Next Article in Journal
Measurement-Based Investigations of the NB-IoT Uplink Performance at Boundary Propagation Conditions
Next Article in Special Issue
Cache-Enabled Data Rate Maximization for Solar-Powered UAV Communication Systems
Previous Article in Journal
Evolutionary Machine Learning for Optimal Polar-Space Fuzzy Control of Cyber-Physical Mecanum Vehicles
Previous Article in Special Issue
Evaluation of Rate Adaptation Algorithms in IEEE 802.11 Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Beamforming and Artificial Noise Optimization for Secure Transmissions in MISO-NOMA Cognitive Radio System with SWIPT

School of Electrical and Computer Engineering, University of Ulsan, Ulsan 680-749, Korea
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(11), 1948; https://doi.org/10.3390/electronics9111948
Submission received: 26 October 2020 / Revised: 13 November 2020 / Accepted: 16 November 2020 / Published: 18 November 2020
(This article belongs to the Special Issue Wireless Network Protocols and Performance Evaluation)

Abstract

:
The integration of non-orthogonal multiple access (NOMA) in cognitive radio (CR) networks has demonstrated how to enhance spectrum efficiency and achieve massive connectivity for future mobile networks. However, security is still a challenging issue due to the wireless transmission environment and the broadcast nature of NOMA. Thus, in this paper, we investigate a beamforming design with artificial noise (AN) to improve the security of a multi-user downlink, multiple-input single-output (MISO) NOMA-CR network with simultaneous wireless information and power transfer (SWIPT). To further support power-limited, battery-driven devices, energy-harvesting (EH) users are involved in the proposed network. Specifically, we investigate the optimal AN, power-splitting ratios, and transmission beamforming vectors for secondary users and EH users in order to minimize the transmission power of the secondary network, subject to the following constraints: a minimum signal-to-interference-plus-noise ratio at the secondary users, minimum harvested energy by secondary users and EH users, maximum power at the secondary transmitter, and maximum permissible interference with licensed users. The proposed solution for the challenging non-convex optimization problem is based on the semidefinite relaxation method. Numerical results show that the proposed scheme outperforms the conventional scheme without AN, the zero-forcing-based scheme and the space-division multiple-access-based method.

1. Introduction

The rapid development of wireless communications requires advanced communications techniques that can provide massive connectivity, high spectral efficiency, high energy efficiency, and low latency in support of the fast proliferation of the Internet of Things (IoT), mobile devices, and so on. Therefore, integration of promising technologies, such as cognitive radio (CR) and non-orthogonal multiple-access (NOMA) techniques, has been investigated by the industry and by academics to enable future wireless networks [1,2]. Specifically, CR tackles spectrum scarcity issues and improves spectrum efficiency based on its strategy of dynamic spectrum access, which permits the use of licensed spectrum by unlicensed users, called secondary users (SUs), without interfering with licensed users [3,4]. There are two types of spectrum sharing in accordance with access technology: underlay and overlay spectrum sharing. Underlay spectrum sharing permits SUs to use the licensed spectrum while keeping their power levels below a certain threshold to prevent unacceptable interference with licensed users, also known as primary users (PUs) [5,6]. On the other hand, overlay spectrum sharing tries to minimize the risk of any interference with the PUs at the expense of spectrum use, allowing SUs to use the licensed spectrum in the absence of the PUs [7,8].
Meanwhile, NOMA has surged as another powerful technology to enhance spectrum efficiency while providing high transmission rates and high user densities for future mobile communications [9,10]. NOMA can be categorized into code-domain and power-domain NOMA. Complex encoding or decoding techniques are required in code-domain NOMA, while the key idea of power-domain NOMA is to assign different power levels to users according to their channel strength, such that higher transmission power is assigned to users with weaker channels. Moreover, on the receiver side, users with stronger channels apply successive interference cancelation (SIC) to first decode the signals of the weaker users, and then, they decode their own signals. In this paper, we focus on power-domain NOMA, which can be further combined with other communications technologies (multiple-input single-output (MISO), multiple-input multiple-output (MIMO), cooperative communications) to reach a better yield [11,12,13,14,15,16].
Furthermore, energy-efficient techniques have been investigated for future wireless networks in support of environmental concerns and battery-limited devices, such as sensors and wearables [17]. In this sense, achieving high energy efficiency and recycling energy are the main goals of energy-efficient techniques, where simultaneous wireless information and power transfer (SWIPT) brings technological innovations and plays a key role in energy and information transmission [18,19,20]. In contrast to the conventional energy-harvesting (EH) technologies that rely on unpredictable natural sources, or where the communications nodes are only able to recharge from electromagnetic radiation, such as wireless power transfer (WPT), SWIPT enables users to perform information decoding (ID) and radio-frequency (RF) EH simultaneously [21,22]. Hence, the study of SWIPT in NOMA with CR networks is of meaningful importance in supporting massive numbers of mobile devices with limited battery power [23,24,25].
However, a NOMA-CR network assisted by SWIPT technology operates in a wireless transmission environment, which is vulnerable to malicious receivers that can intercept confidential information transmitted from the sources to either the legitimate or the unlicensed users. Therefore, security is a critically challenging issue that must be handled for the suitable deployment of wireless communications networks. In this sense, physical-layer security (PLS) has emerged as a complementary technology to address the eavesdropping security issue by exploiting the physical characteristics of wireless channels, e.g., propagation delay, multipath fading, and so on. Although traditional cryptographic encryption and decryption techniques have been pointed out to secure communication systems using complex algorithms and encryption keys. They require key management, maintenance and distribution procedures that use network resources and may become an issue in large-scale decentralized and heterogeneous wireless network. Moreover, the encryption keys are prone to being broken by high computational capabilities of an eavesdropper [26,27]. These drawbacks are the motivations for the study and research on PLS to complement cryptographic techniques. PLS is independent of complex algorithms and key management of which initial idea was investigated in Wyner’s work [28]. Wyner et al. explained that it is possible to achieve secure communication between legal users without sharing a secret key if the eavesdropper’s channel is a much noisier version than the legitimate user’s channel. In addition, PLS metrics include secrecy channel capacity or secrecy rate, secrecy outage probability, secrecy throughput, bit error rate-based and packet error rate-based metrics. One of the most common metric used in various research works is the secrecy channel capacity which indicates the maximum secrecy rate at which the message is retrieved safely at the legitime user while preventing it to be recovered at the eavesdropper. This metric is calculated by the difference between the legitimate and eavesdropper’s channel capacities.

