRNs in future.
PU-S transmits message
PU-D broadcasts AN1
SUs harvest energy
SU-R forwards message
PU-J broadcasts AN2
T
T/2 T/2
(a) Time slot structure.
Energy havester
Message receiver
SU-R
(b) Power splitting.
Fig. 2: Time slot allocation.
and AN into two streams. One stream is used to harvest energy
while the rest is to achieve AF. Nevertheless, SU-J can harvest
energy from both the received signal and AN. Next, using
the harvesting energy, SU-R can forward the received signal
to PU-D while SU-J can broadcast AN v2to achieve secure
transmission in the second phase. Here, we assume that all
channels (as shown in Table I) in both phases experience a
quasi-static Rayleigh block fading (i.e., these channels remain
constant within a time slot and obey independent complex
Gaussian distribution).
TABLE I: List of all channel state information
Variable Definition
hSE The channel gain from PU-S to Eve
hDE The channel gain from PU-D to Eve
hSR The channel gain from PU-S to SU-R
hDR The channel gain from PU-D to SU-R
hRD The channel gain from SU-R to PU-D
hRE The channel gain from SU-R to Eve
hSJ The channel vector from PU-S to SU-J
hDJ The channel vector from PU-D to SU-J
hJD The channel vector from SU-J to PU-D
hJE The channel vector from SU-J to Eve
B. Signal Transmission Model
Here, we provide mathematical expressions of signal trans-
mission in two phases. In the first phase, the received signals
at SU-R and Eve can be expressed as
y(1)
R=(1 β)hSRs1+(1 β)hDRv1+n(1)
R,(1)
and
y(1)
E=hSEs1+hDE v1+n(1)
E,(2)
where the first two terms of (1) represent the stream to forward
signals at SU-R. This stream is obtained from the received
signal and AN based on the power splitting ratio β[0,1].
n(1)
R,n
(1)
ECN 0
2is the additive white Gaussian noise
(AWGN) at SU-R and Eve. According to (2), the SINR at Eve
in the first phase is defined as below,
γ(1)
E=PS|hSE|2
PD|hDE|2+σ2,(3)
where PSE[s2
1]and PDE[v2
1]are the transmit power of
PU-S and PU-D, respectively.
In the second phase, we assume that SU-R forwards s2=
ρy(1)
Rand SU-J sends AN v2. Here, ρis an amplification factor
that can be defined as below,
ρ=PR
(1 β)PS|hSR|2+(1β)PD|hDR|2+σ2.(4)
Therefore, the received signal at PU-D is as follows,
y(2)
D=hRDρy(1)
R+hJDwv2+n(2)
D,(5)
where PRE[s2
s]and PJE[v2
2]represent the transmit
power of SU-R and SU-J, and we will explain in detail in
next subsection. wdenotes a beamforming vector of SU-J,
i.e., w2=1, and n(2)
DCN 0
2is AWGN at PU-D.
Since v1in y(1)
Ris AN transmitted by PU-D itself in the
first phase, we assume that PU-D can easily eliminate these
interference by self-interference cancellation technology. As a
result, (5) can be rewritten as follows,
y(2)
D=hRDρ(1 β)hSR s1+n(1)
R+hJDwv2+n(2)
D.(6)
In addition, the received signal at Eve is given by
y(2)
E=hREρy(1)
R+hJEwv2+n(2)
E,(7)
where n(2)
ECN 0
2is AWGN at Eve.
According to the received signals of the second phase in
(6) and (7), the corresponding SINR at PU-D and Eve can be
calculated by
γ(2)
D=ρ2(1 β)PS|hRD|2|hSR|2
ρ2|hRD|2σ2+PJ|hJDw|2+σ2,(8)
and
γ(2)
E=
ρ2(1 β)PS|hRE |2|hSR|2
ρ2(1 β)PD|hRE |2|hDR|2+ρ2|hRE |2σ2+PJ|hJEw|2+σ2,
(9)
where the sum of PSand PDsatisfies a system power
constraint, i.e., PS+PDP. Here, Pdenotes the achievable
maximum power of the whole system.
C. Energy Harvesting
According to the above statement, the energy harvested by
SU-R and SU-J in the first phase are given by
ER=ηβT
2(PS|hSR|2+PD|hDR|2),(10)
EJ=ηT
2(PS||hSJ||2+PD||hDJ ||2),(11)
where η[0,1] denotes energy harvesting efficiency. Since
this harvested energy is limited, all of it is used for transmis-
sion in the second phase, i.e., PR=ER
(T/2) and PJ=EJ
(T/2) .
III. PROBLEM FORMULATIONS AND SOLUTIONS
In this section, we first present an optimization problem
and formulate it to achieve secure transmission. For this non-
convex optimization problem, we then divide it into three
tractable subproblems. Finally, we propose a joint optimization
algorithm to find a feasible joint solution.
A. Problem formulation
Under the constraints of energy and power splitting ratio,
our optimization problem aims to maximize the secrecy rate.
The secrecy rate is defined as the difference between the
channel rate of main channel and eavesdropping channel [15],
which can be expressed as
RS=[RDRE]+,(12)
where [x]+=max{0,x}.RD=1
2log2(1 + γ(2)
D)and RE=
1
2log2(1+γ(1)
E+γ(2)
E)are the channel rate of the main channel
and the eavesdropping channel, respectively. Accordingly, the
optimization problem can be formulated as
(P1) max
w,β,PS,PD
RS
s.t.P
S+PDP
0β1
||w|| =1.
