Next Article in Journal
Adaptive Ship Detection for Single-Look Complex SAR Images Based on SVWIE-Noncircularity Decomposition
Next Article in Special Issue
A Swarming Approach to Optimize the One-Hop Delay in Smart Driving Inter-Platoon Communications
Previous Article in Journal
On the Performance of Cognitive Satellite-Terrestrial Relay Networks with Channel Estimation Error and Hardware Impairments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Beamforming Design for Secure V2X Downlink System with Wireless Information and Power Transfer under a Nonlinear Energy Harvesting Model

1
School of Physics and Electronic Engineering, Jiangsu Normal University, Xuzhou 221116, China
2
National Communications Research Laboratory, Southeast University, Nanjing 210096, China
3
School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China
4
School of Information Engineering, Henan University of Science and Technology, Luoyang 471023, China
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(10), 3294; https://doi.org/10.3390/s18103294
Submission received: 1 September 2018 / Revised: 24 September 2018 / Accepted: 28 September 2018 / Published: 30 September 2018
(This article belongs to the Special Issue Enhances in V2X Communications for Connected Autonomous Vehicles)

Abstract

:
Vehicle to everything (V2X) has been deemed a promising technology due to its potential to achieve traffic safety and efficiency. This paper considers a V2X downlink system with a simultaneous wireless information and power transfer (SWIPT) system where the base station not only conveys data and energy to two types of wireless vehicular receivers, such as one hybrid power-splitting vehicular receiver, and multiple energy vehicular receivers, but also prevents information from being intercepted by the potential eavesdroppers (idle energy vehicular receivers). Both the base station and the energy vehicular receivers are equipped with multiple antennas, whereas the information vehicular receiver is equipped with a single antenna. In particular, the imperfect channel state information (CSI) and the practical nonlinear energy harvesting (EH) model are taken into account. The non-convex optimization problem is formulated to maximize the minimum harvested energy power among the energy vehicular receivers satisfying the lowest harvested energy power threshold at the information vehicular receiver and secure vehicular communication requirements. In light of the intractability of the optimization problem, the semidefinite relaxation (SDR) technique and variable substitutions are applied, and the optimal solution is proven to be tight. A number of results demonstrate that the proposed robust secure beamforming scheme has better performance than other schemes.

1. Introduction

In recent years, vehicular communication has become a very important subject of study among researchers, due to its potential to increase road-safety and reduce traffic congestion [1,2,3,4,5,6]. There has been a tremendous amount of effort and investment from the government and private organizations to develop a means for highly efficient communication. To support various emerging applications, “cellular-connected vehicles” have been recognized as promising new solutions, by integrating vehicles into the cellular network as the new ground user equipment served by the base stations [7,8,9]. Thanks to the superior performance of the Long Term Evolution and the fifth-generation cellular networks, cellular-connected vehicles are expected to obtain significant performance enhancement in terms of all of throughput, coverage and reliability. In fact, the 3rd Generation Partnership Project (3GPP) standardization body released a dedicated set of criteria for providing V2X applications in future cellular networks in 2016 [10,11,12]. Preliminary field trials have also demonstrated that it is feasible to support the basic communication requirements for V2X with LTE networks [13,14,15,16,17].
The key issue with cellular-connected vehicle networks is how to prolong their lifetime. As we all know, the majority of vehicles in V2X networks are sensors that are typically powered by batteries with limited energy, resulting in a constrained network life time [18,19,20,21]. Meanwhile, the development of battery energy storage technology is unable to keep pace with the significant growth of energy requirements. Though replacement of batteries can extend their lifetime effectively, it will bring higher costs and is sometimes impossible. Traditionally, the energy collecting unit could harvest plentiful renewable energy from natural resources such as the hydro energy, tide and wind, etc. [22,23]. However, renewable sources are liable for the limitation caused by an unpredictable climate and change of position. Moreover, it may not be applicable for some application scenarios while harvesting energy from the ambient radio frequency (RF) signals can be controllable. The SWIPT technique exploits different aspects of RF signals, which are signal transmission and power transfer. Therefore, SWIPT technology has attracted great interest from investigators in recent years [24,25,26,27,28]. Utilizing this technology, the battery-powered vehicular communication devices can collect energy from the RF radios to prolong their network lifetime. For future vehicles with a mass of on-board sensors, the SWIPT technique is more meaningful for continuable communications of these on-board sensors, whose power can be provided from base stations or other vehicles with excess power or grid-connected roadside electrical units. Particularly, the authors in [27] designed the optimal beamforming to balance the information and energy transmission. In [28], the harvested energy and the secrecy channel capacity trade-off problem between the information receiver and energy receivers are considered.
However, all of the above works assume that the perfect knowledge of the receivers’ CSI is available at the base station. In practice, the CSI obtained by the base station may be imperfect. There are many factors resulting in imperfect CSI, such as the quantization error, the delay error and the limited capacity of feedback channel. Moreover, as is known to all, the performance of the approaches with perfect CSI may become poor due to the fact that these methods may be quite sensitive to channel uncertainties. Supposing imperfect CSI at the base station, there are several valuable works on robust beamforming design for multiuser SWIPT systems [29,30,31,32,33]. In [29,30], the authors proposed a secure beamforming optimization algorithm for SWIPT systems, where cooperation jamming and the external helper is considered. Khandaker et al. in [31] investigated the chanced constrained beamformer design for a more general SWIPT system in the presence of multiple Eves equipped with multiple antennas. The authors in [32] considered the resource allocation problem for the secure SWIPT multicasting scenario with channel uncertainties, where a low complexity optimization algorithm was proposed. Moreover, the authors of [33] also consider the SWIPT multicasting scenario and address the secure beamforming design problem.
From the above discussion, it is worth noting that most of the existing works focused on the beamforming design supporting SWIPT under the linear EH model, where it is assumed that the collected energy power could be linearly increased by growing the input power of the received RF signals. However, the practical power conversion circuits usually perform a nonlinear feature rather than the linear one due to their nonlinear elements such as two-electrode valves or two-electrode valves connected to the transistor. Therefore, the authors of [34] proposed a nonlinear EH model by fitting over real sampled data based on a logistic function. Then, the resource allocation optimization algorithms for SWIPT and wireless powered communication networks have been attracting increasing interest (see [35,36,37,38,39,40,41]). In [35], authors addressed the max-min signal-interference-noise-ratio (SINR) beamforming design optimization problem in a V2X-SWIPT environment with imperfectly estimated channels at the base station, where a practical nonlinear EH model is considered. In [36,37], the authors discuss the robust transmit beamformer design, joint user scheduling and power allocation for multiple user SWIPT scenario under nonlinear EH model. In [38], the authors designed the beamformer for energy efficiency maximization in a secure SWIPT system taking into account the influence of the nonlinear EH circuits. Then, the authors in [39] investigate the joint optimization of transmit precoding and power splitting ratios in MISO SWIPT multicasting networks with the objective of maximizing the minimum collected energy among all receivers under a generic (including nonlinear) EH model. The multiuser MIMO SWIPT system is also considered in [40,41], where the authors study the transmit beamforming design to maximize the harvested power based on perfect CSI under a generic EH model. The results obtained in [35,36,37,38,39,40,41] demonstrated that a favorable performance gain could be achieved if the beamforming design takes into account the effect of the nonlinear EH circuit instead of a linear EH circuit owing to the mismatch between the linear EH model and the nonlinear EH model. To the best of our knowledge, most of the above works on SWIPT either focus on the optimization of secrecy capacity of information receiver or the transmit power of the base station. It is usually assumed that the CSIs are perfectly available at the base station or the receivers are equipped with one antenna. These motivate us to research uncommonly considered optimization problem of fair power harvesting among all energy vehicular receivers that are equipped with multiple antennas. In addition, the CSIs of base stations to energy vehicular receivers are imperfect.
In this paper, we focus on the optimal secure beamformer design for V2X-SWIPT in a multiple vehicles MISO communication network with multiple multi-antenna energy vehicular receivers, where the nonlinear EH model proposed in [35] is utilized. The CSIs between the base station and the energy vehicular receivers are supposed to be imperfect. Moreover, the artificial noise-aided signal strategy and the power splitting receivers are taken into account. We aim for the design of a beamforming design algorithm maximizing the minimum harvested energy among multiple multi-antenna energy vehicular receivers for the case when the information vehicular receiver is able to collect energy from radio frequency signals. Our design advocates for the dual use of both energy signal and artificial noise in facilitating efficient wireless energy harvest and providing secure communication. The beamforming design is formulated as a non-convex optimization problem. For obtaining a tractable solution, we reformulated the considered optimization problem by applying a S-procedure and variable substitutions with a tractable solution. The resulting reexpressed non-convex optimization problem can be solved via a semi-definite programming based beamformer design algorithm. Furthermore, the obtained solution is proved to be the optimal solution.
The main contributions of this work are summarized as follows:
Firstly, to explore the network performance, an optimization problem is formulated to maximize the minimum harvested energy power among all the energy vehicular receivers, which is subjected to the required SINR constraints at an information vehicular receiver and energy vehicular receivers, the collected energy power constraints at the information vehicular receiver, and the transmit power constraint at the base station.
Secondly, since the considered problem is non-convex and challenging because there are infinite inequality constraints taking into account the nonlinear EH model and coupling among optimized variables. In order to solve the problem, a beamforming design algorithm is proposed based on the S-procedure and semidefinite relaxation (SDR). Moreover, It is proved that the optimal solution can be guaranteed by applying our approach.
Thirdly, our simulation results demonstrate that the proposed secure beamforming design scheme under the nonlinear EH model with channel uncertainties can provide performance gains compared with that under the linear EH model with channel uncertainties. Moveover, it is shown that a trade-off is found between the SINR of the information vehicular receiver and the energy harvested by energy vehicular receivers.
This rest of this paper is organized as follows. The system model and problem formulation is described in Section 2. Section 3 presents a solution for modelling max-min harvested energy power among all the energy vehicular receivers with imperfect CSI and a nonlinear EH model. Simulation results are provided in Section 4 to verify the effectiveness of the proposed robust secure beamforming design algorithm. Finally, we conclude the paper in Section 5.

