22
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      AN-Aided Transmit Beamforming Design for Secured Cognitive Radio Networks with SWIPT

      1 , 1 , 1 , 2
      Wireless Communications and Mobile Computing
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We investigate multiple-input single-output secured cognitive radio networks relying on simultaneous wireless information and power transfer (SWIPT), where a multiantenna secondary transmitter sends confidential information to multiple single-antenna secondary users (SUs) in the presence of multiple single-antenna primary users (PUs) and multiple energy-harvesting receivers (ERs). In order to improve the security of secondary networks, we use the artificial noise (AN) to mask the transmit beamforming. Optimization design of AN-aided transmit beamforming is studied, where the transmit power of the information signal is minimized subject to the secrecy rate constraint, the harvested energy constraint, and the total transmit power. Based on a successive convex approximation (SCA) method, we propose an iterative algorithm which reformulates the original problem as a convex problem under the perfect channel state information (CSI) case. Also, we give the convergence of the SCA-based iterative algorithm. In addition, we extend the original problem to the imperfect CSI case with deterministic channel uncertainties. Then, we study the robust design problem for the case with norm-bounded channel errors. Also, a robust SCA-based iterative algorithm is proposed by adopting the S -Procedure. Simulation results are presented to validate the performance of the proposed algorithms.

          Related collections

          Most cited references35

          • Record: found
          • Abstract: not found
          • Article: not found

          MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Survey of 5G Network: Architecture and Emerging Technologies

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Robust Beamforming for Secure Communication in Systems with Wireless Information and Power Transfer

              , , (2014)
              This paper considers a multiuser multiple-input single-output (MISO) downlink system with simultaneous wireless information and power transfer. In particular, we focus on secure communication in the presence of passive eavesdroppers and potential eavesdroppers (idle legitimate receivers). We study the design of a resource allocation algorithm minimizing the total transmit power for the case when the legitimate receivers are able to harvest energy from radio frequency signals. Our design advocates the dual use of both artificial noise and energy signals in providing secure communication and facilitating efficient wireless energy transfer. The algorithm design is formulated as a non-convex optimization problem. The problem formulation takes into account artificial noise and energy signal generation for protecting the transmitted information against both considered types of eavesdroppers when imperfect channel state information (CSI) of the potential eavesdroppers and no CSI of the passive eavesdroppers are available at the transmitter. In light of the intractability of the problem, we reformulate the considered problem by replacing a non-convex probabilistic constraint with a convex deterministic constraint. Then, a semi-definite programming (SDP) relaxation approach is adopted to obtain the optimal solution for the reformulated problem. Furthermore, we propose a suboptimal resource allocation scheme with low computational complexity for providing communication secrecy and facilitating efficient energy transfer. Simulation results demonstrate a close-to-optimal performance achieved by the proposed schemes and significant transmit power savings by optimization of the artificial noise and energy signal generation.
                Bookmark

                Author and article information

                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8669
                1530-8677
                August 13 2018
                August 13 2018
                : 2018
                : 1-13
                Affiliations
                [1 ]School of Information Engineering, Zhengzhou University, Zhengzhou, China
                [2 ]Zhengzhou Information Science and Technology Institute, Zhengzhou, China
                Article
                10.1155/2018/6956313
                fd37ce26-42c8-4bb1-ade8-cee209034803
                © 2018

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article