1.1. Related Work

In the literature, to further improve the secure performance of wireless transmissions, different strategies have been proposed, such as multiple antennas, beamforming designs, artificial noise (AN) or jamming, and resource allocation schemes [29,30,31]. For instance, security in cooperative single-input single-output (SISO) NOMA networks has been investigated in [29,30], aiming to maximize the secrecy sum rate (SSR) and secrecy energy efficiency, respectively, by applying a low-complexity solution based on particle swarm optimization (PSO). Recently, PLS in NOMA mobile edge computing (MEC) system was studied in [31] to maximize the secure computation efficiency by jointly optimizing the resource allocations such as the transmission power, the computation time, and the central processing unit frequency. The results showed the superiority of NOMA over the time-division multiple-access (TDMA) conventional scheme. However, none of these studies previously discussed consider MISO and SWIPT technology which can increase the spectral efficiency of the network. Secure NOMA transmission in a MISO scenario was investigated [32,33,34,35,36] via joint beamforming and AN optimization. The authors of both [32,33] maximized the SSR by using joint precoding optimization, while in [34], the authors provided secure NOMA transmission by maximizing the jamming power, and they applied SIC at the receiver to avoid affecting legitimate transmissions. In [32], the authors considered downlink MISO-NOMA system with the presence of an eavesdropper. The objective was to obtain the optimal precoder vectors to maximize the SSR of the users subject to the constraints of maximum available power and rate requirement in each user. The solution was an iterative algorithm based on the second-order cone programming. However, the authors did not consider the SWIPT technology, EH users, AN along with an underlying CR system, which involves extra constraints related to EH requirements and maximum interference allowed to the primary network. Therefore, the solution proposed in [32] cannot be used to solve the optimization problem proposed in this paper. Another optimization approach to improve the SSR of a MISO-NOMA network has been studied in [35] which is based on a dynamic user scheduling, grouping strategy, and the application of efficient algorithms such as outer polyblock approximation and Dinkelbach. The authors considered the zero-forcing (ZF) criteria to define the beamforming vectors and investigated the minimum secrecy rate maximization problem to design the optimal power allocation strategy under three main constrains: QoS requirements, secrecy outage probability (SOP) and maximum available power. However, they did not consider EH users and an underlying CR system, which entails new EH constraints and maximum interference constraints in the optimizations problem. In addition, the proposed approach optimized the beamforming vectors and considered an scheme. Therefore, the algorithm in [35] cannot be used for the proposed system model in this paper.
Security for the primary network of a NOMA-CR system assisted by SWIPT was studied in [36]. The authors considered SU users with the ability to only decode information and several EH users which are considered to be eavesdropper, where the secondary base station (BS) transmits a jamming signal to increase the security of the primary network. The objective was to minimize the total transmission power under the constraints of minimum secrecy rates and EH requirements, in which the solution was based on the successive convex approximation (SCA) algorithm and the semidefinite relaxation (SDR) technique. It was shown that application of NOMA consumed lower transmission power than baseline schemes and satisfied quality of service (QoS) requirements such as the minimum secrecy rate of legitimate users. Although this paper opened doors to future secure wireless systems integrated with SWIPT in CR-NOMA networks, the authors did not consider SUs with the ability to simultaneously receive information and harvest energy, and it was assumed that channel vectors to the eavesdroppers are known at the secondary BS, which is not always possible in practical scenarios where eavesdroppers are hidden from the secondary BS. Please note that the PS structure considered in this paper involves the optimization of PS ratios, which are coupled to the beamforming vectors in the optimization problem.
In general, the mathematical algorithms used to solve optimization problems are problem-dependent. The proposed algorithms to solve the optimization problems in the aforementioned literature are developed based on specific characteristic of the problems such as objective function, type of users, type of constraints and so on. For instance, the procedures and techniques used to transform non-convex problems to convex ones will differ from system to system and depend on the assumptions and elements considered for the optimization problem. When a system model includes new elements with other applications such as SWIPT users or CR capabilities, the previous proposed algorithms cannot be used anymore directly, and a novel algorithm needs to be developed to solve the new problem. Therefore, previous proposed algorithms for a PLS in MISO-NOMA system cannot be applied for the proposed cognitive MISO SWIPT NOMA system with AN.
None of the research described above was specifically proposed to enhance the security of the secondary network in a SWIPT-assisted NOMA-CR with EH users. In addition, the proposed scheme in the paper can be applied for the security in different scenarios such as IoT systems with RF EH user where spectrum scarcity is a critical issue due to the massive deployment of IoT devices. Here, NOMA is used to achieve better connectivity and to enhance spectrum use while EH can be used for improving the energy efficiency of IoT systems [37].
Furthermore, in the case that malicious EH users exist in the system as the work in [36], where a secondary transmitter sends information signals to SUs and energy to EH user, the EH user can eavesdrop the information transmitted to secondary users because of the broadcast nature of NOMA. In this scenario, a channel state information (CSI) of the EH user is available at the secondary transmitter, which can be used for a more precise beamforming design of the AN to interfere with the malicious EH user. In addition, the SSR for the secondary users can be directly maximized in the optimization problem to improve the security in the network. On the other hand, in the paper we propose a more challenging scenario when the eavesdropper is completely hidden from the secondary transmitter and the CSI of the eavesdropper is not available. In this case, the transmission power for legitimate users is minimized to use the remaining available power to maximize the AN. In addition, there is no any impact on the system even though the eavesdropper performs energy-harvesting since the eavesdropper is not a legitimate user and the secondary transmitter does not transfer extra energy signals to satisfy some EH requirement at the eavesdropper.

1.2. Contributions and Organization

The main contributions of this paper are summarized as follows.
  • Secure transmission for a MISO-NOMA-CR network applying SWIPT and assisted by AN is studied to enhance the security of the secondary network. We jointly optimize the precoder vectors and power-splitting (PS) ratios to minimize the transmit power to the SUs and EH users, subject to the constraints of minimum signal-to-interference-plus-noise ratio (SINR) at the SUs, minimum EH for EH users, maximum available power at the secondary transmitter, denoted as SU-Tx, and maximum permissible interference with the PUs. By minimizing the transmit power for SUs and EH users, we can assign the residual power to AN to generate interference against the eavesdropper, by which the security can be improved in the underlying network.
  • The formulated non-convex minimization problem is challenging to solve due to coupling between the PS ratios and transmission beamforming vectors. The proposed solution consists of two steps. First, an SDR-based algorithm converts the formulated problem into a semidefinite programming (SDP) problem. Second, a Gaussian randomization technique is applied to obtain the approximate rank-one solutions for beamforming vectors, and a linear program problem is used to guarantee the feasibility of the candidate solutions of the Gaussian randomization technique.
  • The space-division multiple-access (SDMA) method and the ZF technique are studied as a comparative schemes to solve the minimization problem in which the solution to the non-convex problems are based on the SDR technique. In addition, a MISO-NOMA-CR without AN is considered to be the baseline scheme to prove the advantages of AN.
  • Numerical simulations prove the superiority of the proposed approach based on NOMA with AN for increasing the security of the secondary network, in comparison with NOMA without AN, SDMA and ZF schemes. In particular, the proposed AN method shows a significant improvement in SSR over the no-AN scheme under several studied scenarios.
The rest of this paper is organized as follows. The MISO-NOMA-CR network model with SWIPT and EH users is described in Section 2. In Section 3, the beamforming optimization with AN is presented along with the proposed solution, and the comparison SDMA and ZF schemes are formulated. The numerical results are presented in Section 4. Finally, the conclusions are presented in Section 5. Table 1 lists the main abbreviations used throughout the paper.