2. System Model and Problem Formulation

We consider the downlink of a V2X-SWIPT communication system that consists of a base station and two kinds of legitimate vehicular receivers, namely one information vehicular receiver and K E idle energy vehicular receivers. The base station is equipped with a N T transmit antenna while the information vehicular receiver is a single antenna device and is able to decode information and collect energy from radio signals, cf. Figure 1. In addition, the K E idle energy vehicular receivers equipped with N R antennae are supposed to collect energy from the radio frequency as they are inactive. The energy vehicular receivers can work in double functions of EH and information decoding. In this scenario, the idle energy vehicular receivers, which cause no interference to the communication channel, can potentially eavesdrop on the confidential information of the information vehicular receiver by switching its working pattern to information decoding since all the legitimate vehicular receivers are within service coverage. Therefore, the idle energy vehicular receivers are potential eavesdroppers that can take care of supplying physical layer security. The channel vector between the base station and the information vehicular receiver is denoted as h C N T × 1 and the channel matrix between the base station and the k-th energy vehicular receiver is denoted as G k C N T × N R , k 1 , 2 , , K E . In our considered system model, we suppose that the vehicle speed is low. Several simulation and theoretical investigations have shown that V2X communication channels such as h and G k can be modelled as Rayleigh channel fading [42,43,44,45]. It is assumed that our considered system works in a Time Division Duplex (TDD) mode with slowly time-varying communication channels. Hence, the base-station-to-legitimate-vehicular-receiver fading gains, h and G k , could be reliably estimated at the base station at the start of each scheduling slot with negligible channel estimation errors. During the data transmission, the information vehicular receiver sends acknowledgement packets to tell the base station of successful reception of data packets. Hence, in this paper, the channel uncertainties for the base-station-to-energy-vehicular-receiver are considered while the CSI of the base-station-to-information-vehicular-receiver is perfectly known at the base station. We model the CSI of the link between the base station and the k-th energy vehicular receiver as:
G k = G ¯ k + Δ G k , k 1 , 2 , , K E ,
Ξ k Δ G k C N T × N R : Δ G k 2 υ k 2 , k ,
where G ¯ k is the channel estimate of the k-th energy vehicular receiver available at the base station while Δ G k denotes the unknown channel uncertainty of the energy vehicular receiver k. For notational simplicity, a set Ξ k in Label (2), which includes all possible CSI uncertainties of energy vehicular receiver k. Moreover, the radius υ k 0 denotes the size of the uncertainty region of the estimated CSI of the energy vehicular receiver k.
To provide vehicular secure communication and to facilitate EH at the desired information vehicular receiver, artificial noise signals and energy signals are generated at the base station. In particular, both signals could degrade the channels between the base station and the energy vehicular receivers and perform as an energy source for EH. As a result, we express the transmit signal vector x as
x = w s I + k = 1 K E v k s E , k + v 0 ,
where s I C and w C N T × 1 are the information-bearing signal and the corresponding beamforming vector for the information vehicular receiver, respectively. Without loss of generality, we suppose that E | s I | 2 = 1 . v k C N T × 1 and s E are the energy beamforming vector and the energy-bearing signal with E | s E | 2 = 1 , respectively. v 0 C N T × 1 represents the artificial noise vector generated by the base station to combat both passive and potential eavesdroppers, and we model it as v 0 CN ( 0 , V 0 ) . With the transmit signal x , the received signal at information vehicular receiver and k-th energy vehicular receiver can be expressed as
y I = h H x + n I a n d y E , k = G k H x + n E , k , k 1 , , K E ,
respectively, where n I CN ( 0 , σ I 2 ) and σ E , k CN ( 0 , n E , k 2 I N R ) represent the complex Gaussian noise at the information vehicular receiver and the k-th passive eavesdropper, respectively. σ I 2 and σ E , k 2 is the noise power of each other. In the considered networks, we exploit the energy and artificial noise signals transmitted by the base station to facilitate secure information transfer and charge both information vehicular receiver and energy vehicular receivers, respectively. In this paper, we adopt a practical nonlinear model. According to [35,36], the harvested energy at the k-th energy vehicular receiver can be modeled as:
E E , k Nonlinear = Ψ E , k X E , k Y E , k ,
with
Ψ E , k = M E , k 1 + exp a E , k P E , k W , V , V 0 b E , k ,
P E , k W , V , V 0 = G k H w 2 + k = 1 K E G k H v k 2 + G k H v 0 2 = T r G k H W + V + V 0 G k , k ,
where X E , k = exp a E , k b E , k 1 + exp a E , k b E , k , Y E , k = M E , k exp a E , k b E , k , W = w w H and V = j = 1 K E v j v j H . P E , k W , V , V 0 denote the received RF power at the k-th energy vehicular receiver. Three parameters, namely, M E , k , a E , k and b E , k in (6) are introduced to capture the joint effects of various nonlinear phenomena caused by hardware limitations in practical EH circuits. Furthermore, M E , k denotes the maximum power that can be collected by the EH circuit while a E , k and b E , k rely on serval hardware phenomena, such as the capacitance and diode turn-on voltage and the resistance.
As depicted in Figure 1, we adopt the power splitting architecture at the information vehicular receiver, the RF signals are divided into two streams by a power splitter in ρ , i.e., the 1 ρ part of the received signals is input into the EH receiver and the remaining ρ part is sent to the information receiver. Therefore, the received SINR can be expressed as
Γ I = ρ | h H w | 2 ρ | h H v 0 | 2 + ρ i = 1 K E | h H v i | 2 + σ I 2 = ρ T r ( H W ) ρ T r ( H V 0 ) + ρ T r ( H V ) + σ I 2 .
The input power at the information vehicular receiver can be written as
P I W , V , V 0 , ρ = ( 1 ρ ) | h H w | 2 + ( 1 ρ ) | h H v 0 | 2 + i = 1 K E | h H v i | 2 = ( 1 ρ ) T r ( HW ) + ( 1 ρ ) T r ( H V 0 ) + T r ( HV ) .
Here, we also adopt the nonlinear EH model, and then the harvested energy at the information vehicular receiver is given by
Φ I W , V , V 0 , ρ = Ψ I X I Y I ,
with
Ψ I = M I 1 + exp a I P I W , V , V 0 , ρ b I ,
where X I = exp a I b I 1 + exp a I b I and Y I = M I exp a I b I . M I is a constant representing the maximum harvested power at the information vehicular receiver when the EH circuit is saturated. a I and b I are also constants associated with the detailed circuit specifications.
Without loss of generality, the energy vehicular receivers can also perform as eavesdroppers to decode the confidential information for the information vehicular receiver. Due to the fact that the energy signal k = 1 K E v k s E , k is the only Gaussian pseudo-random sequence that is known at legitimate receivers (including both information vehicular receiver and energy vehicular receivers), we can thus perform interference cancellation at each energy vehicular receiver. As a result, the SINR of the k-th energy vehicular receiver is given by
Γ E , k = G k H w 2 G k 2 v 0 2 + σ E , k 2 .
The optimal beamforming design policy, W , V , V 0 , ρ , for maximizing the minimum harvest energy among all the K E energy vehicular receivers, can be obtained by solving
max W , V , V 0 , ρ min Δ G k Ξ k M E , k X E , k 1 + exp a E , k T r ( G ¯ k + Δ G k ) H ( W + V + V 0 ) ( G ¯ k + Δ G k ) b E , k Y E , k s . t . C 1 : Γ I r , C 2 : max Δ G k Ξ k T r G ¯ k + Δ G k H W G ¯ k + Δ G k G ¯ k + Δ G k H V 0 G ¯ k + Δ G k r k , k , C 3 : Φ I W , V , V 0 , ρ E min , C 4 : T r W + V + V 0 P .
The cost function in (13) takes into account the CSI uncertainty set Ξ k to provide robustness against CSI imperfection. In C1: r represents the minimum SINR of the information vehicular receiver for information decoding. Constraint C2 is imposed such that for a given CSI uncertainty set Ξ k , the maximum received SINR at the passive eavesdropper k is not larger than the maximum tolerable received SINR r k . In practice, r r k > 0 , k 1 , 2 , , K E , to guarantee vehicular secure communication. Constraint C4 set the minimum required power transfer for the information vehicular receiver. Constraint C4 restricts the transmit power at the base station to account for the maximum power.
Remark 1.
In our considered V2X-SWIPT network, the information vehicular receiver is assumed to have limited signal decoding capability and hardware complexity compared to the energy vehicular receivers. In order to ensure communication security, we adopt the worse-case assumption that the information vehicular receiver is equipped with a single antenna while all energy vehicular receivers is equipped with multiple antennas.

