Next Article in Journal
Comparing the Currents Measured by CARTHE, CODE and SVP Drifters as a Function of Wind and Wave Conditions in the Southwestern Mediterranean Sea
Previous Article in Journal
Brain Tumor/Mass Classification Framework Using Magnetic-Resonance-Imaging-Based Isolated and Developed Transfer Deep-Learning Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty

1
School of Artificial Intelligence, Henan University, Zhengzhou 450046, China
2
School of Physics and Electronics, Henan University, Kaifeng 475004, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(1), 370; https://doi.org/10.3390/s22010370
Submission received: 6 December 2021 / Revised: 22 December 2021 / Accepted: 30 December 2021 / Published: 4 January 2022
(This article belongs to the Section Sensor Networks)

Abstract

:
This paper considers the physical layer security (PLS) of a simultaneous wireless information and power transfer (SWIPT) relay communication system composed of a legitimate source–destination pair and some eavesdroppers. Supposing a disturbance of channel status information (CSI) between relay and eavesdroppers in a bounded ellipse, we intend to design a robust beamformer to maximum security rate in the worst case on the constraints of relay energy consumption. To handle this non-convex optimization problem, we introduce a slack variable to transform the original problem into two sub-problems firstly, then an algorithm employing a semidefinite relaxation (SDR) technique and S-procedure is proposed to tackle above two sub-problems. Although our study was conducted in the scene of a direct link among source, destination, and eavesdroppers that is non-existing, we demonstrate that our conclusions can be easily extended to the scene for which a direct link among source, destination and eavesdroppers exist. Numerical simulation results compared with the benchmark scheme are provided to prove the effectiveness and superior performance of our algorithm.

1. Introduction

The future Wireless Sensor Network (WSN) or Internet of Things (IoT) network is composed of billions of energy-limited devices. Since it is frequently deployed in harsh environments, those energy-limited devices are usually difficult to charge. How to give a stable energy supply to those energy-limited devices and thus prolong the life cycle of WSNs is a hot research topic today. Simultaneous wireless information and power transfer (SWIPT) have been proposed as a promising technology to provide power as well as to transmit information for wireless devices, thus it can effectively prolong the life of the energy-limited devices [1]. Moreover, since wireless charging techniques are employed, SWIPT may be flexibly used in electronic devices embedded in building structures or human bodies. Therefore, SWIPT technology in WSN has aroused extensive interest [2].
Due to the dynamic topology of mobile WSN and the open nature of wireless channels, information transmission in WSN may be easy to be intercepted and eavesdropped. At present, the security of wireless communication systems is commonly protected by a cryptographic encryption method which is based on multi-layer protocols. However, the complicated encryption system may induce huge computing challenges at base stations and users, while secure transmission of keys is still difficult to be guaranteed [3]. The physical layer security (PLS) technique is proposed to handle the above problem; since it is free from computational burden caused by encryption and decryption and works well even if the eavesdropper has strong computing power, the foreground of PLS in security of WSN is nice [4].
Traditionally, the cooperative relay technique widely used in WSN is employed to achieve spatial diversity gain as well as to expand WSN coverage [5]. PLS of cooperative relay WSN is a noteworthy issue too. More specifically, to improve PLS is to improve the confidentiality rate of the signal received by users. PLS methods of cooperative relay WSN are divided roughly into two categories. The first is the cooperative jammer (CJ) method, in which the relay transmits artificial noise (AN) to interfere with eavesdroppers. In [6], the relay cluster is divided into two parts, one amplifies and forwards the signal, the other produces AN to interfere with eavesdroppers. In [7], the received signal of each relay is divided into two parts, one is used to forward the signal, and the other is used to harvest energy and then use harvested energy to generate AN to interfere to eavesdroppers. However, generating AN may consume additional energy of energy-limited services embedded in the relay as well as interfere with the legitimate receiver. The other way related to PLS in cooperative relay WSN is the secure beamforming. Security rate and computation complexity of some schemes including maximum secure rate and the zero-space beamforming at total power constraints and individual power constraints of the relay are discussed in [8]. Li proposed the secure relay beamforming algorithm based on concave convex optimization at the power constraints of relay transmitter and energy collector in a multi-antenna SWIPT relay network [9]. The joint optimization of beamformer and energy division ratio in a multi-antenna relay network is also proposed [10]. In an energy-limited full-duplex (FD) relay network, time allocation ratio, energy, and information beamformer are jointly optimized to achieve the maximum secrecy rate [11]. Assuming the channel status information (CSI) of eavesdropper and CSI of legitimate are uncorrelated, Yang proposed a zero-space beamforming algorithm to force the confidential signal into zero space of the eavesdropper to enhance information security [12].