2. System Model

In this paper, we investigate downlink transmissions in a cognitive MISO SWIPT NOMA system with L SUs, and M EH receivers that coexist with K PUs via the underlay scheme, as shown in Figure 1. In the proposed underlying CR system, the secondary network can operate in the same frequency band as the primary network, provided that the interference towards the primary users is kept at a tolerable level. We also consider the presence of one malicious eavesdropper that attempts to intercept confidential information of the SUs. Furthermore, the SU-Tx is equipped with N antennas, while there are single antennas for the PU, SU, and EH receivers, and for the eavesdropper. Moreover, we consider the SUs to be hybrid users capable of decoding information and harvesting energy at the same time by employing a PS structure in the receiver, while energy is harvested by the EH receivers. Moreover, the SU-Tx transmits AN to cause interference with the eavesdropper while improving information secrecy. The SU-Tx is in charge of transmitting the signals towards the SU and the EH receivers, as well as, design the beamforming vectors for the multi-antenna scheme. Then, the signal transmitted from the SU-Tx can be expressed as:
x = l = 1 L v l s l SU + m = 1 M w m s m EH + f r ,
where v l C N × 1 represents the beamforming vector for the l-th SU with l Q = Δ 1 , 2 , . . , L , s l SU is the transmitted signal of the l-th SU with unit power s l SU 2 = 1 , w m C N × 1 denotes the beamforming vector for the m-th EH receivers with m = 1 , 2 , . . , M , s m EH is the energy signal of the m-th EH receiver with unit power s m EH 2 = 1 , f C N × 1 corresponds to the beamforming vector for the AN, and r is a zero-mean Gaussian random variable with unit power r 2 = 1 , which is artificial jamming. Beamforming vector f is used to prevent anything from affecting legal transmissions, and artificial jamming r is randomly generated to effectively disturb any eavesdropping [14].
Accordingly, the received signal at the l-th SU is written as
y SU , l = g l H v l s l SU + g l H l = 1 , l l L v l s l SU + m = 1 M w m s m EH + f r + n SU , l , l Q ,
where g l H C N × 1 is the channel vector from the SU-Tx to the l-th SU, n SU , l C N 0 , σ l 2 is the additive white Gaussian noise (AWGN) at the l-th SU, with zero mean and variance denoted as σ 2 . In addition, we assume the SU-Tx has perfect CSI.
Without loss of generality, we consider the first SU to have the strongest channel strength, whereas the L-th SU has the weakest. As such, the order for channel gain between the SU-Tx and the SUs can be expressed as follows:
g L 2 g L 1 2 . . . g 1 2 .
In NOMA systems, by using the successive interference cancelation procedure, the l-th SU SU l should be capable of successively extracting and decoding the signal intended for the weaker SUs SU L , . . . , SU l + 1 from the received signal. Therefore, the following condition for SIC in MISO-NOMA networks with different channel strengths should be satisfied:
g l H v L 2 g l H v L 1 2 . . . g l H v 1 2 , l Q .
The condition expressed in (4) will be referred to as the SIC constraint in the rest of the paper. The condition (4) guarantees that at the l-th SU, we have a higher SINR from messages of more distant users since these messages need to be decoded prior to decode the l-th user’s own message. Accordingly, the received signal after removing the last L l user signals can be given by
y SU , l = g l H v l s l SU + g l H l = 1 l 1 v l s l SU + g l H m = 1 M w m s m EH + g l H f r + n SU , l ,
where the first term in (5) denotes the intended signal for the l-th SU, whereas the second term represents the interference caused by the first l 1 signals intended for the SUs SU 1 , . . . , SU l 1 . The PS structure at the SUs is based on a PS factor which divides the incoming RF signals into two streams; one to be used for ID and another to harvest energy. It is noteworthy that optimizing the PS factor is required to achieve an optimal trade-off. Then, the achievable SINR for the l-th SU when decoding the signal intended for the i-th SU can be expressed as
SINR l i = θ l g l H v i 2 θ l l = 1 i 1 g l H v l 2 + m = 1 M g l H w m 2 + g l H f 2 + σ l 2 + σ c n , l 2 , l Q , l i ,
where θ l is the PS factor to divide the incoming signal into the ID and EH modules, and the additive circuit noise in the ID module of the l-th SU is defined as n SU , c n , l C N 0 , σ c n , l 2 . It is worth highlighting that (6) is true only after performing SIC on the preceding L i signals.
Moreover, the energy harvested by the EH module in the l-th SU can be written as follows:
EH SU , l = η SU , l 1 θ l l = 1 L g l H v l 2 + m = 1 M g l H w m 2 + g l H f 2 + σ l 2 , l .
In (7), η SU , l is the energy-harvesting efficiency for the l-th SU. For simplicity, we assume that energy-harvesting efficiency is always equal to 1, η SU , l = 1 . The energy harvested by the m-th EH user is given by
EH EH , m = l = 1 L e m H v l 2 + m = 1 M e m H w m 2 + e m H f 2 + σ EH , m 2 ,
where e m C N × 1 is the channel vector from the SU-Tx to the m-th EH user, and σ EH , m 2 is the variance of the antenna noise n EH , m at the m-th EH user, i.e., n EH , m C N 0 , σ EH , m 2 .
The power of the SU-Tx causing interference with the k-th PU can be defined as
P I k = l = 1 L h k H v l 2 + m = 1 M h k H w m 2 + h k H f 2 ,
where h k H C N × 1 is the channel vector from the SU-Tx to the k-th PU.
Moreover, the SINR for information signals of the SUs overheard by the eavesdropper is given by
SINR e v l = h e v H v l 2 l = 1 , l l L h e v H v l 2 + m = 1 M h e v H w m 2 + σ e v 2 ,
where h e v H C N × 1 is the channel vector from the SU-Tx to the eavesdropper, and σ e v 2 is the variance of the antenna noise n e v at the eavesdropper i.e., n e v C N 0 , σ e v 2 . Moreover, we assume that σ EH , m 2 = σ l 2 = σ c n , l 2 = σ e v 2 = 80 dBm.

3. Beamforming Optimization with AN

In this paper, we propose a beamforming optimization scheme to provide security in a MISO SWIPT CR-NOMA network. We consider a practical scenario where the SU-Tx does not have the CSI of the eavesdropper. To further increase the secrecy performance of the network, AN is generated to tackle eavesdropping and guarantee the security of the confidential information of the unlicensed users. In particular, we minimize the transmit power for the SUs and EH users, subject to the constraints of a minimum SINR for the SUs, minimum EH by the SUs and EH users, maximum available power for the SU-Tx, and maximum interference power to ensure the PUs’ legitimate transmissions are not affected. The idea of minimizing transmit power for the SUs and EH users is to use the rest of the available power at the SU-Tx to maximize AN and protect transmitted messages against an eavesdropper. In addition, SDMA and ZF baseline schemes are developed along with MISO CR and SWIPT for comparison purposes.

