Professional Documents
Culture Documents
Robust Beamforming Designs in Secure Mimo Swipt Iot Networks With A Nonlinear Channel Model
Robust Beamforming Designs in Secure Mimo Swipt Iot Networks With A Nonlinear Channel Model
net/publication/343516533
CITATIONS READS
17 97
5 authors, including:
All content following this page was uploaded by Zhengyu Zhu on 07 July 2021.
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1703
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
1704 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 3, FEBRUARY 1, 2021
transmitter, one CJ, K CR nodes, and L EH nodes. Here, the where np,k ∼ CN (0, σp,k
2 ) is the noise at the kth CR node [10].
k=1
where Mi is a constant expressing the maximum harvested
power at the ith CR/ER node when EH circuit reaches satu-
K
ye,l = HH fk sk + HH ration. Parameters ai and bi are also constants in connection
e,l z + Ge,l qsJ + ne,l , l = 1, . . . , L
H
e,l
k=1 with the detailed circuit specifications, as defined in [38]–[41].
(2) Meanwhile, as for the kth CR node, the (1−ρs,k ) part of the
received signal is utilized for EH. Thus, the received RF power
where q ∈ CNJ indicates the CJ vector, sJ equals the coop- at the kth CR node and the lth EH node can be written as
erative jamming signal introduced by CJ with E{|sJ |2 } = 1, K
and ns,k ∼ CN (0, σs,k 2 ) and n
e,l ∼ CN (0, σe,l I) stand for the
2 H
additive Gaussian noise at the kth CR node and the lth EH Es,k = 1 − ρs,k hs,k Fk + Z hs,k + gs,k Qgs,k + σs,k
H 2
k=1
node, respectively. K
The received signal at the kth CR node is divided into the ID
Ee,l = tr HH e,l QGe,l + NE σe,l .
Fk + Z He,l + tr GH 2
and EH parts by the PS ratio ρs,k ∈ (0, 1]. Thus, the received e,l
k=1
signal for ID at the kth CR node can be given as
(7)
√
s,k =
yID ρs,k ys,k + np,k
Using the nonlinear EH model, the harvested power at the kth
√ K
= ρs,k hH fk sk + hH CR node and the lth EH node is expressed as
s,k z + gs,k qsJ + ns,k + np,k
H
s,k
k=1 prac prac
(3) Es,k = prac Es,k ∀k, Ee,l = prac Ee,l ∀l. (8)
⎛ ⎞
ρs,k hH
s,k Fk hs,k
Cs,k ρs,k , Fk , Z, Q = log2 ⎝1 +
⎠
ρs,k σs,k
2 + hH Wh
j=k s,k j s,k + hH Zh
s,k s,k + g H Qg
s,k s,k + σ 2
p,k
−1
Cl,k ρs,k , Fk , Z, Q = log2 I + HHe,l ZHe,l + Ge,l QGe,l + σe,l I
H 2
HH
e,l Fk He,l (5)
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1705
⎛ ⎞
max ⎝ min
prac
Es,k + min Ee,l ⎠
prac
(10a)
ρs,k ,{Fk },Z,Q es,k ≤εs,k ,ẽs,k ≤ε̃s,k E ≤ε ,
Ẽ
e,l F e,l e,l F e,l
≤ε̃
K
tr(Fk ) + tr(Z) ≤ PT , tr(Q) ≤ PJ (10c)
k=1
1 ≥ ρs,k > 0, Fk 0, Z 0, Q 0, rank(Fk ) = 1 (10d)
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
1706 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 3, FEBRUARY 1, 2021
ẽs,k )H Q(ḡs,k + ẽs,k ), Ĝe,l = (Ḡe,l + Ẽe,l )H Q(Ḡe,l + Ẽe,l ), where ts,k ≥ 0 is a slack variable and Js,k = h̄H
s,k Bh̄s,k + gs,k +
s,k = 1/(1 + exp(as,k bs,k )), e,l = 1/(1 + exp(ae,l be,l )), σe,l
2 . Based on Lemma 1, it follows:
and f (t) is defined as the optimal value of problem (12), ⎡ ⎤
ts,k
which is a function over t. The function f (t) does not have B+ 2 I 0NT ×1 Bh̄s,k
εs,k
a closed-form solution, but is numerically tractable. ⎢ √ ⎥
⎣ 01×NT 1 − ρs,k χs,k ⎦ 0. (15)
Remark 1: It is noted that the LMI constraint (12e) is √
h̄H
s,k B χs,k Js,k − ts,k
obtained from [42, Proposition 1] based on the assumption
rank(Fk ) ≤ 1, which will be shown later. By employing Lemma 2 again, (15) is rewritten as
It is observed that problem (12) is still nonconvex due
t
to (12b)–(12e). Now, we first reformulate constraint (12b). The B + s,k2 I B̂s,k
εs,k
following lemma is required to convert (12b) into a quadratic 0 (16)
matrix inequality (QMI). B̂H
s,k B̃s,k
Lemma 1 (Schur Complement [44]): Let X be a complex
where λs,k ≥ 0 is a slack variable
Hermitian matrix as
⎡ √ ⎤
1 − ρs,k χs,k 01×NJ
B1 B2 √
⎢ χs,k ⎥
X=X = H
. B̃s,k = ⎣ B − λs,k ḡH
s,k Q
BH
2 B3 k
λs,k
⎦
0NJ ×1 Qḡs,k Q + 2 INJ
ε̃s,k
−1
Then, we have X 0 if and only if B1 − BH 2 B3 B2 0 with
−1
B3 0, or B3 − BH 2 B1 B2 0 with B1 0. with Bk = h̄H s,k Bh̄s,k + ḡs,k Qḡs,k + σe,l − ts,k and B̂s,k =
H 2
K
Let us define B k=1 Fk + Z. By utilizing Lemma 1 [ 0NT ×(NJ +1) Bh̄s,k ].
to (12b), the robust problem (12) can be converted into
Defining Ck [1/(2R̄s /t − 1)]Fk − ( j=k Wj + Z),
constraint (12d) can be similarly expressed from Lemma 1 as
max Ēs + Ēe (13a)
ρs,k ,Fk ,Z,Q,Ēs ,Ēe
√ ρs,k σp,k
1 − ρs,k χs,k 0 ∀k. (17)
s.t. √ 0 ∀k (13b) σp,k hH s,k Ck hs,k − gs,k − σs,k
2
χs,k hHs,k Bhs,k + gs,k + σs,k
2
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1707
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
1708 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 3, FEBRUARY 1, 2021
by using the method in [27]. Since t lies in the interval Ĝe,l Ḡe,l Ḡe,l , Hs ,k H̄s,k + s,k , Gs ,k Ḡs,k + s,k ,
H
[1/log2 (1 + [(Phs,k 2 )/(σs,k
2 + σ 2 )]), 1], problem (30) can
p,k He ,l Ĥe,l + e,l , and Ge ,l Ĝe,l + e,l where s,k =
be solved by performing a 1-D line search over t and choosing
s,k + es,k h̄s,k + es,k es,k , s,k = ḡs,k ẽs,k + ẽs,k ḡs,k + ẽs,k ẽs,k ,
h̄s,k eH H H H H H
the minimum f (t) as an optimal solution of (29). Note that the
e,l = H̄e,l Ee,l + Ee,l H̄e,l + Ee,l Ee,l , and e,l = Ḡe,l Ẽe,l +
H H H H
optimal beamforming solution w∗k can be computed based on
e,l + Ẽe,l Ẽe,l , which stand for the CSI uncertainties.
Ẽe,l ḠH H
W∗k = w∗k w∗H
k . It is worth noting that the convex problem (29)
is not equivalent to the original problem (11), since the solution Then, the inequalities in (34b) and (34c) can be rearranged,
to (29) is suboptimal of (11) due to the SCA method. respectively, as
σp,k
2
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1709
Then, a loose approximation method [47] can be utilized to By adopting the above Taylor expansion, for the points
minimize the RHS of (41) and (42) as (w̃k , r̃1 ), (z̃, r̃2 ), and (q̃, r̃2 ), (46) and (47) are transformed
into convex forms, respectively, as
fH
k Hs ,k fk fH H̄ξ ,k fk
min ≥ k s ∀k σp,k
2
s,k F ≤ξs,k r1 − 1 r1 − 1
σs,k
2
+ j Hξs ,k wj + z Hξs ,k z + q Gξ̃s ,k q +
wH H H
σe,l
2 + zH H
e ,l z + q Ge ,l q
H ρs,k
j=k
min
e,l F ≤ξe,l ,e,l F ≤ξ̃e,l r2 ≤ FH̄ξ ,k ,1 wk , r1 , w̃k , r̃1 (50a)
s
σe,l
2 + zH Ĥξe ,l z + qH Ĝξ̃e ,l q σe,l
2
+z H
Hξe ,l z + wH
k Hξe ,l wk + q Gξ̃e ,l q
H
≥ (43)
r2 2 r2
≤ σe,l
2
− 2 + FĤ ,0 z, r2 , z̃, r̃2
r̃2 r̃2 ξe ,l
where H̄ξs ,k = H̄s,k − ξs,k INT , Ĥξe ,l = Ĥe,l − ξe,l INT , and
Ĝξ̃e ,l = Ĝe,l − ξ̃e,l INJ . Applying a similar technique to the + FĜ ,0 q, r2 , q̃, r̃2 ∀k, l. (50b)
ξ̃e ,l
LHS of (41) and (42), we obtain
In addition, it can be easily checked that the EH con-
max σs,k
2
+ j Hs ,k wj + z Hs ,k z
wH H
straints (11b) and (11c) are nonconvex because of CSI
s,k F ≤ξs,k ,s,k F ≤ξ̃s,k j=k uncertainties. In order to approximate (11b) and (11c) as a
σp,k
2 convex one, we first explore a loose approximation method.