(13)
Since the objective function is non-convex, problem (P1)
is non-convex over PS,PD,βand/or w. We divide problem
(P1) into three tractable sub-problems: (P1.1),(P1.2) and
(P1.3) and to analyze their partial solutions.
Firstly, by fixing PS,PDand β, we can optimize the
beamforming vector wby solving
(P1.1) max
wRS
s.t.||w|| =1.(14)
Secondly, by fixing PS,PDand w, we can get the optimal
power splitting ratio βby solving
(P1.2) max
βRS
s.t.0β1.
(15)
Thirdly, by fixing βand w, (P1) can become a power
allocation optimization problem as below
(P1.3) max
PS,PD
RS
s.t.P
S+PDP.
(16)
B. Problem analysis and proposed solutions
1) The solution of (P1.1): To maximize secrecy rate in
(P1.1), we can apply zero-forcing (ZF) beam-forming tech-
nique [16] to obtain the optimal w. Thus, the AN sent by SU-J
may not interfere with PU-D. The ZF beam-forming vector w
can be obtained by solving optimization problem (P1.1).
(P1.1)max
w|hJEw|2
s.t.hJDw=0
||w|| =1.
(17)
The solution to (P1.1)is given by lemma 1 as follows.
Lemma 1. The optimal wfor problem (P1.1)can be ex-
pressed as follows
w=(IhH
JDhJD
||hJD||2)hH
JE
||(IhH
JDhJD
||hJD||2)hH
JE||
.(18)
Proof: Please see Appendix A.
2) The solution of (P1.2): Since hJDw=0, we can rewrite
the SINR of PU-D as
γ(2)
D=ηβ(1 β)PS|hRD |2|hSR|2
ηβ|hRD |2σ2+(1β)σ2+σ4
PS|hSR|2+PD|hDR|2
.(19)
By fixing PS=¯
PS,P
D=¯
PD,(P1.2) can be transformed
into (P1.2)as follows
(P1.2)max
β{f1(β)f2(β)}
s.t.0β1,
(20)
where
f1(β)=1
2[log2(2+ +C)+log
2(2+ +H)],
f2(β)=1
2[log2( +C)+log
2(2+ +e)],
A=η¯
PS|hRD|2|hSR|2,
B=η|hRD|2σ2σ2,
C=σ2+σ4
¯
PS|hSR|2+¯
PD|hDR|2,
D=1+ ¯
PS|hSE|2
¯
PD|hDE|2+σ2
,
E=η¯
PS|hRE|2|hSR|2,
F=η¯
PS|hRE|2|hDR|2,
G=η|hRD|2σ2PJ|hJE w|2σ2,
H=PJ|hJEw|2+σ2+PJ|hJEw|2σ2+σ4
¯
PS|hSR|2+¯
PD|hDR|2,
a=A+B, b =F+G, c =DF +E,
d=DF +DG +E, e =DH.
Here, (P1.2)is still a non-convex problem due to the
logarithmic objective function. Consequently, we apply the
difference of two convex functions (D.C.) approximation pro-
gramming [17] to convert it into a convex one.
Specifically, assuming that ˜
βis a feasible solution of (20),
we replace f2(β)approximately with its first-order Taylor
series expansion at the feasible solution f2(˜
β), i.e., (20) can
be rewritten as
(P1.2)max
β{f1(β)f2(˜
β)(β˜
β)f2(˜
β)}
s.t.0β1,
(21)
where f2(˜
β)is a gradient of f2(β)at ˜
β, which is given by
f2(˜
β)=1+ ˜
β
2ln2 B
˜
βB +C+2c˜
β+d
c˜
β2+d˜
β+e.(22)
As a result, (P1.2)is a convex programming problem. It
can be solved by some optimization packages (such as CVX
[18]). We can obtain the optimal βby iterating over problem
(P1.2), which is summarized by Algorithm 1.
Algorithm 1 An iterative algorithm for optimal β
Initialization:
Set ˜
βas the value which is feasible to problem (P1.2);
Iteration:
Repeat: set i=i+1
1: Solve (P1.2)with ˜
βand obtain the optimal values β;
2: Update ˜
β=β;
Until: Satisfy the given convergence threshold or reach
the maximum iteration number.
3) The solution of (P1.3): Assuming the optimal value
obtained in III-B2 is β, we can fix β=βto solve
(P1.3). Here, we employ simulated annealing (SA) algorithm
to obtain optimal PSand PD. The specific steps are illustrated
in Algorithm 2. As proved in [19], the convergence of SA
algorithm can be guaranteed.
Algorithm 2 The SA algorithm of (P1.3)
Initialization:
Set initial value P(0)
S,P(0)
D,m=0,t =t0;
Set the cooling ratio μ,0<μ<1;
Iteration:
1: for i=1:imax do
2: Calculate R(i1)
S(P(i1)
S,P(i1)
D);
3: Generate (P(i)
S,P(i)
D)based on (P(i1)
S,P(i1)
D)and
then calculate R(i)
S;
4: Compute ΔRS=R(i)
SR(i1)
S;
5: if ΔRS<0then
6: (P(i1)
S,P(i1)
D)=(P(i)
S,P(i)
D)with exp(ΔRS
t);
7: m=m+1;
8: else
9: (P(i1)
S,P(i1)
D)=(P(i)
S,P(i)
D);
10: m=0;
11: end if
12: if m>m
max then
13: Update (P(i1)
S,P(i1)
D)=(P(i)
S,P(i)
D);
14: stop
15: end if
16: Set t=μt;
17: if ttmin then
18: break
19: end if
20: end for
21: return (P(i1)
S,P(i1)
D).
