1. Introduction
Simultaneous wireless information and power transfer (SWIPT) is an optimistic and robust method for sustainable power supply to wireless networks [
1]. The lifetime of a typical node in wireless networks can be extended by energy harvesting. Solar and RF energy are popular sources of energy in the environment. RF energy sources are used for energy harvesting to make a system independent of weather conditions. Also, the RF signals can carry information and energy simultaneously [
1], hence the name SWIPT.
The challenges of controlling the data rate and desired quality of service necessitate a cooperative multiple-input multiple-output (CMIMO) system [
2]. CMIMO systems can improve the performance of wireless networks and wireless sensor networks. A comprehensive overview of various supporting technologies, such as compressive sensing and SWIPT, can be augmented to CMIMO to improve the throughput and energy efficiency performance. The challenges involved in the augmented CMIMO systems, energy-saving techniques, and overview of protocol layers are analyzed in [
3]. To increase the capacity and coverage of wireless networks, heterogeneous networks with macrocells and femtocells have become a popular architecture. However, the regulation of interference between these layers still poses a serious difficulty and requires efficient mitigation techniques. In [
4], a joint optimization problem of maximizing the sum rates to inter-tier interference under resource allocation constraints is proposed to reduce the interference to macrocell users.
The use of different SWIPT system settings in a variety of applications, including Internet of Things (IoT) and biosensors, has prompted researchers to investigate the reliability and sustainability of the SWIPT system by analyzing the rate–energy trade-off. In the MIMO environment, the transmit power affects the performance of the SWIPT system. The performance analysis can be conducted by calculating the mean square error (MSE) of the detected/received symbol [
5] and also by analyzing the relationship between the transmit power and the interference regimes present at the receiver end [
6]. Since the transmit power is directly related to the information rate of a legitimate receiver, the security aspect of wireless communication systems must be analyzed. For example, the usability of MIMO systems without secure protocols will compromise the system; therefore, secure transmission algorithms in the presence of multiple eavesdroppers are studied in [
7]. The keyless physical layer security (PLS) represents a subset of theoretical paradigms in wireless communications that optimize the inherent properties of the physical layer to ensure secrecy/reliability (without the need for traditional cryptographic keys). A comprehensive survey based on keyless PLS for ensuring secrecy in the wireless network environment is studied in [
8], where the security challenges in IoT and V2X networks are discussed. Also in [
9], a survey is conducted of the impact of security on the sixth-generation (6G) wireless technologies, network architecture and potential applications. A detailed analysis related to the security requirements, distributed machine learning (DML) is also studied.
A multi-agent deep reinforcement learning (DRL)-based approach is studied in [
10] for the vehicular edge-computing network, where a secure resource allocation strategy is proposed by optimizing the transmission power, spectrum and computation resource allocation components. The DRL approach proposed in [
10] significantly reduces the delay while maintaining the confidentiality probability. In the context of IoT networks, work in [
11] explores the cooperative potential of non-orthogonal multiple access (NOMA) for SWIPT, addressing the challenges of imperfect successive interference cancellation (SIC) and using deep learning to optimize the throughput performance. In [
12], a novel semi-supervised intrusion detection method based on federated learning is proposed to improve the quality of the predicted outputs (thereby avoiding incorrect predictions and achieving lower communication overhead). The recent work proposed in [
13] explores the potential of deep learning applications in device-to-device (D2D) unmanned aerial vehicle (UAV) communication, leveraging the use of both SWIPT and multi-agent deep Q-networks (MADQN) to improve energy efficiency based on the design of reward functions. In the context of the rapidly evolving and highly dynamic vehicular ad hoc networks (VANETs) landscape, as studied in [
14], the deep neural network framework for anomaly detection contributes to jointly enhance the security and reliability of these networked systems.
Dynamic settings and the mobility of devices in wireless network environments (such as unmanned aerial vehicle (UAV) and ad hoc networks) present additional difficulties and opportunities for ensuring effective and reliable data transmission and resource management. Vehicle clustering provides a solution for dynamic wireless networks, enabling effective resource management and solving mobility issues. For ad hoc networks, the vehicle-clustering algorithm plays a key role in establishing effective communication and resource sharing among vehicles. In [
15], a clustering algorithm is proposed to minimize the total energy consumption of vehicles based on their direction and entropy using a fuzzy C-means algorithm. As discussed in [
16], three-dimensional trajectory planning in UAV networks is crucial to enable seamless cooperation and data exchange/collection among UAVs, optimize their flight paths, and efficiently utilize scarce resources.
The transmit power, along with the number of antennas, plays a significant role in determining the secrecy rate of the system. Due to the characteristics of RF signals in SWIPT systems, separate and co-located energy-harvesting/information-decoding (EH/ID) receivers with corresponding precoder designs are being developed [
17]. The characterization of different capacity scaling techniques (in general, the capacity values vary depending on the base station (BS) antennas, signal-to-noise ratio (SNR), beamforming architecture, and coherence block size) are investigated for the massive MIMO systems under strong spatial correlation regimes as shown in [
18]. Based on the optimization of transmit beamforming vectors and power-splitting ratios, the battery depletion phenomenon is mitigated by formulating an optimal resource allocation strategy based on the transmit power optimization algorithm [
19]. The channel characteristics affect the received energy in a wireless network, thus affecting the energy-harvesting capability of the intended receiver. The amount of energy harvested for passively powered sensor networks is investigated in [
20], where the circuit is designed and relationships between the DC power and received power are analyzed.
Vehicular networks are becoming increasingly interconnected and autonomous, leading to the need for reliable, secure, and sustainable communication mechanisms. Recent research has shown that integrating SWIPT into vehicular networks offers promising solutions to energy sustainability concerns [
21,
22]. As relays increasingly become “hubs”—collecting, sending, and receiving large amounts of information—the energy and security requirements of in-vehicle communication systems are increased dramatically [
23]. Integrating vehicle networks with SWIPT promises a dual benefit: reliable communications, and reduced dependence on external power sources. This synergy of security and energy harvesting can significantly increase the potential autonomy of vehicular communication systems. The impact of distance and control over the power-splitting factor on physical layer security is studied in [
24]. The authors also investigated jamming techniques to improve security (as the distance between jammer and eavesdropper changes).
1.1. Motivation
The presence of a sophisticated eavesdropper equipped with multiple antennas adds another layer of complexity. Multi-antenna eavesdroppers can intercept signals from different spatial paths, posing a significant threat to MIMO communications and SWIPT systems. A nuanced approach to resource allocation is essential to ensure both efficient energy harvesting and secure data transmission in such scenarios. Our work aims to address the overlapping challenges of energy and PLS management in vehicular networks, laying the foundation for a more resilient and sustainable vehicular communication system. With the significant modernization and increased applicability of MIMO-SWIPT vehicular networks in industrial applications, ensuring secure communication in the presence of potential eavesdroppers becomes a paramount concern. The potential vulnerabilities posed by multi-antenna eavesdroppers in such vehicular networks necessitate the development of robust resource allocation strategies to secure wireless power and information transmission. By optimizing the transmit power allocation, our work aims to enhance the secrecy capacity and harvested energy in MIMO-SWIPT systems, thus ensuring reliable and secure communication for vehicular applications. Our research aims to contribute to the advancement of secure resource allocation techniques, enabling sustainable and secure wireless communication integration in vehicular networks while addressing security challenges in dynamic communication environments.
1.2. Contributions
In this paper, we present a resource allocation strategy for a MIMO SWIPT system in vehicular networks to optimize the information capacity of multi-antenna Bob under resource allocation constraints in the presence of a multi-antenna passive eavesdropper. The information capacity maximization problem with secrecy rate and quality-of-service constraints is formulated for different positions of Bob, and transmit power/power-splitting (PS) ratio values are achieved using the divide-and-conquer strategy. The following dynamic scenario is considered: Bob is moving from position-A (Pos-A) to position-B (Pos-B). Also, Pos-B is further away from Alice (compared to Pos-A) because Bob traverses from Pos-A to Pos-B away from Alice in the presence of a multi-antenna eavesdropper (which is positioned relatively close to Alice). The contributions of this paper are as follows:
We present two transmission scenarios in SWIPT-enabled vehicular networks in the presence of a multi-antenna eavesdropper: Bob is at Pos-A, and Bob is at Pos-B.
We formulate corresponding optimization problems for two scenarios: when Bob is at Pos-A and when Bob is at Pos-B under resource allocation constraints.
We maximize the information capacity under the secrecy capacity, harvested energy requirements, and other resource allocation constraints.
We propose a divide-and-conquer strategy by splitting the optimization problem into two sub-problems (alternating the choice of optimization variables). By optimizing the power-splitting ratio, our proposed algorithm can allocate the harvested energy to the EH/ID receiver and maintain sufficient secrecy capacity.
We provide simulation results, highlighting the differences between the transmission scenarios considered. We also validate the need for the proposed scheme by analyzing the performance under the two considered scenarios.
1.3. Related Work
The transmit power parameter is one of the key variables in determining the information rate for wireless communication systems. The transmit power can be optimized by using beamforming resource allocation strategies. Since we incorporated SWIPT in the MIMO system, there is also a need to optimize the value of the power-splitting ratio. The system is modeled without the inclusion of SWIPT, and is studied in the works [
6,
18], where the beamforming problem for cognitive radio and MIMO environments is developed. In [
6], the transmit power for secondary users is minimized, while the power for the primary user is increased. The problem is reformulated as a relaxed semidefinite problem, and transmit power/SNR analysis is performed for primary and secondary users.
In [
18], the achievable rate in a MIMO environment is analyzed. The rate-scaling characteristics are studied for different values of antennas. The analytical structure of the information rate depends on the selected channel characteristics. An investigation of the use of multiple transmit/receive antennas for a single-user communication model is studied for fading and non-fading channels [
25]. The capacities and error exponents of both fading and non-fading channels are formulated. The result shows that the use of multiple antennas significantly increases the information capacity of a single user.
By incorporating a SWIPT perspective into the wireless communication model, the rate–energy (R-E) characteristics are analyzed as in [
1,
3], and the corresponding beamforming vector optimization strategy is used to improve the efficiency (by preventing depletion and ensuring the latency/harvesting required amount of energy) as in [
19]. The characteristics of EH/ID receivers are studied for various practical designs. The co-located and separated EH/ID receivers and their relationship with information rates are analyzed. The reliability of the practical parameters present in the receiver circuit must be introspected and incorporated in the study of the rate–energy trade-off. The effect of the circuit specification on the R-E region is analyzed in [
3]. A multi-antenna SWIPT framework is studied in [
19], where both (i) the semi-definite relaxation (SDR) approach combined with fractional programming (FP), and (ii) successive convex approximation (SCA) are proposed to achieve a robust and energy-efficient resource allocation strategy to mitigate battery depletion.
The hardware imperfections and distortions occur due to imbalance and nonlinearity in the high-power amplifier (HPA) and phase noise, which can degrade the quality of the EH/ID receivers. In [
26], the estimation of distortions present in a SWIPT power-splitting system is investigated. The nonlinearity and total harmonic distortion present in the output of the HPA are analyzed using the recursive least squares technique. An analysis of the received SNR and harvested energy is performed for different harmonic distortion characteristics. In [
27], a PS-based SWIPT system is studied under hardware impairments and in-phase and quadrature imbalances. An optimization problem is proposed to maximize the harvested energy under a SNR constraint in the presence of hardware impairments. An optimal value of harvested energy is achieved using bio-inspired algorithms in a Rayleigh fading environment.
The energy-harvesting capability can also cause interference in the communication environment, so the selection of optimal users based on a resource allocation strategy is developed in [
28]. The use and design of appropriate variables in the resource allocation algorithms guarantee the selection of sensors and users depending on the defined optimization problem under the energy-harvesting wireless network environment [
28].
The number of deployable nodes and transmission strategies is increasing in a wireless network environment, so several relay selection strategies need to be explored. In [
29], a novel and efficient relay node selection scheme based on a power-splitting ratio for decoding and forward cooperative relay networks under the SWIPT framework is proposed. A power-splitting scheme is formulated to express the rate–energy exchange for the energy used for information decoding. The expression for the probability of failure is also derived, and a performance metric is analyzed in terms of energy conversion efficiency and SNR at different thresholds of the data rates.
The secrecy rate of the system is analyzed as a min-max problem for different ranges of SNR [
30] in the presence of an active eavesdropper attack. The effect of multiple antennas between the sender, receiver, and eavesdropper on the secrecy rate is also analyzed. A trade-off between the average harvested energy and secrecy rate is analyzed for secure SWIPT in cell-free MIMO systems with multiple access points (APs) transmitting information to users. In [
31], the authors extensively analyze the phenomenon of active pilot attack (by eavesdroppers) to compromise the base station channel and propose a methodology to achieve a secure link in intelligent reflecting surface (IRS)-assisted MIMO systems. The authors also successfully suppress the active eavesdropper using beamforming optimization (which is also validated in the trade-off curve between the secrecy capacity and eavesdropper position).
To achieve a secure wireless communication environment, a cognitive radio transmission system for decode and forward UAV with energy harvesting at the source and relay nodes is proposed [
32]. The distribution of the probability of the non-zero secrecy rate of the system under the time-shared protocol is studied. A performance analysis based on the optimal secrecy rate selection strategy and the optimal antenna selection strategy at the destination node of the secondary network is investigated. The resource allocation algorithm of the SWIPT system can be extended to the security aspect of the algorithm by incorporating an analysis involving two significant characteristics: secrecy throughput, and transmission schemes, such as delay-constrained transmission and delay-tolerant transmission [
33].
A resource allocation strategy is proposed to achieve a secure information rate and green power transmission for mobile receivers with distributed antennas connected to a central processor [
34]. The total network transmission power is minimized under quality-of-service constraints. An optimal iterative algorithm based on generalized Bender’s decomposition is proposed.
Most practical applications require the optimization of rate and energy variables, so such variants of optimization problems are biconvex. An extensive survey of the theory of biconvex sets is given in [
35], and biconvex optimization problems are solved by exploiting the properties of biconvex sets. The mathematical approach of convex optimization always aims to find optimal or suboptimal values of the variables under consideration. The penalty convex–concave approach is used to perform first-order convex approximation to solve the bilinear difference of convex problem [
5]. The SDR approach for the co-located receiver is developed to achieve optimal parameter values [
17].
As the technology evolves, the simulation of MIMO wireless environments requires an accurate, practical model for arriving at an optimal solution, so the nonlinear EH models are studied in [
3]. The various aspects of resource allocation algorithms are developed to analyze the characteristics of MIMO system models. Resource allocation problems based on the system models provide an optimal solution to several key variables. This also helps to understand the relationship between these variables. As the deployability of SWIPT systems increases, there is a need to characterize the trade-off between the information and energy-harvesting parameters, which provides a detailed analysis on the SWIPT, WPT-enabled systems [
1,
3].
In summary, vehicular networks require a high rate of information exchange for synchronous and concurrent operations. Wireless networks are also growing in almost all practical aspects, so MIMO-based capabilities are being used to enhance various physical layer aspects of these systems. This use of MIMO technologies and the increasing robust use of RF signals have led to the development of SWIPT-enabled MIMO systems. From the SWIPT perspective of the wireless system, the receiver is required to maintain an optimal amount of energy-harvesting and information-decoding capability, as this feature determines the lifetime and reliability of the entire transmission.
To the best of the authors’ knowledge, the study of optimization problems under different transmission scenarios for the MIMO-SWIPT system in the presence of a multi-antenna eavesdropper has not been studied. To elaborate the specific novelty of our work, we compared it with the previous works. The main differences are as follows:
In [
3], the main objective is to maximize the harvested energy for time-switching and power-splitting scenarios for the MIMO broadcasting system. The authors analyzed the trade-off between information capacity and energy for separated and co-located SWIPT receivers. In our proposed work, we included the maximization of the information capacity of Bob with the co-located SWIPT system in the presence of a multi-antenna eavesdropper. Our work focuses on the secrecy capacity–harvested energy trade-off under dynamic vehicular settings.
In [
30], the authors consider active eavesdropping scenarios and solve the maximized ergodic secrecy capacity problem using semidefinite relaxation programming. We considered dynamic MIMO-SWIPT settings in the presence of multi-antenna eavesdroppers under a worst-case scenario when Bob traverses from Pos-A to Pos-B (hence different from [
30]).