+ qH Gs ,k q + ≤ σs,k
2
+ j Hξs ,k wj + z Hξs ,k z
wH H
Following (6), the inverse function of prac (Pin ) can be
ρs,k
j=k written as
σp,k
2 ab
1 e (Pmax − prac )
+ qH Gξ̃s ,k q + ∀k (44) Pin prac b − ln . (51)
ρs,k a eab prac + Pmax
max σe,l
2
+ zH He ,l z
e,l F ≤ξe,l ,e,l F ≤ξ̃e,l Then, applying (51), (11b) and (11c) can be transformed
to be
+ wH
k He ,l wk + q Ge ,l q ≤ σe,l
H 2
K
+ zH Hξe ,l z + wH
k Hξe ,l wk + q Gξ̃e ,l q ∀l
H
(45)
j H̄ξs ,k wj + z H̄ξs ,k z + q Ḡξ̃s ,k q
wH H H
j=1
where Hξs ,k = H̄s,k + ξs,k INT , Gξ̃s ,k = Ḡs,k + ξ̃s,k INJ , Hξe ,l =
Pin Ēs
Ĥe,l + ξe,l INT , and Gξ̃e ,l = Ĝe,l + ξ̃e,l INJ . ≥ − σs,k
2
∀k (52a)
According to (41)–(45), (36a) and (36b) can be converted, 1 − ρs,k
respectively, as K
zH Ĥξe ,l z + wHj Ĥξe ,l wj + q Ĝξ̃e ,l q
H
σp,k
2 j=1
σs,k
2
+ j Hξs ,k wj + z Hξs ,k z + q Gξ̃s ,k q +
wH H H
ρs,k ≥ Pin Ēe − NE σe,l
2
∀l (52b)
j=k
fH
k H̄ξs ,k fk where Ḡξ̃s ,k = Ḡs,k + ξ̃s,k I. Substituting wj w̃j + wj ,
≤ ∀k (46)
r1 − 1 z z̃ + z, and q q̃ + q into the LHS of (52a), we get
σe,l
2
+ zH Hξe ,l z + wHk Hξe ,l wk + q Gξ̃e ,l q
H
K
K
! "
2{w̃H Aw} w̃H Aw̃
FA,a w, t, w̃, t̃ = − 2 (t − a). (49) + j Ĥξe ,l w̃j + 2 w̃j Ĥξe ,l wj
w̃H H
. (54)
t̃ − a t̃ − a j=1
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
1710 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 3, FEBRUARY 1, 2021
TABLE I
C OMPLEXITY A NALYSIS OF D IFFERENT A LGORITHMS
Problem (60) is an SOCP problem [44], which can be solved V. S IMULATION R ESULTS
by employing the CVX tools [45]. Note that the convex In this section, we provide the simulation results to val-
problem (60) is not equivalent to the orignal problem (11). idate the performance of our proposed scheme. The system
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1711
TABLE II
S YSTEM PARAMETERS
Fig. 3. Average harvested energy with respect to the target secrecy rate.
Fig. 2. Average harvested energy with respect to the iteration numbers for
the SPCA method.
parameters that we have considered for the simulations are Fig. 4. Average harvested energy with respect to the power budget at CJ.
summarized in Table II, where Tx means the transmitter.
The estimated channels hs,k , He,l ,gs,k , and Ge,l are, respec-
tively, modeled as hs,k = H(ds,k )hI , He,l = H(de,l )HI , of all schemes declines with the increased secrecy rate target.
gs,k = H(fs,k )gI , and Ge,l = H(fe,l )GI , where H(d) = In addition, the SOCP-SPCA algorithm can achieve almost the
(c/4π fc )(1/d)(κ/2) , hI ∼ CN (0, I), HI ∼ CN (0, I), gs,k ∼ same performance as the two-layer method with much lower
CN (0, I), and Ge,l ∼ CN (0, I). We fix the channel error complexity. When = 0.01, the average harvested power of
bound for the deterministic model as εs = εs,k = ε̃s,k ∀k the SOCP-SPCA algorithm reaches 99.85% of the two-layer
and εe = εe,l = ε̃e,l ∀k. For the nonlinear EH model, we algorithm. Compared with the no-AN scheme and the no-CJ
set M = Ms,k = Me,l = 3.9 mW, a = as,k = ae,l = 1500, scheme, the harvested power of the SOCP-SPCA algorithm is
and b = bs,k = be,l = 0.0022 according to the measurement 9 and 8 dB higher, respectively. Moreover, we can check that
data results [39]. In our simulations, we compare the no-AN the proposed algorithm outperforms the nonrobust scheme,
scheme which is obtained by setting Qm = 0 ∀m [21], no-CJ and the performance gap increases as the target secrecy rate
scheme which is computed by Z = 0 [27], and the nonrobust becomes large.
