Next Article in Journal
Entanglement Entropy of the Spin-1 Condensates at Zero Temperature
Previous Article in Journal
Anomalous Advection-Dispersion Equations within General Fractional-Order Derivatives: Models and Series Solutions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Newly Secure Solution to MIMOME OFDM-Based SWIPT Frameworks: A Two-Stage Stackelberg Game for a Multi-User Strategy

Freelance Scholar, Tehran 1634776616, Iran
Entropy 2018, 20(1), 79; https://doi.org/10.3390/e20010079
Submission received: 22 December 2017 / Revised: 9 January 2018 / Accepted: 18 January 2018 / Published: 22 January 2018
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
The paper technically proposes a newly secure scheme for simultaneous wireless power and information transfer (SWIPT) frameworks. We take into account an orthogonal frequency division multiplexing (OFDM)-based game which is in relation to a multi-input multi-output multi-antenna Eavesdropper (MIMOME) strategy. The transceiver is generally able to witness the case imperfect channel state information (ICSI) at the transmitter side. Transferring power and information are conducted via orthogonally provided sub-carriers. We propose a two-step Stackelberg game to optimise the Utility Functions of both power and information parts. The price for the first stage (in connection with information) is the total power of the other sub-carriers over which the energy is supported. In this stage, the sum secrecy rate should be essentially maximised. The second level of the proposed Stackelberg game is in association with the energy part. In this stage, the price essentially is the total power of the other sub-carriers over which the information is transferred. In this stage, additionally, the total power transferred is fundamentally maximised. Subsequently, the optimally and near-optimally mathematical solutions are derived, for some special cases such as ICSI one. Finally, the simulations validate our scheme as well, authenticating our contribution’s tightness and efficiency.
Keywords:
MIMOME; OFDM; SWIPT

1. Introduction

Physical-layer security techniques basically play a vital role in Green communication these days. One of the important parts of these techniques are in relation to SWIPT frameworks [1,2,3]. These schemes as the emerging telecommunications technologies, are promising ones to highlight the term green cited above.
Two challenging issues as the open trends in connection with SWIPT systems are: (i) actualising a significantly appropriate tradeoff between the power and information parts; and (ii) guaranteeing the secrecy capacity.
In connection with the tradeoff expressed above, a coefficient (ratio) should be technically defined. Some recently conventional techniques to provide the mentioned tradeoff have been considered such as power splitting [4], time switching [5], antenna selection [3], full/half duplexing [4] etc. However, among them, one of the promising ones is sub-carriering [6,7,8,9,10,11,12].
The Stackelberg game has been widely taken into consideration in the literature aimed at principally guaranteeing physical layer security. In [13], a game was determined in which the transmitter was the Seller, whereas jammer was the Buyer. In [14,15,16], and even [17], the mentioned game-based method was considered as well in order to maintain the secrecy rate for cognitive radio frameworks. A dynamic hybrid-access control framework was defined in [18] exploiting the mentioned game. For energy harvesting schemes [19,20], some secure Stackelberg games have been provided to keep the quality of service.

1.1. Differences and Motivation (Regarding the Related Work)

Regarding the literature, optimally closed-form solutions in terms of jointly guaranteeing the secrecy capacity and power-information ratio are still required as favourable as possible. In other words, even if new solutions in the technologically advanced equipment SWIPT have been widely supported, however, they are also highly motivated.
More specifically, Ref. [21] sub-carriering in a MIMO OFDM-based SWIPT system in order to enhance the configuration flexibility. Indeed, in [21], the norm of each sub-channel was mathematically considered as 0.1× the number of the sub-carriers. In contrast, we use OFDM in order to pursue a goal. This paper technically discusses how to guarantee this goal.
Finally, it should be noted that classifying the resources to the two principles energy and information is often mapped to two totally different groups of users. Indeed, in the literature, there seems to be (i) some schemes [22,23] in which SWIPT is defined for every specific user; and (ii) some schemes [7,24,25,26,27,28] in which SWIPT is defined for two kinds of users, i.e., information decoders, and energy harvesters (which use their energy according to their disciplines). For example, Ref. [28] considered the energy/information for one class of users, whereas considering the artificial noise/energy for the others who were energy harvesters. Or even more specifically, Ref. [7] designated two separate classes of users, information receivers, and energy harvesters.

1.2. Our Contribution

More specifically, the contributions of our work are:
  • Owing to the orthogonality between dually adjacent sub-carriers, the possibility of the energy receivers being passive Eavesdroppers (Eves) is zero. For example, in [12], an OFDM block was considered to jointly support the information and power. Inversely, in this paper, the coefficient to handle the power-information tradeoff is in relation to the number of sub-carriers. Instead, an active Eve is taken into account as well.
  • We derive the mathematically closed-form solution as well.
  • We extend and recast the solution into a sub-optimally closed-form solution using equal-power allocation.
  • We extend the two-level Stackelberg to a stochastic one for the special case ICSI.

1.3. Notation & Organisation

Some of the symbols and mathematical notations used throughout the paper are shown in Table 1. Additionally, for more convenience, all vectors and matrices are respectively N × 1 and N × N , without loss of optimality and generality.
The rest of the paper is organised as follows. Firstly, the main problem as well as the proposed solution are subsequently realised in Section 2. Additionally, the results are addressed in Section 3. Finally, conclusion and proofs are represented in Section 4 and Appendix A.

2. System Description and Problem Formulation

In this section, firstly the system and the main problem are described, subsequently, our proposed scheme is discussed.

2.1. System Description

A MIMOME OFDM-based transceiver is given in Figure 1 supporting K legitimate users and M energy receivers. The MIMO channels between the legitimate transmitter and the kth legitimate user as well as the active Eve are formulated by H ( k ) and G (Our scheme unhesitatingly satisfies for H and G of sizes A × B , A B . However, we consider them square for more simplicity, without loss of generality and optimality.), in a downlink scenario. The superscripts i and j are relation to the sub-carriers over which the information and energy are respectively transferred. Moreover, due to the orthogonality between the pair of adjacent sub-carriers, the energy receivers cannot be passive Eves. Finally, the coefficient for handling the power-information tradeoff is in association with the number of sub-carriers.
We should strongly highlight here that our scheme does not experience any limitations. Though over both the jth sub-carrier, an energy harvester, and over the ith one, one information decoder is respectively allocated, however, the interception between these two adjacent sub-carriers is unified by zero. The interception should be fully considered since the energy harvester can potentially intercept the information decoder, due to the closer location to the access point. However, in order to guarantee a perfect scheme, an active Eavesdropper is also accordingly taken into account (We should add that classifying the resources to the two principles energy and information is often mapped to two totally different and separate sorts of users. Additionally, the energy harvested by the harvesters, may be used to decoding (such as in non-orthogonal multiple access scenarios in which we have two kinds of users, namely (i) strong users; and (ii) weak users); relaying (in cooperative schemes) etc.).
Assuming a fixed Bandwidth, Ergodic capacities C r , i ( k ) and C e , i at the receiver of the kth legitimate user and Eve over the ith sub-carrier (ith sub-channel) are respectively considered as
C r , i ( k ) = log det I + 1 δ r , i ( k ) 2 H i ( k ) Q i H i ( k ) H ,
and
C e , i = log det I + 1 δ e , i 2 G i Q i G i H ,
with respect to (w.r.t.) the transmit covariance matrix Q i : = E { x i x i H } , and moreover the noise variance terms δ r , i ( k ) 2 and δ e , i 2 at the receiver sides (over the ith sub-channel). Thus, the secrecy capacity in relation to the kth user over the ith sub-carrier is defined as
C S , i ( k ) : = m a x 0 , C r , i ( k ) C e , i .
Fact 1: Consider S , A z and U z respectively as a finite set of Players, a set of Actions of the zth Player, and the Utility Function for the zth Player. A Game S , A z , U z unhesitatingly has a Stackelberg Equilibrium, if
  • A z , z Z is a non-empty compact convex subset over the Euclidian Space,
  • and also U z is quasi-concave over A z .
Please see [29] for the proof.
Definition 1
(Stackelberg Equilibrium [30]). The vector of Action Space A = ( a ˜ 1 , a ˜ 2 ) = ( a ˜ 11 , a ˜ 12 , a ˜ 21 , a ˜ 22 ) basically is a Stackelberg Equilibrium if and only if: a ˜ 1 = a r g m a x a 1 U 1 ( a 1 , a ^ 2 ( a 1 ) ) satisfies, where a ^ 2 ( a 1 ) = a r g m a x a 2 ( a 1 , a 2 ) , a 1 , and also a ˜ 2 = a ^ 2 ( a ˜ 1 ) .
Definition 2.
Consider a given Price set P n * n = 1 N , n { i , j , i j , i = 1 , , I , j = 1 , , J } , N { I , J , I J } . For example, P i * is the power over the ith sub-carrier. As can be observed, the total number of sub-carriers is ρ I + ( 1 ρ ) J , ρ [ 0 , 1 ) . ρ is a coefficient by which the option information/energy transferring is handled.