Although much work has been done on secure beamforming, the above research is merely carried out by supposing the CSI of the legitimate receiver and eavesdropper fully known, which is not realistic in the actual scenario. Since eavesdroppers may keep silent to hide themselves, the relay may have difficulty obtaining the accurate CSI between relay and eavesdropper, leading performance of the above algorithms to deterioration. Therefore, how to design a robust beamforming algorithm with tolerance for CSI disturbance to improve the security of SWIPT-assisted communication system is challenging work. Supposing CSI error follows Gaussian distribution, the optimal security rate is achieved by the joint optimization of relay beamformer and power allocation factors [13]. Assuming the CSI error between the base station and the user in a bounded ellipsoid region, a robust beamforming scheme based on S-procedure is proposed to achieve the minimum base station transmission power [14]. The robust sum rate optimization in non-orthogonal multiple access (NOMA) amplifying and forwarding (AF) relay networks is considered in [15], and the power allocation scheme and beamforming matrix are jointly optimized to achieve the maximum rate at the quality of service (QoS) constraints and relay transmission power constraints. In addition, a joint information beamforming and energy beamforming scheme based on semidefinite relaxation (SDR) and successive convex approximation (SCA) techniques is proposed to achieve the maximum secrecy rate of the multiple input single output (MISO) network [16], in which the CSI error is also restrained in a bounded elliptic region.
It is worth noting that the difference between our work and the above works are the following. Different from [13], we discussed the bounded ellipsoid model of the channel error instead of the Gaussian distribution model, which is widely used in the literature [14,15,16,17,18]. Although the bounded ellipsoid channel error model is discussed in [14,15,16,17,18], the point to point algorithm proposed in [14,16,17] can not be directly generalized to our SWIPT relay network. The security problem of two-tier downlink heterogeneous network is studied in [18], since channel error between the base station and the eavesdropper is not involved in [18], and their system models are too different from ours, and its conclusions could not be directly extended to SWIPT WSN. The research in [15] only focuses on how to obtain the best quality of service for users, while ignoring the problem of user information leakage. Our research can effectively prevent information leakage while maximizing user transmission rate.
The main contributions of our work are summarized as follows:
We propose the robust optimization method to maximize the security rate of the destination under the constraints such as transmission power of relay, signal to interference plus noise power ratio (SINR) of receiver, and CSI error between relay and eavesdroppers. Our method solves the problem that the performance of existing methods deteriorates sharply when the relay fails to obtain perfect CSI. Since perfect CSI is difficult to obtain in practical scenarios, our method has better performance.
To circumvent the non-convexity of the original optimization problem, the original problem is decoupled into two subproblems by introducing a slack variable, and thus can be iteratively solved by an SDR technique and bisection method, respectively.
For simplicity, the scene without a direct connection between the source, the legitimate destination and the eavesdropper are mainly involved in the proposed algorithm; however, we have proved that the proposed algorithm can be generalized to SWIPT WSN with a direct connection between the source, the legitimate destination and the existing eavesdropper.
Extensive numerical results are presented to demonstrate the system parameters impacting the performance of the proposed scheme and the superior performance of the proposed scheme against three other benchmark schemes.
The rest of this paper is organized as follows: the system model and the problem formulation are presented in Section 2. Then, we design an effective iterative algorithm to achieve the maximum secrecy rate in the worst case in Section 3. Section 4 presents numerical results to validate the proposed scheme. Finally, Section 5 concludes the paper and extends the future research work.
Notations: Bold lowercase letters and capital letters represent column vectors and matrices, respectively, The transpose, conjugate transpose, trace, and rank of a matrix S are denoted by S T , S H , Tr S , and rank S , respectively. S i , j signals the i , j term of the matrix S . The modulus of a complex scalar s and euclidean norm of a vector s are denoted by s and s , respectively. I N denotes the N-dimensional identity matrix. diag s is the diagonal matrix whose diagonal elements are the vector s . E [ ] representing mathematical expectation. x + is the abbreviation of max x , 0 .