method which assumes no uncertainty in the CSI [27]. Fig. 4 depicts the average harvested energy in terms of the
Fig. 2 illustrates the convergence of the SOCP-SPCA power budget at CJ with PT = 10 dBm and R̄s = 0.5 b/s/Hz.
method with respect to the iteration numbers for PT = It is easily observed that the achieved harvested power grows
40 dBm, PJ = 40 dBm, R̄s = 0.5 b/s/Hz, and ε = 0.01. with PJ . Also the perfect CSI case, the two-layer algorithm,
We can see that the convergence of the SOCP-SPCA method and the SOCP-SPCA algorithm exhibit the same slope. Also,
is achieved for all cases within just five iterations. the average harvested power of the SOCP-SPCA algorithm
Fig. 3 shows the average harvested energy in terms of differ- reaches 99.91% of the two-layer algorithm regardless of .
ent target secrecy rates with PT = 30 dBm and PJ = 30 dBm. Moreover, we can check that as PJ increases, the performance
Here, “Two-layer” and “SOCP-SPCA” denote our proposed gap between the proposed SOCP-SPCA algorithm and the no-
schemes, while “no-AN,” “no-CJ,” and “no-robust” represent AN scheme becomes larger and a performance loss of the
the benchmark designs. It is observed that the harvested power nonrobust scheme grows.
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
1712 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 3, FEBRUARY 1, 2021
VI. C ONCLUSION
In this article, we have studied robust secure beamforming
designs for a PS MIMO SWIPT IoT network under a nonlinear
EH model with cooperative jamming, where norm-bounded
channel uncertainties are present. The formulated optimization
problem has been transformed into a tractable two-layer form.
The inner layer problem has been recast as a sequence of SDPs
by converting all nonconvex constraints into LMIs. Then the
optimal solution to the outer layer problem can be obtained
by conducting a 1-D line search. To reduce the computational
complexity due to the 1-D search technique, an SPCA-based
iterative algorithm has been proposed. Simulation results have
Fig. 5. CDF of the target secrecy rate at the CR nodes.
shown that the proposed robust design outperforms conven-
tional schemes reported in the literature. In particular, it has
been illustrated that the proposed SPCA algorithm can achieve
almost the same performance as the two-layer search method
with significantly reduced complexity. The proposed robust
secrecy design framework and solution approach have poten-
tials to be extended to more complex SWIPT systems by
incorporating new security strategies.
A PPENDIX
P ROOF OF T HEOREM 1
First, we reformulate the constraints of problem (29).
Equation (19) can be rewritten as
s,k + H
s,k Ck s,k − J s,k Qs,k J 0 ∀k
H H
(61)
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1713
K
Premultiplying both sides of the above equality by Fk and
+ tr Vs,k ˜ s,k + H
s,k Bs,k +
H H
J s,k Q s,k J applying the inverse yield
k=1
K 2R̄s
L
L
NE (j,j) Fk s,k Ss,k Hs,k
+ tr Ue,l e,l + tr Fk + Z De,l 2R̄s − t
−1
l=1 l=1 j=1 k=1 L
1
L
NJ
× N+ e,l Tk,l e,l + s,k Vs,k s,k
H H
= Fk .
(j,j) t
+ tr QEe,l l=1
l=1 j=1 Hence, we have the rank relation as
⎛
where Mk ∈ HNT
+ , N ∈ HN NT NT
+ , P ∈ H+ , Sk ∈ H+ , Tk,l ∈ H+ ,
T NT
2R̄s
NT NT
Ue,l ∈ H+ , Vs,k ∈ H+ , γ ∈ R+ , and ν ∈ R+ are the dual rank(Fk ) = rank⎝ Fk s,k Ss,k Hs,k
2R̄s − t
variables of Fk , Q, P, (61)–(64), and (10c), respectively, and
(j,j)
De,l ∈ HN
(j,j) NT −1 ⎞
+ and Ee,l ∈ H+ denote a block submatrix of
T
L
1
˜H
˜ e,l Ue,l ˜ H ˜H × N+ e,l Tk,l He,l + s,k Vs,k s,k
H ⎠
e,l and e,l T Ue,l T e,l , respectively, as t
⎡ (1,1) (1,N )
⎤ l=1
De,l ··· De,l E
⎢ . .. ⎥ ≤ rank(s,k Ss,k H
s,k ). (68)
˜H
˜ e,l Ue,l ⎢ . .. ⎥
e,l = ⎣ . . . ⎦
(N ,1) (N ,N ) Now, we will compute the rank of the matrix s,k Ss,k H
s,k .
De,lE · · · De,lE E To this end, we consider the following equalities as:
⎡ (1,1) ⎤
Ee,l ···
(1,N )
Ee,l J # $
⎢ . ⎥ I 0 H s,k = I
˜ e,l T Ue,l H ˜H ⎢ . .. .. ⎥. # $
T e,l = ⎣ . . . ⎦ μs,k # $
(NJ ,1) (NJ ,NJ )
I 0 s,k = 2 s,k − 0 hs,k
Ee,l · · · Ee,l εs,k
# $ H
The related Karush–Kuhn–Tucker (KKT) conditions are I 0 J = 0. (69)
listed as Premultiplying [I 0] and post-multiplying H s,k to (65d)
∂L t generate
= Mk + s,k Ss,k H
s,k + γ I
∂Fk 2 −t
R̄s # $
I 0 s,k + H s,k Ck s,k − J s,k Qs,k J Ss,k s,k = 0
H H H
L L NE
(j,j)
− e,l Tk,l H
e,l + De,l = 0 (65a) (70)
l=1 l=1 j=1
and thus we get
L
∂L 1
= N − s,k Ss,k s,k + γ I +
H
− 1 e,l Tk,l H μs,k μs,k # $
∂Z t e,l
I + Ck s,k Ss,k H
s,k = 2 0 hs,k Ss,k H
s,k .
l=1 εs,k
2 εs,k
L
NE
(j,j)
+ s,k Vs,k H
s,k + De,l = 0 (65b) It is easily verified that (μs,k /εs,k
2 )I + C 0 and it is
k
l=1 j=1 nonsingular. Thus, multiplying this matrix will not change the
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
1714 IEEE INTERNET OF THINGS JOURNAL, VOL. 8, NO. 3, FEBRUARY 1, 2021
rank of the resulting matrix, and we obtain [21] Z. Deng, Q. Li, Q. Zhang, L. Yang, and J. Qin, “Beamforming design
for physical layer security in a two-way cognitive radio IoT network
μs,k with SWIPT,” IEEE Internet Things J., vol. 6, no. 6, pp. 10786–10798,
rank(s,k Ss,k s,k ) = rank
H
I + Ck s,k Ss,k s,k
H
Dec. 2019.
εs,k
2
[22] X. Sun, W. Yang, and Y. Cai, “Secure communication in NOMA assisted
millimeter wave SWIPT UAV networks,” IEEE Internet Things J., vol.
μs,k # $ 7, no. 3, pp. 1884–1897, Mar. 2020.
= rank 2 0 hs,k Ss,k s,k H
[23] Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le goff, “Robust
εs,k
# $ outage secrecy rate optimizations for a MIMO secrecy channel,” IEEE
≤ rank 0 hs,k ≤ 1. (71) Wireless Commun. Lett., vol. 4, no. 1, pp. 86–89, Feb. 2015.
[24] Z. Chu, Z. Zhu, W. Xiang, and J. Hussein, “Robust beamforming
This completes the proof. and power splitting design in MISO SWIPT downlink system,” IET
Commun., vol. 10, no. 6, pp. 691–698, Apr. 2016.
[25] Z. Zhu, Z. Chu, Z. Wang, and I. Lee, “Outage constrained robust beam-
R EFERENCES forming for secure broadcasting systems with energy harvesting,” IEEE
Trans. Wireless Commun., vol. 15, no. 11, pp. 7610–7620, Nov. 2016.
[1] C. X. Wang et al., “Cellular architecture and key technologies for 5G [26] Z. Chu, Z. Zhu, and J. Hussein, “Robust optimization for AN-aided
wireless communication networks,” IEEE Commun. Mag., vol. 52, no. 2, transmission and power splitting for secure MISO SWIPT system,” IEEE
pp. 122–130, Feb. 2014. Commun. Lett., vol. 20, no. 8, pp. 1571–1574, Aug. 2016.
[2] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,”
[27] Z. Zhu, Z. Chu, N. Wang, S. Huang, Z. Wang, and I. Lee, “Beamforming
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
and power splitting designs for AN-aided secure multi-user MIMO
[3] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
SWIPT systems,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 12,
M. Ayyash, “Internet of Things: A survey on enabling technologies, pro-
pp. 2861–2874, Dec. 2017.
tocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4,
[28] Z. Chu, H. Nguyen, T. Le, M. Karamanoglu, E. Ever, and A.
pp. 2347–2376, 4th Quart., 2015.
Yazici, “Secure wireless powered and cooperative jamming D2D
[4] Z. Chu et al., “Resource allocation for secure wireless powered inte-
communications,” IEEE Trans. Green Commun. Netw., vol. 2, no. 1,
grated multicast and unicast services with full duplex self-energy
pp. 1–13, Mar. 2018.
recycling,” IEEE Trans. Wireless Commun., vol. 18, no. 1, pp. 620–636,
[29] Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le goff, “Secrecy rate
Jan. 2019.
optimizations for a MIMO secrecy channel with a cooperative jammer,”
[5] P. Kamalinejad et al., “Wireless energy harvesting for the Internet of
IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833–1847, May 2015.
Things,” IEEE Commun. Mag., vol. 53, no. 6, pp. 102–108, Jun. 2015.
[6] Z. Chu, F. Zhou, Z. Zhu, Q. Hu, and P. Xiao, “Wireless powered sen- [30] J. Moon, H. Lee, C. Song, and I. Lee, “Secrecy performance
sor networks for Internet of Things: Maximum throughput and optimal optimization for wireless powered communication networks with an
power allocation,” IEEE Internet Things J., vol. 5, no. 1, pp. 310–321, energy harvesting jammer,” IEEE Trans. Commun., vol. 65, no. 2,
Feb. 2018. pp. 764–774, Feb. 2017.
[7] P. Grover and A. Sahai, “Shannon meets Tesla: Wireless information [31] Z. Chu, T. A. Le, H. X. Nguyen, M. Karamanoglu, and Z. Zhu, “Robust
and power transfer,” in Proc. IEEE ISIT, pp. 2363–2367, Jun. 2010. design for MISO SWIPT system with artificial noise and cooperative
[8] Z. Chu, F. Zhou, Z. Zhu, M. Sun, and N. Al-Dhahir, “Energy beamform- jamming,” in Proc. IEEE GLOBECOM, Dec. 2017, pp. 1–6.
ing design and user cooperation for wireless powered communication [32] Z. Zhu, Z. Chu, N. Wang, Z. Wang, and I. Lee, “Energy harvesting fair-
networks,” IEEE Wireless Commun. Lett., vol. 6, no. 6, pp. 750–753, ness in AN-aided secure MU-MIMO SWIPT systems with cooperative
Dec. 2017. jammer,” in Proc. IEEE ICC, May 2018, pp. 1–6.
[9] H. Ko and S. Pack, “OB-DETA: Observation-based directional energy [33] F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, “Robust AN-aided beam-
transmission algorithm in energy harvesting networks,” J. Commun. forming and power splitting design for secure MISO cognitive radio with
Netw., vol. 21, no. 2, pp. 168–176, Apr. 2019. SWIPT,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450–2464,
[10] R. Zhang and C. Ho, “MIMO broadcasting for simultaneous wire- Apr. 2017.
less information and power transfer,” IEEE Trans. Wireless Commun., [34] Q. Qi, X. Chen, D. W. K. Ng, C. Zhongl, and Z. Zhang, “Robust beam-
vol. 12, no. 5, pp. 1989–2001, May 2013. forming design for SWIPT in cellular Internet of Things,” in Proc. IEEE
[11] J. Tang, D. K. C. So, N. Zhao, A. Shojaeifard, and K.-K. Wong, ICCC, Aug. 2019, pp. 523–528.
“Energy efficiency optimization with SWIPT in MIMO broadcast chan- [35] Q. Qi, X. Chen, and D. W. K. Ng, “Robust beamforming for NOMA-
nels for Internet of Things,” IEEE Internet Things J., vol. 5, no. 4, based cellular massive IoT with SWIPT,” IEEE Trans. Signal Process.,
pp. 2605–2619, Aug. 2018. vol. 68, pp. 211–224, Jan. 2020.
[12] Y. Huang, M. Liu, and Y. Liu, “Energy-efficient SWIPT in IoT dis- [36] R. Jiang, K. Xiong, P. Fan, Y. Zhang, and Z. Zhong, “Power
tributed antenna systems,” IEEE Internet Things J., vol. 5, no. 4, minimization in SWIPT networks with coexisting power-splitting
pp. 2646–2656, Aug. 2018. and time-switching users under nonlinear EH model,” IEEE Internet
[13] Y. Hu, Y. Zhu, M. C. Gursoy, and A. Schmeink, “SWIPT-enabled relay- Things J., vol. 6, no. 5, pp. 8853–8869, Oct. 2019.
ing in IoT networks operating with finite blocklength codes,” IEEE J. [37] X. Hu, B. Li, K. Huang, Z. Fei, and K. Wong, “Secrecy energy efficiency
Sel. Areas Commun., vol. 37, no. 1, pp. 74–88, Jan. 2019. in wireless powered heterogeneous networks: A distributed ADMM
[14] D. S. Gurjar, H. H. Nguyen, and H. D. Tuan, “Wireless information and approach,” IEEE Access, vol. 6, pp. 20609–20624, 2018.
power transfer for IoT applications in overlay cognitive radio networks,” [38] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical
IEEE Internet Things J., vol. 6, no. 2, pp. 3257–3270, Apr. 2019. non-linear energy harvesting model and resource allocation for SWIPT
[15] D. K. P. Asiedu, H. Lee, and K. Lee, “Simultaneous wireless information systems,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2082–2085, Dec.
and power transfer for decode-and-forward multihop relay systems in 2015.
energy-constrained IoT networks,” IEEE Internet Things J., vol. 6, no. 6, [39] K. Xiong, B. Wang, and K. J. R. Liu, “Rate-energy region of SWIPT
pp. 9413–9426, Dec. 2019. for MIMO broadcasting under nonlinear energy harvesting model,” IEEE
[16] D. Mishra, G. C. Alexandropoulos, and S. De, “Energy sustainable IoT Trans. Wireless Commun., vol. 16, no. 8, pp. 5147–5161, Aug. 2017.
with individual QoS constraints through MISO SWIPT multicasting,” [40] E. Boshkovska, D. W. K. Ng, N. Zlatanov, A. Koelpin, and R. Schober,
IEEE Internet Things J., vol. 5, no. 4, pp. 2856–2867, Aug. 2018. “Robust resource allocation for MIMO wireless powered communication
[17] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE networks based on a non-linear EH model,” IEEE Trans. Commun.,
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. vol. 65, no. 5, pp. 1984–1999, May 2017.
[18] Z. Chu, Z. Zhu, M. Johnston, and S. Le goff, “Simultaneous wireless [41] Y. Lu, K. Xiong, P. Fan, Z. Ding, Z. Zhong, and K. B. Letaief,
information power transfer for MISO secrecy channel,” IEEE Trans. Veh. “Global energy efficiency in secure MISO SWIPT systems with non-
Technol., vol. 65, no. 9, pp. 6913–6925, Sep. 2016. linear power-splitting EH model,” IEEE J. Sel. Areas Commun., vol. 37,
[19] P. Lubega, T. Ssettumba, H. Nabuuma, and J. Serugunda, “A secure no. 1, pp. 216–232, Jan. 2019.
energy efficient multi-user selection scheme for SWIPT wireless IoT [42] Q. Li and W.-K. Ma, “Spatially selective artificial-noise aided trans-
networks in the presence of cooperative jamming,” in Proc. 27th mit optimization for MISO multi-eves secrecy rate maximization,” IEEE
Telecommun. Forum, 2019, pp. 1–4. Trans. Signal Process., vol. 61, no. 10, pp. 2704–2717, May 2013.
[20] D. Xu and H. Zhu, “Secure transmission for SWIPT IoT systems [43] K. B. Petersern and M. S. Pedersern, The Matrix Cookbook.
with full-duplex IoT devices,” IEEE Internet Things J., vol. 6, no. 6, Cambridge, MA, USA: MIT Press, Nov. 2008. [Online]. Available:
pp. 10915–10933, Dec. 2019. http://matrixcookbook.com
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: ROBUST BEAMFORMING DESIGNS IN SECURE MIMO SWIPT IoT NETWORKS WITH NONLINEAR CHANNEL MODEL 1715
[44] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Wanming Hao received the Ph.D. degree from the
Cambridge Univ. Press, 2004. School of Electrical and Electronic Engineering,
[45] M. Grant and S. Boyd. (Sep. 2012). CVX: MATLAB Software Kyushu University, Fukuoka, Japan, in 2018.
for Disciplined Convex Programming. [Online]. Available: He has worked as a Research Fellow with the
http://cvxr.com/cvx 5G Innovation Center, Institute of Communication
[46] Z.-Q. Luo, J. F. Sturm, and S. Zhang, “Multivariate nonnegative Systems, University of Surrey, Guildford, U.K. He
quadratic mappings,” SIAM J. Optim., vol. 14, no. 4, pp. 1140–1162, is currently a Research Fellow with the School
Jul. 2004. of Information Engineering, Zhengzhou University,
[47] M. Bengtsson and B. Ottersten, “Optimum and suboptimum transmit Zhengzhou, China. His research interests include
beamforming,” in Handbook of Antennas in Wireless Communications, millimeter wave, edge caching, NOMA, SWIPT, and
L. C. Godara, Ed. Boca Raton, FL, USA: CRC Press, Aug. 2001. cloud radio access networks.
[48] A. S. Vishwanathan, A. J. Smola, and S. V. N. Vishwanathan, “Kernel Dr. Hao has served as the IEEE ICC Technical Program Committee Member
methods for missing variables,” in Proc. Int. Workshop Artif. Intell. Stat., in 2019 and 2020.
Jan. 2005, pp. 325–332.
[49] Q. Zhang, Q. Li, and J. Qin, “Robust beamforming for nonorthogonal
multiple-access systems in MISO channels,” IEEE Trans. Veh. Technol.,
vol. 65, no. 12, pp. 10231–10236, Dec. 2016.
[50] K.-Y. Wang, A. M.-C. So, T.-H. Chang, W.-K. Ma, and C.-Y. Chi,
“Outage constrained robust transmit optimization for multiuser MISO
downlinks: Tractable approximations by conic optimization,” IEEE
Trans. Signal Process., vol. 62, no. 21, pp. 5690–5705, Nov. 2014. Zhongyong Wang received the B.S. and M.S.
degrees in automatic control from Harbin
Shipbuilding Engineering Institute, Harbin, China,
in 1986 and 1988, respectively, and the Ph.D.
degree in automatic control theory and application
from Xi’an Jiaotong University, Xi’an, China, in
1998.
Since 1988, he has been a Lecturer with the
Zhengyu Zhu (Member, IEEE) received the B.S. Department of Electronics, Zhengzhou University,
degree from Henan University, Kaifeng, China, Zhengzhou, China, where he was an Associate
in 2010, and the Ph.D. degree from Zhengzhou Professor from 1999 to 2002 and promoted to a
University, Zhengzhou, China, in 2017. Professor with the Department of Communication Engineering in 2002. His
He is currently with the School of Information general fields of interests cover numerous aspects within embedded systems,
Engineering, Zhengzhou University. His research signal processing, and communication theory.
interests include information theory and signal
processing for wireless communications, such as
MIMO wireless network, physical layer security,
wireless cooperative networks, convex optimization
techniques, and energy harvesting communication
systems.
Dr. Zhu has served on the Technical Program Committees of international
conferences, including IEEE GLOBECOM, IEEE ICC, IEEE WCNC, IEEE Inkyu Lee (Fellow, IEEE) received the B.S. degree
VTC, and ICCC. (Hons.) in control and instrumentation engineering
from Seoul National University, Seoul, South Korea,
in 1990, and the M.S. and Ph.D. degrees in electri-
cal engineering from Stanford University, Stanford,
CA, USA, in 1992 and 1995, respectively.
From 1995 to 2001, he was a member of
the Technical Staff with Bell Laboratories, Lucent
Technologies, Murray Hill, NJ, USA, where he stud-
Ning Wang (Member, IEEE) received the B.E. ied high-speed wireless system designs. From 2001
degree in communication engineering from Tianjin to 2002, he was a Distinguished Member of the
University, Tianjin, China, in 2004, the M.A.Sc. Technical Staff with Agere Systems (formerly, the Microelectronics Group,
degree in electrical engineering from the University Lucent Technologies), Murray Hill. Since 2002, he has been with Korea
of British Columbia, Vancouver, BC, Canada, in University, Seoul, where he is currently a Department Head of the School
2010, and the Ph.D. degree in electrical engineering of Electrical Engineering. In 2009, he was a Visiting Professor with the
from the University of Victoria, Victoria, BC, University of Southern California, Los Angeles, CA, USA. He has authored or
Canada, in 2013. coauthored more than 180 journal papers in IEEE publications and has 30 U.S.
From 2004 to 2008, he was with the China patents granted or pending. His research interests include digital communi-
Information Technology Design and Consulting cations, signal processing, and coding techniques applied for next-generation
Institute, Zhengzhou, China, as a Mobile wireless systems.
Communication System Engineer, specializing in planning and design of Dr. Lee was a recipient of the IT Young Engineer Award at the IEEE/IEEK
large-scale commercial mobile communication networks, network traffic Joint Award in 2006, the Best Paper Award at the Asia–Pacific Conference
analysis, and radio network optimization. He was a Postdoctoral Research on Communications in 2006, the IEEE Vehicular Technology Conference in
Fellow with the Department of Electrical and Computer Engineering, 2009, the IEEE International Symposium on Intelligent Signal Processing
University of British Columbia from 2013 to 2015. Since 2015, he has and Communication Systems in 2013, the Best Research Award from the
been with the School of Information Engineering, Zhengzhou University, Korean Institute of Communications and Information Sciences in 2011, the
Zhengzhou, where he is currently an Associate Professor. He also holds Best Young Engineer Award from the National Academy of Engineering of
adjunct appointments with the Department of Electrical and Computer Korea in 2013, and the Korea Engineering Award from the National Research
Engineering, McMaster University, Hamilton, ON, Canada. His research Foundation of Korea in 2017. He has served as an Associate Editor for
interests include resource allocation and security designs of future cellular the IEEE T RANSACTIONS ON C OMMUNICATIONS from 2001 to 2011 and
networks, channel modeling for wireless communications, statistical signal the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS from 2007 to
processing, and cooperative wireless communications. 2011. In addition, he was a Chief Guest Editor for the IEEE J OURNAL ON
Dr. Wang was on the Finalist of the Governor General’s Gold Medal for S ELECTED A REAS IN C OMMUNICATIONS (Special Issue on 4G Wireless
outstanding graduating doctoral student with the University of Victoria in Systems) in 2006. He currently serves as the Co-Editor-in-Chief for the
2013. He has served on the technical program committees of international Journal of Communications and Networks. He has been elected as a member
conferences, including IEEE GLOBECOM, IEEE ICC, IEEE WCNC, IEEE of the National Academy of Engineering of Korea in 2015, and is an IEEE
VTC, and CyberC. Distinguished Lecturer.
Authorized licensed use limited to: Zhengzhou University. Downloaded on February 05,2021 at 02:31:35 UTC from IEEE Xplore. Restrictions apply.
View publication stats