2.2. Our Two-Stage Stackelberg Game

Let us define the two-level Stackelberg Game G as
G : U i n f o : = i = 1 I k = 1 K C S , i ( k ) j = 1 , j i J m = 1 M P j ( m ) , U p o w e r : = j = 1 , j i J m = 1 M P j ( m ) i = 1 , i j I P i .
First step and the relative strategy: On this level, the Utility Function is U i n f o . The objective is the secrecy capacity for the ith sub-carrier for K legitimate users. The Price is the total transmit power of those sub-carriers over which power should be transferred to M energy receivers ( P j ( m ) ).
Second step and the relative strategy: On this level, the Utility Function is U p o w e r . The objective is the total transmit power of those sub-carriers over which power should be transferred to M energy receivers. The Price is the total transmit power of those sub-carriers over which information should be transferred ( P i ).
Claim 1: Our Stackelberg game is called two-stage since there appear to be two separately defined controllers, i.e., P i and P j ( m ) . These controllers are essentially assigned to respectively two separate group-Players legitimate users and energy receivers.
Proposition 1.
There undoubtedly exists a Stackelberg Equilibrium for the Game G .
Proof. 
See Appendix A. ☐
Theorem 1.
The Game G has an optimal solution as Problem P 1 as
( Q i * , P i * , P j ( m ) * ) = a r g m a x Q i , P i , P j ( m ) { i = 1 I k = 1 K C S , i ( k ) j = 1 , j i J m = 1 M P j ( m ) , j = 1 , j i J m = 1 M P j ( m ) i = 1 , i j I P i } ,
constraining
C 1 : P i : T r Q i Q i H P t h ( i ) ,
in which P t h ( i ) is a threshold defined for the transmit power over the ith sub-carrier, and finally
C 2 : P j ( m ) 0 .
Proof. 
See Appendix B. ☐
Claim 2: According to Claim 1, we should highlight that our Stackelberg game is called two-stage since, indeed, Q i * ( P i * ; P j ( m ) * ) is a 2-D controller w.r.t. both P i and P j ( m ) .
Claim 3: From (5), it can be conveniently witnessed that the security in our SWIPT scheme is efficiently guaranteed for the kth user, that is, C S , i ( k ) .
Remark 1.
The Game G has a sub-optimal solution as Problem P 2 as
Q i * = a r g m a x Q i i = 1 I k = 1 K C S , i ( k ) j = 1 , j i J m = 1 M P j ( m ) , j = 1 , j i J m = 1 M P j ( m ) i = 1 , i j I P i ,
while constraining
C 1 : P i : T r Q i Q i H 1 ρ I ,
and finally
C 2 : P j ( m ) 1 ( 1 ρ ) JM .
Proposition 2.
Equivalently, Problem P 2 can also be consequently re-stated as Problem P 3 as
Q i * = a r g m a x Q i i = 1 I k = 1 K C S , i ( k ) 1 ( 1 ρ ) JM , 1 ( 1 ρ ) JM 1 ρ I .
Proof. 
Regarding the principle Equal-power allocation, Problem P 1 can be conveniently re-casted into Problem P 3 , which near-optimally satisfies. ☐
Remark 2.
Generally, assuming equal-power allocation among the sub-carriers consequently reduces the energy consumption at the transmitter and receiver, as completely discussed in [12].
Remark 3.
The rates obtained through two totally different approaches Water-filling and equal-power allocation for the sub-carriers are nearly equal [12,31].
Proposition 3 (ICSI case).
Under the assumption of experiencing the case ICSI, the Game G has another sub-optimal solution as Problem P 4 as
m a x Q i R i ( k ) ,
while consequently defining the following probabilistic constraint w.r.t. C S , i ( k ) [ 0 , R i ( k ) )
C 1 : P C S , i ( k ) R i ( k ) 1 ϵ ,
and
C 2 : P i : T r Q i Q i H 1 ρ I ,
and finally
C 3 : P j ( m ) 1 ( 1 ρ ) JM ,
in which (13), according to Bernstein inequality as a probabilistic method to deal with the controversial case ICSI (see for example [32,33]), can be re-casted as
T r G i 1 2 F i ( k ) G i 1 2 2 ln ( ϵ ) α i ( k ) + ln ( ϵ ) β i ( k ) + d 1 , i ( k ) 0 , v e c G i 1 2 F i ( k ) G i 1 2 2 G i 1 2 F i ( k ) g i α i ( k ) , β i ( k ) I N + G i 1 2 F i ( k ) G i 1 2 0 ,
where α i ( k ) and β i ( k ) are Slack variables which are derived by the algorithm given in Algorithm 1 w.r.t. DogLeg method [34,35], and
d 1 , i ( k ) : = g i H F i ( k ) g i ( ( 2 ( R i ( k ) ) ) d 2 , i ( k ) 1 ) δ e , i 2 ,
F i ( k ) : = 2 ( R i ( k ) ) d 2 , i ( k ) Q i ,
and
d 2 , i ( k ) : = δ r , i ( k ) 2 h i ( k ) H Q i h i ( k ) ,
w.r.t.
g ^ i : = g i + G i 1 2 g i Δ g i ,
and
g i : = v e c { G i } , h i ( k ) : = v e c { H i ( k ) } .
Algorithm 1. Dogleg method [34,35]. Proposed algorithm for deriving α i ( k ) and β i ( k ) .
Output: α i ( k ) * , β i ( k ) *
1. Initialisation: Set the Knees φ i ( k ) ( α ; t = 0 ) , φ i ( k ) ( β ; t = 0 ) , and the Legs γ i ( k ) ( φ , α ; t = 0 ) , γ i ( k ) ( φ , β ; t = 0 ) .
2. Computation: Until convergence
3. Repeat: Update the Knees and Legs; go to Step 2; t = t + 1 .