In [
36], the authors propose a joint channel estimation and transmit power allocation strategy to maximize the average signal-to-error-plus-noise ratio (SENR) under resource allocation constraints. The authors use a Karush–Khun–Tucker (KKT)-based solution to arrive at the solution. Unlike [
36], we proposed a “divide-and-conquer strategy” by reformulating the non-convex problem into convex sub-problems based on maximizing the information capacity in the presence of the secrecy capacity and other resource allocation constraints under dynamic vehicular environment.
The rest of the paper is organized as follows.
Section 2 presents the problem formulation, where the system model for the MIMO-SWIPT system in the presence of a multi-antenna eavesdropper and the problem definition for both transmission scenarios are discussed.
Section 3 presents the proposed solution for both transmission scenarios and a description of the algorithm.
Section 4 describes the result obtained for both transmission scenarios. The complexity analysis is also presented in this section.
Section 5 concludes the paper.
4. Results and Discussion
In this section, we present the simulation results to illustrate the trade-off between harvested energy and secrecy capacity for a single-user multi-antenna SWIPT system in the presence of a multi-antenna eavesdropper. The Matlab and CVX tools are used to obtain the following results. The simulation results are performed to evaluate the proposed algorithm when Bob is present at Pos-A and Pos-B. The channel fading states
and
are generated over 1000 channel realizations. The differences between
and
are based on the distance between Alice and Bob. We generated the channel state conditions by varying the distance of Bob as it moves away from Alice. For Pos-A, the distance between Alice and Bob is 30 m, while for Pos-B, the distance between Alice and Bob is 80 m. The eavesdropper is stationary, and its distance from Alice is assumed to be 20 m.
Table 1 shows the essential sets of simulation parameters used to generate the results. The transmit power available at Alice is varied in the range of 5 to 40 dBm. The expressions for the harvested energy in the nonlinear EH models [
3] are as follows:
Here,
M denotes the maximum energy harvested at the receiver when the EH circuit is saturated, and
denotes the circuit parameters for the nonlinear EH model considered. For the nonlinear EH model, the circuit parameters
and
are chosen as given in [
3] and the harvested energy is then calculated, where the circuit parameters
and the maximum harvested energy
M simulate the effects caused by the constraints such as current leakage and hardware sensitivity [
3,
20]. The noise at Bob is −30 dBm (when Bob is at Pos-A). A worst-case scenario is considered by assuming that the noise at Bob increases to 1 dBm (while at Pos-B). The noise at the eavesdropper is assumed to be −10 dBm.
4.1. Performance Analysis Based on Trade-Off between Harvested Energy and Secrecy Capacity
4.1.1. Bob at Pos-A
In
Figure 2, we present the trade-off between the secrecy capacity and harvested energy for varying transmit power and transmit antenna values at Alice. The simulations are performed when the channel fading state is
and Bob is at Pos-A. The co-located SWIPT setting for Bob implies that the received signal is split between energy harvesting and information decoding. As the formulated problem is information capacity maximization, the solution to the variables
and
Q are “fine tuned” so that the overall information capacity (thereby, the secrecy capacity) is maximized. This means that due to the maximization of the information capacity, there will be a decrease in the value of
, which further decreases the value of the harvested energy (as
is directly proportional to harvested energy).
The achievable harvested energy values and corresponding range are small for the lower transmit power regimes due to the directly proportional relationship between the transmit power matrix, harvested energy and the transmit power constraint
C1 in
(
7). However, the harvested energy range becomes wider as the transmit power value increases. This increase in range is due to the inherent properties of the transmit power matrix
Q. Increasing the number of transmit antennas at Alice increases the matrix dimension of
Q, which further amplifies the harvested energy (which can be verified from the harvested energy expression in (
31)). Hence, we can infer that the increase in the number of transmit antennas is the least noticeable (due to the narrow range of harvested energy values) when the transmit power is low. Comparing within the higher transmit power regime, the increase in the harvested energy decreases the secrecy capacity (for all the combinations of transmit antennas at Alice). Overall, the trend of the secrecy capacity is steep. This is due to the more stringent constraint imposed by the formulated problem.