4) The algorithm of (P1): The above three sub-problems
have discussed problem (P1) from different aspects. Next, we
propose an outer iterative algorithm to provide a feasible joint
solution of (P1). The specific steps of the iterative algorithm
are shown in Algorithm 3, where εis convergence precision
and imax represents the maximum iteration number. Since the
iteration process can ensure that the secrecy rate is monotoni-
cally increasing (or at least nondecreasing), Algorithm 3 will
converge to a feasible solution.
S
D
E
R
J
m
m
0246
4
8
6
2
8
Fig. 3: Nodes distribution.
15 20 25 30 35
P(dBm)
0
1
2
3
4
5
Secrecy rate (bps/Hz)
proposed algorithm(with SU-J)
proposed algorithm(without SU-J)
random algorithm(with SU-J)
Fig. 4: Secrecy rate v.s. transmit power.
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0.5
1
1.5
2
2.5
3
3.5
4
Secrecy rate (bps/Hz)
proposed algorithm(with SU-J)
proposed algorithm(without SU-J)
random algorithm(with SU-J)
Fig. 5: Secrecy rate v.s. η.
12345678910
The number of iterationV
0
1
2
3
4
5
6
7
8
9
10
Computational Time (s)
Without SU-J
With SU-J
Fig. 6: Computational time analysis.
Algorithm 3 An outer iterative algorithm of (P1)
Initialization:
Set P(0)
S=P
2;P(0)
D=P
2;i=0;
Solve (P1.1) to obtain optimal wand R(0)
S;
Iteration:
Repeat: set i=i+1
1: Fix w=w,¯
PD=P(i1)
D, update β(i)by Algorithm 1;
2: Fix w=w,¯
β=β(i), update P(i)
Dby Algorithm 2;
3: Update R(i)
S;
Until: 0R(i)
SR(i1)
Sεor iimax.
IV. NUMERICAL RESULTS AND ANALYSIS
In this section, numerical results are presented to evaluate
the secrecy performance of our algorithms in a typical CCRN.
This network consists of a pair of PUs, two energy harvest-
ing enabled SUs, and an eavesdropper. All those nodes are
distributed as shown in Fig. 3, where signals of PU-S can be
received within a circle with the radius 6m. For simplicity,
unless otherwise noted, the simulation parameters are set as
follows. The maximum transmit power and noise variance of
the system are P=25dBm and σ2=50 dBm, respectively.
The number of antennas for the jammer is defined as N=6.
The energy harvesting efficiency ηis 0.8. In addition, all
channels follow the identically distributed complex Gaussian
distribution with zero mean and variance of d(α), where dis
the Euclidean distance between two nodes, and αrepresents
the path loss factor that is set to be 3.
A. The effect of different parameters on secrecy rate.
We study the impact of different parameters on the secrecy
rate based on two benchmark schemes. First, we still apply
our proposed algorithm, but remove the jammer (as the model
of [9]), i.e., SU-J dose not send jamming signals in the second
phase. Second, we remain SU-J, but select βand PS(PD=
PPS)randomly, i.e., not to optimize these parameters. We
call two benchmark schemes as proposed algorithm (without
SU-J) and random algorithm (with SU-J), respectively.
Clearly, by increasing the maximum transmit power P, the
secrecy rate of the three algorithms increases gradually as
shown in Fig. 4. It also can be notably seen that the proposed
algorithm (with SU-J) outperforms the other two algorithms.
Then, we investigate the impact of energy harvesting coeffi-
cient ηon the secrecy rate of the three algorithms in Fig. 5. The
secrecy rate of three algorithms grows with the growth of η.
Similarly, it can also be observed that our proposed algorithm
(with SU-J) is better than others. In addition, we present the
computational time2of Algorithm 13in Fig. 6. It shows that
the security performance is improved at the expense of a little
computational time.
Numerical results demonstrate that our proposed algorithm
(with SU-J) can not only achieve a certain non-zero secrecy
rate, but also have a better performance.
B. Convergence of the proposed algorithms
In this subsection, the convergence of three algorithms is
verified by numerical results in Fig. 7. Specifically, Fig. 7(a)
and Fig. 7(b) depict the convergence of Algorithm 1 and
Algorithm 2, respectively. The secrecy rate is monotonically
increasing at each iteration, and there is an upper bound
because of the power constraint. Besides, the secrecy rate
increases when increasing the maximum transmit power. Note
that we set PS=PD=P
2in Fig. 7(a).
Fig. 7(d) illustrates the convergence of Algorithm 3. In this
figure, it can be seen that Algorithm 3 converges after one
iteration. This phenomenon can be explained from the fact that
βin Algorithm 3 always converges to a same value (as shown
in Fig. 7(c)), regardless of how Pchanges.
V. C ONCLUSION AND FUTURE WORK
In this paper, we study secure transmission in CCRNs where
energy harvesting enabled SUs (may be selected as a relay or
jammer) can assist PUs to improve the secrecy rate. For a
two-phase transmission, we propose a cooperative jamming
strategy that PU-D and SU-J send AN to jam Eve in the
first phase and the second phase, respectively. Further, upon
this jamming strategy, we propose a optimization problem
aiming to improve the secrecy rate of PUs. Considering the
non-convexity of the optimization problem, we first divide it
into three tractable sub-problems and then get a feasible joint
2The results are simulated on a computer with Intel(R) Core(TM) i5-6600
CPU@3.30GHz processor and 16GB RAM.
3Since the computational time of Algorithm 2 is very short, we only
analyze the computational time of Algorithm 1. In addition, we only give
the computational time of 10 iterations, due to the fact that Algorithm 1
converges after 10 iterations as shown in Fig. 7.
0102030
The number of iterations
0.5
1
1.5
2
2.5
3
3.5
Secrecy rate (bps/Hz)
P=20dBm
P=25dBm
P=30dBm
(a) Convergence of algorithm 1.
0 40 80 120 160 200
The number of iterations
1.5
2
2.5
3
3.5
4
4.5
Secrecy rate (bps/Hz)
P=20dBm
P=25dBm
P=30dBm
(b) Convergence of algorithm 2.
0 5 10 15 20 25 30
The number of iterations
0.3
0.4
0.5
0.6
0.7
0.8
P=20dBm
P=25dBm
P=30dBm
(c) Convergence of βin algorithm 1.
123456
The number of iterations
0
1
2
3
4
5
Secrecy rate (bps/Hz)
P=20dBm
P=25dBm
P=30dBm
(d) Convergence of algorithm 3.
Fig. 7: Convergence of proposed algorithms.
solution by a two-tiered iterative algorithm. Finally, numerical
results demonstrate the effectiveness of our proposed jamming
strategy. In future work, we will consider secure transmission
in more practical CCRNs with imperfect CSI.
APPENDIX A. PROOF O F LEMMA 1
To guarantee hJDw=0,wis defined as w=Hu, where
||u|| =1.HCN×Nis the null space of hJD which can be
expressed as
H=IhH
JDhJD
||hJD||2.(23)
Here, HH=Hand HH =H. Thus, (P1.1) can be converted
into following form
max
u|hJEHu|2.(24)
To achieve the same direction between uand (hJEH)H,u
should obey the following form
u=(hJEH)H
||(hJEH)H|| =HHhH
JE
||HHhH
JE|| =HhH
JE
||HhH
JE||.(25)
Thus, according to (23) and (25), we can get the optimal w
which can be further expressed as
w=Hu == HhH
JE
||HhH
JE|| =(IhH
JDhJD
||hJD||2)hH
JE
||(IhH
JDhJD
||hJD||2)hH
JE||
.(26)
The proof of Lemma 1 is completed.
ACKNOWLEDGMENTS
We are very grateful to all reviewers who have helped
improve the quality of this paper. This work was supported
by the National Natural Science Foundation of China (Grant
No. 61471028 and 61572070), and the Fundamental Research
Funds for the Central Universities (Grant No. 2017JBM004).
REFERENCES
[1] N. Zhang, N. Lu, N. Cheng, and J. W. Mark, “Cooperative networking
towards secure communications for CRNs, in Wireless Communications
& Networking Conference, 2013, pp. 1691–1696.
[2] Z. Li, T. Jing, Y. Huo, and J. Qian, “Achieving secure communications
in multi-antenna cooperative cognitive radio networks using cooperative
jamming,” International Journal of Sensor Networks, vol. 22, no. 2, pp.
100–110, 2016.
[3] Y. Huo, Y. Tian, L. Ma, X. Cheng, and T. Jing, “Jamming strategies for
physical layer security, IEEE Wireless Communications, vol. PP, no. 99,
pp. 1–6, 2017.
[4] Y. Huo, Y. Tian, C. Hu, Q. Gao, and T. Jing, A location prediction-
based helper selection scheme for suspicious eavesdroppers, Wireless
Communications and Mobile Computing, no. 12, pp. 1–11, 2017.
[5] L. R. Varshney, “Transporting information and energy simultaneously,
in IEEE International Symposium on Information Theory, 2008, pp.
1612–1616.
[6] S. Bi, Y. Zeng, and R. Zhang, “Wireless powered communication
networks: an overview,” IEEE Wireless Communications, vol. 23, no. 2,
pp. 10–18, 2015.
[7] Q. Gao, T. Jing, X. Xing, X. Cheng, Y. Huo, and D. Chen, “Simulta-
neous energy and information cooperation in MIMO cooperative cog-
nitive radio systems, in IEEE Wireless Communications and Network
Conference-Track 1:PHY and Fundamentals, 2015.
[8] Z. Li, T. Jing, L. Ma, Y. Huo, and J. Qian, “Worst-case cooperative jam-
ming for secure communications in CIoT networks,” Sensors, vol. 16,
no. 3, 2016.
[9] A. Salem, K. A. Hamdi, and K. M. Rabie, “Physical layer security with
RF energy harvesting in AF multi-antenna relaying networks, IEEE
Transaction on Communications, vol. 64, no. 7, pp. 3025–3038, July
2016.
[10] H. Xing, Z. Chu, Z. Ding, and A. Nallanathan, “Harvest-and-jam:
Improving security for wireless energy harvesting cooperative networks,
in Global Communications Conference, 2014, pp. 3145–3150.
[11] H. Xing, K. K. Wong, and A. Nallanathan, “Secure wireless energy
harvesting-enabled AF-relaying SWIPT networks,” in IEEE Internation-
al Conference on Communications, 2015, pp. 2307–2312.
[12] S. Raghuwanshi, P. Maji, S. D. Roy, and S. Kundu, “Secrecy perfor-
mance of a dual hop cognitive relay network with an energy harvesting
relay, in International Conference on Advances in Computing, Commu-
nications and Informatics, 2016, pp. 1622–1627.
[13] H. Lei, M. Xu, H. Zhang, G. Pan, I. S. Ansari, and K. A. Qaraqe,
“Secrecy outage performance for underlay MIMO CRNs with energy
harvesting and transmit antenna selection,” in GLOBECOM Workshops,
2017, pp. 1–6.
[14] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wire-
less information and power transfer, IEEE Transactions on Wireless
Communications, vol. 12, no. 5, pp. 1989–2001, 2013.
[15] A. D. Wyner, “The wire-tap channel,” Bell Labs Technical Journal,
vol. 54, no. 8, pp. 1355–1387, 1975.
[16] M. Fuchs, G. Del Galdo, and M. Haardt, “A novel tree-based scheduling
algorithm for the downlink of multi-user MIMO systems with ZF
beamforming,” in IEEE International Conference on Acoustics, Speech,
and Signal Processing, 2005. Proceedings, 2005, pp. iii/1121–iii/1124
Vol. 3.
[17] H. H. Kha, H. D. Tuan, and H. H. Nguyen, “Fast global optimal power
allocation in wireless networks by local D.C. programming,” Wireless
Communications IEEE Transactions on, vol. 11, no. 2, pp. 510–515,
2012.
[18] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex
programming, version 1.21,” Global Optimization, pp. 155–210, 2008.
[19] V. Granville, M. Krivnek, and J. P. Rasson, “Simulated annealing:
A proof of convergence, IEEE Transactions on Pattern Analysis &
Machine Intelligence, vol. 16, no. 6, pp. 652–656, 2002.
... More specifically, the security of direct communications [17][18][19] and relaying communications [5,[20][21][22][23][24][25][26] in EHSSNs was studied without considerations of FD secondary destination-assisted jamming, non-linear energy harvesting, and primary interference. In [27][28][29], the HD destination was exploited to jam the eavesdropper for securing EHSSNs. Similar to [5,[17][18][19][20][21][22][23][24][25][26], FD secondary destination-assisted jamming, non-linear energy harvesting, and primary interference were not studied in [27][28][29]. ...
... In [27][28][29], the HD destination was exploited to jam the eavesdropper for securing EHSSNs. Similar to [5,[17][18][19][20][21][22][23][24][25][26], FD secondary destination-assisted jamming, non-linear energy harvesting, and primary interference were not studied in [27][28][29]. In 1 Wang et al. [38], the authors investigated the security problem for spectrum sharing networks considering primary interference and non-linear energy harvesting. ...
... Appendix A: Proof for the PDF of P s in (28) To obtain the PDF of P s , one firstly needs the CDF of P s . Plugging (10) into the definition of the CDF results in ...
Article
Full-text available
Spectrum sharing (SS) and energy harvesting (EH) basically improve spectrum-and-energy efficiencies required by modern communications systems. Nonetheless, most publications have focused on the linear (L) EH model which did not characterize practically non-linearities of EH circuits. Moreover, SS induces secondary receivers to suffer primary interference (PI) and facilitates eavesdroppers to overhear legitimate data. To secure communications in energy harvesting spectrum sharing networks (EHSSNs), this paper proposes a full-duplex (FD) secondary destination which not only receives legitimate signal but also jams signal reception of the eavesdropper. Joint effects of non-linear (NL) EH, PI, and FD destination-assisted jamming on security-and-reliability performances of EHSSNs are first analyzed in terms of outage and intercept probabilities that are then endorsed by Monte-Carlo simulations. Next, the proposed analysis is exploited to achieve the asymptotic analysis and the security-and-reliability analysis for two baseline EHSSNs (half-duplex (HD) destination and L EH). Finally, numerous results demonstrate joint effects of NL EH, PI, and FD destination on data security and communication reliability by comparing three EHSSNs: (i) L EH and FD destination; (ii) NL EH and FD destination; (iii) NL EH and HD destination. Notably, the proposed communications scheme with the FD destination is more secure than the baseline scheme with the HD destination. In addition, the reliability of the communications scheme with the NL EH is inferior to that with the L EH but the data security of the former is better than the latter. Additionally, the security-reliability trade-off exists for all the considered communications schemes. Moreover, the PI enhances the security but degrades the reliability. Furthermore, the time fraction for EH can be optimized to attain the best security-reliability trade-off.
... For securing communication at the physical layer, jamming method that generates purposefully jamming signals to impair merely decoding at wire-tappers is efficient and well-known [18]. However, most publications (e.g., [19][20][21][22][23][24][25][26]) assumed jamming signals to be accurately reproduced by legitimate users. Consequently, these users suppress definitely adverse impact of jamming signals while wire-tappers bear adversely this effect. ...
... where ε n ∼ CN (0, m ) notates additive noise at the receiver n ∈ {r , e}. It is recalled that most publications such as [19][20][21][22][23][24][25][26] assumed jamming signal w j to be absolutely regenerated at the legitimate receiver CR, not at E, in order for CR to completely suppress influence of w j on its performance. Nevertheless, such an assumption is somehow unrealistic since any regeneration of w j is scarcely perfect with an absolute probability. ...
... Explicit expressions forˆ 1 ,ˆ 2 , andˆ 3 are presented in (55) ς), (21) shows that the investigated jamming strategy where both secret transmissions of CS and CR can be secured in Stage 2 and Stage 3 can ensure different security levels (i.e., different ) by reserving properly time for energy scavenging (i.e., choosing δ), distributing reasonably the power of CS and CR to their jamming signals (i.e., choosing ϑ and ς ), and setting appropriately the preset transmission rate (i.e., choosing¯ e ). More specifically, ...
Article
Full-text available
This paper considers an underlay relaying network where a cognitive relay performs decode-and-forward operation to aid communication between a cognitive source-destination pair. Transmit powers of cognitive users are subject to both interference and peak transmit power constraints. To stimulate support, the relay merely spends power scavenged from source signals with realistic non-linear energy harvester for its operation. Additionally, to secure secret transmission of both the source and the relay, this paper proposes to merge jamming signals with secret ones before their transmission. Relied on practical observations that jamming signals and channel state information at legitimate receivers may not be suppressed and estimated perfectly, respectively, this paper analyzes system performance under inaccuracies of jamming suppression and channel estimation. Purposively, this paper analyzes security-reliability trade-off of underlay relaying networks under joint practical influences of erroneous channel information, Nakagami-m fading severity, jamming suppression error, energy harvesting non-linearity, and power constraints of cognitive users. Towards this end, explicit expressions of intercept and outage probabilities are first derived. Then, they are used to quickly generate numerous results so as to withdraw interesting findings. More specifically, the proposed jamming strategy experienced the trade-off between security and reliability as well as reliability/security saturation at high peak transmit power. Additionally, channel estimation error, fading severity, jamming suppression error, and energy harvesting non-linearity significantly impact system performance. Nonetheless, system parameters can be set properly to achieve different security levels and prevent absolute outage.
... Overlay · Secrecy outage probability · Energy harvesting · Channel estimation imperfection · Artificial noise cancellation mance of primary/secondary communication in terms of SOP (Secrecy Outage Probability) was not analyzed in [14][15][16][17]. ...
... Most references (e.g., [14][15][16][17][18][19][20][21]) assumed artificial noise to be exactly known at legitimate receivers. Accordingly, these receivers completely eliminate its detrimental effect while eavesdroppers suffer severely this effect. ...
... While publications on information security for energy harvesting (interweave/underlay) networks have been blooming, few works have been interested in the overlay mode [14][15][16][17][18][19][20][21]23]. More specifically, [14] and [15] considered the almost same system model as ours but EHONs are secured by letting the primary receiver jam the eavesdropper and the secondary transmitter helps primary communication by the AF (Amplify-and-Forward) mechanism. ...
Article
Full-text available
EHONs (Energy Harvesting Overlay Networks) satisfy stringent design requirements such as high energy-and-spectrum utilization efficiencies. However, due to open access nature of these networks, eavesdroppers can emulate cognitive radios to wire-tap legitimate information, inducing information security to become a great concern. In order to protect legitimate information against eavesdroppers, this paper generates artificial noise transmitted simultaneously with legitimate information to interfere eavesdroppers. Nonetheless, artificial noise cannot be perfectly suppressed at legitimate receivers as for its primary purpose of interfering only eavesdroppers. Moreover, channel information used for signal detection is hardly estimated at receivers with absolute accuracy. As such, to quickly evaluate impact of channel estimation-and-artificial noise cancellation imperfection on secrecy performance of secondary/primary communication in ANaEHONs (Artificial Noise-aided EHONs), this paper firstly proposes precise closed-form formulas of primary/secondary SOP (Secrecy Outage Probability). Then, computer simulations are provided to corroborate these formulas. Finally, various results are illustrated to shed insights into secrecy performance of ANaEHON with key system parameters from which optimum parameters are recognized. Notably, secondary/primary communication can be secured at different levels by flexibly adjusting various parameters of the proposed system model.
... Whilst most publications have investigated the PHY security for energy harvesting (interweave/underlay) networks, a handful works have paid attention to the overlay mechanism [5,[21][22][23][24][25][26][27][28]. More specifically, [21] investigated the almost similar system model to ours but EHONs are secured by asking a devoted jammer to jam the eavesdropper. ...
... Meanwhile, the latter employed the cognitive transmitter as the AF relay and as an energy scavenger that bases on the power splitting protocol [30]. To better secure primary communications, [24] suggested to jam the eavesdropper by the primary receiver as well as the dedicated jammer. Nonetheless, the analysis on the secrecy outage probability (SOP) of both primary and cognitive communications was not reported in [21][22][23][24]. ...
... To better secure primary communications, [24] suggested to jam the eavesdropper by the primary receiver as well as the dedicated jammer. Nonetheless, the analysis on the secrecy outage probability (SOP) of both primary and cognitive communications was not reported in [21][22][23][24]. In [25], EHONs are secured with the multiuser scheduling and the transmit antenna selection. ...
Article
Full-text available
Artificial noise, energy harvesting, and overlay communications can assure design metrics of modern wireless networks such as data security, energy efficiency, and spectrum utilization efficiency. This paper studies impact of artificial noise on security capability of energy harvesting overlay networks in which the cognitive transmitter capable of self-powering its operation by harvesting radio frequency energy and self-securing its communications against eavesdroppers by generating artificial noise amplifies and forwards the signal of the primary transmitter as well as transmits its individual signal concurrently. To quantify this impact, the current paper firstly suggests accurate expressions of crucial security performance indicators. Then, computer simulations are supplied to corroborate these expressions. Finally, numerous results are demonstrated to expose insights into this impact from which optimum specifications are determined. Notably, primary/cognitive communications can be secured at distinct degrees by flexibly controlling multiple specifications of the suggested system model.