3. Results and Evaluation

In this section, we provide a theoretical and simulation-based analysis over our newly proposed framework.
Some parameters taken into account in the simulations are given in Table 2, all of which are fixed, if not mentioned otherwise.
The secrecy capacity is depicted in Figure 2 against the number of iterations, for the two cases ICSI and full CSI, where the size of MIMO, i.e., N is 4, using the equal-power technique.
The secrecy capacity is shown in Figure 3 against the norm of the interception channel, while changing the size of MIMO, i.e., N. In this figure, an average is thoroughly applied on n entries of the matrices.
Remark 4.
It should be noted that Figure 3 succinctly indicates the Eve’s performance.
Figure 4 shows the secrecy capacity versus S N R ( d B ) while changing the size of MIMO, i.e., N, comparing our work with [37,38]. Our proposed algorithm performs better than [37,38].
Figure 5 shows the Cumulative distribution function of the secrecy capacity while changing S N R , for the case ICSI.
Figure 6 illustrates the principle Goodput as the spent bits per sub-carrier (as the useful data: the size of a transmitted packet devided to the transfer time), while comparing our work and [38]. Our proposed algorithm performs better than [38].
The proposed algorithm to derive the best solution to our proposed scheme is given in Algorithm 2.
Lemma 1.
The algorithm stated above converges.
Proof. 
The algorithm is descending due to the decreasing behaviour of the inputs in the iteration step, when Q i ( P i ; P j ( m ) ) Q i * ( P i * ; P j ( m ) * ) , hence, this converges. The inputs are assigned from the relative equations, as shown in the algorithm, i.e., P t h ( i ) , ρ , I , J , M , ϵ , α i ( k ) , β i ( k ) . ☐
Algorithm 2. Proposed Resource Scheduling Algorithm.
Intput: P t h ( i ) , ρ , I , J , M , ϵ , α i ( k ) , β i ( k )
Output: Q i * ( P i * ; P j ( m ) * )
1. Initialisation: Set the given thresholds, c o u n t e r = 0 .
2. Computation: Until convergence
Switch
   Case 1 Perfect CSI
       Solve Problem P 1 (or P 3 ).
   Case 2 Imperfect CSI
       Solve Problem P 4 .
end
If Q * is feasible for Problem, stop; store the resultant matrix.
3. Iteration: Repeat
Else if Otherwise, empty Q *; re-assign the possible candidates; update the subsets; go to Step 2; c o u n t e r = c o u n t e r + 1 .
End
As completely discussed in [37], since the utility functions are tightly concave over the feasible solution sets, irrespective of some rare cases (for example spatially correlated MIMOs for which other interface algorithms has been proposed such as proximal-point-based regularization approach [37]), the algorithm converges. Of course, the aforementioned concavity is proven in the next parts, as well.
Lemma 2.
(Complexity): Our scheme’s complexity in terms of Big-O function is ≈ O ( N 3 ) , compared to ≈ O ( N 5 ) obtained for [38].
The figures and discussions mentioned above straightforwardly highlight our scheme’s efficiency and correctness.

4. Conclusions

A secure scheme for SWIPT systems was proposed in a MIMOME OFDM-multi-user-based strategy. OFDM was used to transfer the power and information. A two-level Stackelberg game was also proposed to optimise the Utility Functions of both power and information sides. The novelty stated above was conducted as well, supporting some theorems and propositions.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1

The existence of any Stackelberg Equilibrium for the Game G is proven according to the uniqueness of the Game G . Prior of this, we should prove the mentioned uniqueness regarding the concavity of the two-step Game G . The concavity expressed above is proven regarding the fact that both steps of the Game G are concave. Please see the following.
It is sufficient to prove the concavity (see for example [39]) of only the first level. h ( b x 1 + ( 1 b ) x 2 ) , 0 b 1 is concave if and only if 2 h ( b ) b 2 0 (see for example [40]). Now, let us define the function (For more convenience, in order to simplify the following equations (only in Appendix A), please consider a single-user case. This assumption results in removing the superscript k in the following).
h ( Q i ) : = log det I + 1 δ r , i 2 H i Q i H i H log det I + 1 δ e , i 2 G i Q i G i H ,
and
Q i ( 2 ) + b ( Q i ( 2 ) Q i ( 1 ) ) = U i + b V i ,
therefore,
h 1 ( b ) = log det I + ( U i ( 1 ) + b V i ( 1 ) ) W i ( 1 ) ,
and
h 2 ( b ) = log det I + ( U i ( 2 ) + b V i ( 2 ) ) W i ( 2 ) ,
where
W i ( 1 ) : = H i H H i ,
W i ( 2 ) : = G i H G i .
Let us define new variables
X i ( 1 ) : = I + U i ( 1 ) W i ( 1 ) ,
X i ( 2 ) : = I + U i ( 2 ) W i ( 2 ) ,
Y i ( 1 ) : = V i ( 1 ) W i ( 1 ) ,
Y i ( 2 ) : = V i ( 2 ) W i ( 2 ) .
Hence,
h f ( b ) : = log det X i ( f ) + b Y i ( f ) , f { 1 , 2 } ,
which is equal to
h f ( b ) = log det X i ( f ) 1 2 ( I + b X i ( f ) 1 2 Y i ( f ) X i ( f ) 1 2 D i ( f ) ) X i ( f ) 1 2 = d = 1 D log ( 1 + b λ d ( f ) ) + log det X i ( f ) , f { 1 , 2 } ,
for which λ d ( f ) are the eigen-values of D i ( f ) , f { 1 , 2 } .
Now, we have
2 h f ( b ) b 2 = d = 1 D λ d 2 ( f ) ( 1 + b λ d ( f ) ) 2 0 , f { 1 , 2 } .
Thus, the proof is completed regarding the concavity derived above.

Appendix B

Proof of Theorem 1

First of all, let us provide the following definition [41].
Definition A1.
For the Stackelberg Equilibrium ( a 1 , a 2 ) the following should hold
U z ( a 1 ) = S u p S u p a z U z ( a z ( 1 ) ) ,
and
U z ( a 2 ) = S u p S u p a z U z ( a z ( 2 ) ) .
Regarding Definition A1 given above, now, the following equations hold
i = 1 I k = 1 K C S , i ( k ) ( Q i * ; P i * ) j = 1 , j i J m = 1 M P j ( m ) i = 1 I k = 1 K C S , i ( k ) ( Q i ; P i * ) j = 1 , j i J m = 1 M P j ( m ) ,
i = 1 I k = 1 K C S , i ( k ) ( Q i * ; P i * ) j = 1 , j i J m = 1 M P j ( m ) i = 1 I k = 1 K C S , i ( k ) ( Q i * ; P i ) j = 1 , j i J m = 1 M P j ( m ) ,
i = 1 I k = 1 K C S , i ( k ) ( Q i * ; P i ) j = 1 , j i J m = 1 M P j ( m ) i = 1 I k = 1 K C S , i ( k ) ( Q i ; P i ) j = 1 , j i J m = 1 M P j ( m ) ,
i = 1 I k = 1 K C S , i ( k ) ( Q i ; P i * ) j = 1 , j i J m = 1 M P j ( m ) i = 1 I k = 1 K C S , i ( k ) ( Q i ; P i ) j = 1 , j i J m = 1 M P j ( m ) ,
and
j = 1 , j i J m = 1 M P j ( m ) * i = 1 , i j I P i j = 1 , j i J m = 1 M P j ( m ) i = 1 , i j I P i .
Hence, we are able to proceed with
C S , i ( k ) ( Q i * ; P i ) Q i * = 0 ,
As completely discussed for example in [33] (Equation (43)) can be conveniently derived exploiting the facts log d e t U = T r U 1 U [42], chain rule as g ( U = f ( U ) ) U [43] (Equation (135)), and ( W ( U ) V ) U = ( ( W ( U ) ) ) V + 0 [43] (Equation (37)).
Solving (42) completes the proof.

References

  1. Wang, X.; Liu, J.; Zhai, C.; Ma, S.; Wang, Q. Energy efficient relay networks with wireless power transfer from a multi-antenna base station. Trans. Emerg. Telecommun. Technol. 2016, 27, 533–543. [Google Scholar] [CrossRef]
  2. Liu, C.; Natarajan, B. Modeling and Analysis of Simultaneous Information and Energy Transfer in Internet of Things. Trans. Emerg. Telecommun. Technol. 2017, 28, e3177. [Google Scholar] [CrossRef]
  3. Zahedi, A.; Lari, M.; Albaaj, A.; Alabkhat, Q. Simultaneous energy harvesting and information processing considering multi-relay multi-antenna using maximum ratio transmission and antenna selection strategies. Trans. Emerg. Telecommun. Technol. 2017, 28, e3182. [Google Scholar] [CrossRef]
  4. Dong, A.; Zhang, H.; Shu, M.; Yuan, D. Simultaneous Wireless Information and Power Transfer for MIMO Interference Channel Networks Based on Interference Alignment. Entropy 2017, 9, 484. [Google Scholar] [CrossRef]
  5. Pan, G.; Tang, C. Outage Performance on Threshold AF and DF Relaying Schemes in Simultaneous Wireless Information and Power Transfer Systems. Int. J. Electron. Commun. 2017, 71, 175–180. [Google Scholar] [CrossRef]
  6. Huang, X.; Li, Q.; Zhang, Q.; Qin, J. Power allocation for secure OFDMA systems with wireless information and power transfer. Electron. Lett. 2014, 50, 229–230. [Google Scholar] [CrossRef]
  7. Zhang, M.; Liu, Y.; Zhang, R. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems. IEEE Trans. Wirel. Commun. 2016, 15, 3085–3096. [Google Scholar] [CrossRef]
  8. Zhang, M.; Liu, Y. Energy Harvesting for Physical-Layer Security in OFDMA Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 154–162. [Google Scholar] [CrossRef]
  9. Li, M.; Liu, Y. Power Allocation for Secure SWIPT Systems with Wireless-Powered Cooperative Jamming. IEEE Commun. Lett. 2017, 21, 1353–1356. [Google Scholar] [CrossRef]
  10. Zhang, M.; Liu, Y.; Zhang, R. Secrecy Wireless Information and Power Transfer in OFDMA Systems. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015. [Google Scholar]
  11. Zhang, M.; Liu, Y.; Feng, S. Energy Harvesting for Secure OFDMA Systems. In Proceedings of the 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), Hefei, China, 23–25 October 2014. [Google Scholar]
  12. Shafie, A.E.; Tourki, K.; Al-Dhahir, N.L. An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems. IEEE Commun. Lett. 2017, 21, 632–635. [Google Scholar] [CrossRef]
  13. Tang, X.; Ren, P.; Wang, Y.; Du, Q.; Sun, L. Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015. [Google Scholar]
  14. Al-Talabani, A.; Nallanathan, A.; Nguyen, H.X. Enhancing Secrecy Rate in Cognitive Radio via Game Theory. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015. [Google Scholar]
  15. Talabani, A.; Deng, Y.; Nallanathan, A.; Nguyen, H.X. Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game. IEEE Trans. Commun. 2016, 64, 4764–4775. [Google Scholar] [CrossRef]
  16. Talabani, A.; Deng, Y.; Nallanathan, A.; Nguyen, H.X. Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game. IEEE Commun. Lett. 2016, 20, 1112–1115. [Google Scholar] [CrossRef]
  17. Abdalzaher, M.S.; Seddik, K.; Muta, O. Using Stackelberg game to enhance cognitive radio sensor networks security. IET Commun. 2017, 11, 1503–1511. [Google Scholar] [CrossRef]
  18. Liu, C.; Xing, S.; Shen, L. Dynamic hybrid-access control in multi-user and multi-femtocell networks via Stackelberg game competition. IET Commun. 2016, 10, 862–872. [Google Scholar] [CrossRef]
  19. Sarma, S.; Kandhway, K.; Kuri, J. Robust Energy Harvesting Based on a Stackelberg Game. IEEE Wirel. Commun. Lett. 2016, 5, 336–339. [Google Scholar] [CrossRef]
  20. Zhang, T.; Chen, W.; Yang, F. Balancing Delay and Energy Efficiency in Energy Harvesting Cognitive Radio Networks: A Stochastic Stackelberg Game Approach. IEEE Trans. Cognit. Commun. Netw. 2017, 3, 201–216. [Google Scholar] [CrossRef]
  21. Xiong, K.; Fan, P.; Zhang, C.; Letaief, K.B. Wireless Information and Energy Transfer for Two-Hop Non-Regenerative MIMO-OFDM Relay Networks. IEEE J. Sel. Areas Commun. 2015, 33, 1595–1611. [Google Scholar] [CrossRef]
  22. Wang, X.; Liu, J.; Zhai, C. Wireless power transfer based multi-pair two-way relaying with massive antennas. IEEE Trans. Wirel. Commun. 2017, 16, 7672–7684. [Google Scholar] [CrossRef]
  23. Wang, X.; Zhai, C. Simultaneous wireless information and power transfer for multi-user massive antenna-array systems. IEEE Trans. Commun. 2017, 65, 4039–4048. [Google Scholar] [CrossRef]
  24. Khandaker, M.R.A.; Wong, K.-K.; Zhang, Y.; Zheng, Z. Probabilistically Robust SWIPT for Secrecy MISOME Systems. IEEE Trans. Inf. Forensics Secur. 2017, 12, 211–226. [Google Scholar] [CrossRef]
  25. Liu, L.; Zhang, R.; Chua, K.-C. Secrecy Wireless Information and Power Transfer with MISO Beamforming. IEEE Trans. Signal Process. 2014, 62, 1850–1863. [Google Scholar] [CrossRef]
  26. He, B.; Yang, N.; Yan, S.; Zhou, X. Regularized Channel Inversion for Simultaneous Confidential Broadcasting and Power Transfer: A Large System Analysis. IEEE J. Sel. Top. Signal Process. 2016, 10, 1404–1416. [Google Scholar] [CrossRef]
  27. Zhu, Z.; Chu, Z.; Wang, N.; Huang, S.; Wang, Z.; Lee, I. Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2861–2874. [Google Scholar] [CrossRef]
  28. Zhou, F.; Li, Z.; Cheng, J.; Li, Q.; Si, J. Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio with SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 2450–2464. [Google Scholar] [CrossRef]
  29. Osborne, M.J.; Rubenstein, A. A Course in Game Theory; MIT Press: Cambridge, UK, 1994. [Google Scholar]
  30. Haddad, M.; Hayely, Y.; Habachi, O. Spectrum Coordination in Energy Efficient Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2015, 64, 2112–2122. [Google Scholar] [CrossRef]
  31. Rhee, W.; Cioffi, J.M. Increase in capacity of multiuser OFDM system using dynamic subchannel allocation. In Proceedings of the 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No. 00CH37026), Tokyo, Japan, 15–18 May 2000; pp. 1085–1089. [Google Scholar]
  32. Le, T.A.; Vien, Q.T.; Nguyen, H.X.; Kwan Ng, D.W.; Schober, R. Robust Chance-Constrained Optimization for Power-Efficient and Secure SWIPT Systems. IEEE Trans. Green Commun. Netw. 2017, 1, 333–346. [Google Scholar] [CrossRef]
  33. Zamanipour, M. Probabilistic-based secrecy rate maximisation for MIMOME wiretap channels: Towards novel convexification procedures. Trans. Emerg. Telecommun. Technol. 2017, 28, e3154. [Google Scholar] [CrossRef]
  34. Ding, H.; Wan, G.; Zhou, Y.; Tang, J.; Zhou, Z. Nonlinearity analysis based algorithm for indentifying machine settings in the tooth flank topography correction for hypoid gears. Mech. Mach. Theory 2017, 113, 1–21. [Google Scholar] [CrossRef]
  35. Bellavia, S.; Macconi, M.; Pieraccini, S. Constrained dogleg methods for nonlinear systems with simple bounds. Comput. Optim. Appl. 2012, 53, 771–794. [Google Scholar] [CrossRef]
  36. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming; CVX Research Inc.: Austin, TX, USA, 2009. [Google Scholar]
  37. Fang, B.; Zhong, W.; Jin, S.; Qian, Z.; Shao, W. Game-Theoretic Precoding for SWIPT in the DF-Based MIMO Relay Networks. IEEE Trans. Veh. Technol. 2016, 65, 6940–6948. [Google Scholar] [CrossRef]
  38. Bannour, A.; Sacchi, C.; Sun, Y. MIMO-OFDM Based Energy Harvesting Cooperative Communications Using Coalitional Game Algorithm. IEEE Trans. Veh. Technol. 2017, 66, 11166–11179. [Google Scholar] [CrossRef]
  39. Adian, M.G.; Aghaeinia, H. Low complexity resource allocation in MIMO-OFDM-based cooperative cognitive radio networks. Trans. Emerg. Telecommun. Technol. 2016, 27, 92–100. [Google Scholar] [CrossRef]
  40. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  41. Wang, A.; Cai, Y.; Yang, W.; Hou, Z. A Stackelberg Security Game with Cooperative Jamming over a Multiuser OFDMA Network. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013. [Google Scholar]
  42. Hjørungnes, A.; Gesbert, D. Complex-Valued Matrix Derivatives: With Applications in Signal Processing and Communications; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  43. Petersen, K.; Pedersen, M. The Matrix Cookbook; Technical University of Denmark: Kongens Lyngby, Denmark, 2012. [Google Scholar]
Figure 1. MIMOME OFDM-based Transceiver in downlink.
Figure 1. MIMOME OFDM-based Transceiver in downlink.
Entropy 20 00079 g001
Figure 2. Secrecy capacity vs. iterations’ number.
Figure 2. Secrecy capacity vs. iterations’ number.
Entropy 20 00079 g002
Figure 3. Secrecy capacity vs. the interception channel’s norm.
Figure 3. Secrecy capacity vs. the interception channel’s norm.
Entropy 20 00079 g003
Figure 4. Secrecy capacity vs. S N R ( d B ) . (a) Complete S N R ( d B ) regime; (b) Low S N R ( d B ) regime.
Figure 4. Secrecy capacity vs. S N R ( d B ) . (a) Complete S N R ( d B ) regime; (b) Low S N R ( d B ) regime.
Entropy 20 00079 g004
Figure 5. Cumulative distribution function vs. the secrecy capacity.
Figure 5. Cumulative distribution function vs. the secrecy capacity.
Entropy 20 00079 g005
Figure 6. Goodput vs. S N R ( d B ) .
Figure 6. Goodput vs. S N R ( d B ) .
Entropy 20 00079 g006
Table 1. Notations.
Table 1. Notations.
NotationDefinitionNotationDefinition
A Matrix l o g { · } Logarithm
a Vector T r { · } Trace of Matrix
aScalar m a x { · } Maximum Value
I Identity Matrix S u p Supremum
0All-zero Matrix v e c { · } Vectorisation
( · ) ^ Estimation operation · Euclidean Norm
{ · } H Hermitian : = Equal by Definition
d e t { · } Determinant ( · ) * Optimum Value
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
The size of MIMOs ( N ) 4 (i.e., 4 × 4)
Transmit power threshold P t h ( i ) S N R regime
Convex interface packageCVX [36]
Number of sub-carriers1024
Number of legitimate users (k)25
Number of Randomly generated channel realisations300

Share and Cite

MDPI and ACS Style

Zamanipour, M. A Newly Secure Solution to MIMOME OFDM-Based SWIPT Frameworks: A Two-Stage Stackelberg Game for a Multi-User Strategy. Entropy 2018, 20, 79. https://doi.org/10.3390/e20010079

AMA Style

Zamanipour M. A Newly Secure Solution to MIMOME OFDM-Based SWIPT Frameworks: A Two-Stage Stackelberg Game for a Multi-User Strategy. Entropy. 2018; 20(1):79. https://doi.org/10.3390/e20010079

Chicago/Turabian Style

Zamanipour, Makan. 2018. "A Newly Secure Solution to MIMOME OFDM-Based SWIPT Frameworks: A Two-Stage Stackelberg Game for a Multi-User Strategy" Entropy 20, no. 1: 79. https://doi.org/10.3390/e20010079

APA Style

Zamanipour, M. (2018). A Newly Secure Solution to MIMOME OFDM-Based SWIPT Frameworks: A Two-Stage Stackelberg Game for a Multi-User Strategy. Entropy, 20(1), 79. https://doi.org/10.3390/e20010079

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop