异构携能通信网络中人工噪声辅助的顽健能量与信息安全传输方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Artificial noise-aided robust secure information and power transmission scheme in heterogeneous networks with simultaneous wireless information and power transfer
  • 作者:张波 ; 黄开枝 ; 钟州 ; 陈亚军
  • 英文作者:ZHANG Bo;HUANG Kaizhi;ZHONG Zhou;CHEN Yajun;National Digital Switching System Engineering and Technological Research Center;
  • 关键词:物理层安全 ; 安全传输 ; 异构网络 ; 无线携能通信 ; 凸优化
  • 英文关键词:physical layer security;;secure transmission;;heterogeneous network;;simultaneous wireless information and power transfer;;convex optimization
  • 中文刊名:TXXB
  • 英文刊名:Journal on Communications
  • 机构:国家数字交换系统工程技术研究中心;
  • 出版日期:2019-03-25
  • 出版单位:通信学报
  • 年:2019
  • 期:v.40;No.383
  • 基金:国家自然科学基金资助项目(No.61871404,No.61701538,No.61601514)~~
  • 语种:中文;
  • 页:TXXB201903007
  • 页数:13
  • CN:03
  • ISSN:11-2102/TN
  • 分类号:64-76
摘要
异构携能通信网络中CSI存在随机误差时,为保证信息与能量传输的安全性及可靠性,提出一种人工噪声辅助的顽健能量与信息安全传输方案。通过联合设计宏基站、微基站的下行信息波束矩阵及人工噪声矩阵,使网络中其他用户信号及人工噪声能够干扰窃听者。同时提升系统能量的接收性能。考虑CSI随机误差,在基站的发送功率约束、合法用户的信息接收中断约束及窃听者的信息窃听中断约束下,以最大化系统能量接收性能为目标进行数学建模。建模后的问题是非凸的,首先将其等效转化为一种易于处理的形式;然后,分别利用Berstein-type不等式和Large-deviation不等式这2种方式将其中的中断概率约束转化为凸的线性矩阵不等式;最后结合二次等式引理及递归估计算法处理秩为1波束成形约束的非凸性。仿真结果表明,与对比方案相比,所提方案具有更高的系统能量接收性能和可行解性能,验证了其有效性和顽健性。
        A heterogeneous network with simultaneous wireless information and power transfer under the stochastic channel state information(CSI) error was considered. In this network, to guarantee the security and reliability of information and energy transmission, an artificial noise(AN)-aided robust secure information and power transmission scheme was proposed. By jointly designing the downlink information beamforming and AN matrix of macrocell base station and femtocell base stations, the eavesdroppers were jammed and the energy receiving performance of system was improved simultaneously. The problem of maximizing the energy receiving performance was modeled under the constraints on the base station power, the outage probability of information transfer and confidential information eavesdropped. Due to the probabilistic and rank-one constraints, this problem was non-convex. To obtain the solution, the original problem was first transformed into an equivalent form, which was easy to process. Then, the Bernstein-type inequality and the Large-deviation inequality was utilized to transform the outage probability limits into convex linear matrix inequalities,respectively. Finally, the rank-one beamforming constraints were processed with quadratic equality constraint procedure.Simulation results show that the proposed scheme has higher energy receiving performance and feasible performance in comparison with compared schemes, which validates the effectiveness and the robustness of our proposed scheme.
引文
[1]YANG N,WANG L,GERACI G.Safeguarding 5G wireless communication networks using physical layer security[J].IEEE Communications Magazine,2015,53(4):20-27.
    [2]TK VU,BENNIS M,SAMARAKOON S.Joint load balancing and interference mitigation in 5G heterogeneous networks[J].IEEE Transactions on Wireless Communications,2017,16(9):6032-6046.
    [3]AKBAR S,DENG Y,NALLANATHAN A.Simultaneous wireless information and power transfer in K-tier heterogeneous cellular networks[J].IEEE Transactions on Wireless Communications,2016,15(8):5804-5818.
    [4]SHENG M,WANG L,WANG X.Energy efficient beamforming in MISO heterogeneous cellular networks with wireless information and power transfer[J].IEEE Journal on Selected Areas in Communications,2016,34(4):954-968.
    [5]邹羿,黄开枝,康小磊.基于中继间干扰消除的轮流转发系统安全传输方案[J].通信学报,2017,38(9):185-192.ZOU Y,HUANG K Z,KANG X L.Successive relaying secure transmission scheme based on inter-relay interference cancellation[J].Journal on Communications,2017,38(9):185-192.
    [6]肖帅芳,郭云飞.面向物联网的多跳中继系统的协作密钥生成方法[J].通信学报,2018,39(3):86-94.XIAO S F,GUO Y F.Cooperative secret key generation for multi-hop relaying systems in Internet of things[J].Journal on Communications,2018,39(3):86-94.
    [7]钟智豪,罗文宇,彭建华.多层异构蜂窝网协作传输和协作干扰机制的安全性能分析[J].中国科学:信息科学,2016,46(1):33-48.ZHONG Z H,LUO W Y,PENG J H.Security performance analysis of cooperative transmission and cooperative jam scheme in multi-tier heterogeneous cellular networks[J].Science China Information Sciences,2016,46(1):33-48.
    [8]ZHONG Z,PENG J,LUO W.A tractable approach to analyzing the physical-layer security in k-tier heterogeneous cellular networks[J].China Communications,2015,12(S):166-173.
    [9]任远.多天线系统中的干扰管理和安全无线携能通信技术研究[D].北京:北京邮电大学,2017.REN Y.Research on interference management and secure SWIPT for multi-antenna systems[D].Beijing:Beijing University of Posts and Telecommunications,2017.
    [10]余红宴.无线携能通信的能量效率优化与物理层安全研究[D].重庆:西南大学,2017.YU H Y.Energy efficiency optimization and physical layer security research for SWIPT systems[D].Chongqing:Southwest University,2017.
    [11]CHANG Z,WANG Z,GUO X.Energy-efficient resource allocation for wireless powered massive MIMO system with imperfect CSI[J].IEEE Transactions on Green Communications&Networking,2017,1(2):121-130.
    [12]FANG F,ZHANG H,CHENG J.Joint user scheduling and power allocation optimization for energy efficient NOMA systems with imperfect CSI[J].IEEE Journal on Selected Areas in Communications,2017,PP(99):1-7.
    [13]REN Y,LV T,GAO H.Secure wireless information and power transfer in heterogeneous networks[J].IEEE Access,2017,5(99):4967-4979.
    [14]LI B,FEI Z,CHU Z.Secure transmission for heterogeneous cellular networks with wireless information and power transfer[J].IEEE Systems Journal,2018,PP(99):1-7.
    [15]ZHU Z,CHU Z,WANG Z.Outage constrained robust beamforming for secure broadcasting systems with energy harvesting[J].IEEETransactions on Wireless Communications,2016,15(11):7610-7620.
    [16]LE T A,VIEN Q T,NGUYEN H X.Robust chance-constrained optimization for power-efficient and secure SWIPT systems[J].IEEETransactions on Green Communications&Networking,2017,1(3):333-346.
    [17]LE T A,VIEN Q T,NGUYEN H X.Robust optimization with probabilistic constraints for power-efficient and secure SWIPT[C]//Proceedings of IEEE Global Communications Conference.2017:1-7.
    [18]LI B,FEI Z.Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels[J].Science China Information Sciences,2018,61(2):1-12.
    [19]MUHAMMAD R,WONG K,ZHANG Y.Probabilistically robust SWIPT for secrecy MISOME systems[J].IEEE Transactions on Information Forensics and Security,2017,12(1):211-227.
    [20]NIU H,GUO D,HUANG Y.Outage constrained robust energy harvesting maximization for secure MIMO SWIPT systems[J].IEEEWireless Communications Letters,2017,6(5):614-617.
    [21]WANG F,PENG T,HUAN Y,et al.Robust transceiver optimization for power-splitting based downlink MISO SWIPT systems[J].IEEESignal Process Letters,2015,22:1492-1496.
    [22]WANG K,SO M.Outage constrained robust transmit optimization for multiuser MISO downlinks:tractable approximations by conic optimization[J].IEEE Transactions on Signal processing,2014,62(21):5690-5705.
    [23]RASHID U,TUAN H,KHA H.Joint optimization of source precoding and relay beamforming in wireless MIMO relay networks[J].IEEETransactions on Communications,2014,62:488-499.
    [24]NASSERI S,NAKHAI M.Chance constrained robust downlink beamforming in multicell networks[J].IEEE Transactions on mobile computing,2016,15(11):2682-2691.
    [25]CHU Z,ZHU Z,HUSSEIN J.Robust optimization for AN-aided transmission and power splitting for secure MISO SWIPT system[J].IEEE Communications Letter,2016,20:1571-1574.
    [26]BEN A,NEMIROVSKI A.Lectures on modern convex optimization:analysis,algorithms,and engineering applications[M].Philadelphia,PA:SIAM,2001.
    [27]ZHANG L,JIN L,LUO W.Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints[J].Science China Information Sciences,2016,59(2):1-13.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700