{"title":"具有部分窃听信道状态信息的无线供电中继系统的安全传输和自能量回收","authors":"Jingping Qiao, Haixia Zhang, Feng Zhao, D. Yuan","doi":"10.1109/JSAC.2018.2825541","DOIUrl":null,"url":null,"abstract":"This paper focuses on the secure transmission of wireless-powered relay systems with imperfect eavesdropper channel state information (ECSI). For efficient energy transfer and information relaying, a novel two-phase protocol is proposed, in which the relay operates in full-duplex (FD) mode to achieve simultaneous wireless power and information transmission. Compared with those existing protocols, the proposed design possesses two main advantages: 1) it fully exploits the available hardware resource (antenna element) of relay and can offer higher secrecy rate; 2) it enables self-energy recycling (S-ER) at relay, in which the loopback interference (LI) generated by FD operation is harvested and reused for information relaying. To maximize the worst-case secrecy rate (WCSR) through jointly designing the source and relay beamformers coupled with the power allocation ratio, an optimization problem is formulated. This formulated problem is proved to be non-convex and the challenge to solve it is how to concurrently solve out the beamformers and the power allocation ratio. To cope with this difficulty, an alternative approach is proposed by converting the original problem into three subproblems. By solving these subproblems iteratively, the closed form solutions of robust beamformers and power allocation ratio for the original problem are achieved. Simulations are done and results reveal that the proposed S-ER based secure transmission scheme outperforms the traditional time-switching based relaying (TSR) scheme at a maximum WCSR gain of 80%. Results also demonstrate that the WCSR performance of the scheme reusing idle antennas for information reception is much better than that of schemes exploiting only one receive antenna.","PeriodicalId":13243,"journal":{"name":"IEEE Journal on Selected Areas in Communications","volume":"95 1","pages":""},"PeriodicalIF":13.8000,"publicationDate":"2017-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/JSAC.2018.2825541","citationCount":"2","resultStr":"{\"title\":\"Secure Transmission and Self-Energy Recycling for Wireless-Powered Relay Systems with Partial Eavesdropper Channel State Information\",\"authors\":\"Jingping Qiao, Haixia Zhang, Feng Zhao, D. Yuan\",\"doi\":\"10.1109/JSAC.2018.2825541\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses on the secure transmission of wireless-powered relay systems with imperfect eavesdropper channel state information (ECSI). For efficient energy transfer and information relaying, a novel two-phase protocol is proposed, in which the relay operates in full-duplex (FD) mode to achieve simultaneous wireless power and information transmission. Compared with those existing protocols, the proposed design possesses two main advantages: 1) it fully exploits the available hardware resource (antenna element) of relay and can offer higher secrecy rate; 2) it enables self-energy recycling (S-ER) at relay, in which the loopback interference (LI) generated by FD operation is harvested and reused for information relaying. To maximize the worst-case secrecy rate (WCSR) through jointly designing the source and relay beamformers coupled with the power allocation ratio, an optimization problem is formulated. This formulated problem is proved to be non-convex and the challenge to solve it is how to concurrently solve out the beamformers and the power allocation ratio. To cope with this difficulty, an alternative approach is proposed by converting the original problem into three subproblems. By solving these subproblems iteratively, the closed form solutions of robust beamformers and power allocation ratio for the original problem are achieved. Simulations are done and results reveal that the proposed S-ER based secure transmission scheme outperforms the traditional time-switching based relaying (TSR) scheme at a maximum WCSR gain of 80%. Results also demonstrate that the WCSR performance of the scheme reusing idle antennas for information reception is much better than that of schemes exploiting only one receive antenna.\",\"PeriodicalId\":13243,\"journal\":{\"name\":\"IEEE Journal on Selected Areas in Communications\",\"volume\":\"95 1\",\"pages\":\"\"},\"PeriodicalIF\":13.8000,\"publicationDate\":\"2017-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1109/JSAC.2018.2825541\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Journal on Selected Areas in Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/JSAC.2018.2825541\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Journal on Selected Areas in Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/JSAC.2018.2825541","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Secure Transmission and Self-Energy Recycling for Wireless-Powered Relay Systems with Partial Eavesdropper Channel State Information
This paper focuses on the secure transmission of wireless-powered relay systems with imperfect eavesdropper channel state information (ECSI). For efficient energy transfer and information relaying, a novel two-phase protocol is proposed, in which the relay operates in full-duplex (FD) mode to achieve simultaneous wireless power and information transmission. Compared with those existing protocols, the proposed design possesses two main advantages: 1) it fully exploits the available hardware resource (antenna element) of relay and can offer higher secrecy rate; 2) it enables self-energy recycling (S-ER) at relay, in which the loopback interference (LI) generated by FD operation is harvested and reused for information relaying. To maximize the worst-case secrecy rate (WCSR) through jointly designing the source and relay beamformers coupled with the power allocation ratio, an optimization problem is formulated. This formulated problem is proved to be non-convex and the challenge to solve it is how to concurrently solve out the beamformers and the power allocation ratio. To cope with this difficulty, an alternative approach is proposed by converting the original problem into three subproblems. By solving these subproblems iteratively, the closed form solutions of robust beamformers and power allocation ratio for the original problem are achieved. Simulations are done and results reveal that the proposed S-ER based secure transmission scheme outperforms the traditional time-switching based relaying (TSR) scheme at a maximum WCSR gain of 80%. Results also demonstrate that the WCSR performance of the scheme reusing idle antennas for information reception is much better than that of schemes exploiting only one receive antenna.
期刊介绍:
The IEEE Journal on Selected Areas in Communications (JSAC) is a prestigious journal that covers various topics related to Computer Networks and Communications (Q1) as well as Electrical and Electronic Engineering (Q1). Each issue of JSAC is dedicated to a specific technical topic, providing readers with an up-to-date collection of papers in that area. The journal is highly regarded within the research community and serves as a valuable reference.
The topics covered by JSAC issues span the entire field of communications and networking, with recent issue themes including Network Coding for Wireless Communication Networks, Wireless and Pervasive Communications for Healthcare, Network Infrastructure Configuration, Broadband Access Networks: Architectures and Protocols, Body Area Networking: Technology and Applications, Underwater Wireless Communication Networks, Game Theory in Communication Systems, and Exploiting Limited Feedback in Tomorrow’s Communication Networks.