Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper

In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The...

Full description

Bibliographic Details
Main Authors: Pham Viet Tuan, Pham Ngoc Son, Tran Trung Duy, Sang Quang Nguyen, Van Quang Binh Ngo, Do Vinh Quang, Insoo Koo
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/8/1222
_version_ 1797561015289774080
author Pham Viet Tuan
Pham Ngoc Son
Tran Trung Duy
Sang Quang Nguyen
Van Quang Binh Ngo
Do Vinh Quang
Insoo Koo
author_facet Pham Viet Tuan
Pham Ngoc Son
Tran Trung Duy
Sang Quang Nguyen
Van Quang Binh Ngo
Do Vinh Quang
Insoo Koo
author_sort Pham Viet Tuan
collection DOAJ
description In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for users receiving maximum ratio transmission beamforming at the BSs. Eventually, the numerical experiments show the superiority of the proposed scheme, compared to a conventional scheme, in terms of signal-to-interference-plus-noise ratio at the eavesdropper.
first_indexed 2024-03-10T18:08:22Z
format Article
id doaj.art-a1d7c95fac8d482d9e0a64536d7bad2d
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T18:08:22Z
publishDate 2020-07-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-a1d7c95fac8d482d9e0a64536d7bad2d2023-11-20T08:22:00ZengMDPI AGElectronics2079-92922020-07-0198122210.3390/electronics9081222Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden EavesdropperPham Viet Tuan0Pham Ngoc Son1Tran Trung Duy2Sang Quang Nguyen3Van Quang Binh Ngo4Do Vinh Quang5Insoo Koo6Faculty of Physics, University of Education, Hue University, 34 Le Loi Str., Hue City 530000, VietnamFaculty of Electrical and Electronics Engineering, Ho Chi Minh City University of Technology and Education, Ho Chi Minh City 700000, VietnamDepartment of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, VietnamInstitute of Fundamental and Applied Sciences, Duy Tan University, Ho Chi Minh City 700000, VietnamFaculty of Physics, University of Education, Hue University, 34 Le Loi Str., Hue City 530000, VietnamSchool of Electrical Engineering, University of Ulsan, Ulsan 44610, KoreaSchool of Electrical Engineering, University of Ulsan, Ulsan 44610, KoreaIn this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for users receiving maximum ratio transmission beamforming at the BSs. Eventually, the numerical experiments show the superiority of the proposed scheme, compared to a conventional scheme, in terms of signal-to-interference-plus-noise ratio at the eavesdropper.https://www.mdpi.com/2079-9292/9/8/1222two-way networkSWIPTsemidefinite relaxationpenalty function methodnon-linear energy harvestinghidden eavesdropper
spellingShingle Pham Viet Tuan
Pham Ngoc Son
Tran Trung Duy
Sang Quang Nguyen
Van Quang Binh Ngo
Do Vinh Quang
Insoo Koo
Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
Electronics
two-way network
SWIPT
semidefinite relaxation
penalty function method
non-linear energy harvesting
hidden eavesdropper
title Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
title_full Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
title_fullStr Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
title_full_unstemmed Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
title_short Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper
title_sort optimizing a secure two way network with non linear swipt channel uncertainty and a hidden eavesdropper
topic two-way network
SWIPT
semidefinite relaxation
penalty function method
non-linear energy harvesting
hidden eavesdropper
url https://www.mdpi.com/2079-9292/9/8/1222
work_keys_str_mv AT phamviettuan optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper
AT phamngocson optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper
AT trantrungduy optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper
AT sangquangnguyen optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper
AT vanquangbinhngo optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper
AT dovinhquang optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper
AT insookoo optimizingasecuretwowaynetworkwithnonlinearswiptchanneluncertaintyandahiddeneavesdropper