... Whilst most works have focused on security solutions for cognitive radio networks with SUs capable of harvesting RF energy and operating in the interweave and underlay mechanisms, few publications have studied the overlay mechanism lately [20][21][22][23][24]. More specifically, the almost identical system model as ours was investigated in [20] and [21] but their security solution is to jam the eavesdropper by primary receiver 1 . ...
... The authors in [22] deployed a dedicated jammer to interrupt the signal reception of the eavesdropper instead of the primary receiver as in [20] and [21]. To further secure primary network, [23] exploited both the dedicated jammer and the primary receiver to jam the eavesdropper. Nonetheless, [20][21][22][23] did not carry out the security analysis in terms of secrecy outage probability (SOP). ...
... To further secure primary network, [23] exploited both the dedicated jammer and the primary receiver to jam the eavesdropper. Nonetheless, [20][21][22][23] did not carry out the security analysis in terms of secrecy outage probability (SOP). As alternative security solutions, [24] proposed multi-user scheduling and transmit antenna selection and analyzed the ergodic rate of secondary network and the SOP of primary network. ...
Article
This paper investigates a cognitive radio network where a secondary sender assists a primarytransmitter in relaying primary information to a primary receiver and also transmits its own information toa secondary recipient. This sender is capable of jamming to protect secondary and/or primary informationagainst an eavesdropper and self-powering by harvesting radio frequency energy of primary signals.Security capability of both secondary and primary networks are analyzed in terms of secrecy outageprobability. Numerous results corroborate the proposed analysis which serves as a design guidelineto quickly assess and optimize security performance. More importantly, security capability trade-offbetween secondary and primary networks can be totally controlled with appropriate selection of systemparameters.
... The overlay mechanism in RF energy harvesting networks, where SUs operate in the overlay mechanism and harvest RF energy for their operation, can solve issues of spectrum under-utilization and shortage, and sufficient energy supply for next generation mobile systems by exploiting both implementable (energy harvesting and cognitive radio) technologies [16][17][18][19][20]. Nevertheless, that the overlay mechanism grants access to licensed spectrum of PUs for SUs raises a severe security issue because wire-tappers can mimic SUs to attack legal information [21]. ...
... Fortunately, these issues are efficiently resolved by cognitive radio technology, which offers SUs opportunities to exploit licensed spectrum of PUs with negligible interference to PUs [3][4][5]. SUs typically operate through three (overlay, interweave, Studies on secrecy performance of the underlay/interweave mechanism in RF energy harvesting networks have been flourishing lately but few publications 1 have investigated the overlay mechanism [16][17][18][19][20]. More specifically, [16] and [17] studied the almost same system model as ours yet the primary receiver serves as a jammer to corrupt the eavesdropper for secured secret information. ...
... Instead of jamming the wire-tapper by the primary receiver as in [16] and [17], a deliberate jammer is exploited in [18]. To further enhance security, [19] proposed both the primary receiver and the deliberate jammer to interfere the wire-tapper. However, [16][17][18][19] did not perform secrecy outage probability (SOP) analysis for the overlay mechanism in RF energy harvesting networks. ...
Article
Full-text available
Overlay mechanism offers secondary users (SUs) chances to access licensed spectrum of primary users (PUs) to improve spectrum utilization efficiency. However, these chances impose serious security challenges when wire-tappers emulate legal users (SUs/PUs) to eavesdrop secret information. Moreover, energy sources available for SUs to transmit its private information as well as assist PUs in the overlay mechanism are problematic in green communication age. This paper proposes SUs who are able to scavenge radio frequency energy in signals of PUs to meet green communication requirement and jam wire-tappers to secure both secondary and primary information. Important secrecy performance indicators of overlay mechanism in radio frequency energy harvesting networks with jamming under Nakagami-m fading are evaluated by proposed precise expressions. Various results validate these expressions and show that secrecy performances of SUs and PUs are flexibly controlled, compromised and optimized with proper selections of system parameters as well as are dramatically affected by fading severity.
... However, the works on physical-layer security combining with energy-harvesting technique [25][26][27][28][29][30][31]35] merely discussed on non-cognitive radio systems, while [37][38][39][40][41][42] examined the private cognitive transmission. In [37], the multiuser scheduling was exploited to fight against eavesdroppers. ...
Article
Full-text available
The secrecy outage performance for a cooperative cognitive radio energy‐harvesting network is analyzed. The cognitive network is composed of an energy‐constrained cognitive source (CS), multiple energy‐constrained cognitive relays (CRs) and a cognitive destination (CD) as well as an eavesdropper (E) coexists with a primary network consisting of a primary transmitter (PT) and a primary receiver (PR). The CS and CRs are equipped with energy harvesters for collecting energy from the radio frequency signal from PT and their transmit powers are limited by the interference threshold at PR. To prevent confidential information leaking to E, an optimal relay selection (ORS) scheme and a suboptimal relay selection (SRS) scheme are proposed. In ORS scheme, the whole channels state information (CSI) of wireless links is available to CRs while SRS only needs to know the CSI of main channels from CRs to CD. Moreover, the closed‐form expressions of secrecy outage probabilities for both ORS and SRS schemes are derived. For the purpose of comparison, the classical round‐robin relay selection (RRRS) is also analyzed in terms of secrecy outage probability. Furthermore, the numerical results show that ORS achieves the best performance and RRRS performs the worst in terms of secrecy outage probability.