3. Solution of the Optimization Problem

It can be observed that the optimization problem (13) is a non-convex quadratically constrained programming that involves semi-infinite programming. Particularly, the non-convexity with respect to the information beamforming matrix W and the power splitting ratio ρ is owing to constraints (C1) and (C3). In addition, both the objective function in (13) and constraint (C2) involve infinitely many possibilities due to the CSI uncertainties. In general, there are no standard methods for solving the non-convex optimization problem. In extreme cases, we require an exhaustive search method to get the optimal solution that is computationally intractable even for a moderate network size. To deduce an efficient beamforming design algorithm for the considered optimization problem, we first recast the optimization problem (13) as a semi-definite programming (SDP) problem to avoid the non-convexity associated with the objective function, and constraints (C1) and (C3). Next, the infinite number of constraints is converted into an equivalent finite number of constraints. The performance of the reformulated optimization problem is the lower bound for the original optimization problem. Finally, we apply semi-definite programming relaxation (SDR) to obtain the globally optimal beamforming for the reformulated optimization problem. In practice, the considered optimization problem may be infeasible when the channels are in unfavourable conditions. However, in the following, we suppose that the problem is always feasible for investigating the design of different beamforming schemes.

3.1. Semi-Definite Programming Relaxation

In order to solve the optimization problem (13), we introduce a slack variable t 0 . With the slack variable t, the problem (13) can be equivalently formulated as the following optimization problem:
max W , V , V 0 , ρ , t t s . t . C 1 : T r W r V 0 r V H σ I 2 r ρ , C 2 : max Δ G k Ξ k T r G k H W r k V 0 G k r k σ E , k 2 , k , C 3 : Φ I W , V , V 0 , ρ E min , C 4 : T r W + V + V 0 P , C 5 : min Δ G k Ξ k E E , k Nonlinear t , k , C 6 : 0 ρ 1 , C 7 : W , V , V 0 0 , C 8 : Rank W = 1 .
To facilitate the optimization problem (14), another slack variable τ k , k 1 , , K E is also introduced, we can rewrite the problem (14) as
max W , V , V 0 , ρ , t , τ t s . t . C 1 : T r W r V 0 r V H σ I 2 r ρ , C 2 : max Δ G k Ξ k T r G k H W r k V 0 G k r k σ E , k 2 , k , C 3 : T r W + V + V 0 H ω I 1 ρ , C 4 : T r W + V + V 0 P , C 5 : M E , k 1 + exp a E , k τ E , k b E , k X E , k Y E , k + t , k , C 6 : 0 ρ 1 , C 7 : W , V , V 0 0 , C 8 : Rank W = 1 , C 9 : min Δ G k Ξ k T r G k H W + V + V 0 G k τ E , k ,
where ω I = b I ln M I E min + Y I X I 1 a I ; W 0 , W H + N T and rank ( W ) = 1 are imposed to guarantee that W = w w H holds after optimizing W . After some manipulations, it can be easily known that constraints (C1) and (C3) are jointly convex with regard to W , V , V 0 , ρ . Then, we deal with constraints (C2), (C5) and (C9). Although constraints (C1) and (C3) are jointly convex with regard to the optimization variables, they are semi-infinite constraints that are generally intractable for beamforming scheme design. To facilitate this, we can transform them into linear matrix inequalities using the following lemma.
Lemma 1.
(S-Procedure) Let f m ( x ) = x H A m x + 2 R e b m H x + c m , m 1 , 2 , where x C N × 1 , A m H N × N , b m C N × 1 and c m R . Then, the expression f 1 ( x ) 0 f 2 ( x ) holds if and only if there exists a λ 0 such that we get:
λ A 1 b 1 b 1 H c 1 A 2 b 2 b 2 H c 2 0
provided that there exsists a vector x ^ such that we obtain f i ( x ^ ) < 0 .
As a result, we can perform Lemma 1 to constraint (C2). Particularly, we substitute G k = G ¯ k + Δ G k in constraint C2. Hence, the implication
Δ g k H Δ g k v k 2 , Δ g k H Δ 2 Δ g k + 2 R e g ¯ k H Δ 2 Δ g k + g ¯ k H Δ 2 g ¯ k r k σ E , k 2 0
holds if and only if there exist λ ¯ k 0 , k 1 , 2 , , K E , such that the following linear matrix inequalities hold:
C 2 : N E , k W , V 0 , λ ¯ k = λ ¯ k I N T N R Δ 2 Δ 2 g ¯ k g ¯ k H Δ 2 g ¯ k H Δ 2 g ¯ k v k 2 λ ¯ k + r k σ E , k 2 0 ,
where W ¯ = I N R W , V ¯ 0 = I N R V 0 , Δ g k = v e c ( Δ G k ) , g ¯ k = v e c ( G ¯ k ) and Δ 2 = W ¯ r k V ¯ 0 . Similarly, by applying Lemma 1, we can equivalently write the constraint (C9) as
C 9 : T E , k W , V 0 , V , μ ¯ k , t = μ ¯ k I N T N R + Δ 3 Δ 3 g ¯ k g ¯ k H Δ 3 g ¯ k H Δ 3 g ¯ k v k 2 μ ¯ k τ E , k 0
for μ ¯ k 0 , k 1 , 2 , , K E , where V ¯ = I N R V and Δ 3 = W ¯ + V ¯ + V ¯ 0 . Therefore, substituting (18) and (19) back into (15)
max W , V , V 0 , ρ , t , τ E , k , λ ¯ , μ ¯ t s . t . C 1 , C 3 , C 4 , C 5 , C 6 , C 7 , C 2 : N E , k W , V 0 , λ ¯ k 0 , k , C 8 : rank ( W ) = 1 , C 9 : T E , k W , V 0 , V , μ ¯ k , t 0 , k , C 10 : λ ¯ k 0 , μ ¯ k 0 , k ,
where λ ¯ and μ ¯ denote auxiliary optimization variable vectors, whose elements λ ¯ k , k 1 , 2 , , K E , and μ ¯ k , k 1 , 2 , , K E were introduced in (18) and (19), respectively. Now, (C8): rank ( W ) = 1 is the main obstacle in solving the optimization problem (20). By relaxing constraint (C8), i.e., dropping the rank constraint from the optimization problem (20), we can reexpress the optimization problem (20) as follows:
max W , V , V 0 , ρ , t , τ E , k , λ ¯ , μ ¯ t s . t . C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 9 , C 10 .
It is worth noting that the relaxed optimization problem (21) becomes a convex SDP problem that can be solved efficiently by a numerical solver such as S D P T 3 and S e D u M i . Based on the basic principles of convex optimization theory, if the obtained solution W for optimization problem (21) admits a rank-one matrix, then W is the optimal solution of the optimization problem (20). Then, we can obtain the optimal information vector w by performing eigenvalue decomposition on W . However, in some cases, the rank of the obtained W is higher than one, thus the resulting solution may not the optimal solution for the relaxed problem. In the following, a theorem that reveals the tightness of the relaxed optimization problem (21) is first introduced. Then, a method for constructing an optimal solution for the relaxed optimization problem (21) with rank ( W ) = 1 is proposed.