3.1. Beamforming Optimization with AN in the MISO SWIPT CR-NOMA Network

The SU-Tx power for transmitting to SUs and EH users is minimized in the proposed network by satisfying the QoS requirements of each user and in accordance with the decoding order of the SIC indicated in (4), as follows:
min v l , w m , θ l , f l = 1 L v l 2 + m = 1 M w m 2
s . t . θ l g l H v i 2 θ l l = 1 i 1 g l H v l 2 + m = 1 M g l H w m 2 + g l H f 2 + σ l 2 + σ c n , l 2 γ i , l , i Q , l i
l = 1 L g l H v l 2 + m = 1 M g l H w m 2 + g l H f 2 + σ l 2 ψ l 1 θ l , l
l = 1 L e m H v l 2 + m = 1 M e m H w m 2 + e m H f 2 + σ EH , m 2 ξ m , m
l = 1 L v l 2 + m = 1 M w m 2 + f 2 = P max ,
l = 1 L h k H v l 2 + m = 1 M h k H w m 2 + h k H f 2 ϕ PU , k , k
1 > θ l > 0 , l
g l H v L 2 g l H v L 1 2 . . . g l H v 1 2 , l ,
where γ i is the minimum targeted SINR for the i-th message, i Q , ψ l is the minimum harvested energy required by the l-th SU, ξ m is the minimum harvested energy required by the m-th EH user, P max denotes the maximum available power at the SU-Tx, and ϕ PU , k denotes the maximum permissible interference with the k-th PU. Constraint (11b) is to guarantee a minimum SINR for the messages from s l SU to s L SU at the l-th SU, while constraints (11c) and (11d) represent the minimum harvested energy required by the SUs and the EH users, respectively. Constraint (11e) indicates the maximum available power, P max that can be consumed by the SUs, the EH users, and AN. Constraint (11f) indicates that the transmit power for the SUs, the EH users, and for AN must not exceed the maximum permissible interference with the k-th PU, given by ϕ PU , k . Problem (11) is not convex or challenging to solve due to the coupling between the PS ratios, θ l , and the precoding vectors, v l , w l , and f , in constraint (11b). Therefore, problem (11) cannot be solved directly.
We derive an optimal solution via SDR [38] for problem (11). Define V l = v l v l H , W m = w m w m H , F = f f H , G l = g l g l H , E m = e m e m H , and H k = h k h k H , l , m , k . Based on the properties x 2 = x H x , Tr AB = Tr BA , and x = Tr x , we can derive the following expressions: v l 2 = Tr V l , w l 2 = Tr W l , f 2 = Tr F , g l H v l 2 = Tr G l V l , g l H w m 2 = Tr G l W m , and g l H f 2 = Tr G l F . Moreover, a matrix variable, V l = v l v l H , is equivalent to V l being a rank-one symmetric positive semidefinite (PSD) matrix, i.e., V l 0 , and rank V l = 1 . Thus, we can express problem (11) in the following equivalent form:
min V l , W m , θ l , F l = 1 L Tr V l + m = 1 M Tr W m s . t . l = 1 i 1 Tr G l V l + m = 1 M Tr G l W m + Tr G l F + σ l 2 + σ c n , l 2 θ l γ i
Tr G l V i 0 , l , i Q , l i
ψ l 1 θ l l = 1 L Tr G l V l m = 1 M Tr G l W m Tr G l F σ l 2 0 , l
ξ m l = 1 L Tr E m V l m = 1 M Tr E m W m Tr E m F σ EH , m 2 0 , m
l = 1 L Tr V l + m = 1 M Tr W m + Tr F = P max ,
l = 1 L Tr H k V l + m = 1 M Tr H k W m + Tr H k F ϕ PU , k 0 , k
V l , W m , F 0 , l , m
1 > θ l > 0 , l
rank V l = 1 , rank W m = 1 , rank F = 1 , l , m
Tr G l V L Tr G l V L 1 . . . Tr G l V 1 , l .
Problem (12) is still non-convex due to the rank-one constraints. Then, we can drop the rank-one constraints to get an SDP problem denoted as (12)-SDR, which is convex and can be solved by using the CVX toolbox of MATLAB. To define the computational complexity to solve the (12)-SDR problem, we define T = L + M + 1 as the number of matrix variables of size N × N , and Υ = 3 L + M + K + 1 is the linear constraint. Then, we can denote the computational complexity to solve problem (12)-SDR as O T Υ T 3 Υ 6 + T 2 Υ 2 log 1 1 χ χ ) with a solution accuracy of χ > 0. The solution to problem (12)-SDR is denoted as { V l , W m , θ l }, F*, which is unlikely to satisfy the following constraints: rank (Vl) = 1, rank (Wm) = 1, rank (F) = 1, ∀l, ∀m. Therefore, we propose a Gaussian randomization technique to obtain the close-to-optimal solutions for problem (11).
In the Gaussian randomization technique [13,14,39], the first step is to perform eigen decomposition of the precoder matrices obtained from problem (12)-SDR, i.e., we evaluate V l = Q SU , l Λ SU , l Q SU , l H , W m = Q EH , m Λ EH , m Q EH , m H , and F = Q f Λ f Q f H . Next, we generate candidate solutions based on vectors κ SU , l , κ EH , m , and κ f , where the elements follows a complex, circularly symmetric Gaussian distribution, C N 0 , 1 , i.e., v l = Q SU , l Λ SU , l 1 / 2 κ SU , l , w m = Q EH , m Λ EH , m 1 / 2 κ EH , m and f = Q f Λ f 1 / 2 κ f . However, there exists the possibility that the obtained candidate precoder vectors are not feasible for problem (11). Then, we can adjust the value of the candidate precoded vectors based on scalar factors, τ SU , l , τ EH , m τ f , which can be obtained through the solution to the following optimization problem:
min τ SU , l , τ EH , m , τ f l = 1 L τ SU , l v l 2 + m = 1 M τ EH , m w m 2 s . t . l = 1 i 1 τ SU , l g l H v l 2 + m = 1 M τ EH , m g l H w m 2 + τ f g l H f 2 + σ l 2 + σ c n , l 2 θ l γ i
τ SU , i g l H v i 2 0 , l , i Q , l i
ψ l 1 θ l l = 1 L τ SU , l g l H v l 2 m = 1 M τ EH , m g l H w m 2 τ f g l H f 2 σ l 2 0 , l
ξ m l = 1 L τ SU , l e m H v l 2 m = 1 M τ EH , m e m H w m 2 τ f e m H f 2 σ EH , m 2 0 , m
l = 1 L τ SU , l v l 2 + m = 1 M τ EH , m w m 2 + τ f f 2 = P max ,
l = 1 L τ SU , l h k H v l 2 + m = 1 M τ EH , m h k H w m 2 + τ f h k H f 2 ϕ PU , k 0 , k
1 > θ l > 0 , l
τ SU , L g l H v L 2 τ SU , L 1 g l H v L 1 2 . . . τ SU , 1 g l H v 1 2 , l .
Problem (13) is a linear program that can be solved with the CVX module of MATLAB. In the Gaussian randomization technique, we generate G r a n d candidate precoder vectors, where the final solution is the one that achieves the lower transmit power. The proposed algorithm with SDR and the Gaussian randomization technique is summarized in Algorithm 1.
Algorithm 1: The proposed algorithm based on SDR and Gaussian randomization to solve problem (11).
Electronics 09 01948 i001