Article
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks (EHOCNs). To this end, we assume that a message by a licensed transmitter is relayed by an unlicensed sender. Critically, the unlicensed sender uses energy harvested from licensed signals, enhancing the overall energy efficiency and maintaining the integrity of licensed communications. To secure messages broadcast by the unlicensed sender against the wire-tapper, full-duplex destinations – unlicensed recipient and licensed receiver – jam the eavesdropper at the same time they receive signals from the unlicensed sender. To this effect, we derive closed-form formulas for the secrecy outage probability, which then quantify the security performance of both unlicensed and licensed communications for EHOCNs with jamming-assisted full-duplex destinations, namely EHOCNwFD. In addition, optimum operating parameters are established, which can serve as essential design guidelines of such systems.
Article
Full-text available
This paper aims to improve security performance of data transmission with a mobile eavesdropper in a wireless network. The instantaneous channel state information (CSI) of the mobile eavesdropper is unknown to legitimate users during the communication process. Different from existing work, we intend to reduce power consumption of friendly jamming signals. Motivated by the goal, this work presents a location-based prediction scheme to predict where the eavesdropper will be later and to decide whether a friendly jamming measure should be selected against the eavesdropper. The legitimate users only take the measure when the prediction result shows that there will be a risk during data transmission. According to the proposed method, system power can be saved to a large degree. Particularly, we first derive the expression of the secrecy outage probability and set a secrecy performance target. After providing a Markov mobile model of an eavesdropper, we design a prediction scheme to predict its location, so as to decide whether to employ cooperative jamming or not, and then design a power allocation scheme and a fast suboptimal helper selection method to achieve targeted and efficient cooperative jamming. Finally, numerical simulation results demonstrate the effectiveness of the proposed schemes.
Article
Full-text available
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be guaranteed. Simulation results demonstrate the good performance of the cooperative jamming scheme and the auction framework.
Article
Full-text available
This paper considers energy and information cooperation between a single-antenna primary user (PU) pair and a multiple-antennae secondary user (SU) pair in a cognitive radio system. The secondary transmitter (ST) harvests energy from the primary signal and gains opportunity to transmit its own signal in return for helping relay the primary transmitter's (PT) traffic. A time-divided power splitting scheme is proposed to enable the energy and information cooperation with the objective of maximizing the throughput of the SU pair under the energy constraint of the ST and the received signal-to-inference plus noise ratio (SINR) constraint of the primary receiver (PR). Simulation results demonstrate the influence of the time division proportion and the power splitting parameter on the throughput of the SU pair and the PU pair.
Article
This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available. Among the physical layer security techniques, jamming is an effective way to degrade the channel quality of the eavesdroppers for ensuring security. We start by giving a brief introduction to the fundamental principles of physical layer security and jamming. Then we classify jamming strategies from three different perspectives and explain the major related designs in various scenarios. Finally, we discuss the open issues of jamming that can be helpful to foster future research.
Article
Multi-antenna based cooperative cognitive radio networks (MCCRNs) have been proposed recently to further improve the spectrum efficiency. Secure communications may be impeded by the eavesdropper in MCCRNs. In this paper, we use physical layer methods to prevent the eavesdropping attack. A cooperative jamming scheme is proposed, in which SUs are employed as helpers to send jamming signals. We optimise the design of beamformers and power allocation vectors to maximise secrecy capacity. To further improve the secrecy capacity, we design an effective cooperation strategy of helpers using coalition formation game. Based on the merge-and-split rules, a coalition formation algorithm is proposed.
Article
In this paper, we analyze the secrecy capacity of a half-duplex energy harvesting (EH)-based multi-antenna amplify-and-forward relay network in the presence of a passive eavesdropper. During the first phase, while the source is in the transmission mode, the legitimate destination transmits an auxiliary artificial noise (AN) signal which has two distinct purposes: 1) to transfer power to the relay and 2) to improve system security. Since the AN is known at the legitimate destination, it is easily cancelled at the intended destination, which is not the case at the eavesdropper. In this respect, we derive new exact analytical expressions for the ergodic secrecy capacity for various well-known EH relaying protocols, namely, time switching relaying (TSR), power splitting relaying (PSR), and ideal relaying receiver (IRR). Monte Carlo simulations are also provided throughout our investigations to validate the analysis. The impacts of some important system parameters, such as EH time, power splitting ratio, relay location, AN power, EH efficiency, and the number of relay antennas, on the system performance are investigated. The results reveal that the PSR protocol generally outperforms the TSR approach in terms of the secrecy capacity.
Conference Paper
The emerging radio signal enabled simultaneous wireless information and power transfer (SWIPT), has drawn significant attention. To achieve secrecy transmission by cooperative jamming, especially in the upcoming 5G networks with self-sustainable mobile base stations (BSs) and yet not to add extra power consumption, we propose in this paper a new relay protocol, i.e., harvest-and-jam (HJ), in a relay wiretap channel with an additional set of spare helpers. Specifically, in the first transmission phase, a single-antenna transmitter (Tx) transfers signals carrying both information and energy to a multi-antenna amplify-and-forward (AF) relay and a group of multi-antenna helpers; in the second transmission phase, the AF relay processes the information and forwards it to the receiver while each of the helpers generates an artificial noise (AN), the power of which is constrained by its previously harvested energy, to interfere with the eavesdropper. By optimizing the transmit beamforming matrix for the AF relay and the covariance matrix for the AN, we maximize the secrecy rate for the receiver subject to transmit power constraints for the AF relay and all helpers. The formulated problem is shown to be non-convex, for which we propose an iterative algorithm based on alternating optimization. Finally, the performance of the proposed scheme is evaluated by simulations as compared to other heuristic schemes.