2. System Model and Problem Formulation

Consider the SWIPT-assisted relay communications system shown in Figure 1, which consists of a source (S), a legitimate destination (D), K eavesdroppers (Eve), and N energy limited relays (R). Each piece of the equipment is equipped with a single antenna. Furthermore, we assume that there is no direct link among S, D, and Eve (The algorithm proposed by this paper is also applicable to the case of direct link. Refer to Remark 1 at the end of Section 3 [19]), which usually occurs at the long-distance path loss or heavy channel fading [20,21,22,23,24,25]. For example, in a long range missile detection system, the satellite can act as a relay to forward information to the control center without a direct link between monitoring nodes. Here, we consider the fact that relay uses the power splitting (PS) scheme to harvest energy from the Radio Frequency (RF) signal transmitted by S to forward the confidential information to D in the meantime (There are two well-known practical receiver schemes (i.e., time switching (TS) and power splitting PS). PS scheme can process information and harvest energy at the same time to avoid interruption of information transmission, so we adopt PS scheme).
Following by SWIPT-AF relay protocol, relay employs cascading two stages to process the signal received by i-th relay [7]. In the first stage, namely the receiving stage, the signal received by i-th relay can be expressed as
y r i = h s r i x s + n a , i , i ,
where x represents the transmit signal at S with power E ( x s 2 ) = P s , P s represents the transmitted power of S. h s r i represents the channel complex coefficient from S to i-th R, and n a , i CN 0 , σ a , i 2 is the additive white Gaussian noise with 0 mean and σ a , i 2 variance received by the k-TH relay.
Each AF relay adopts a PS receiver shown in Figure 2 to process signals. Specifically, the relay divides the received signal into two parts. One part 1 α i y r i is used for information decoding (ID); the other part α i y r i is used for energy harvest, where α i is the power splitting ratio. In general, the energy harvested from the received RF power may be modeled by a nonlinear equation. However, since there is currently no widely accepted nonlinear model related to energy harvest, we employ the linear energy collection model here [26]. Thus, the energy harvested by the relay is modeled as
E R = η α P s h s r 2 2 ,
where η ( 0 < η < 1 ) represents the EH efficiency and h s r = [ h s r i ] i = 1 N .
In the second stage, called the amplification and forwarding stage, linear amplification of the signal received by the i-th relay can be described as
x r i = β i 1 α i y r i + n c , i , i ,
where n c , i CN 0 , σ c 2 is baseband conversion noise of the RF signal. β i is a complex coefficient given by
β i = η α i h s r i 2 P s 1 α i h s r i 2 P s + 1 α i σ a 2 + σ c 2 e j θ i .
Due to limited energy in the relay, the energy of the relay output signal must be less than the energy harvested by the relay, viz., the following constraints must be satisfied:
x r i 2 E R .
To sum up, transmitting signals of relays can be described as
x r = Q β α h s r P s x s + Q β α n a + Q β n c ,
where Q β α and Q β are the diagonal matrix with diagonal elements are ( β 1 1 α 1 , ,   β N 1 α N ) T and β 1 , , β N T , respectively. n a CN 0 , σ a 2 is the additive white Gaussian noise received by R, where σ a 2 represents the variance of n a . n c CN 0 , σ c 2 is the baseband conversion noise of the RF signal, where σ c 2 represents the variance of n c . Thus, signals received by the legitimate destination can be described as
y d = h r d H x r + n d ,
where n d CN 0 , σ d 2 is the additive white Gaussian noise received by D, where σ d 2 represents the variance of n d . h r d = [ h r i d ] i = 1 N represents the channel complex coefficient from relay to legitimate destination. Substituting (6) into (7), we can obtain
y d = h r d H Q β α h s r P s x s + h r d H Q β α n a + h r d H Q β n c + n d .
Meanwhile, the signal received by each eavesdropper is expressed as
y e , k = h ¯ r e , k H x r + n e , k ,
where h ¯ r e , k represents the nominal channel complex coefficient from relay to k-th eavesdroppers, n e , k CN 0 , σ e , k 2 is the additive white Gaussian noise. Substituting (6) into (9), the signal received by the k-th eavesdropper can be described as
y e , k = h ¯ r e , k H Q β α h s r P s x s + h ¯ r e , k H Q β α n a + h ¯ r e , k H Q β n c + n e , k .
In summary, the SINR of D and Eve can be respectively described as
SINR S , D = P s h r d H Q β α h s r 2 σ a 2 h r d H Q β α 2 + σ c 2 h r d H Q β 2 + σ d 2 ,
SINR S , E , k = P s h ¯ r e , k H Q β α h s r 2 σ a 2 h ¯ r e , k H Q β α 2 + σ c 2 h ¯ r e , k H Q β 2 + σ e , k 2 .
Supposing CSI disturbance between R and Eve following the elliptical sphere uncertainty model, i.e.,
h r e , k = h ¯ r e , k + Δ h r e , k ,
where h r e , k represents the actual channel coefficient vector between R and the k-th Eve, and Δ h r e , k represents the bounded estimate error described by Δ = { Δ h r e , k |   Δ h r e , k 2 δ 2 , k , δ 0 } , where δ is the upper bound on the error. It can be considered that the relay has perfect CSI when h r e , k = h ¯ r e , k . After introducing the channel error model, the SINR of the received signal of the k-th eavesdropper can be re-expressed as
SINR S , E , k = P s h ¯ r e , k + Δ h r e , k H Q β α h s r 2 σ a 2 h ¯ r e , k + Δ h r e , k H Q β α 2 + σ c 2 h ¯ r e , k + Δ h r e , k H Q β 2 + σ e , k 2 .
Hereto, we have obtained the SINR of the signals received by the D and the Eve, respectively, and we defined the secrecy rate as
r S e c = min k = 1 K r S , D r S , E , k + ,
where r S , D = 1 / 2 log 1 + SIN R S , D represents the mutual information between S and D. r S , E , k = 1 / 2 log 1 + SIN R S , E , k represents the mutual information between the k-th Eve and S. The coefficient 1 / 2 is due to the relay working in a half-duplex model.
For convenience, we may convert r S , D and r S , E , k into the following forms:
r S , D = 1 2 log 2 1 + h s d H w 2 g s d H w 2 + σ d 2 r S , E , k = 1 2 log 2 1 + h s e , k H w 2 g se , k H w 2 + σ e , k 2 ,
where w = w 1 , w 2 , . . . , w N T is defined as a beamforming vector, and the other parameters are defined as follows:
h s d i = Δ h s r i h r i d η α i 1 α i P s 1 α i h s r i 2 P s + σ a 2 + σ c 2 , i ;
g s d i = Δ h s r i h r i d η α i P s 1 α i σ a 2 + σ c 2 1 α i h s r i 2 P s + σ a 2 + σ c 2 , i ;
h s e , k i = Δ h s r i h r i e , k η α i 1 α i P s 1 α i h s r i 2 P s + σ a 2 + σ c 2 , i , k ;
g s e , k i = Δ h s r i h r i e , k η α ¯ i P s 1 α i σ a 2 + σ c 2 1 α i h s r i 2 P s + σ a 2 + σ c 2 , i , k .
Considering that the error of CSI can be described by an elliptic bounded model, we intend to design a beamforming vector which may achieve the maximum secrecy rate in all possible eavesdropper CSI errors; thus, the optimization problem mentioned above can be described as
max w min Δ h r e , k Δ 1 2 r S , D r S , E , k + s . t . Tr η α i P s h s r i 2 w w H E i η α i P s h s r i 2 , i Δ = { Δ h r e , k | Δ h r e , k 2 δ 2 , k } ,
where E i = diag ( e i ) , e i is the vector whose i-th entry is 1, and the other entries are 0. Considering that the channel error only exists between the eavesdropper and the relay, (21) can be translated into
max w , Δ h r e , k Δ 1 2 r S , D max r S , E , k s . t . Tr η α ¯ i P s h s r i 2 w w H E i η α ¯ i P s h s r i 2 , i Δ = { Δ h r e , k | Δ h r e , k 2 δ 2 , k } ,
Observing (22), we can find that two optimized variables are coupled in objective functions; thus, the original problem is non-convex and hard to handle. We will explore the solution method of this problem in the next section.