3.2. Beamforming Optimization with AN in the MISO SWIPT CR-SDMA Network

In this subsection, we describe the baseline scheme based on SDMA for the MISO SWIPT CR system. In SDMA, the messages from other users are considered interference, and no SIC procedure exists at the receiver. Therefore, the SINR at the l-th user is as follows:
SINR SDMA , l = θ l g l H v l 2 θ l l = 1 , l l L g l H v l 2 + m = 1 M g l H w m 2 + g l H f 2 + σ l 2 + σ c n , l 2 , l .
Although the energy harvested by the SUs and the EH users, as well as the power interfering with the PUs, are expressed in the same way as NOMA, and are defined in (7)–(9), respectively. Then, the minimization of the transmit power for the SUs and EH users under the constraints of minimum SINR, minimum EH required, and maximum interference with the PUs can be expressed as follows:
min v l , w m , θ l , f l = 1 L v l 2 + m = 1 M w m 2
s . t . θ l g l H v l 2 θ l l = 1 , l l L g l H v l 2 + m = 1 M g l H w m 2 + g l H f 2 + σ l 2 + σ c n , l 2 γ l , l
( 11 c ) , . . . , ( 11 g )
Problem (15) is non-convex and can be solved by using the SDR technique described in Section 3.1. Then, problem (15) can be reformulated as follows:
min V l , W m , θ l , F l = 1 L Tr V l + m = 1 M Tr W m s . t . l = 1 , l l L Tr G l V l + m = 1 M Tr G l W m + Tr G l F + σ l 2 + σ c n , l 2 θ l γ l
Tr G l V l 0 , l
( 12 c ) , . . . , ( 12 i )
After removing the rank-one constraints, the problem is denoted as (16)-SDR, which is convex and can be solved with the CVX toolbox of MATLAB. Then, the Gaussian randomization technique can be used if the precoder matrices, V l * , W m * , F , do not satisfy the rank-one condition.

3.3. Beamforming Optimization with AN in the MISO SWIPT CR-ZF Network

In this section, we include a comparative scheme based on ZF to solve the power minimization problem in the cognitive MISO SWIPT system. The ZF scheme allows the nullification of the interference signals from other users, which is considered to be a common approach used to simplify the system design [35,40]. At the l-th SU user, we design the ZF scheme to null the interference from other SU’s messages and from the energy signals. At the k-th PU user, the ZF scheme nulls the interference from the SU’s messages and from the energy signals. However, to increase the harvested energy at the EH users, we allow interference signals at the EH users. Then, we define A l = g 1 , . . . , g l 1 , g 1 + 1 , . . . , g L , h 1 , . . . , h K C N × L + K 1 and B m = g 1 , . . . , g L , h 1 , . . . , h K C N × L + K . Therefore, we denote the beamforming vectors as follows:
v ˜ l = Ω A , l Ω A , l H g l Ω A , l Ω A , l H g l ,
v l = p SU , l v ˜ l ,
w ˜ m = Ω B , m Ω B , m H e m Ω B , m Ω B , m H e m ,
w m = p EH , m w ˜ m ,
where p SU , l and p EH , m are the power variables to be optimized, Ω A , l C N × N L + K 1 is the orthogonal basis of the null space of A l and Ω B , m C N × N L + K is the orthogonal basis of the null space of B m . Based on the ZF scheme, the transmit power minimization problem (11) can be transformed into the following problem:
min p SU , l , p EH , m , θ l , f l = 1 L p SU , l + m = 1 M p EH , m
s . t . θ l p SU , l g l H v ˜ l 2 θ l g l H f 2 + σ l 2 + σ c n , l 2 γ l , l
p SU , l g l H v ˜ l 2 + g l H f 2 + σ l 2 ψ l 1 θ l , l
l = 1 L p SU , l e m H v ˜ l 2 + m = 1 M p EH , m e m H w ˜ m 2 + e m H f 2 + σ EH , m 2 ξ m , m
l = 1 L p SU , l + m = 1 M p EH , m + f 2 = P max ,
h k H f 2 ϕ PU , k 0 , k
1 > θ l > 0 , l .
Next, we solve the problem (21) by using the SDR technique. We denote F = f f H , G l = g l g l H , E m = e m e m H , H k = h k h k H , f 2 = Tr F , g l H f 2 = Tr G l F , e m H f 2 = Tr E m F and h k H f 2 = Tr H k F .
min p SU , l , p EH , m , θ l , F l = 1 L p SU , l + m = 1 M p EH , m
s . t . γ l Tr G l F + σ l 2 + σ c n , l 2 θ l p SU , l κ SU , l 0 , l
ψ l 1 θ l p SU , l κ SU , l Tr G l F σ l 2 0 , l
ξ m l = 1 L p SU , l κ SU EH , l m = 1 M p EH , m κ EH , m Tr E m F σ EH , m 2 0 , m
l = 1 L p SU , l + m = 1 M p EH , m + Tr F = P max ,
Tr H k F ϕ PU , k 0 , k
1 > θ l > 0 , l
F 0 ,
rank F = 1 ,
where κ SU , l = g l H v ˜ l 2 , κ SU EH , l = e m H v ˜ l 2 and κ EH , m = e m H w ˜ m 2 . Then, we drop the constraint (22i) and obtain an SDP problem denoted as (22)-SDR, which is convex. The solution of (22)-SDR can be obtained through the CVX toolbox. The Gaussian randomization technique, detailed in Section 3.1, is used to obtain the approximate rank-one solution for the ZF-based problem (21).

4. Numerical Results

In this section, simulation results are provided to assess the performance of the proposed MISO-NOMA-CR aided by SWIPT with EH users, in comparison with an SDMA approach and with a scheme without AN. We used MATLAB software on a Core i7-6700K CPU with 16 GB of main memory to perform the simulations over several channel realizations. The simulation parameters listed in Table 2 were selected based on the work in [15,41,42]. More specifically, the transmission power of the SU-Tx is set to 30 dBm since it is a common value used in the literature for CR systems [30,41]. In addition, the channel vectors parameters such as the channel gain and the Rician factor were set to 10 3 and 5 dB, respectively, based on the work in [15]. The number of SUs and the value for the path-loss exponent are stablished according to the reference [42].
In the considered paper, we consider a quasi-static channel condition, which is usually assumed for indoor channels where the degree of time variation in the signal strength is small compared with the symbol duration. The channel model used in the simulations considers different distances from the SU-TX to the users, as well as different angle directions. The channel vectors were modeled based on an independent Rician fading, which is composed of a line-of-sight component and scattering components, and it is given as follows [15]:
g l = L o d SU , l α K R 1 + K R g l L O S + 1 1 + K R g l N L O S ,
where g l N L O S is the Rayleigh fading component, which follows a circularly symmetric complex Gaussian random variable with zero mean and unit variance, and g l L O S is the line-of-sight component. The line-of-sight component is based on a uniform linear array from [16] with a wavelength equal to the double of the spacing between successive antenna elements, and it is given as follows:
g l L O S = 1 e j π sin ϕ SU , l e j 2 π sin ϕ SU , l . . . e j N 1 π sin ϕ SU , l T ,
where ϕ SU , l denotes the direction from the SU-Tx to the l-th SU, set at ϕ SU , 1 and ϕ SU , 2 . Channel vectors e m from the SU-Tx to the m-th EH user were generated by following the aforementioned procedure, with the directions ϕ EH , 1 and ϕ EH , 2 pointed out in Table 2. Moreover, channels vectors h k and h e v follow Rayleigh fading with an attenuation equal to L o d PU , k α and the distances from the SU-Tx to SUs, EH users, PUs, and the eavesdropper are defined in Table 2.
Furthermore, the proposed model can be adapted to several scenarios since we do not consider a fixed number of users. Instead we assume that there exist L SUs and M EH receivers. It is worth highlighting that the proposed approach is valid for other channel model because in a real deployment the inputs are channel state information (CSI), which can be obtained by a feedback process between the transmitter and the users and by cooperation between the primary and secondary network.
The simulation results in this section are the average over several independent channel realizations, where the Rayleigh fading component of the channel vectors varies in each channel realization. Please note that new beamforming vectors and PS ratios should be obtained each time the channel conditions changes, which is not the best solution in fast time-varying channels because of the computational complexity of solving the optimization problem.
First, we investigated the results for problem (11) by using the SDR technique. Furthermore, we compared the results with the SDMA scheme, ZF technique and with the scheme without using AN.
Figure 2 shows AN power, f 2 according to the minimum SINR required at the SUs when minimum EH requirements of the SUs and EH users are given as ψ l = ξ m = 25 dBm and ψ l = ξ m = 30 dBm, respectively. We observed that the radiated AN power is decreased as the minimum required SINR increases, because the SU-Tx needs to allocate more power to satisfy the SINR constraint while reducing the available power for the artificial noise. In addition, the proposed scheme based on the NOMA technique outperforms the SDMA method and ZF scheme for two considered cases of minimum EH. The improvement from the NOMA technique is due to the ability to decode part of the interference from other messages via the SIC procedure, which allows an increase in the achievable SINR at the SUs while reducing the required transmit power to satisfy the minimum SINR constraint. Subsequently, the NOMA technique can provide a high level of PLS, because the interference with the eavesdropper increases as the AN power increases, which makes it difficult for the eavesdropper to decode the SU’s messages. The SDMA method outperforms the ZF scheme because ZF nulls the interference from other SU’s and EH’s messages at the l-th SU which permits an increase of the SINR but affects the harvested energy. Subsequently, the ZF scheme harvests lower energy than that harvested by the SDMA approach, which makes that the SU-Tx increases the transmission power to satisfy the EH constraint while reducing the available power to allocate to the AN.
Figure 3 illustrates the SSR achieved with the proposed approach and with the scheme without AN, according to the minimum SINR and minimum EH requirements, with maximum permissible interference with the PUs equal to ϕ PU = 60 dBm. From Figure 3, we can observe the benefit of the proposed approach with AN on increasing the achievable SSR, because AN can effectively generate interference with the eavesdropper while the beamforming technique minimizes that interference at the SUs. We note that the SSR grows as the minimum SINR increases, and this trend coincides with previous research [13,14] because the achievable transmission rate at the SUs increases. In addition, the SSR reduces as the minimum EH requirement increases because more power needs to be allocated to satisfy the EH requirements while reducing the available power for AN.
Figure 4 shows AN power according to the minimum harvested energy by the SUs and the EH users when the minimum SINR of the SUs is given as γ l = 5 dB and γ l = 10 dB, respectively. From Figure 4, we can see that AN power decreases for all the considered schemes as the minimum EH requirement increases. The reason is because as the minimum EH increases, more transmission power should be allocated to the users to satisfy their EH requirements. Subsequently, less power is assigned for the AN. Furthermore, we can see that the proposed scheme outperforms SDMA and ZF, since NOMA can achieve higher values of AN power due to the SIC application to nullify interference with other users while causing interference with the eavesdropper to improve network security. Similar to Figure 2, the ZF condition of canceling the interference makes it necessary to transmit more power to satisfy the EH requirements at SUs.
Figure 5 shows the AN power according to the interference threshold when the minimum EH requirements of the SUs and EH users are given as ψ l = ξ m = 25 dBm, and the minimum SINR for the SUs are γ l = 5 dB and γ l = 10 dB. From Figure 5, we can see that the AN power increases along with increasing interference threshold values for the PUs. As the interference threshold increases, the SU-Tx can transmit more power to the SUs and EH users that includes AN power to tackle the eavesdropper’s wiretap. Moreover, Figure 5 also verifies that the proposed scheme outperforms the other baseline schemes. This can be explained as follows: Unlikely to SDMA and ZF, NOMA can perform SIC to decode part of the interference caused by other users, which allows transmitting less power to satisfy the QoS requirements of the users and more AN power which results in better PLS in the network. The results obtained by ZF are due to the condition of designing the beamforming vectors to null the interference at the PUs, where the constraint (21f) of maximum interference allowed to the PUs only depends on the beamforming vector of the AN.

5. Conclusions

In this paper, we consider a MISO-NOMA-CR network assisted by SWIPT with the presence of EH users and an eavesdropper. To improve the security of the secondary network, we investigate a beamforming design and optimal PS ratios to minimize the transmit power of the secondary transmitter. Moreover, AN is considered in the proposed scheme to disrupt eavesdropping. The formulated non-convex optimization problem is subject to satisfying QoS constraints of the SUs and EH users, and maximum allowable power of the SU-Tx and maximum acceptable interference with the PUs. We provide a solution based on SDR, and develop performance comparison with baseline schemes such as SDMA, ZF, and a conventional approach without AN. Numerical results show that the proposed AN-aided beamforming and PS-ratio design furnishes secure transmissions of confidential information, and provides better secrecy than that obtained by the scheme without AN. Furthermore, it was shown that the application of NOMA in the proposed network overcomes the drawbacks of the traditional SDMA and ZF baseline schemes.

Author Contributions

C.E.G. conceived and proposed the research idea; All authors designed the experiments; C.E.G performed the experiments. C.E.G.; M.R.C. and I.K. analyzed the experimental results; C.E.G. wrote the paper under the supervision of I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) through the Korean Government and the Ministry of Science and ICT (MSIT) under Grant NRF-2018R1A2B6001714.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cui, J.; Ding, Z.; Fan, P. Beamforming design for MISO non-orthogonal multiple access systems. IET Commun. 2017, 11, 720–725. [Google Scholar] [CrossRef]
  2. Garcia, C.E.; Tuan, P.V.; Camana, M.R.; Koo, I. Optimized Power Allocation for a Cooperative NOMA System with SWIPT and an Energy-Harvesting User. Int. J. Electron. 2020, 107, 1704–1733. [Google Scholar] [CrossRef]
  3. Sharmila, A.; Dananjayan, P. Spectrum Sharing Techniques in Cognitive Radio Networks—A Survey. In Proceedings of the 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 29–30 March 2019. [Google Scholar]
  4. Riveros, L.G.M.; de Carvalho, F.B.S.; de Marinho, R.S. Spectrum Management based on Genetic Algorithm for Cognitive Networks. In Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), Milan, Italy, 7–9 July 2020. [Google Scholar]
  5. Arzykulov, S.; Nauryzbayev, G.; Tsiftsis, T.A.; Maham, B. Performance Analysis of Underlay Cognitive Radio Nonorthogonal Multiple Access Networks. IEEE Trans. Veh. Technol. 2019, 68, 9318–9322. [Google Scholar] [CrossRef]
  6. Lee, W. Resource Allocation for Multi-Channel Underlay Cognitive Radio Network Based on Deep Neural Network. IEEE Commun. Lett. 2018, 22, 1942–1945. [Google Scholar] [CrossRef]
  7. Alias, D.M.; Ragesh, G.K. Cognitive Radio networks: A survey. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016. [Google Scholar]
  8. Zheng, K.; Liu, X.-Y.; Liu, X.; Zhu, Y. Hybrid Overlay-Underlay Cognitive Radio Networks with Energy Harvesting. IEEE Trans. Commun. 2019, 67, 4669–4682. [Google Scholar] [CrossRef]
  9. Singh, S.; Mitra, D.; Baghel, R. Analysis of NOMA for Future Cellular Communication. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019. [Google Scholar]
  10. Liu, G.; Wang, Z.; Hu, J.; Ding, Z.; Fan, P. Cooperative NOMA Broadcasting/Multicasting for Low-Latency and High-Reliability 5G Cellular V2X Communications. IEEE Internet Things J. 2019, 6, 7828–7838. [Google Scholar] [CrossRef]
  11. Kang, J.-M.; Kim, I.-M. Optimal User Grouping for Downlink NOMA. IEEE Wirel. Commun. Lett. 2018, 7, 724–727. [Google Scholar] [CrossRef]
  12. Salehi, M.; Tabassum, H.; Hossain, E. Meta Distribution of SIR in Large-Scale Uplink and Downlink NOMA Networks. IEEE Trans. Commun. 2019, 67, 3009–3025. [Google Scholar] [CrossRef]
  13. Karipidis, E.; Sidiropoulos, N.D.; Luo, Z.-Q. Quality of Service and Max-Min Fair Transmit Beamforming to Multiple Cochannel Multicast Groups. IEEE Trans. Signal Process. 2008, 56, 1268–1279. [Google Scholar] [CrossRef] [Green Version]
  14. Camana, M.R.; Tuan, P.V.; Garcia, C.E.; Koo, I. Joint power allocation and power splitting for MISO SWIPT RSMA systems with energy-constrained users. Wirel. Netw. 2019, 26, 2241–2254. [Google Scholar] [CrossRef]
  15. Liu, L.; Zhang, R.; Chua, K.-C. Multi-Antenna Wireless Powered Communication with Energy Beamforming. IEEE Trans. Commun. 2014, 62, 4349–4361. [Google Scholar] [CrossRef] [Green Version]
  16. Karipidis, E.; Sidiropoulos, N.D.; Luo, Z.-Q. Far-Field Multicast Beamforming for Uniform Linear Antenna Arrays. IEEE Trans. Signal Process. 2007, 55, 4916–4927. [Google Scholar] [CrossRef] [Green Version]
  17. John, N.; Jyotsna, A. A Survey on Energy Efficient Tree-Based Data Aggregation Techniques in Wireless Sensor Networks. In Proceedings of the 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 11–12 July 2018. [Google Scholar]
  18. Zhou, F.; Beaulieu, N.C.; Li, Z.; Si, J.; Qi, P. Energy-Efficient Optimal Power Allocation for Fading Cognitive Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity. IEEE Trans. Wirel. Commun. 2016, 15, 2741–2755. [Google Scholar] [CrossRef]
  19. Feng, D.; Jiang, C.; Lim, G.; Cimini, L.J.; Feng, G.; Li, G.Y. A survey of energy-efficient wireless communications. IEEE Commun. Surv. Tutor. 2013, 15, 167–178. [Google Scholar] [CrossRef]
  20. Mao, S.; Leng, S.; Hu, J.; Yang, K. Power Minimization Resource Allocation for Underlay MISO-NOMA SWIPT Systems. IEEE Access. 2019, 7, 17247–17255. [Google Scholar] [CrossRef]
  21. Perera, T.D.P.; Jayakody, D.N.K.; Sharma, S.K.; Chatzinotas, S.; Li, J. Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges. IEEE Commun. Surv. Tutor. 2018, 20, 264–302. [Google Scholar] [CrossRef] [Green Version]
  22. Choi, K.W.; Hwang, S.I.; Aziz, A.A.; Jang, H.H.; Kim, J.S.; Kang, D.S.; Kim, D.I. Simultaneous Wireless Information and Power Transfer (SWIPT) for Internet of Things: Novel Receiver Design and Experimental Validation. IEEE Internet Things J. 2020, 7, 2996–3012. [Google Scholar] [CrossRef]
  23. Hedayati, M.; Kim, I.-M. On the Performance of NOMA in the Two-User SWIPT System. IEEE Trans. Veh. Technol. 2018, 67, 11258–11263. [Google Scholar] [CrossRef]
  24. Song, Z.; Wang, X.; Liu, Y.; Zhang, Z. Joint Spectrum Resource Allocation in NOMA-based Cognitive Radio Network with SWIPT. IEEE Access 2019, 7, 89594–89603. [Google Scholar] [CrossRef]
  25. Le, Q.N.; Nguyen, N.-P.; Yadav, A.; Dobre, O.A. Outage Performance of Full-Duplex Overlay CR-NOMA Networks with SWIPT. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar]
  26. Mukherjee, A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
  27. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1773–1828. [Google Scholar] [CrossRef]
  28. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  29. Garcia, C.E.; Camana, M.R.; Koo, I.; Rahman, M.A. Particle Swarm Optimization-Based Power Allocation Scheme for Secrecy Sum Rate Maximization in NOMA with Cooperative Relaying. Lect. Notes Comput. Sci. 2019, 11644, 1–12. [Google Scholar]
  30. Garcia, C.E.; Camana, M.R.; Koo, I. Secrecy Energy Efficiency Maximization in an Underlying Cognitive Radio–NOMA System with a Cooperative Relay and an Energy-Harvesting User. Appl. Sci. 2020, 10, 3630. [Google Scholar] [CrossRef]
  31. Garcia, C.E.; Camana, M.R.; Koo, I. Particle Swarm Optimization-Based Secure Computation Efficiency Maximization in a Power Beacon-Assisted Wireless-Powered Mobile Edge Computing NOMA System. Energies 2020, 13, 5540. [Google Scholar] [CrossRef]
  32. Zhao, N.; Li, D.; Liu, M.; Cao, Y.; Chen, Y.; Ding, Z.; Wang, X. Secure Transmission via Joint Precoding Optimization for Downlink MISO NOMA. IEEE Trans. Veh. Technol. 2019, 68, 7603–7615. [Google Scholar] [CrossRef] [Green Version]
  33. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.; Chen, W. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1812–1823. [Google Scholar] [CrossRef] [Green Version]
  34. Zhao, N.; Wang, W.; Wang, J.; Chen, Y.; Lin, Y.; Ding, Z.; Beaulieu, N.C. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks. IEEE Trans. Commun. 2019, 67, 2294–2305. [Google Scholar] [CrossRef] [Green Version]
  35. Wang, H.-M.; Zhang, X.; Yang, Q.; Tsiftsis, T.A. Secure Users Oriented Downlink MISO NOMA. IEEE J. Sel. Top. Signal Process. 2019, 13, 671–684. [Google Scholar] [CrossRef] [Green Version]
  36. Zhou, F.; Chu, Z.; Sun, H.; Hu, R.Q.; Hanzo, L. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT. IEEE J. Sel. Areas Commun. 2018, 36, 918–931. [Google Scholar] [CrossRef]
  37. Vo, V.N.; So-In, C.; Tran, H.; Tran, D.-D.; Heng, S.; Aimtongkham, P.; Nguyen, A.-N. On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA. IEEE Access 2019, 7, 149341–149354. [Google Scholar] [CrossRef]
  38. Luo, Z.; Ma, W.; So, A.; Ye, Y.; Zhang, S. Semidefinite Relaxation of Quadratic Optimization Problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  39. Camana, M.R.; Garcia, C.E.; Koo, I. Joint Power Allocation and Power Splitting for MISO-RSMA Cognitive Radio Systems with SWIPT and Information Decoder Users. IEEE Syst. J. 2020. submitted. [Google Scholar]
  40. Shi, Q.; Peng, C.; Xu, W.; Hong, M.; Cai, Y. Energy Efficiency Optimization for MISO SWIPT Systems with Zero-Forcing Beamforming. IEEE Trans. Signal Process. 2016, 64, 842–854. [Google Scholar] [CrossRef]
  41. Umebayashi, K.; Lehtomäki, J.; Suliman, I.M. Analysis of transmit power setting technique for cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2016, 144, 1–13. [Google Scholar] [CrossRef] [Green Version]
  42. Yang, Z.; Ding, Z.; Fan, P.; Karagiannidis, G.K. On the Performance of Non-orthogonal Multiple Access Systems with Partial Channel Information. IEEE Trans. Commun. 2016, 64, 654–667. [Google Scholar] [CrossRef]
Figure 1. Frame scheme of the wireless-powered NOMA-MEC network.
Figure 1. Frame scheme of the wireless-powered NOMA-MEC network.
Electronics 09 01948 g001
Figure 2. AN power according to the minimum SINR required at the SUs.
Figure 2. AN power according to the minimum SINR required at the SUs.
Electronics 09 01948 g002
Figure 3. SSR performance comparison between the proposed approach and the scheme without AN, in accordance with the minimum harvested energy at the SU and EH users, and the minimum SINR at the SUs.
Figure 3. SSR performance comparison between the proposed approach and the scheme without AN, in accordance with the minimum harvested energy at the SU and EH users, and the minimum SINR at the SUs.
Electronics 09 01948 g003
Figure 4. AN power versus the minimum harvested energy at the EH users and SUs.
Figure 4. AN power versus the minimum harvested energy at the EH users and SUs.
Electronics 09 01948 g004
Figure 5. AN power versus the interference threshold, ϕ P U , k .
Figure 5. AN power versus the interference threshold, ϕ P U , k .
Electronics 09 01948 g005
Table 1. Main abbreviations.
Table 1. Main abbreviations.
AbbreviationTerm
ANArtificial noise
BSBase station
CRCognitive radio
CSIchannel state information
DFDecode-and-forward
IDInformation decoding
IoTInternet of things
MISOMultiple-input single-output
MIMOMultiple-input multiple-output
NOMANon-orthogonal multiple-access
PAPower allocation
PLSPhysical-layer security
PSPower-splitting
PSOParticle swarm optimization
SICSuccessive interference cancelation
SDPsemidefinite programming
SINRSignal-to-Interference-plus-noise ratio
SSRSecrecy sum-rate
QoSQuality of service
TDMATime-division multiple-access
SDRSemidefinite relaxation
SWIPTSimultaneous wireless information and power transfer
ZFZero-forcing
SU-TxSecondary transmitter
SU l l-th Secondary user
EH m m-th EH user
P U k k-th Primary user
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterNotationValue
Number of SUsL2
Number of EH usersM2
Number of PUsK2
Number of SU-Tx antennasN8
Maximum SU-Tx transmission power P max 30 dBm
Channel gain L o 10 3
Path-loss exponent α 2
Rician factor K R 5
Distance from the SU-Tx to the SU 1 d SU , l 10
Distance from the SU-Tx to the SU 2 d SU , 2 15
Distance from the SU-Tx to the EH user 1 d EH , 1 5
Distance from the SU-Tx to the EH user 2 d EH , 2 5
Distance from the SU-Tx to the PU 1 d PU , 1 20
Distance from the SU-Tx to the PU 2 d PU , 2 20
Distance from the SU-Tx to the eavesdropper d e v 13
Direction from the SU-Tx to the SU 1 ϕ SU , 1 30 °
Direction from the SU-Tx to the SU 2 ϕ SU , 2 40 °
Direction from the SU-Tx to the EH user 1 ϕ EH , 1 15 °
Direction from the SU-Tx to the EH user 2 ϕ EH , 2 25 °
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Garcia, C.E.; Camana, M.R.; Koo, I. Joint Beamforming and Artificial Noise Optimization for Secure Transmissions in MISO-NOMA Cognitive Radio System with SWIPT. Electronics 2020, 9, 1948. https://doi.org/10.3390/electronics9111948

AMA Style

Garcia CE, Camana MR, Koo I. Joint Beamforming and Artificial Noise Optimization for Secure Transmissions in MISO-NOMA Cognitive Radio System with SWIPT. Electronics. 2020; 9(11):1948. https://doi.org/10.3390/electronics9111948

Chicago/Turabian Style

Garcia, Carla E., Mario R. Camana, and Insoo Koo. 2020. "Joint Beamforming and Artificial Noise Optimization for Secure Transmissions in MISO-NOMA Cognitive Radio System with SWIPT" Electronics 9, no. 11: 1948. https://doi.org/10.3390/electronics9111948

APA Style

Garcia, C. E., Camana, M. R., & Koo, I. (2020). Joint Beamforming and Artificial Noise Optimization for Secure Transmissions in MISO-NOMA Cognitive Radio System with SWIPT. Electronics, 9(11), 1948. https://doi.org/10.3390/electronics9111948

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop