1. Introduction
As a promising technique for energy-constrained wireless communication systems, simultaneous wireless information and power transfer (SWIPT) techniques have been extensively investigated to provide a cost-effective solution for self-sustainability of energy-limited wireless devices [
1,
2]. The SWIPT schemes have been utilized in various wireless networks [
3,
4]. In [
3], SWIPT-enabled small cells are deployed in heterogeneous cloud small cell networks and energy harvesting revenues have been considered in interference management problems. In particular, references [
5,
6,
7,
8] have focused on security issues in SWIPT sytstems and exploited physical layer security techniques to enable simultaneous secure communication and wireless power transfer. In [
5], secure beamforming design for a multi-antenna amplify-and-forward (AF) relay was proposed for SWIPT systems. In multiuser multiple-input single-output (MISO) systems, Ng et al. [
6] proposed beamforming design to minimize the total transmit power of the system for simultaneous secure communication and power transfer, whereas [
7] maximized secrecy rates satisfying given energy harvesting and overall power constraints. It is noteworthy that a single source-destination pair is considered in [
5,
6,
7,
8] for secure communication in SWIPT systems.
In this work, secure broadcasting scenarios [
9] are considered in SWIPT systems, where an individual secure message is sent to each destination [
8] or a common secure message is sent to multiple destinations (i.e., secure multicasting) [
10,
11]. In particular, we focus on the secure multicasting scenario with wireless power transfer. A common secure message is sent from a source to its desired destinations, while multiple eavesdroppers also exist to overhear the secure message. In general, a rate at which secure messages can be sent from a source to its intended receiver without being leaked to eavesdroppers is termed an achievable secrecy rate. The maximum achievable secrecy rate is defined as the secrecy capacity. In our scenario, energy receivers also exist in the system to harvest energy from the RF transmission. While a source equipped with multiple antennas is considered in [
10,
11], we consider that a source equipped with a single antenna performs simultaneous secure multicasting and wireless power transfer with the help of multiple decode-and-forward (DF) single-antenna relays located between the source and the receiver nodes [
12]. In this work, multiple relays are designed to operate cooperatively to improve the multicast secrecy rate as well as to enlarge the harvested energy at the energy receivers. It is worth mentioning that the exploitation of cooperative relays for SWIPT systems is also shown in [
13,
14], but a single source-destination pair is considered for secure communication and amplify-and-forward (AF) relays are utilized.
For simultaneous wireless power transfer and secure multicasting in cooperative DF relay networks, we investigate transmit power allocation and relay beamformer design problems under a total power budget, where the overall power consumed by the source and the relays does not exceed a given limit, in the following two scenarios: (1) maximize the minimum harvested energy achieving a given multicast secrecy rate; and (2) maximize the multicast secrecy rate under a minimum harvested energy constraint. Our contribution in this paper is to show that the optimization problems for both scenarios can be solved by a unified framework consisting of semidefinite relaxation [
15] and bisection technique [
16].
2. System Model
As shown in
Figure 1, we consider that one source node,
M trusted relays,
I destination nodes,
J eavesdroppers, and
K energy receivers are deployed in a wireless relay network. All nodes are assumed to have a single antenna and each relay operates in the DF mode. The cooperative relays
R’s support the source node
S to send a common secure message to the destination nodes
D’s. The eavesdroppers
E’s try to overhear the information message and the energy receivers
G’s perform energy harvesting from the RF transmission of
S and
R’s.
In the first time slot,
S sends
s and the other nodes listen. We denote
,
,
, and
as the received signals at the
ith
D, the
jth
E, the
kth
G, and the
mth
R, respectively, which are given as
where
,
,
, and
are the complex channel gains from
S to the
ith
D, the
jth
E, the
kth
G, and the
mth
R, respectively, and
is the transmit power of
S. Moreover,
,
,
, and
are complex additive white Gaussian noises with zero-mean and variance
. In the second time slot, we assume that
R decode
s successfully and send the weighted version of the re-encoded symbol. Then, the received signals at
D’s,
E’s, and
K’s can be expressed as
where
M relay weights are stacked in a
vector
and
,
, and
denote
complex channel vectors from
R’s to the
ith
D, the
jth
E, and the
kth
G, respectively.
Let each
D and
E perform maximal ratio combining using the received signals during two time slots. Then, the rates at the
ith
D and the
jth
E are computed as
where
and
denotes the conjugated transpose. Here, we compute the achievable multicast secrecy rate as [
17]
The rate at the
mth
R is given as
where
. Further, the harvested energy at the
kth
G is proportional to [
5]
where
,
, and
is the energy harvesting efficiency.
In this work, let us assume that global channel state information (CSI) is available. This assumption is valid when we can monitor the transmission of
E’s since they are also active in the network [
18]. In this scenario,
E’s are low-level users such that they are allowed to access less information than
D’s. If the global CSI is not available, we may use artificial noise (AN) techniques [
19,
20], where we consume some portion of the total power budget to transmit artificially generated noises. We expect that our proposed schemes derived in the following can be extended to exploit the AN techniques for simultaneous wireless power transfer and secure multicasting in cooperative DF relay networks.
3. Energy Harvesting Maximization with Secure Multicasting Constraints
Our objective in this section is to maximize the minimum harvested energy among
K energy receivers while guaranteeing that the multicast secrecy rate is greater than or equal to the given threshold (i.e.,
). Because the common information rate for multicasting is determined by the rate of the weakest
S-
D link [
17,
21], we let the rate at each relay be equal to or greater than the minimum rate among
D’s (i.e.,
for all
m) such that each
R correctly decodes and forwards the common secure message. The optimization problem under a total power budget
and the DF relaying constraints for secure multicasting is given as
Substituting (
3), (
6), and (
7) into (
8), we have
where
and
. Let us rewrite (
9) as
where
, tr(.) denotes the trace of a matrix, and
represents that
is a Hermitian positive semidefinite matrix.
In (
10), let us ignore the rank constraint using semidefinite relaxation [
15]. Then, we use the concept of bisection technique [
16] as follows. At first, we set an initial interval
, where the maximum value of
in (
10) is assumed to exist. At the midpoint of the given interval
, the following feasibility problem is solved by using SeDuMi [
22] and Yalmip [
23]:
If (
11) is infeasible, we update
. If (
11) is feasible such that we can obtain the solutions
,
,
, and
, we check the rank of
. If the rank of
is one, we update
. Otherwise, we exploit the penalty function method (PFM) in [
24] with
,
,
, and
to confirm the existence of a rank-one solution. The PFM consists of the initialization and optimization steps, which are both an iterative process. In this work, we use
as a starting point in the initialization step of the PFM. After the iteration of the initialization step is terminated, we may obtain
with
. Then, we use
as a starting point in the optimization step of the PFM. In the initialization and optimization steps of the PFM, the following semidefinite programming problem is solved at the
lth iteration:
where
is the maximum eigenvalue of
and
denotes the eigenvector of
corresponding to the maximum eigenvalue. If we can obtain a rank-one solution using the PFM, we update
. Otherwise, we update
. Until the width of the updated interval is small enough, the above process continues. The initial interval for the above bisection technique is derived in
Appendix A.
5. Numerical Results
In this section, we present numerical results to verify the energy harvesting and secure multicasting performance of the proposed schemes. As shown in
Figure 2, we assume that
R’s are located randomly within a circle with a radius of
and the center of the circle for
R’s is located
away from
S. Further, the radius of a circle, where
D’s,
E’s, and
G’s are located randomly, is
and the center of this circle is on the line formed by
S and the center of the circle for
R’s. The center of the circle for
D’s,
E’s, and
G’s is located
away from
S. In our simulation, we set
m,
m,
m, and varied
for
R’s to be located between
S and the receiver nodes
D’s,
E’s, and
G’s as in [
12]. We adopt a line-of-sight channel model [
12] such that the channel gain between any two nodes is evaluated by
, where
d is the distance between the nodes,
denotes the path loss exponent, and
follows a uniform distribution on
. For simplicity, we set
dBm and
dBm. We performed Monte Carlo simulations with
independent channel realizations and random node locations to obtain the average results.
Let us first consider maximizing the minimum harvested energy under a multicast secrecy rate constraint described in
Section 3. In
Figure 3, we present
[
7] as a function of
for different values of
when
and
, where
denotes the average of
and the upper bound is the average of the minimum harvested energy without the secure multicast constraints as in
Appendix A. Note that only wireless power transfer is performed when there is no secure multicasting constraint, which is equivalent to
. In this case, it is beneficial for energy harvesting that
R’s are located close to
G’s, because the harvested energy at
G depends on the received signal strength as shown in (
7) and
G can easily harvest the energy from the RF transmission of the closely located
R’s. Therefore, the upper bound in
Figure 3 increases as
R’s move closer to the nodes (i.e.,
increases). Now, we focus on a simultaneous wireless power transfer and secure multicasting case with
. In this case,
R’s in the DF mode should decode a secure message from
S correctly and forward it to
D’s. Obviously, moving close to
S is beneficial for
R’s to decode the secure message from
S without errors and
R’s should be located more closely to
S for larger values of
. Here, we find a tradeoff for the
R’s location in simultaneous wireless power transfer and secure multicasting scenarios. In our simulation, we do not allow the RF transmission of
S and
R’s for a certain channel realization and random location of the nodes, where the given
cannot be achieved (i.e., the optimization problem in (
8) is infeasible for the given
). For smaller values of
, the wireless power transfer is more dominant than the secure multicasting such that the average of the minimum harvested energy
still increases as
increases. However, for larger values of
,
is found to decrease drastically for larger values of
. This implies that, when
R’s are located close to the receiver nodes, it is hard to achieve the given
for lots of channel realizations and random node locations such that
S and
R’s do not perform the RF transmission more frequently and the harvested energy at
G’s reduces.
Figure 4 presents
as a function of
K for different values of
and
I when
,
, and
m. As expected, the minimum harvest energy decreases as
K increases and also becomes smaller for larger values of
in all ranges of
K. However, it is observed that the decrease of the minimum harvested energy according to increasing
K does not become steeper even though
is larger. Further, for a given
, the minimum harvested energy with
is greater than that with
in all ranges of
K and the gap between them becomes larger with an increase of
. Since the multicast secrecy rate depends on the minimum rate among
D’s as shown in (
5), it becomes harder to achieve the given
as
I increases. Then, the solution for
and
in (
8) becomes more oriented to the secure multicasting for achieving
than the energy harvesting, as
I becomes larger. This phenomenon becomes severe as
increases.
Now, we focus on maximizing multicast secrecy rates under a minimum energy harvesting constraint investigated in
Section 4.
Figure 5 shows the multicast secrecy rate as a function of
for different values of
when
and
. We evaluated the upper bound in
Figure 5 as in
Appendix B, which is the multicast rate in the absence of
E’s without the energy harvesting constraints. Note that
R’s should decode the signal from
S correctly as well as forward it to
D’s thoroughly. In order to decode the signal from
S correctly,
R’s should be close to
S, while it is beneficial for the signal forwarding that
R’s are located close to
D. As a compromise, it is optimal for the multicast rate to let
R’s be in the middle range between
S and the receiver nodes as shown in the curve for the upper bound in
Figure 5. This observation is still valid for simultaneous wireless power transfer and secure multicasting cases. It is seen that the optimal position of
R’s to provide the maximum multicast secrecy rate is
m until
dB, while
m is found to be optimal when
dB. As discussed in
Figure 3, it is advantageous for energy harvesting that
R’s are close to
G’s. For larger values of
, the energy harvesting becomes more dominant, such that the optimal position of
R’s move closer to the receiver nodes. Moreover, the multicast secrecy rate decreases in all ranges of
as
increases. In particular for smaller values of
, the secrecy rate decrease with an increase of
is more severe. This implies that, as
R’s are located farther from
G’s, it becomes more difficult to satisfy the given energy harvesting constraint.
From the observations in
Figure 3 and
Figure 5, we found that the location of
R’s is an important factor to figure out the tradeoff between energy harvesting and secure multicasting in simultaneous wireless power transfer and secure multicasting via cooperative DF relays. In
Figure 3, we observed that
R’s should be close to
G’s for energy harvesting, while it is advantageous for secure multicasting that
R’s is located in the middle range of
S and the receiver nodes as shown in
Figure 5. For simultaneous wireless power transfer and secure multicasting in cooperative DF relay networks, we may choose the location of
R’s to be close to the receiver nodes when the harvested energy is more required than the multicast secrecy rates, while the location of
R’s may be chosen to be in the middle range between
S and the receiver nodes when more multicast secrecy rates are needed.
The multicast secrecy rates are compared in
Figure 6 as a function of
J for different values of
and
K when
,
, and
m. As expected, the multicast secrecy rate is found to decrease with an increase of
J. It also becomes smaller for larger values of
K in all ranges of
J. Further, it is also observed that the gap between the multicast secrecy rates for
and 4 becomes more significant as
becomes larger. Since
is the requirement for the minimum harvested energy among
G’s, it becomes more difficult to achieve
as
K increases. Therefore, with an increase of
K, the solution for
and
in (
13) becomes more oriented to the energy harvesting for achieving
than the secure multicasting. Further, the increase of
brings about the aggravation of this effect.