Hongjun Kim, Jinkyu Kang, Seongah Jeong, Kwang-Eog Lee, Joonhyuk Kang
{"title":"Secure beamforming and self-energy recycling with full-duplex wireless-powered relay","authors":"Hongjun Kim, Jinkyu Kang, Seongah Jeong, Kwang-Eog Lee, Joonhyuk Kang","doi":"10.1109/CCNC.2016.7444859","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate a two-hop full-duplex wireless-powered relaying system consists of a source, a relay, and a destination in the presence of a passive eavesdropper. The relay assists the transmission of confidential information from the source to the destination, while simultaneously harvesting the energy with time switching scheme by the radio-frequency (RF) signals. Our goal is to maximize the physical-layer security under harvested energy constraints by designing the full-duplex wireless-powered relay, whose two relaying strategies are considered, namely amplify-and-forward (AF) and decode-and-forward (DF). The relay beamforming vector design is proposed for AF protocol, and is jointly optimized with the time ratio parameter in the case of DF protocol to maximize the physical-layer security under harvested energy constraints. Moreover, for the simultaneous energy and secure message transfer at the relay, a two-phase method is provided, which enables the relay to avoid the self-interference caused by full-duplex operation, and also to harvest the energy from the self-interference. The proposed algorithmic solutions leverage the rank relaxation, Majorization-Minimization (MM) programming, and line search method. Numerical results show that the proposed full-duplex relaying system outperforms the half-duplex relaying system in energy harvesting. Moreover, the trade-off between AF and DF protocols according to the occurrence probability of non-zero secrecy rate can be observed in terms of physical-layer security.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2016.7444859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21
Abstract
In this paper, we investigate a two-hop full-duplex wireless-powered relaying system consists of a source, a relay, and a destination in the presence of a passive eavesdropper. The relay assists the transmission of confidential information from the source to the destination, while simultaneously harvesting the energy with time switching scheme by the radio-frequency (RF) signals. Our goal is to maximize the physical-layer security under harvested energy constraints by designing the full-duplex wireless-powered relay, whose two relaying strategies are considered, namely amplify-and-forward (AF) and decode-and-forward (DF). The relay beamforming vector design is proposed for AF protocol, and is jointly optimized with the time ratio parameter in the case of DF protocol to maximize the physical-layer security under harvested energy constraints. Moreover, for the simultaneous energy and secure message transfer at the relay, a two-phase method is provided, which enables the relay to avoid the self-interference caused by full-duplex operation, and also to harvest the energy from the self-interference. The proposed algorithmic solutions leverage the rank relaxation, Majorization-Minimization (MM) programming, and line search method. Numerical results show that the proposed full-duplex relaying system outperforms the half-duplex relaying system in energy harvesting. Moreover, the trade-off between AF and DF protocols according to the occurrence probability of non-zero secrecy rate can be observed in terms of physical-layer security.