In this paper, we investigate beamforming design for cooperative secure transmission in cognitive two-way relay networks, where the cognitive transmitter (CT) with multiple antennas helps to forward ...the signals of two primary transmitters (PTs) and tries to protect the PTs from wiretapping by a single-antenna eavesdropper. With the objective of maximizing the secrecy sum rate (SSR) for PTs, we jointly design the beamforming matrix for the PTs' signals, the beamforming vector for the cognitive receiver (CR)'s signal, and the artificial noise (AN)'s beamforming matrix, under the quality of service constraint at the CR and the transmit power constraint at the CT. We propose the monotonic optimization-based algorithm to obtain the global optimal solution to the SSR maximization problem, which is a double-layer iterative algorithm and has very high complexity. To balance the complexity and the performance, we also propose a sequential parametric convex approximation-based single-layer iterative algorithm and a zero-forcing-based closed-form algorithm, the latter of which has the lowest complexity. Furthermore, we derive the asymptotic achievable secrecy sum rate when the CT transmit power goes to infinity. We present the numerical results to verify the effectiveness of our proposed algorithms.
For over‐the‐air computation (AirComp) systems, energy‐constrained sensors become a bottleneck to improve the performances. To address this issue, in this letter, a full‐duplex (FD) wireless powered ...AirComp system with self‐energy recycling is proposed, where all the nodes operate in the FD mode and the sensors can harvest energy from the hybrid access point (HAP)' signal and it's own transmit signal by self‐energy recycling. A joint beamforming design problem is formulated and an effective iterative algorithm is proposed to solve the non‐convex optimization problem, aiming to minimize the computation mean square error at the HAP under the transmit power constraints of the HAP and sensors. Simulation results are presented to demonstrate the effectiveness of the proposed scheme.
For over‐the‐air computation (AirComp) systems, energy‐constrained sensors become a bottleneck to improve the performances. To address this issue, in this letter, we propose a full‐duplex (FD) wireless powered AirComp system with self‐energy recycling, where all the nodes operate in the FD mode and the sensors can harvest energy from the hybrid access point (HAP)' signal and it's own transmit signal by self‐energy recycling. We formulate a joint beamforming design problem and propose an effective iterative algorithm to solve the non‐convex optimization problem, aiming to minimize the computation mean square error at the HAP under the transmit power constraints of the HAP and sensors.
In this paper, we study the energy efficiency (EE) optimization for simultaneous wireless information and power transfer in multiple-input-multiple-output two-way amplify-and-forward relay networks, ...where the energy-constrained relay harvests energy from two sources' signals by power splitting (PS) scheme to forward the information of two sources. Our objective is to jointly design the sources and relay precoding matrices and the PS ratio to maximize the EE of the network, under the transmit power constraints at sources and relay and the minimum spectral efficiency requirement. We transform the nonconvex precoding and PS design problem into a difference of convex programming and propose an efficient iterative algorithm based on the constrained concave convex procedure to obtain a local optimum. To reduce computational complexity, we propose a generalized singular value decomposition based channel diagonalization scheme to simplify the optimization into a joint source and relay power allocation problem. The alternating optimization method is employed to solve this problem and a suboptimal solution to the EE maximization problem is obtained. Simulation results demonstrate the effectiveness of the proposed schemes.
For over‐the‐air computation (AirComp) systems, secure data aggregation is an important issue. This letter investigates joint transceiver optimization for secure data aggregation in orthogonal ...frequency division multiple access (OFDMA) AirComp systems. The aim is to minimize the computation mean square error of the fusion centre, while satisfying the security constraint of the computation mean square error of the eavesdropper and the power constraints of the sensors. The formulated optimization problem is non‐convex, and an effective iterative algorithm is proposed to solve it. Simulation results demonstrate the superiority of the proposed scheme.
For over‐the‐air computation (AirComp) systems, secure data aggregation is an important issue. This letter investigates joint transceiver optimization for secure data aggregation in orthogonal frequency division multiple access AirComp systems. The aim is to minimize the computation mean square error of the fusion centre, while satisfying the security constraint of the computation mean square error of the eavesdropper and the power constraints of the sensors.
Nonorthogonal multiple access (NOMA) is a promising technology in future mobile communication systems. In this paper, considering that the base station knows imperfect channel state information ...(CSI), we investigate the robust beamforming design problem for NOMA systems in multiple-input-single-output (MISO) channels. Modeling channel uncertainties by the worst-case model, we aim at maximizing the worst-case achievable sum rate subject to the transmit power constraint at the base station. We propose to decouple the nonconvex optimization problem into four optimization problems and employ an alternating optimization algorithm to solve the problem. Simulation results demonstrate that our proposed robust beamforming scheme outperforms the orthogonal multiple-access scheme.
In this paper, we consider a cellular downlink multiple-input-single-output (MISO) nonorthogonal multiple access (NOMA) secure transmission system, where users are grouped as multiple clusters. Each ...cluster consists of a central user and a cell-edge user. The central user is an entrusted user, and the cell-edge user is a potential eavesdropper. We focus on the secure beamforming and power allocation design optimization problem which maximizes the sum achievable secrecy rate of central users subject to the transmit power constraint at the base station and transmission rate requirements at cell-edge users. The problem is nonconvex because of coupling optimization variables in the considered fractional quadratically constrained quadratic programming. We propose an alternating optimization-based solution and a constrained concave-convex procedure-based solution to the considered problem. Simulation results demonstrate that our proposed NOMA schemes outperform the conventional orthogonal multiple access scheme.
In this paper, we investigate the secure relay beamforming problem for simultaneous wireless information and power transfer (SWIPT) in an amplify-and-forward (AF) two-way relay network. We consider ...scenarios that the eavesdropper's channel state information (CSI) is and is not available. When the eavesdropper's CSI is available, our objective is to maximize the achievable secrecy sum rate under transmit power constraint and energy harvesting constraint. Since the optimization problem is nonconvex, we derive its performance upper bound, which requires 2-D search, where a semidefinite programming is solved in each step. We also propose an upper bound-based rank-one solution by employing the Gaussian randomization method. To reduce computational complexity, we transform the optimization problem into a difference-of-convex programming and propose a sequential parametric convex approximation (SPCA)-based iterative algorithm to find a locally optimal solution. Furthermore, we also propose a zero-forcing (ZF)-based suboptimal solution. Simulation results demonstrate that the upper bound-based rank-one solution archives the performance almost the same as the upper bound that has high computational complexity. The low-complexity SPCA-based locally optimal solution performs close to the upper bound. The ZF-based suboptimal solution has the lowest computational complexity among the proposed solutions. When the eavesdropper's CSI is not available, we propose an artificial noise-aided secure relay beamforming scheme.
Non-orthogonal multiple access (NOMA) is a promising technology in future communication systems. In this paper, we propose a buffer-aided NOMA relaying system, which consists of a source, a relay, ...and two destinations. In the relaying system, the relay helps the source transmit packets to two destinations simultaneously using NOMA scheme. We theoretically derive outage probabilities of source-to-relay link and relay-to-destinations links considering two scenarios that the relay does and does not know the channel state information (CSI) from itself to two destinations. When the relay knows CSI, the obtained outage probability of relay-to-destinations links involves integration operation. Thus, we derive an upper bound and two lower bounds. Simulation results demonstrate that two lower bounds approach exact outage probability at low and high signal-to-noise ratios, respectively. We also propose a relay decision scheme for the buffer-aided NOMA relaying system. Based on the obtained system outage probability, we theoretically derive the diversity order. It is found that no matter whether the relay knows CSI or not, the diversity order of 2 can be achieved when the buffer size is larger than or equal to 3.
For simultaneous wireless information and power transfer (SWIPT), secure communication is an important issue. In this correspondence, we study the secure relay beamforming (SRB) scheme for SWIPT in a ...nonregenerative multiantenna relay network. We propose a constrained concave convex procedure (CCCP)-based iterative algorithm that is able to achieve a local optimum, where the secrecy rate is maximized, and the relay transmit power and energy harvesting constraints are satisfied. Simulation results have shown that our proposed CCCP-based iterative algorithm achieves a larger secrecy rate and lower computational complexity than the convectional SRB schemes. Since the CCCP-based iterative algorithm is still complex, we propose a semidefinite programming (SDP)-based noniterative suboptimal algorithm and a closed-form suboptimal algorithm. It is shown that when the maximum transmit power of the relay to noise power ratio is high, the SDP-based noniterative suboptimal algorithm performs close to the CCCP-based iterative algorithm.
The secure transmission in the multiple-input-single-output simultaneous wireless information and power transfer (SWIPT) system is an important issue. Considering channel uncertainties, we ...investigate the robust secure transmission scheme, which maximizes the worst-case secrecy rate under transmit power constraint and energy-harvesting (EH) constraint. The optimization problem is a nonconvex problem. Omitting the rank-one constraint on transmit covariance, it is transformed into a solvable semidefinite program (SDP) where the rank relaxation performance upper bound is obtained. Since the obtained rank relaxation transmit covariance may not be rank one, we propose a lower bound-based rank-one suboptimal (LB-Sub) solution by employing Charnes-Cooper transformation. We also propose the suboptimal Gaussian randomized (GR) solutions based on the rank relaxation upper bound and the lower bound, respectively. Simulation results have shown that our proposed LB-Sub solution and suboptimal GR solution based on the rank relaxation upper bound outperform the nonrobust scheme.