異構(gòu)攜能通信網(wǎng)絡(luò)中基于人工噪聲輔助的魯棒安全傳輸方案
doi: 10.11999/JEIT180269 cstr: 32379.14.JEIT180269
-
國(guó)家數(shù)字交換系統(tǒng)工程技術(shù)研究中心 ??鄭州 ??450002
Robust Secure Transmission Scheme Based on Artificial Noise-aided for Heterogeneous Networks with Simultaneous Wireless Information and Power Transfer
-
National Digital Switching System Engineering & Technological R & D Center, Zhengzhou 450002, China
-
摘要:
異構(gòu)攜能通信網(wǎng)絡(luò)中信道狀態(tài)信息不準(zhǔn)確時(shí),為保證信息、能量傳輸?shù)陌踩耘c可靠性,該文提出一種基于人工噪聲輔助的魯棒安全傳輸方案。通過(guò)聯(lián)合設(shè)計(jì)宏基站、微基站的下行信息波束及人工噪聲矩陣,干擾竊聽(tīng)者,同時(shí)提升系統(tǒng)能量接收性能。在基站的發(fā)送功率約束、合法用戶的信息接收及能量接收中斷約束和竊聽(tīng)者的竊聽(tīng)信息中斷約束下,以最大化系統(tǒng)能量接收性能為目標(biāo)進(jìn)行建模。針對(duì)該問(wèn)題的非凸性,首先將其等效轉(zhuǎn)化為一種易于處理的形式;而后進(jìn)一步利用Berstein-type不等式處理其中的中斷概率約束,將其轉(zhuǎn)化為凸的問(wèn)題進(jìn)行求解。仿真結(jié)果驗(yàn)證了該方案的安全性和魯棒性。
-
關(guān)鍵詞:
- 異構(gòu)網(wǎng)絡(luò) /
- 無(wú)線攜能通信 /
- 物理層安全 /
- 非理想信道狀態(tài)信息 /
- 凸優(yōu)化
Abstract:When the Channel State Information (CSI) is not accurate in heterogeneous networks with simultaneous wireless information and power transfer, to guarantee the security and reliability of information and energy transfer simultaneously, a robust secure transmission scheme based on Artificial Noise (AN)-aided is proposed. Through jointly designing the downlink information beamforming and AN matrix of macrocell base station and femtocell base stations, the potential eavesdroppers will be jammed, and the energy harvesting performance of system can be improved. To obtain the optimal designs, the problem of maximizing the energy harvesting performance of system is modeled under the base station power limit and the outage probability limits of information transfer, energy transfer and confidential information eavesdropped. This modeled problem is non-convex. To address the problem, it is transformed into an equivalent form, which can be processed easily. Then, the Bernstein-type inequality is utilized to deal with the outage probability limits, and it is transformed into a convex problem. Simulation results validate the security and the robustness of the proposed scheme.
-
表 1 基于人工噪聲輔助的魯棒安全傳輸算法
初始化:設(shè)置 $j = 0$ ,最大迭代次數(shù)$g$ ,并隨機(jī)生成可以滿足式 (24)問(wèn)題可行解約束的$\mathop {{{w}_m}}\limits^ \simeq {\rm{(}}j{\rm{)}}$ ,$\mathop {{{w}_{nk}}}\limits^ \simeq {\rm{(}}j{\rm{)}}$ ;循環(huán): 步驟 1 將 $\mathop {{{w}_m}}\limits^ \simeq {\rm{(}}j{\rm{)}}$ ,$\mathop {{{w}_{nk}}}\limits^ \approx {\rm{(}}j{\rm{)}}$ 代入式(24)問(wèn)題中求解,獲得相應(yīng)的 解${w}_m^ * $ ,${w}_{nk}^ * $ ;步驟 2 更新: $j = j + 1$ ;步驟 3 令 $\mathop {{{w}_m}}\limits^ \simeq {\rm{(}}j{\rm{) = }}{w}_m^ * $ ,$\mathop {{{w}_{nk}}}\limits^ \simeq {\rm{(}}j{\rm{) = }}{w}_{nk}^ * $ ;終止:直至收斂或達(dá)到最大迭代次數(shù) $g$ ;輸出:最優(yōu)的 ${w}_m^ * $ ,${w}_{nk}^ * $ ,${Z}_0^ * $ ,${Z}_n^ * $ ,及系統(tǒng)能量接收性能值$t$ 。下載: 導(dǎo)出CSV
-
ZHANG Haijun, DU Jiali, and CHENG Juliang. Incomplete CSI based resource optimization in SWIPT -enabled heterogeneous networks: A non-cooperative game theoretic approach[J]. IEEE Transactions on Wireless Communications, 2018, 17(3): 1882–1892 doi: 10.1109/TWC.2017.2786255 AKBAR S and DENG Yansha. Simultaneous wireless information and power transfer in K-tier heterogeneous cellular networks[J]. IEEE Transactions on Wireless Communications, 2016, 15(8): 5804–5818 doi: 10.1109/TWC.2016.2570209 SHENG Ming, WANG Liang, and WANG Xijun. Energy efficient beamforming in MISO heterogeneous cellular networks with wireless information and power transfer[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(4): 954–968 doi: 10.1109/JSAC.2016.2544538 LIU Yiliang, CHEN Hsiaohwa, and WANG Liangmin. Physical layer security for next generation wireless networks: theories, technologies, and challenges[J]. IEEE Transactions on Information Forensics and Security, 2017, 19(1): 347–376 doi: 10.1109/COMST.2016.2598968 SUN Li and DU Qinghe. Physical layer security with its applications in 5G networks: A review[J]. China Communications, 2017, 14(12): 1–14 doi: 10.1109/CC.2017.8246328 CHU Zheng, NQUYEN H X, and CAIRE G. Game theory-based resource allocation for secure WPCN multi-antenna multicasting systems[J]. IEEE Transactions on Information Forensics&Security, 2018, 13(4): 926–939 doi: 10.1109/TIFS.2017.2774441 ALEXANDER A O, MUHAMMAD R A K, WONG K K, et al. Secure full-duplex two-way relaying for SWIPT[J]. IEEE Wireless Communications Letters, 2018, 7(3): 336–339 doi: 10.1109/LWC.2017.2776928 LI Quanzhong, ZHANG Qi, and QIN Jiayin. Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(11): 9006–9019 doi: 10.1109/TVT.2016.2519339 REN Yuan, Lü Tiejun, GAO Hui, et al. Secure wireless information and power transfer in heterogeneous networks[J]. IEEE Access, 2017, 99(5): 4967–4979 doi: 10.1109/ACCESS.2017.2682277 LI Bin, FEI Zesong, CHU Zheng, et al. Secure transmission for heterogeneous cellular networks with wireless information and power transfer[J]. IEEE Systems Journal,Early Access, 2017 doi: 10.1109/JSYST.2017.2713881 ZHU Zhengyu and CHU Zheng. Outage constrained robust beamforming for secure broadcasting systems with energy harvesting[J]. IEEE Transactions on Wireless Communications, 2016, 15(11): 7610–7620 doi: 10.1109/TWC.2016.2605102 LE T A and VIEN Q T. Robust chance-constrained optimization for power-efficient and secure SWIPT systems[J]. IEEE Transactions on Green Communications&Networking, 2017, 1(3): 333–346 doi: 10.1109/TGCN.2017.2706063 LI Bin and FEI Zesong. Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels[J]. Science China Information Sciences, 2018, 61(2): 1–12 doi: 10.1007/s11432-016-9040-x NIU Hehao and GUO Daoxin. Outage constrained robust energy harvesting maximization for secure MIMO SWIPT Systems[J]. IEEE Wireless Communications Letters, 2017, 6(5): 614–617 doi: 10.1109/LWC.2017.2722415 RASHID U, TUAN H, KHA H, et al. Joint optimization of source precoding and relay beamforming in wireless MIMO relay networks[J]. IEEE Transactions on Communications, 2014, 62(2): 488–499 doi: 10.1109/TCOMM.2013.122013.130239 ZHANG Lijian and JIN Liang. Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints[J]. Science China Information Sciences, 2016, 59(2): 1–13 doi: 10.1007/s11432-015-5342-6 -