3.2. Optimality Conditions for SDP Relaxation

In this subsection, the tightness of the proposed SDP relaxation in (20) is revealed. Before introducing the theorem, a crucial expression, which is a cornerstone in revealing the tightness of our proposed SDP relaxation optimization problem, is defined as
T = α I N T + k = 1 K E n = 1 N R J E , k ( n , n ) ( ) K E , k ( n , n ) ( )
and r ˜ = rank ( T ) , where J E , k ( n , n ) ( ) H + N T and K E , k ( n , n ) ( ) H + N T denote the n-th entry matrices on the diagonal of G ˜ k H X k G ˜ k H + N T N R and G ˜ k H Y k G ˜ k H + N T N R , respectively; where G ˜ k = I N T N R g ¯ k , and X k and Y k represent the Lagrange dual variables corresponding to N E , k W , V 0 , λ ¯ k and T E , k W , V 0 , V , μ ¯ k , t , respectively. Moreover, N 1 C N T × ( N T r ˜ ) is modeled as the orthogonal basis of the null space of T and π 1 , n c n t × 1 , 1 n N T r ˜ is the n-th column of the matrix N 1 . Based on this, we give the following theorem.
Theorem 1.
The optimal solution W , V , V 0 , ρ , t of the optimization problem (20) is characterized as the following conditions:
1. The optimal solution W can be formulated as
W = n = 1 N T r ˜ b n π 1 , n π 1 , n H + a ι ι H ,
where b n 0 , n and ι C N T × 1 , ι 2 = 1 satisfies ι H N 1 = 0 .
2. If the solution W given in (23) has rank ( W ) > 1 , i.e., there is at least an n such that b n > 0 , then we have the following alternative solution
W ˜ = W n = 1 N T r ˜ b n π 1 , n π 1 , n H = a ι ι H ,
V ˜ = V + n = 1 N T r ˜ b n π 1 , n π 1 , n H ,
V ˜ 0 = V 0 , ρ ˜ = ρ , t ˜ = t ,
with r a n k W ˜ = 1 serving as the optimal solution of optimization problem (20).
Proof. 
The Lagrangian dual function of problem (20) can be modeled as
L ( W , V , V 0 , X k , Y k , α , β , γ , ζ k , Θ , Ξ , Ω , ρ , t , τ E , k , λ ¯ k , μ ¯ k ) = t + k = 1 K E T r X k N E , k W , V 0 , λ ¯ k + α P T r W + V + V 0 + β [ T r W r V r V 0 H σ I 2 r ρ ] + γ T r W + V + V 0 H ω I 1 ρ + k = 1 K E T r Y k T E , k W , V 0 , V , μ ¯ k , t + k = 1 K E ζ k M E , k 1 + exp a E , k τ E , k b E , k X E , k Y E , k + t + T r Θ W + T r Ξ V + T r Ω V 0 ,
where X k 0 , k , Y k 0 , k , α 0 , β 0 , γ 0 , ζ k 0 , k are the dual variables for constraints C2, C9, C4, C1, C3, and C5, respectively. Θ H + N , Ξ H + N and Ω H + N are the dual variables with respect to parameters W , V and V 0 , respectively. Let G ˜ k = I N T N R g ¯ k , Λ E , k = μ ¯ k I N T N R 0 0 v k 2 μ ¯ k τ E , k , Λ ¯ E , k = λ ¯ k I N T N R 0 0 v k 2 λ ¯ k + r k σ E 2 , we can rewrite the N E , k W , V 0 , λ ¯ k and T E , k W , V 0 , V , μ ¯ k , t as follows:
N E , k W , V 0 , λ ¯ k = G ˜ k H r k V ¯ 0 W ¯ G ˜ k + Λ ¯ E , k , T E , k W , V 0 , V , μ ¯ k , t = G ˜ k H W ¯ + V ¯ + V ¯ 0 G ˜ k + Λ E , k .
For the convenience of analyzing the construction of the resulting solution, we must write back the variable W ¯ , V ¯ , and V ¯ 0 into their primal styles. Hence, we have
G ˜ k H X k G ˜ k = K E , k ( 1 , 1 ) K E , k ( 1 , 2 ) K E , k ( 1 , N R ) K E , k ( 2 , 1 ) K E , k ( 2 , 2 ) K E , k ( 1 , N R ) K E , k ( N R , 1 ) K E , k ( N R , 2 ) K E , k ( N R , N R ) H + N T N R , G ˜ k H Y k G ˜ k = J E , k ( 1 , 1 ) J E , k ( 1 , 2 ) J E , k ( 1 , N R ) J E , k ( 2 , 1 ) J E , k ( 2 , 2 ) J E , k ( 1 , N R ) J E , k ( N R , 1 ) J E , k ( N R , 2 ) J E , k ( N R , N R ) H + N T N R , J E , k ( k , k ) H + N R , K E , k ( k , k ) H + N R .
Then, by utilizing (27)–(29), the Lagrange dual function can be rewritten as
L ( W , V , V 0 , X k , Y k , α , β , γ , ζ k , Θ , Ξ , Ω , ρ , t , τ E , k , λ ¯ k , μ ¯ k ) = t + k = 1 K E T r X k Λ ¯ E , k + n = 1 N R ( r k V 0 W ) K E , k ( n , n ) + k = 1 K E T r Y k Λ E , k + n = 1 N R W + V + V 0 J E , k ( n , n ) + α P T r W + V + V 0 + β [ T r W r V r V 0 H σ I 2 r ρ ] + γ T r W + V + V 0 H ω I 1 ρ + T r Θ W + T r Ξ V + T r Ω V 0 + k = 1 K E ζ k M E , k 1 + exp a E , k τ E , k b E , k X E , k Y E , k + t .
It can be verified that the relax optimization problem (20) is jointly convex with regard to the primal variables and satisfies the Slater’s constraint qualification. Therefore, there is no gap between the primal optimization problem and dual optimization problem. That is to say, strong duality holds and solving the dual optimization problem is equivalent to solving the primal problem. Considering (30), the dual optimization problem is expressed as:
min X k 0 , Y k 0 , Θ , Ξ , Ω 0 , α , β , γ 0 , ζ k 0 max W , V , V 0 , ρ L ( Π ) ,
where Π W , V , V 0 , X k , Y k , α , β , γ , ζ k , Θ , Ξ , Ω , ρ , t , τ E , k , λ ¯ k , μ ¯ k . From (31), we have X k , Y k , Θ , Ξ , Ω , α , β , γ , ζ k and W , V , V 0 , ρ , τ E , k , t as the dual and the primal optimal solution of (20) and (31), respectively. Considering (31), the Karush–Kuhn–Tucker (KKT) conditions for the optimal W are given by
Θ 0 , α 0 , β 0 , γ 0 ,
Θ W = 0 ,
[ k = 1 K E n = 1 N R J E , k ( n , n ) ( ) K E , k ( n , n ) ( ) + β + γ H α I N T ] W + Θ = 0 ,
L ( Π ) ρ = 0 ρ = β r σ I 2 γ ω I + β r σ I 2 .
For notational simplicity, we define
R = k = 1 K E n = 1 N R J E , k ( n , n ) ( ) K E , k ( n , n ) ( ) + β + γ H α I N T .
Then, we have
R = T + β + γ H .
However, in general, we define r ˜ = rank ( T ) . Then, we consider two cases of r ˜ with the aim of analyzing R . Firstly, it is assumed that r ˜ = N T , i.e., the matrix T is full rank. Upon that, we obtain
rank ( R ) = rank ( T + ( β + γ ) H ) , rank ( T ) rank ( ( β + γ ) H ) = N T 1 .
However, if rank ( R ) = N T , then according to (33) and (34) it follows that W = 0 , which, of course, cannot be the optimal solution to optimization problem (20). Thus, we obtain rank ( T ) = N T 1 and get the optimal solution W = a ι ι H , a 0 if r ˜ = N T where ι lies in the null space of R with unit norm. Next, we consider the cast where T is rank defective, i.e., r ˜ N T . In this case, the matrix N 1 is modeled as the standard orthogonal basis that spans the null space of T , i.e., T N 1 = 0 . Let π 1 , n represent the n-th column of N 1 , 1 n N T r ˜ . The following equation holds:
π 1 , n H R π 1 , n = π 1 , n H T + β + γ H π 1 , n = β + γ π 1 , n H H π 1 , n = β + γ π 1 , n H h h H π 1 , n .
Since R 0 and | π 1 , n H h | 0 , it follows that
R N 1 = 0 a n d H N 1 = 0 .
Furthermore, according to (37), another inequality is achieved, i.e., rank ( R ) rank ( T ) rank ( H ) = r ˜ 1 . We define Ω 1 as the orthogonal basis for the null space of R ; it then yields
rank ( Ω 1 ) = N T rank R N T r ˜ + 1 .
Next, we come to show that rank Ω 1 = N T r ˜ + 1 . With (40), N 1 spans N T r ˜ orthogonal dimensions of the null space of A , i.e., rank Ω 1 N T r ˜ . Assume that rank ( Ω 1 ) = N T r ˜ ; then, we get Ω 1 = N 1 and express W as W = n = 1 N T r ˜ b n π 1 , n π 1 , n H , where b n 0 , n . Moreover, in this case, there is no information transferred to information receiver according to (40). Therefore, according to (41), there exists only one single subspace spanned by unit norm vector ι that also satisfies N 1 ι = 0 . Therefore, we have
Ω 1 = N 1 ι
and rank ( Ω 1 ) = N T 1 + r ˜ . Furthermore, according to (33) and (34), any optimal solution W for optimization problem (20) can be modeled as
W = n = 1 N T r ˜ b n π 1 , n π 1 , n H + a ι ι H ,
where b n 0 , n , and a 0 . The first part of Theorem 1 is thus proved.
Next, we prove the second part of Theorem 1. Suppose we obtained the optimal solution W , V , V 0 , ρ , t , where W is given by (23) and rank ( W ) > 1 . Then, the new alternative solution W ˜ , V ˜ , V ˜ 0 , ρ ˜ , t ˜ can be given in (23)–(26) and has the following properties:
T r [ ( W ˜ r V ˜ r V ˜ 0 ) H ] = T r [ ( W r V r V 0 ( r + 1 ) n = 1 N T r ˜ b n π 1 , n π 1 , n H ) H ] = T r [ ( W V V 0 ) H ] σ I 2 r ρ ˜ ,
T r [ G k H ( W ˜ r k V ˜ 0 ) G k ] = T r [ G k H ( W n = 1 N T r ˜ b n π 1 , n π 1 , n H r k V ) G k ] T r [ G k H ( W r k V ) G k ] r k σ E , k 2 ,
T r [ ( W ˜ + V ˜ + V ˜ 0 ) H ] = T r [ ( W + V + V 0 ) H ] ω I 1 ρ ˜ ,
T r [ G k H ( W ˜ + V ˜ + V ˜ 0 ) G k ] = T r [ G k H ( W + V + V 0 ) G k ] t ˜ , k ,
T r ( W ˜ + V ˜ + V ˜ 0 ) = T r ( W + V + V 0 ) P ,
W ˜ 0 , V ˜ 0 , V ˜ 0 0 .
The properties from (44) to (49) indicate that the new solution W ˜ , V ˜ , V ˜ 0 , ρ ˜ , t ˜ can achieve the same optimal value as W , V , V 0 , ρ , t while (44)–(49) demonstrate that the new optimal solution satisfies all the constraints of primal problem (20) with rank ( W ˜ ) = 1 . Theorem 1 is thus proved. ☐
With Theorem 1, we can achieve the global optimal solution of the optimization problem (13) with rank ( W ) = 1 as follows. First, we solve the SDP relaxation optimization problem (20) via CVX and obtain the solution W , V , V 0 , ρ , t . If the rank of the obtained W equals one, then W , V , V 0 , ρ , t will be the optimal solution to problem (20). Otherwise, if the rank of W has a larger rank than one, a new optimal solution W ˜ , V ˜ , V ˜ 0 , ρ ˜ , t ˜ with rank ( W ˜ ) = 1 can be constructed according to (23)–(26). Then, W ˜ , V ˜ , V ˜ 0 , ρ ˜ , t ˜ will be the optimal solution to (20). Hence, dropping the rank-one constraint in (15) results in no loss of optimality to (13).

