Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/8/1222 |
_version_ | 1797561015289774080 |
---|---|
author | Pham Viet Tuan Pham Ngoc Son Tran Trung Duy Sang Quang Nguyen Van Quang Binh Ngo Do Vinh Quang Insoo Koo |
author_facet | Pham Viet Tuan Pham Ngoc Son Tran Trung Duy Sang Quang Nguyen Van Quang Binh Ngo Do Vinh Quang Insoo Koo |
author_sort | Pham Viet Tuan |
collection | DOAJ |
description | In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for users receiving maximum ratio transmission beamforming at the BSs. Eventually, the numerical experiments show the superiority of the proposed scheme, compared to a conventional scheme, in terms of signal-to-interference-plus-noise ratio at the eavesdropper. |
first_indexed | 2024-03-10T18:08:22Z |
format | Article |
id | doaj.art-a1d7c95fac8d482d9e0a64536d7bad2d |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-10T18:08:22Z |
publishDate | 2020-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-a1d7c95fac8d482d9e0a64536d7bad2d2023-11-20T08:22:00ZengMDPI AGElectronics2079-92922020-07-0198122210.3390/electronics9081222Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden EavesdropperPham Viet Tuan0Pham Ngoc Son1Tran Trung Duy2Sang Quang Nguyen3Van Quang Binh Ngo4Do Vinh Quang5Insoo Koo6Faculty of Physics, University of Education, Hue University, 34 Le Loi Str., Hue City 530000, VietnamFaculty of Electrical and Electronics Engineering, Ho Chi Minh City University of Technology and Education, Ho Chi Minh City 700000, VietnamDepartment of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, VietnamInstitute of Fundamental and Applied Sciences, Duy Tan University, Ho Chi Minh City 700000, VietnamFaculty of Physics, University of Education, Hue University, 34 Le Loi Str., Hue City 530000, VietnamSchool of Electrical Engineering, University of Ulsan, Ulsan 44610, KoreaSchool of Electrical Engineering, University of Ulsan, Ulsan 44610, KoreaIn this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for users receiving maximum ratio transmission beamforming at the BSs. Eventually, the numerical experiments show the superiority of the proposed scheme, compared to a conventional scheme, in terms of signal-to-interference-plus-noise ratio at the eavesdropper.https://www.mdpi.com/2079-9292/9/8/1222two-way networkSWIPTsemidefinite relaxationpenalty function methodnon-linear energy harvestinghidden eavesdropper |
spellingShingle | Pham Viet Tuan Pham Ngoc Son Tran Trung Duy Sang Quang Nguyen Van Quang Binh Ngo Do Vinh Quang Insoo Koo Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper Electronics two-way network SWIPT semidefinite relaxation penalty function method non-linear energy harvesting hidden eavesdropper |
title | Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper |
title_full | Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper |
title_fullStr | Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper |
title_full_unstemmed | Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper |
title_short | Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper |
title_sort | optimizing a secure two way network with non linear swipt channel uncertainty and a hidden eavesdropper |
topic | two-way network SWIPT semidefinite relaxation penalty function method non-linear energy harvesting hidden eavesdropper |
url | https://www.mdpi.com/2079-9292/9/8/1222 |
work_keys_str_mv | AT phamviettuan optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper AT phamngocson optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper AT trantrungduy optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper AT sangquangnguyen optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper AT vanquangbinhngo optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper AT dovinhquang optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper AT insookoo optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper |