Secure beamforming and self-energy recycling with full-duplex wireless-powered relay

Hongjun Kim, Jinkyu Kang, Seongah Jeong, Kwang-Eog Lee, Joonhyuk Kang
{"title":"Secure beamforming and self-energy recycling with full-duplex wireless-powered relay","authors":"Hongjun Kim, Jinkyu Kang, Seongah Jeong, Kwang-Eog Lee, Joonhyuk Kang","doi":"10.1109/CCNC.2016.7444859","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate a two-hop full-duplex wireless-powered relaying system consists of a source, a relay, and a destination in the presence of a passive eavesdropper. The relay assists the transmission of confidential information from the source to the destination, while simultaneously harvesting the energy with time switching scheme by the radio-frequency (RF) signals. Our goal is to maximize the physical-layer security under harvested energy constraints by designing the full-duplex wireless-powered relay, whose two relaying strategies are considered, namely amplify-and-forward (AF) and decode-and-forward (DF). The relay beamforming vector design is proposed for AF protocol, and is jointly optimized with the time ratio parameter in the case of DF protocol to maximize the physical-layer security under harvested energy constraints. Moreover, for the simultaneous energy and secure message transfer at the relay, a two-phase method is provided, which enables the relay to avoid the self-interference caused by full-duplex operation, and also to harvest the energy from the self-interference. The proposed algorithmic solutions leverage the rank relaxation, Majorization-Minimization (MM) programming, and line search method. Numerical results show that the proposed full-duplex relaying system outperforms the half-duplex relaying system in energy harvesting. Moreover, the trade-off between AF and DF protocols according to the occurrence probability of non-zero secrecy rate can be observed in terms of physical-layer security.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2016.7444859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

In this paper, we investigate a two-hop full-duplex wireless-powered relaying system consists of a source, a relay, and a destination in the presence of a passive eavesdropper. The relay assists the transmission of confidential information from the source to the destination, while simultaneously harvesting the energy with time switching scheme by the radio-frequency (RF) signals. Our goal is to maximize the physical-layer security under harvested energy constraints by designing the full-duplex wireless-powered relay, whose two relaying strategies are considered, namely amplify-and-forward (AF) and decode-and-forward (DF). The relay beamforming vector design is proposed for AF protocol, and is jointly optimized with the time ratio parameter in the case of DF protocol to maximize the physical-layer security under harvested energy constraints. Moreover, for the simultaneous energy and secure message transfer at the relay, a two-phase method is provided, which enables the relay to avoid the self-interference caused by full-duplex operation, and also to harvest the energy from the self-interference. The proposed algorithmic solutions leverage the rank relaxation, Majorization-Minimization (MM) programming, and line search method. Numerical results show that the proposed full-duplex relaying system outperforms the half-duplex relaying system in energy harvesting. Moreover, the trade-off between AF and DF protocols according to the occurrence probability of non-zero secrecy rate can be observed in terms of physical-layer security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全波束形成和自我能量回收与全双工无线供电继电器
本文研究了在无源窃听器存在的情况下,由源、中继和目标组成的二跳全双工无线中继系统。该中继器协助将机密信息从源传输到目的地,同时通过射频(RF)信号以时间开关方式收集能量。我们的目标是通过设计全双工无线供电中继,在收获能量约束下最大限度地提高物理层安全性,该中继考虑了两种中继策略,即放大转发(AF)和解码转发(DF)。提出了AF协议的中继波束形成矢量设计,并与DF协议的时间比参数进行了联合优化,以最大限度地提高收获能量约束下的物理层安全性。此外,对于继电器的同步能量和安全消息传输,提供了一种两相方法,使继电器能够避免全双工工作引起的自干扰,并从自干扰中获取能量。所提出的算法解决方案利用秩松弛,最大化最小化(MM)规划和线搜索方法。数值结果表明,所提出的全双工继电系统在能量收集方面优于半双工继电系统。此外,在物理层安全性方面,可以观察到AF和DF协议根据非零保密率发生概率的权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Scalable topology-based flow entry management in data center Cost effective digital signage system using low cost information device Efficient tuning methodologies for a network payload anomaly inspection scheme Real-time communication in low-power mobile wireless networks State-aware allocation of reliable Virtual Software Defined Networks based on bandwidth and energy
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1