4.1.2. Bob at Pos-B
Figure 3 illustrates the relationship between the secrecy capacity and harvested energy for different transmit power values and antennas. The analysis focuses on the channel fading state
, where Bob is moving away from Alice. Theoretically, this results in an overall decrease in the upper bound of both the secrecy capacity and the harvested energy. Also, increasing the harvested energy decreases the secrecy capacity values. We can conclude that the difference in harvested energy is significantly high for the high transmit power regime. In summary, increasing the transmit power increases the harvested energy values. We can also observe that increasing the number of transmit antennas at Alice has a smaller effect on the change in the harvested energy values. This difference in the consequences of varying the values of transmit antennas and transmit power can be attributed to the influence of the transmit power matrix on the proposed algorithm. The steepness of the trend of the trade-off is significantly high for the lower transmit power regime. From this observation, we can infer that the secrecy capacity decreases significantly as the harvested energy value increases. This is due to the lack of transmit power availability to maintain the required harvested energy due to the co-located nature of the SWIPT system.
4.1.3. Comparison with Benchmarks
Figure 4 illustrates the secrecy capacity performance when the transmit power and transmit antennas (of Alice) are fixed for SDP, KKT, and the proposed algorithms. The harvested energy is computed by the solution variables
Q and the power-splitting ratio
(which can be verified from (
31)). We observe a steep decrease in the secrecy capacity values as the harvested energy increases. This is due to the co-located nature of Bob’s EH/ID. However, when comparing Pos-A and Pos-B, significant differences in the (achievable) harvested energy can be observed. This is due to the distance variation and channel fading state of Pos-A and Pos-B of Bob. We can also infer that to achieve positive secrecy capacity values between Pos-A and Pos-B, there is a significant drop in the harvested energy values between Pos-A and Pos-B. This phenomenon can be attributed to the information capacity maximization (of Bob), where our goal is to optimize the information capacity while maintaining the harvested energy and secrecy capacity requirements. Our algorithm successfully maintained the required secrecy capacity values by minimizing the harvested energy value (via the optimization of the
variable). That is, a decrease in
reduces the harvested energy, thereby maintaining the required secrecy capacity.
4.2. Analysis of Secrecy Capacity for Varying Number of Eavesdropper Antennas
4.2.1. Bob at Pos-A
Figure 5 shows the secrecy capacity for different numbers of eavesdropper antennas. As the number of eavesdropper antennas increases, the secrecy capacity value decreases. This is because the information capacity value of the eavesdropper increases as the number of eavesdropper antennas increases (thus decreasing the secrecy capacity value). However, when the number of eavesdropper antennas is eight, the secrecy capacity barely exceeds the secrecy capacity of 0.5 bps/Hz. This means that simultaneously increasing the number of eavesdropper antennas and decreasing the transmit power has a negative effect on the secrecy capacity values. However, the increase in transmit power has a positive effect on the secrecy capacity values, resulting in an overall increase in the secrecy capacity (seen throughout the
regime). The secrecy capacity difference for all the algorithms is almost the same for higher transmit power values. However, for lower values of transmit power, the differences in performance based on secrecy capacity can be observed. For all the simulated configurations of
, the proposed algorithm can achieve higher values of secrecy capacity, with a maximum difference in performance observed when
= 4 and the transmit power is at 8 dBm.
4.2.2. Bob at Pos-B
Figure 6 shows the effect of the number of eavesdropper antennas on the secrecy capacity for varying transmit power values when Bob is at Pos-B. The cause of the overall decrease in secrecy can be attributed to the increase in the resulting distance between Alice and Bob. This increase in distance reduces the value of the secrecy capacity (compared to the value of the secrecy capacity in
Figure 5). Because of the change in Bob’s trajectory (as he moves further away from Alice), the beamforming technique is ineffective. This is evident from the fact that the secrecy capacity value does not exceed 1.5 bps/Hz, even at a transmit power of 40 dBm. The decrease in secrecy capacity means that the overall information capacity of the eavesdropper increases as the number of antennas on the eavesdropper side increases. Because of the directly proportional relationship between the transmit power and the information capacity of Bob, increasing the transmit power increases the value of the secrecy capacity. This is true for all algorithms. The significant performance difference between different algorithms is observed when the transmit power is 8 dBm. This means that our proposed algorithm can maintain a relatively high secrecy capacity value, even when the transmit power is reduced.
4.3. Non-Zero Secrecy Capacity Probability Analysis
4.3.1. Bob at Pos-A
Figure 7 shows the relationship between the non-zero secrecy capacity probability and the transmit power when Bob is at Pos-A. The non-zero probability of secrecy can be defined as the probability of achieving positive values of secrecy for the simulated set of iterations. The secrecy capacity requirement is relaxed [refer
Appendix A], while the harvested energy requirement is increased to a limit (for a given transmit power). This analysis provides the probability of achieving positive secrecy capacity values for the proposed algorithm while maintaining a significant harvested energy requirement. The security aspect of the proposed algorithm is tested by maintaining a stricter harvested energy requirement, thereby accessing the number of iterations (we used 1000 iterations) where the secrecy capacity values fall below zero. We can conclude that the probability of obtaining a positive secrecy capacity increases as the transmit power increases. This is because the transmit power plays a significant role in achieving the more stringent harvested energy requirement and maintaining positive secrecy capacity values. The number of transmit antennas in Alice helps increase the probability of achieving positive secrecy capacity as shown in
Figure 7. Therefore, to maintain non-zero secrecy capacity for a lower power regime, we must guarantee more transmit antennas for Alice. However, the difference in probability is not significant at a high transmit power.
Comparing different algorithms, our proposed algorithm maintains a higher probability value for the entire transmit power regime. However, for the higher transmit power regime, the probability of achieving positive secrecy capacity is almost the same for = 16. Overall, we can conclude that under a high transmit power regime, our proposed algorithm has a high probability of generating positive secrecy capacity values compared to other algorithms.
4.3.2. Bob at Pos-B
Figure 8 illustrates the effect of transmit power on the achievable secrecy capacity for different values of transmit antennas. For a lower transmit power regime, the probability of achieving secrecy capacity is less than 0.7 for all combinations of transmit antennas. This is due to two reasons: one is the channel fading state
, which negatively affects Bob’s information capacity value, and the other is the inherent nature of low transmit power (which also reduces the value of secrecy capacity). As the transmit power increases, the probability of achieving a positive secrecy capacity increases for all transmit antenna configurations. We can observe that the difference between the probabilities of
= 16 and other
configurations is large. This suggests that to achieve positive secrecy capacity, it is only appropriate to deploy a large number of transmit antennas for Alice for a worst-case scenario (when the eavesdropper is in a better state than Bob). Unlike
Figure 7 for Bob at Pos-A, the probabilistic analysis shows a clear difference in the simulated values for all the transmit power combinations considered when Bob is at Pos-B. This means that when Bob is farther away from Alice, our proposed algorithm can maintain a higher probability of achieving positive secrecy for the entire transmit power regime. For all
combinations, the probability value differences between SDP and the proposed algorithm are small for higher transmit power values. However, for the lower transmit power regime, the difference in probability values between the different algorithms is relatively high. In summary, for higher values of
, the probability of achieving positive secrecy capacity increases.
4.4. Computational Complexity
The complexity analysis is performed for the proposed subproblems P2-A (
17) and P3-A (
21) (the computational complexity for Pos-A and Pos-B is identical; therefore, it is analyzed only for Pos-A). The increased computational complexity of the proposed algorithm is due to the presence of multiple matrices in the formulated problems.
Table 2 shows the computational complexity of subproblems P2-A and P3-A, where
,
, and
denote the number of antennas present at Alice, Eve, and Bob, respectively. The accuracy bounds for the proposed KKT and SDP algorithms are denoted as
,
(for individual subproblems),
, and
, respectively.
Table 2 gives an approximate upper bound on the complexity per iteration for the subproblems. Also, the computational complexity remains the same for both scenarios (when Bob is at Pos-A and when Bob is at Pos-B). There are special algorithms that can have lower complexity than the KKT algorithm. However, global optimality is not guaranteed when using such low-complexity algorithms. The interior-point approximation strategy can achieve low complexity, but this resource allocation strategy primarily leads to locally optimal solutions. Our proposed “divide-and-conquer approach” is a combination of sequential programming and a branch-bound strategy [
38].