4. Simulation Results

In this section, we provide simulation results to validate the performance of our proposed robust beamforming design algorithm. The considered vehicular secure downlink channel in Section 2 for Rayleigh flat-fading environments with zero-mean and unit variance is considered. Unless specified otherwise, it is assumed that there are K E = 3 energy vehicular receivers. Indeed, we have some other configurations that can be employed with a different number of energy vehicular receivers, transmit antennas and receiver antennas; however, the simulation results will be similar, the only difference is the computation complexity. In our simulations, we set N T = 6 , N R = 3 , r = 10 dB, r k = r ¯ = 0 dB, P = 25 dBm, E min = 0 mW, σ I 2 = σ E , k 2 = σ 2 = 20 dBm. For the nonlinear EH model, we set: M I = M E , k = M = 24 mW, a I = a E , k = a ¯ = 1500 , b I = b E , k = b ¯ = 0.014 . To the imperfect CSI between the base station and energy vehicular receivers, d E , k 2 = υ k 2 G ¯ k 2 is defined as the channel uncertainty ratio to demonstrate the kth energy vehicular receiver’s channel estimate error. Without loss of generality, it is assumed that d k = δ E . We solve the optimization problem (21) and compute the average minimum harvested energy power per energy vehicular receiver by averaging over 1000 channel realizations.
Figure 2 depicts the average minimum harvested energy power per energy vehicular receiver versus the maximum power of the base station, P, for K E = 3 energy vehicular receivers, δ E 2 = 0.02 , and different beamforming design schemes. We learn that the average minimum harvested energy power per energy vehicular receiver of the proposed beamforming design scheme is a monotonically increasing function of P. This is attributed to the fact that a higher harvested energy power is necessary for satisfying constraint C4 when the maximum transmit power requirement of P becomes more stringent. For a comprehensive comparison, Figure 2 also contains the average minimum harvested energy power per energy vehicular receiver of the proposed algorithm that the base station has perfect CSI, the non-robust scheme, the linear EH scheme and two baseline beamforming design schemes. For the non-robust scheme, we treat the estimated channel G ¯ k , k 1 , 2 , , K E as true CSI, and then optimize W , V , V 0 , ρ jointly in (21) according to G ¯ k , k 1 , 2 , , K E . For the linear EH scheme, we adopt the existing linear EH model for the beamforming design algorithm. In particular, W , V , V 0 , ρ optimizes to the maximum the minimum harvested energy power per energy vehicular receiver subject to the constraints in (13). For the baseline scheme 1, we adopt the zero-forcing approach to null out the undesired interference to the information vehicular receiver. In particular, we choose V and V 0 lying in the null space of the channel h . Furthermore, we employ the maximum ratio transmission for transmitting information to the information vehicular receiver. It can be observed that the proposed scheme closely approaches the performance of the perfect CSI scheme. On the other hand, it can be seen that the low computational complexity of the baseline scheme 1 comes at the expense of a significantly lower harvested energy power compared to the proposed scheme and the linear EH scheme. Indeed, the proposed scheme and the linear EH scheme fully use the CSI of all vehicular communication links and optimize the space spanned by the artificial noise and the energy signal for performing beamforming design. On the contrary, for the baseline scheme 1, the base station is unable to fully utilize the available degrees of freedom in beamforming design because the both the energy beam V and artificial noise V 0 are fixed. Finally, with the increase of P, the proposed scheme achieves higher harvested energy power than other schemes for every channel realization. The reason for this is that the proposed scheme takes into account the nonlinearity of practical EH circuits leading to mismatches in beamforming design.
In Figure 3, we study the average minimum harvested energy power per energy vehicular receiver versus the maximum power of the base station, P, for K E = 3 energy vehicular receivers, and different than the maximum channel estimation errors, δ E 2 . As can be seen, with the increase of P, the average minimum harvested energy power per energy vehicular receiver increases for increasing maximum channel estimation error, δ E 2 . Indeed, with increasing the imperfectness of channel estimation, the base station has to allocate less power to the artificial noise and energy signals to ensure vehicular secure communication.
In Figure 4, we move on to investigating how the average harvested energy power per energy vehicular scales with the minimum required SINR of the information vehicular receiver, r, for K E = 3 energy vehicular receivers, δ E 2 = 0.02 , and different beamforming design schemes. It can seen that the average minimum harvested energy power per energy vehicular receiver of the proposed scheme is a monotonically increasing function of r. This is owing to the fact that there is a trade-off of the proposed beamforming design scheme between power collecting of the energy vehicular receivers and the guarantee of physical layer secure of information vehicular receiver. In particular, the achieved SINR of the information vehicular receiver and the minimum harvested energy power per energy vehicular receiver can not be maximized simultaneously with fixed r k and vice versa. Among all the considered beamforming design schemes, the proposed nonlinear EH scheme still achieves a better performance than the other beamforming design schemes.
Figure 5 shows the average minimum harvested energy power per energy vehicular receiver versus the number of the transmit antenna, N T , for K E = 3 energy vehicular receivers, δ E 2 = 0.02 , and different beamforming design schemes. It can observed that the average minimum harvested energy power per energy vehicular receiver in the considered system increases with the increasing number of antennae. These results advise that a higher amount of energy is available in the RF for energy collecting when the number of the transmit antennae increases. This is owing to the fact that with more transmit antennae the direction of energy beamforming matrix V can be more accurately steered towards the energy vehicular receivers, which further increase the amount of energy available in the RF for energy collecting. Among all the considered beamforming design schemes, the proposed beamforming design scheme also achieves a better performance than the other beamforming design schemes.
Figure 6 illustrates the average minimum harvested energy power per energy vehicular receiver versus the maximum channel estimation error, i.e., δ E 2 , for different beamforming design schemes. As seen in Figure 6, it can be seen that the minimum harvested energy per energy vehicular receiver of the proposed robust beamforming design scheme decreases with the increase of the estimated channel error, δ E 2 , which confirms the motivation of the worse case robust optimization. Moreover, we learn intuitively that the proposed nonlinear EH beamforming design scheme performs considerably better than other beamforming design schemes but worse than the perfect case.

5. Conclusions

In this paper, we formulated the beamforming design for secure V2X communication systems with an RF energy collecting vehicular receiver as a non-convex optimization problem, which took into account the imperfection of CSI and the nonlinearity of practical EH circuits. The considered problem formulation supports the dual use of energy signals and artificial noise for efficient energy transfer and facilitating secure vehicular communication in the presence of the potential eavesdroppers (idle energy vehicular receivers). Owing to the intractability of the resulting max-min harvested energy power per energy vehicular receiver problem, the optimization problem was reformulated and solved with a semidefinite relaxation technique and variable substitutions. Numerical results showed the excellent performance of the proposed robust secure beamforming design algorithm.

Author Contributions

S.L., C.L., W.T., B.J. and L.Y. conceived of the main proposal of the robust secure resource allocation scheme, conducted network modeling, and derived analysis and computer simulation of the proposed algorithm. S.L. and W.T. wrote the manuscript. C.L., B.J. and L.Y. provided considerable comments and technique review of the proposed algorithm.

Funding

This work was supported in part by the Natural Science Foundation of Jiangsu Higher Education Institutions of China under Grant 17KJB510016, by the Research Fund for the Doctoral Program of New Teachers of Jiangsu Normal University under Grants 17XLR029, 17XLR003, and 17XLR046, by the National Natural Science Foundation of China under Grants 61372101, 61422105, 61671144, 61801132, 61801170, 61501405, U1404615, 61671144, 41605122 and 61201176, by the National Thirteen Five National Defense Fund under Grant 6140311030207, by Henan Province Science and Technology Program under Grant 182102110401, by China Postdoctoral Science Foundation under Grant 2018M633351, by National Key Research and Development under Grant 2018YFB0904905, by the 863 Program of China under Grant 2015AA01A703, by the Natural Science Foundation of Guangdong Province of China under Grant 2018A030310338, by the Project of Educational Commission of Guangdong Province of China under Grant 2017KQNCX155 and by the Cyrus Tang Foundation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhu, F.; Ukkusuri, S.V. An optimal estimation approach for the calibration of the car-following behavior of connected vehicles in a mixed traffic environment. IEEE Trans. Intell. Transp. Syst. 2017, 18, 282–291. [Google Scholar] [CrossRef]
  2. Mccluskey, B. Connected cars the security challenge connected cars cyber security. Eng. Technol. 2015, 12, 22–27. [Google Scholar]
  3. Woo, S.O.; Jo, H.J.; Lee, D.H. Practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 2015, 16, 993–1106. [Google Scholar]
  4. Koesdwiady, A.; Soua, R.; Karry, F. Improving traffic flow prediction with weather information in connected cars: A deep learning approach. IEEE Trans. Veh. Technol. 2016, 65, 9508–9517. [Google Scholar] [CrossRef]
  5. Liu, C.F.; Bennis, M. Ultra-reliable and low-latency vehicular transmission: An extreme value theory approach. IEEE Commun. Lett. 2018, 22, 1292–1295. [Google Scholar] [CrossRef]
  6. Cao, Y.; Zhao, N.; Yu, F.R.; Jin, M.; Chen, Y.; Tang, J.; Leung, V.C. Optimization or alignment: Secure primary transmission assisted by secondary Networks. IEEE J. Sel. Areas Commun. 2018, 36, 905–917. [Google Scholar] [CrossRef]
  7. Molina-Masegosa, R.; Gozalvez, J. LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Veh. Technol. Mag. 2017, 12, 30–39. [Google Scholar] [CrossRef]
  8. Campolo, C.; Molinaro, A.; Iera, A.; Menichella, F. 5G Network slicing for vehicle-to-everything services. IEEE Wirel. Commun. 2017, 24, 28–45. [Google Scholar] [CrossRef]
  9. Zhou, Z.Y.; Xiong, F.; Xu, C.; He, Y.J.; Mumtaz, S. Energy-efficient vehicular heterogeneous networks for green cities. IEEE Trans. Ind. Inform. 2018, 14, 1522–1531. [Google Scholar] [CrossRef]
  10. Sun, S.; Hu, J.; Peng, Y.; Pan, X.; Zhao, L.; Fang, J. Support for vehicle-to-everything services based on LTE. IEEE Wirel. Commun. 2016, 23, 4–8. [Google Scholar] [CrossRef]
  11. Chen, S.; Hu, J.; Shi, Y.; Peng, Y.; Fang, J.; Zhao, R.; Zhao, L. Vehicle-to-everything (v2x) services supported by LTE-based systems and 5G. IEEE Commun. Stand. Mag. 2017, 1, 70–76. [Google Scholar] [CrossRef]
  12. Soleimani, H.; Boukerche, A. On vehicular safety message transmissions through LTE-Advanced networks. Ad Hoc Netw. 2018, 79, 133–145. [Google Scholar] [CrossRef]
  13. Tan, W.; Mathaiou, M.; Jin, S.; Li, X. Spectral efficiency of DFT-based processing hybrid architectures in massive MIMO. IEEE Wirel. Commun. Lett. 2017, 6, 586–589. [Google Scholar] [CrossRef]
  14. Tan, W.; Xu, G.; De Carvalho, E.; Zhou, M.; Fan, L.; Li, C. Low Cost and High Efficiency Hybrid Architecture Massive MIMO Systems Based on DFT Processing. Wirel. Commun. Mob. Comput. 2018. [Google Scholar] [CrossRef]
  15. Tan, W.; Jin, S.; Wen, C.K.; Tao, J. Spectral efficiency of multi-user millimeter wave systems under single path with uniform rectangular arrays. EURASIP J. Wirel. Commun. Netw. 2017, 1, 458–472. [Google Scholar] [CrossRef]
  16. Tan, W.; Huang, W.; Xie, D.; Liu, W.; Fan, L. Multiuser precoding scheme and achievable rate analysis for massive MIMO system. EURASIP J. Wirel. Commun. Netw. 2018, 1, 1–15. [Google Scholar] [CrossRef]
  17. Tan, W.; Xie, D.; Xia, J.; Tan, W.; Fan, L.; Jin, S. Spectral and energy efficiency of massive MIMO for hybrid architectures based on phase shifters. IEEE Access 2018, 6, 11751–11759. [Google Scholar] [CrossRef]
  18. Ansari, R.I.; Chrysostomou, C.; Hassan, S.A.; Guizani, M.; Mumtaz, S.; Rodriguez, J.; Rodrigues, J. 5G D2D networks: Techniques, challenges, and future prospects. IEEE Syst. J. 2018, 1–18. [Google Scholar] [CrossRef]
  19. Wang, D.; Zhang, R.; Cheng, X.; Quan, Z.; Yang, L. Joint power allocation and splitting (JoPAS) for SWIPT in doubly selective vehicular channels. IEE Trans. Green Commun. Netw. 2017, 1, 494–502. [Google Scholar] [CrossRef]
  20. Atallah, R.; Khabbaz, M.; Assi, C. Energy harvesting in vehicular networks: A contemporary survey. IEEE Wirel. Commun. 2016, 23, 70–77. [Google Scholar] [CrossRef]
  21. Atoui, W.S.; Ajib, W.; Boukadoum, M. Offline and online scheduling algorithms for energy harvesting RSUs in VANETs. IEE Trans. Veh. Technol. 2018, 67, 6370–6382. [Google Scholar] [CrossRef]
  22. Zhao, N.; Cao, Y.; Yu, F.R.; Chen, Y.; Jin, M.; Leung, V.C. Artificial noise assisted secure interference networks with wireless power transfer. IEEE Trans. Wirel. Commun. 2018, 67, 1087–1098. [Google Scholar] [CrossRef]
  23. Zhao, J.; Xu, X. Wireless energy transfer in downlink and wireless communications in uplink for multi-user MIMO networks. Phys. Commun. 2018, 29, 48–54. [Google Scholar] [CrossRef]
  24. Guo, J.; Zhao, N.; Yu, F.R.; Liu, X.; Leung, V.C. Exploiting adversarial jamming signals for energy harvesting in interference networks. IEEE Trans. Wirel. Commun. 2017, 16, 1267–1280. [Google Scholar] [CrossRef]
  25. Zhao, N.; Yu, F.R.; Leung, V.C. Wireless energy harvesting in interference alignment networks. IEEE Commun. Mag. 2015, 72–78. [Google Scholar] [CrossRef]
  26. Zhao, N.; Yu, F.R.; Leung, V.C. Opportunistic communications in interference alignment networks with wireless power transfer. IEEE Wirel. Commun. 2015, 22, 88–95. [Google Scholar] [CrossRef]
  27. Zhang, H.; Huang, Y.; Li, C.; Yang, L. Secure transmission scheme for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers. In Proceedings of the 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, USA, 6–9 September 2015; pp. 1–5. [Google Scholar]
  28. Ng, D.W.K.; Schober, R. Max-min fair wireless energy transfer for secure multiuser communication systems. In Proceedings of the Information Theory Workshop (ITW 2014), Hobart, Australia, 2–5 November 2014; pp. 326–330. [Google Scholar]
  29. Zhang, Q.; Huang, X.; Li, Q.; Qin, J. Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE Trans. Commun. 2015, 63, 906–915. [Google Scholar] [CrossRef]
  30. Xing, H.; Wong, K.K.; Chu, Z.; Nallanathan, A. To Harvest and Jam: A paradigm of self-sustaining friendly jammers for secure AF relaying. IEEE Trans. Signal Process. 2015, 63, 6616–6631. [Google Scholar] [CrossRef]
  31. Khandaker, M.; Wong, K.K.; Zhang, Y.; Zheng, Z. Probabilistically robust SWIPT for secrecy MISOME systems. IEEE Trans. Inform. Forensics Secur. 2017, 12, 211–226. [Google Scholar] [CrossRef]
  32. Khandaker, M.; Wong, K.K. SWIPT in MISO multicasting systems. IEEE Wirel. Commun. Lett. 2014, 3, 277–280. [Google Scholar] [CrossRef]
  33. Xu, W.; Li, S.; Lee, C.H.; Feng, Z.; Lin, J. Optimal secure multicast with simultaneous wireless information and power transfer in the presence of multiparty eavesdropper collusion. IEEE Trans. Veh. Technol. 2016, 65, 9123–9137. [Google Scholar] [CrossRef]
  34. Boshkovska, E.; Ng, D.W.K.; Zlatanov, N.; Schober, R. Practical nonlinear energy harvesting model and resource allocation for SWIPT systems. IEEE Commun. Lett. 2015, 19, 2082–2085. [Google Scholar] [CrossRef]
  35. Li, S.; Li, C.; Jin, S.; Wei, M.; Yang, L. SINR balancing technique for robust beamforming in V2X-SWIPT system based on a nonlinear EH model. Phys. Commun. 2018, 29, 95–102. [Google Scholar] [CrossRef]
  36. Boshkovska, E.; Koelpin, A.; Ng, D.W.K.; Zlatanov, N.; Robert, S. Robust beamforming for SWIPT systems with nonlinear energy harvesting model. In Proceedings of the 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK, 3–6 July 2016; pp. 1–6. [Google Scholar]
  37. Boshkovska, E.; Morsi, R.; Ng, D.W.K.; Robert, S. Power allocation and scheduling for SWIPT systems with nonlinear energy harvesting model. In Proceedings of the International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; pp. 1–6. [Google Scholar]
  38. Niu, H.; Guo, D.; Huang, Y.; Zhang, B. Robust energy efficiency optimization for secure MIMO SWIPT systems with nonlinear EH model. IEEE Commun. Lett. 2017, 21, 2610–2613. [Google Scholar] [CrossRef]
  39. Mishra, D.; Alexandropoulos, G.C.; De, S. Energy sustainable IoT with individual QoS constraints through MISO SWIPT multicasting. IEEE Internet Things J. 2018, 5, 2856–2867. [Google Scholar] [CrossRef]
  40. Mishra, D.; Alexandropoulos, G.C. Jointly optimal spatial channel assignment and power allocation for MIMO SWIPT systems. IEEE Wirel. Commun. Lett. 2018, 7, 214–217. [Google Scholar] [CrossRef]
  41. Mishra, D.; Alexandropoulos, G.C. Transmit precoding and receive power splitting for harvested power maximization in MIMO SWIPT systems. IEEE Trans. Green Commun. Netw. 2018, 2, 774–786. [Google Scholar] [CrossRef]
  42. Matolak, D.W. Channel modeling for vehicle-to-vehicle communications. IEEE Commun. Mag. 2018, 5, 76–83. [Google Scholar] [CrossRef]
  43. Xiao, H.; Chen, Y.; Zhang, Q.; Chronopoulos, A.; Zhang, Z.; Ouyang, S. Joint clustering and power allocation for the cross roads congestion scenarios in cooperative vehicular networks. IEEE Trans. Intell. Transp. Syst. 2018, 99, 1–11. [Google Scholar] [CrossRef]
  44. Duy, T.T.; Alexandropoulos, G.C.; Tung, V.T.; Son, V.N.; Duong, T.Q. Outage performance of cognitive cooperative networks with relay selection over double-Rayleigh fading channels. IET Commun. 2016, 10, 57–64. [Google Scholar] [CrossRef]
  45. Antonescu, B.; Moayyed, M.T.; Basagni, S. mmWave channel propagation modeling for V2X communication systems. In Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–6. [Google Scholar]
Figure 1. (a) V2X-SWIPT system model for two energy vehicular receivers and one information vehicular receiver; (b) the block diagram of the information vehicular receiver model for wireless information and power transfer.
Figure 1. (a) V2X-SWIPT system model for two energy vehicular receivers and one information vehicular receiver; (b) the block diagram of the information vehicular receiver model for wireless information and power transfer.
Sensors 18 03294 g001
Figure 2. Average minimum harvested power per energy vehicular receiver versus total transmit power, P.
Figure 2. Average minimum harvested power per energy vehicular receiver versus total transmit power, P.
Sensors 18 03294 g002
Figure 3. Average minimum harvested power per energy vehicular receiver versus total transmit power P with different δ E 2 .
Figure 3. Average minimum harvested power per energy vehicular receiver versus total transmit power P with different δ E 2 .
Sensors 18 03294 g003
Figure 4. Average minimum harvested power per energy vehicular receiver versus the minimum required SINR of the information vehicular receiver, r.
Figure 4. Average minimum harvested power per energy vehicular receiver versus the minimum required SINR of the information vehicular receiver, r.
Sensors 18 03294 g004
Figure 5. Average minimum harvested power per energy vehicular receiver versus the number of transmit antennae, N T .
Figure 5. Average minimum harvested power per energy vehicular receiver versus the number of transmit antennae, N T .
Sensors 18 03294 g005
Figure 6. Average minimum harvested power per energy vehicular receiver versus channel estimation error, δ E 2 .
Figure 6. Average minimum harvested power per energy vehicular receiver versus channel estimation error, δ E 2 .
Sensors 18 03294 g006

Share and Cite

MDPI and ACS Style

Li, S.; Li, C.; Tan, W.; Ji, B.; Yang, L. Robust Beamforming Design for Secure V2X Downlink System with Wireless Information and Power Transfer under a Nonlinear Energy Harvesting Model. Sensors 2018, 18, 3294. https://doi.org/10.3390/s18103294

AMA Style

Li S, Li C, Tan W, Ji B, Yang L. Robust Beamforming Design for Secure V2X Downlink System with Wireless Information and Power Transfer under a Nonlinear Energy Harvesting Model. Sensors. 2018; 18(10):3294. https://doi.org/10.3390/s18103294

Chicago/Turabian Style

Li, Shidang, Chunguo Li, Weiqiang Tan, Baofeng Ji, and Luxi Yang. 2018. "Robust Beamforming Design for Secure V2X Downlink System with Wireless Information and Power Transfer under a Nonlinear Energy Harvesting Model" Sensors 18, no. 10: 3294. https://doi.org/10.3390/s18103294

APA Style

Li, S., Li, C., Tan, W., Ji, B., & Yang, L. (2018). Robust Beamforming Design for Secure V2X Downlink System with Wireless Information and Power Transfer under a Nonlinear Energy Harvesting Model. Sensors, 18(10), 3294. https://doi.org/10.3390/s18103294

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop