For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Robust Secure Transmit Design for SWIPT System with Many Types of Wireless Users and Passive Eavesdropper
Pham-Viet TUAN Insoo KOO
IEICE TRANSACTIONS on Communications
Publication Date: 2018/02/01
Online ISSN: 1745-1345
Type of Manuscript: Special Section PAPER (Special Section on Recent Progress in Antennas and Propagation in Conjunction with Main Topics of ISAP2016)
Category: Wireless Communication Technologies
simultaneous wireless information and power transfer (SWIPT), passive eavesdropper, multiuser multiple-input single-output (MISO), semidefinite relaxation, Gaussian randomization,
Full Text: PDF(877.6KB)
>>Buy this Article
This paper studies a simultaneous wireless information and power transfer (SWIPT) system in which the transmitter not only sends data and energy to many types of wireless users, such as multiple information decoding users, multiple hybrid power-splitting users (i.e., users with a power-splitting structure to receive both information and energy), and multiple energy harvesting users, but also prevents information from being intercepted by a passive eavesdropper. The transmitter is equipped with multiple antennas, whereas all users and the eavesdropper are assumed to be equipped with a single antenna. Since the transmitter does not have any channel state information (CSI) about the eavesdropper, artificial noise (AN) power is maximized to mask information as well as to interfere with the eavesdropper as much as possible. The non-convex optimization problem is formulated to minimize the transmit power satisfying all signal-to-interference-plus-noise (SINR) and harvested energy requirements for all users so that the remaining power for generating AN is maximized. With perfect CSI, a semidefinite relaxation (SDR) technique is applied, and the optimal solution is proven to be tight. With imperfect CSI, SDR and a Gaussian randomization algorithm are proposed to find the suboptimal solution. Finally, numerical performance with respect to the maximum SINR at the eavesdropper is determined by a Monte-Carlo simulation to compare the proposed AN scenario with a no-AN scenario, as well as to compare perfect CSI with imperfect CSI.