3. Robust Beamforming Optimization for Physical Layer Security

In this section, we aim to settle the problem of maximizing the secrecy rate under the bounded CSI error model proposed in Section 2. To settle the above non-convex problem, we introduce a slack variable τ to convert the original problem into P1:
( P 1 ) min τ , w 1 2 r S , D 1 2 log 1 τ
s . t . max Δ h r e , k Δ r S , E , k log ( 1 τ ) , k
Tr η α i P s h s r i 2 w w H E i η α i P s h s r i 2 , i ,
Observing ( P 1 ) , it can be seen that, although the introduced variable τ solves the maximum and minimum forms of the source problem (22), due to the coupling of τ and w in the objective function (23) and the form of constraint (24), the problem (23) is still non-convex and unsolvable. To settle this problem, we propose an algorithm to transform it into a two-level optimization problem. Specifically, the lower-level optimization problem can be expressed as the following form (P2):
( P 2 ) min w h s d H w 2 g s d H w 2 + σ d 2
s . t . max Δ h r e , k Δ r S , E , k log ( 1 τ ) , k
Tr η α i P s h s r i 2 w w H E i η α i P s h s r i 2 , i .
which can be regarded as a quadratic programming problem for the variable w when the variable τ is fixed.
The upper-level optimization problem is determined by the solution of the lower-level optimization problem. Let R ( τ ) = τ γ ( τ ) , where γ ( τ ) represents the objective function of the optimization problem (P2). The objective function of the optimization problem (23) could be modeled as
1 2 log 1 + γ τ 1 2 log 1 τ = 1 2 log τ + R τ .
Consequently, we can describe the upper-level optimization problem (P3) as
( P 3 ) max τ 1 2 log τ + R τ s . t . τ min τ 1 ,
The meaning of 1 / τ in problem (23) is the maximum allowable SINR of channels between relay and eavesdroppers which satisfies the non-zero security rate. τ min represents the smallest feasible value of τ given by the following inequality:
τ 1 1 + P s h s d 2 w 2 / σ d 2 1 1 + N P s h s d 2 / σ d 2 = Δ τ min ,
where the first inequality is obtained according to Cauchy–Schwarz inequality, and the second inequality is obtained by w i 2 1 , i .
Suppose that we can obtain the corresponding R ( τ ) for any τ in the definition domain, and then the optimal solution τ * of the (30) can be efficiently solved within the region [ τ min , 1 ] through bisection method, etc. Heretofore, we have solved the upper-level problem (30), but, due to the non-convexity of constraint (27), the lower-level problem (26) is still difficult to settle. It is obvious that constraint (27) can be rewritten in the following form:
Δ h r e , k Δ h s e , k H w 2 g se , k H w 2 + σ e , k 2 1 τ 1 ,
Considering the ellipsoidal uncertainty model, using S-procedure [27], inequation (32) can be expressed in the form of a series of linear matrix inequalities (LMI), which are summarized as the following proposition:
Proposition 1.
The constraints (32) hold if and only if there exist μ k 0 , k = 1 , . . . K such that the following LMIs hold:
μ k I N + W W h ¯ r e , k H h ¯ r e , k W ψ k 0 , k .
Proof. 
See Appendix A.    □
Using Proposition 1, the constraint (27) can be converted to an LMI form, and then problem (26) can be expressed as
max W , μ k , ψ k Tr h ^ r d H W h ^ r d Tr g ^ r d H W g ^ r d + σ d 2 s . t . W 0 , μ k 0 , ψ k 0 μ k I N + W W h ¯ r e , k h ¯ r e , k H W ψ k 0 , k Tr η α i P s h s r i 2 W E i η α i P s h s r i 2 , i ,
where h ^ r d = Δ diag ( 1 α i ) h r d , g ^ r d = Δ diag 1 α i σ a 2 + σ c 2 h r d .
At this point, the problem is easy to solve while still not a standard convex optimization problem. In order to settle the fractional form of the above problem, we define W ˜ = ξ W , ξ = Tr g ^ r d H W g ^ r d + σ d 2 1 according to the Charnes–Cooper transformation. By combining the above definitions, we could convert the above problem into a standard convex optimization problem:
( P 4 ) max W ˜ , μ k , ψ k Tr h ^ r d H W ˜ h ^ r d s . t . W ˜ 0 , μ k 0 , ψ k 0 Tr g ^ r d H W ˜ g ^ r d + σ d 2 = τ μ k I N + W ˜ W ˜ h ¯ r e , k h ¯ r e , k H W ˜ ψ k 0 , k Tr η α i P s h s r i 2 W ˜ E i μ k η α i P s h s r i 2 , i .
Thus far, we convert the original non-convex problem (22) into two convex problems (P3) and (P4). (P3) can be solved by using the bisection method, and (P4) can be solved by using the interior point method or a convex optimization toolbox such as CVX [27]. If the solution W ˜ * of the problem (P4) satisfies Rank W ˜ * = 1 , w could be obtained by EVD, otherwise by Gaussian randomization. In addition, the specific algorithm is summarized in Algorithm 1.
Algorithm 1 Proposed algorithm for solving P 1
1. Initialize relevant basic parameters;
2. Set s = τ min , v = τ max = 1 , accuracy ϵ > 0 ;
Repeat
3. τ c u r = s + v l + u 2 2 ;
4. Solve (35), get R τ c u r and W ˜ ;
5. Solve (30), get r c u r = ( 1 / 2 ) log 2 τ c u r + R τ c u r ;
6. Set τ t e m = max τ c u r Δ τ , τ min , where Δ τ > 0 denotes a minimum,
return r t e m = ( 1 / 2 ) log 2 τ t e m + R ( τ t e m ) ;
7. If r c u r > r t e m , s = τ c u r ,
else v = τ c u r ;
8. until | r c u r r t e m | < ϵ
9. W * = W ˜ , get w * by EVD or Gaussian randomization to W * , r * = r c u r .
Remark 1.
Although the problem described in (22) is modeled without a direct link between S, D, and Eve, it is can be easily extended to the case direct link between S, D, and Eve existing. Let a direct link channel coefficient between S and D be defined as h s d D L and the direct link channel coefficient vector between S and the k-th Eve be defined as h ¯ s e , k D L , respectively. The signals received by D and Eve through the direct link could be respectively defined as
y S , D D L = h s d DL x s + n s d D L ,
y S , E , k D L = h ¯ s e , k DL x s + n s e , k D L .
where n s d D L CN 0 , 1 represents the noise signal received by D, n s e , k D L CN 0 , 1 represents the noise signal received by Eve.By stacking the direct link signals and relay forward signals received by the D and Eve into a 2 × 1 vector, respectively, the reception rate of D and Eve can be defined as
r S , D DL = log 1 + P s h s d DL 2 + h s d H w 2 g s d H w 2 + σ d 2 , r S , E , k DL = log 1 + P s h ¯ se , k DL 2 2 + h s e , k H w 2 g se , k H w 2 + σ e 2 .
It can be seen that the only difference between (38) and (16) is the additive constant. Similar to a model without a direct link between the S, D, and eavesdropper, supposing a direct link between existing D and S, imperfect CSI between relay and eavesdropper can also be modeled as a bounded ellipsoid, i.e., h s e , k D L h ¯ s e , k D L 2 ξ k , where ξ k represents the upper bound of channel error of the k-th eavesdropper. Then, the worst-case transmission rate of system is described as
max h s e , k DL : h s e , k DL h ¯ s e , k DL 2 ξ k r S , E , k DL = log 1 + P s h ¯ s e , k DL + ξ k 2 + h s e , k H w 2 g se , k H w 2 + σ e 2 ,
which again differs from the no-direct link term in (16) only in some constant term [21]. Hence, our model of direct link non-existing can be straightforwardly extended to the case of direct link existing. However, it is worth noting that, if the direct links between S and Eve are strong, a positive secrecy rate may be achieved with difficulty.

4. Complexity Analysis and Numerical Results

In this section, we first derive the complexity of the proposed algorithm. By analyzing Algorithm 1, it can be found that the complexity of the proposed algorithm is concentrated from solved (P2) in each iteration. Due to the LMI form introduced by S-procedure and SDR, the complexity of the problem in (P2) is mainly derived from solving the following quantitative LMI including K linear matrix inequalities of N + 1 dimensions, N linear matrix inequalities of 1 dimension, and K linear matrix inequalities of one dimension. Similar to [28], the complexity of the proposed robust secure beamforming algorithm can be roughly expressed as K N + 1 K 2 N 4 ln ( 1 / ε ) .
Next, we present extensive numerical simulation results to prove the performance of the proposed algorithm. Our comparison algorithm comes from similar works presented in [7,12,13]. As shown in Figure 1, we assume that the S is located at the edge of a circular region and the legitimate destination is located at a symmetrical position of the source on the circle. AF relay and eavesdroppers (only existing in the “security zone”) are randomly distributed within a circle of radius R. Similar to some related work, we assume that all channel models used in the paper contain large-scale path loss and small-scale multipath fading, the small-scale fading is assumed to be Rician fading, and the path loss model can be described as
L = A 0 d d 0 κ .
Parameters related to experiments are shown in Table 1.
Convergences of the algorithms are plotted in Figure 3. It can be seen that the convergence of the three algorithms is similar, and all converge to the maximum within seven iterations, but the proposed algorithm achieves a higher secrecy rate. The reason is that the cooperative jamming beamforming (CJ-SPS) algorithm [7] only considers the performance in the case of perfect CSI. Although AN is introduced to interfere with eavesdroppers, the security of the system is still deteriorating in the presence of CSI errors. Since designs for CSI error follow Gaussian distribution, the probabilistic constraint beamforming (PC-SPS) algorithm [13] has a certain robustness, and its performance is slightly better than the CJ-SPS algorithm, while the proposed algorithm can achieve a higher security rate at the ellipsoidal bounded CSI error.
In the proposed algorithm, the levels of CSI error impacting the security of the system are plotted in Figure 4a. As can be seen from the figure, the secrecy rate increases with the source transmission power increasing. It is mainly because of harvest energy of relay increasing with source transmission power, resulting in more transmission power of relay. Moreover, the security of system will decrease with CSI error increasing. In addition, Figure 4b shows that the secrecy rate varies with the channel error at the different transmission power of the source, and the conclusion is similar to Figure 4a. With the CSI error increasing, the achieved secrecy rate decreases gradually, and this is because the CSI has greater uncertainty within a larger error bound, leading the worst-case achieved secrecy rate to increases.
The performance of the proposed algorithm is compared with the three benchmark algorithms mentioned in the introduction in Figure 5. Clearly, relay may achieve higher secrecy rate with the transmitting power P s increasing. In addition, compared with the other benchmark algorithms, the performance of the proposed algorithm is improved as expected. It is worth noting that the PC-SPS algorithm models CSI error as Gaussian distribution, which is inconsistent with actual CSI error, thus leading to the worst performance.
Next, Figure 6a compares the system performance of our scheme at different energy collection efficiency η . As expected, the security rate increases with the energy collection efficiency η at any transmission power. The reason for the above phenomenon is that the relay can obtain more energy with the η increasing, thus having more transmission power. However, since SINR obtained by the eavesdropper may also enhance following η increasing, the increasing trend of security rate may slow down at the large η . The security rate of four algorithms at the different η are plotted in Figure 6b. Similar to Figure 6a, the secrecy rate of all algorithms increases with η . Moreover, our proposed algorithm achieves the highest secrecy rate since bounded CSI errors impacting the performance of the system are fully considered.
The number of relays impacting the security rate of system is described in Figure 7. It can be seen that security rate of all algorithms tends to increase with number of relays. This is of course because the ability of system may be enhanced with the number of relays increasing. Moreover, since the bounded CSI error impacting the performance of the system is fully considered, the proposed algorithm achieves the highest security rate among all the algorithms.
Finally, the worst-case secrecy rates at the different power allocation factors are also described in Figure 8a. Similar to Figure 6, with the power allocation factor α increasing, the relay can obtain more energy, which leads to a higher secrecy rate. However, the secrecy rate drops sharply once α is greater than 0.9, since there is little signal to be forwarded. The security rate of four schemes at the different power allocation factor α are also compared in Figure 8b. Similar to Figure 8a, the secrecy rate of all algorithms increases with α . Moreover, our proposed algorithm achieves the highest secrecy rate since bounded CSI errors impacting the performance of the system are fully considered. It should be pointed out that, with the α increasing, the growth of the secrecy rate gradually tends to be flat, so using large α may be unadvisable and energy wasting.

5. Conclusions and Future Research

The robust beamforming design related to the secrecy rate of SWIPT WSN with relay is deeply discussed in this paper. Assuming bounded ellipsoid of CSI error between the relay and the eavesdropper, a maximum secrecy rate algorithm of the system at the constraints of relay power and bounded CSI error is proposed. By introducing slack variables, the original non-convex optimization is converted into a two-level coupled optimization problems. In addition, using S-procedure and SDR techniques, the non-convex constraints of lower-level problem are transformed into a series of LMI forms and iterative bisection methods are introduced to tackle the above decouple problem. The effectiveness of the proposed algorithm is verified by comparing it with PC-SPS, CJ-SPS, and ZF-SPS algorithms.
In this paper, we focus on the impact of channel errors on physical layer security, and we adopt a linear EH model at the relay. There are also many nonlinear EH models in the literature, and it is also necessary to study the influence of the nonlinear EH model on the network. However, because of the complexity of the nonlinear EH model, this is a challenging problem. In addition, the common relay cooperation technology is adopted in this paper, and the emerging intelligent reflecting surface technology is expected to replace relay in short-distance communication because of its excellent energy-saving effect. The SWIPT network of intelligent reflecting surface cooperation is also a subject of concern. We will also continue to pay attention to the above issues in the follow-up work.

Author Contributions

Conceptualization, Y.J. and R.G.; methodology, C.F.; software, R.G.; validation, C.F. and R.G.; writing—original draft preparation, R.G.; writing—review and editing, Y.J., L.Z. and C.F.; funding acquisition, Y.J. and Z.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Science Foundation Council of China (61771006, 61976080), Key Research Projects of University in Henan Province of China (19A413006, 20B510001), First-class Discipline Training Foundation of Henan University (2018YLTD04), the Programs for Science and Technology Development of Henan Province (192102210254), and the Talent Program of Henan University (SYL19060110).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the first author.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Proposition 1
Let w ˜ = η α P s 1 α h s r 2 P s + σ a 2 + σ c 2 diag ( h s r ) w , The constraint (27) can be expressed as
Δ h r e , k 2 δ 2
h ¯ r e , k + Δ h r e , k H w ˜ w ˜ H h ¯ r e , k + Δ h r e , k + σ e , k 2 1 α σ a 2 + σ c 2 1 - α 1 / τ 1 0 , k .
Then, according to SDR, let W = w ˜ w ˜ H , (A2) converts to
h ¯ r e , k + Δ h r e , k H W h ¯ r e , k + Δ h r e , k + σ e , k 2 1 α σ a 2 + σ c 2 1 α 1 / τ 1 0 , k .
Lemma A1.
Let Q 1 , Q 2 C N × N , b 1 , b 2 C N × 1 , c 1 , c 2 C and x C N × 1 , and then the inequation x H Q 1 x + 2 Re b 1 H x + c 1 0 x H Q 2 x + 2 Re b 2 H x + c 2 0 hold if and only if there exists a μ 0 such that
μ Q 1 b 1 b 1 H c 1 Q 2 b 2 b 2 H c 2 0 ,
provided there exists a point x ^ with x ^ H Q 1 x ^ + 2 Re b 1 H x ^ + c 1 0 [4].
By applying Lemma A1, let x = h ˜ r e , k , Q 1 = I N , b 1 = 0 , c 1 = δ 2 , Q 2 = W , b 2 = W h ¯ r e , k , c 2 = h ¯ r e , k H W h ¯ r e , k σ e 2 1 α σ a 2 + σ c 2 1 - α 1 / τ 1 , the inequations (A1) and (A2) can be transformed into
μ k I N + W W h ¯ r e , k h ¯ r e , k H W ψ k 0 , k ,
where ψ k = Δ h ¯ r e , k H W h ¯ r e , k + σ e 2 1 α σ a 2 + σ c 2 1 α 1 / τ 1 δ 2 . □

References

  1. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless Networks With RF Energy Harvesting: A Contemporary Survey. IEEE Commun. Surv. Tutor. 2015, 17, 757–789. [Google Scholar] [CrossRef] [Green Version]
  2. Zhang, R.; Ho, C.K. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  3. Wang, D.; Bai, B.; Chen, W.; Han, Z. Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying. IEEE Trans. Wirel. Commun. 2016, 15, 740–752. [Google Scholar] [CrossRef]
  4. Huang, J.; Swindlehurst, A.L. Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization. IEEE Trans. Signal Process. 2012, 60, 1696–1707. [Google Scholar] [CrossRef] [Green Version]
  5. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving Wireless Physical Layer Security via Cooperating Relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  6. Ding, Z.; Leung, K.K.; Goeckel, D.L.; Towsley, D. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting. IEEE Trans. Wirel. Commun. 2011, 10, 1725–1729. [Google Scholar] [CrossRef]
  7. Xing, H.; Wong, K.; Nallanathan, A.; Zhang, R. Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks. IEEE Trans. Wirel. Commun. 2016, 15, 7971–7984. [Google Scholar] [CrossRef] [Green Version]
  8. Zhou, X.; Li, Q. Energy Efficiency for SWIPT in MIMO Two-Way Amplify-and-Forward Relay Networks. IEEE Trans. Veh. Technol. 2018, 67, 4910–4924. [Google Scholar] [CrossRef]
  9. Li, Q.; Zhang, Q.; Qin, J. Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks. IEEE Trans. Veh. Technol. 2014, 63, 2462–2467. [Google Scholar] [CrossRef]
  10. Xing, H.; Wong, K.; Nallanathan, A. Secure wireless energy harvesting-enabled AF-relaying SWIPT networks. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 6 August 2015; pp. 2307–2312. [Google Scholar] [CrossRef]
  11. Qiao, J.; Zhang, H.; Zhou, X.; Yuan, D. Joint Beamforming and Time Switching Design for Secrecy Rate Maximization in Wireless-Powered FD Relay Systems. IEEE Trans. Veh. Technol. 2018, 67, 567–579. [Google Scholar] [CrossRef]
  12. Yang, Y.; Li, Q.; Ma, W.; Ge, J.; Ching, P.C. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers. IEEE Signal Process. Lett. 2013, 20, 35–38. [Google Scholar] [CrossRef]
  13. Hu, Z.; Xie, D.; Jin, M.; Zhou, L.; Li, J. Relay Cooperative Beamforming Algorithm Based on Probabilistic Constraint in SWIPT Secrecy Networks. IEEE Access 2020, 8, 173999–174008. [Google Scholar] [CrossRef]
  14. Zhou, F.; Li, Z.; Cheng, J.; Li, Q.; Si, J. Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 2450–2464. [Google Scholar] [CrossRef] [Green Version]
  15. Zhao, S.; Tian, M.; Li, Q. Robust Transmission in Non-Orthogonal Multiple Access AF Relay Networks. IEEE Wirel. Commun. Lett. 2018, 7, 1078–1081. [Google Scholar] [CrossRef]
  16. Joshi, S.K.; Wijewardhana, U.L.; Codreanu, M.; Latva-aho, M. Maximization of Worst-Case Weighted Sum-Rate for MISO Downlink Systems With Imperfect Channel Knowledge. IEEE Trans. Commun. 2015, 63, 3671–3685. [Google Scholar] [CrossRef]
  17. Li, Q.; Ma, W. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming. IEEE Trans. Signal Process. 2011, 59, 3799–3812. [Google Scholar] [CrossRef] [Green Version]
  18. Ren, Y.; Lv, T.; Gao, H.; Li, Y. Secure Wireless Information and Power Transfer in Heterogeneous Networks. IEEE Access 2017, 5, 4967–4979. [Google Scholar] [CrossRef]
  19. Li, Q.; Yang, Y.; Ma, W.; Lin, M.; Ge, J.; Lin, J. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks. IEEE Trans. Signal Process. 2015, 63, 206–220. [Google Scholar] [CrossRef]
  20. Mukherjee, A.; Swindlehurst, A.L. Detecting passive eavesdroppers in the MIMO wiretap channel. In Proceedings of the 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, 25 March 2012; pp. 2809–2812. [Google Scholar] [CrossRef]
  21. Hasan, A.; Andrews, J.G. The Guard Zone in Wireless Ad hoc Networks. IEEE Trans. Wirel. Commun. 2007, 6, 897–906. [Google Scholar] [CrossRef]
  22. Wang, X.; Wang, K.; Zhang, X. Secure Relay Beamforming With Imperfect Channel Side Information. IEEE Trans. Veh. Technol. 2013, 62, 2140–2155. [Google Scholar] [CrossRef]
  23. Xing, H.; Wong, K.; Chu, Z.; Nallanathan, A. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying. IEEE Trans. Signal Process. 2015, 63, 6616–6631. [Google Scholar] [CrossRef] [Green Version]
  24. Salari, S.; Amirani, M.Z.; Kim, I.; Kim, D.I.; Yang, J. Distributed Beamforming in Two-Way Relay Networks With Interference and Imperfect CSI. IEEE Trans. Wirel. Commun. 2016, 15, 4455–4469. [Google Scholar] [CrossRef]
  25. Li, X.; Wang, W.; Zhang, M.; Zhou, F.; Al-Dhahir, N. Robust Secure Beamforming for SWIPT-Aided Relay Systems With Full-Duplex Receiver and Imperfect CSI. IEEE Trans. Veh. Technol. 2020, 69, 1867–1878. [Google Scholar] [CrossRef]
  26. Feng, Y.; Yang, Z.; Zhu, W.; Li, Q.; Lv, B. Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks. IEEE Trans. Veh. Technol. 2017, 66, 2354–2366. [Google Scholar] [CrossRef]
  27. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, MA, USA, 2004. [Google Scholar]
  28. Wang, K.; So, A.M.; Chang, T.; Ma, W.; Chi, C. Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization. IEEE Trans. Signal Process. 2014, 62, 5690–5705. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The SWIPT-assisted relay communication network model.
Figure 1. The SWIPT-assisted relay communication network model.
Sensors 22 00370 g001
Figure 2. Power splitting receiver architecture.
Figure 2. Power splitting receiver architecture.
Sensors 22 00370 g002
Figure 3. The secrecy rate vs. the number of iterations (N = 10, K = 5).
Figure 3. The secrecy rate vs. the number of iterations (N = 10, K = 5).
Sensors 22 00370 g003
Figure 4. The secrecy rate vs. P s and δ (N = 10, K = 5).
Figure 4. The secrecy rate vs. P s and δ (N = 10, K = 5).
Sensors 22 00370 g004
Figure 5. The secrecy rate vs. P s (N = 20, K = 8).
Figure 5. The secrecy rate vs. P s (N = 20, K = 8).
Sensors 22 00370 g005
Figure 6. The secrecy rate vs. η (N = 15, K = 5).
Figure 6. The secrecy rate vs. η (N = 15, K = 5).
Sensors 22 00370 g006
Figure 7. The secrecy rate vs. the number of relays (K = 1).
Figure 7. The secrecy rate vs. the number of relays (K = 1).
Sensors 22 00370 g007
Figure 8. The secrecy rate vs. α (N = 10, K = 5).
Figure 8. The secrecy rate vs. α (N = 10, K = 5).
Sensors 22 00370 g008
Table 1. Simulation parameter setup.
Table 1. Simulation parameter setup.
ParamatesNotationTypical Value
Standard Distance d 0 1 m
Path loss exponent κ 2.5
Channel mismatch bound δ 0.1
Power splitting ratio α 0.5
Fade coefficient A 0 10 3
Energy collection efficiency η 50 %
Circular area of radius RR 50 m
Power of source P s 30 dBm
Noise variance of relay σ a 2 80 dBm
Noise variance of baseband σ c 2 50 dBm
Noise variance of receiver σ d 2 130 dBm
Noise variance of eavesdropper σ e , k 2 130 dBm
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Guo, R.; Fu, C.; Jin, Y.; Hu, Z.; Zhou, L. Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty. Sensors 2022, 22, 370. https://doi.org/10.3390/s22010370

AMA Style

Guo R, Fu C, Jin Y, Hu Z, Zhou L. Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty. Sensors. 2022; 22(1):370. https://doi.org/10.3390/s22010370

Chicago/Turabian Style

Guo, Ruijie, Chunling Fu, Yong Jin, Zhentao Hu, and Lin Zhou. 2022. "Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty" Sensors 22, no. 1: 370. https://doi.org/10.3390/s22010370

APA Style

Guo, R., Fu, C., Jin, Y., Hu, Z., & Zhou, L. (2022). Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty. Sensors, 22(1), 370. https://doi.org/10.3390/s22010370

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop