Advertisement

A DCA-Based Approach for Outage Constrained Robust Secure Power-Splitting SWIPT MISO System

  • Phuong Anh NguyenEmail author
  • Hoai An Le Thi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 991)

Abstract

This paper studies the worst-case secrecy rate maximization problem under the total transmit power, the energy harvesting and the outage probability requirements. The problem is nonconvex, thus, hard to solve. Exploiting the special structure of the problem, we first reformulate as a DC (Difference of Convex functions) program. Then, we develop an efficient approach based on DCA (DC Algorithm) and alternating method for solving the problem. The computational results confirm the efficiency of the proposed approach.

Keywords

DC programming DCA Physical layer security Beamforming SWIPT Outage probability 

References

  1. 1.
    Chen, D., He, Y., Lin, X., Zhao, R.: Both worst-case and chance-constrained robust secure SWIPT in MISO interference channels. IEEE Trans. Inf. Forensics Secur. 13(2), 306–317 (2018)CrossRefGoogle Scholar
  2. 2.
    Chu, Z., Zhu, Z., Hussein, J.: Robust optimization for an-aided transmission and power splitting for secure MISO SWIPT system. IEEE Commun. Lett. 20(8), 1571–1574 (2016)CrossRefGoogle Scholar
  3. 3.
    Feng, Y., Yang, Z., Zhu, W., Li, Q., Lv, B.: Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE Trans. Veh. Technol. 66(3), 2354–2366 (2017)CrossRefGoogle Scholar
  4. 4.
    Gharavol, E.A., Liang, Y., Mouthaan, K.: Robust downlink beamforming in multiuser MISO cognitive radio networks with imperfect channel-state information. IEEE Trans. Veh. Technol. 59(6), 2852–2860 (2010)CrossRefGoogle Scholar
  5. 5.
    Khandaker, M.R.A., Wong, K., Zhang, Y., Zheng, Z.: Probabilistically robust SWIPT for secrecy misome systems. IEEE Trans. Inf. Forensics Secur. 12(1), 211–226 (2017)CrossRefGoogle Scholar
  6. 6.
    Krikidis, I., Timotheou, S., Nikolaou, S., Zheng, G., Ng, D.W.K., Schober, R.: Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 52(11), 104–110 (2014)CrossRefGoogle Scholar
  7. 7.
    Le, T.A., Vien, Q., Nguyen, H.X., Ng, D.W.K., Schober, R.: Robust chance-constrained optimization for power-efficient and secure SWIPT systems. IEEE Trans. Green Commun. Netw. 1(3), 333–346 (2017)CrossRefGoogle Scholar
  8. 8.
    Le Thi, H.A., Huynh, V.N., Pham Dinh, T.: Dc programming and DCA for general dc programs. In: Advanced Computational Methods for Knowledge Engineering, pp. 15–35 (2014)Google Scholar
  9. 9.
    Le Thi, H.A., Le, H.M., Phanand, B.,Tran, D.N.: A DCA-like algorithm and its accelerated version with application in data visualization (2018). CoRR arXiv:abs/1806.09620
  10. 10.
    Le Thi, H.A., Pham Dinh, T.: The DC (difference of convex functions) programming and DCA revisited with dc models of real world nonconvex optimization problems. Ann. Oper. Res. 133(1), 23–46 (2005)MathSciNetzbMATHGoogle Scholar
  11. 11.
    Le Thi, H.A., Pham Dinh, T.: DC programming and DCA: thirty years of developments. Math. Program. 169(1), 5–68 (2018)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Lei, H., Ansari, I.S., Pan, G., Alomair, B., Alouini, M.: Secrecy capacity analysis over \(\alpha - \mu \) fading channels. IEEE Commun. Lett. 21(6), 1445–1448 (2017)CrossRefGoogle Scholar
  13. 13.
    Li, Q., Ma, W.: Secrecy rate maximization of a MISO channelwith multiple multi-antenna eavesdroppers via semidefinite programming. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3042–3045 (2010)Google Scholar
  14. 14.
    Ma, S., Hong, M., Song, E., Wang, X., Sun, D.: Outage constrained robust secure transmission for MISO wiretap channels. IEEE Trans. Wirel. Commun. 13(10), 5558–5570 (2014)CrossRefGoogle Scholar
  15. 15.
    Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to D.C. programming: theory, algorithm and applications. Acta Math. Vietnam. 22(1), 289–355 (1997)Google Scholar
  16. 16.
    Pham Dinh, T., Le Thi, H.A.: D.C. optimization algorithms for solving the trust region subproblem. SIAM J. Optim. 8(2), 476–505 (1998)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. In: Transactions on Computational Intelligence XIII. pp. 1–37. Springer, Heidelberg (2014)Google Scholar
  18. 18.
    Rashid, U., Tuan, H.D., Kha, H.H., Nguyen, H.H.: Joint optimization of source precoding and relay beamforming in wireless mimo relay networks. IEEE Trans. Commun. 62(2), 488–499 (2014)CrossRefGoogle Scholar
  19. 19.
    Tian, M., Huang, X., Zhang, Q., Qin, J.: Robust an-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(6), 723–727 (2015)CrossRefGoogle Scholar
  20. 20.
    Wang, K., So, A.M., Chang, T., Ma, W., Chi, C.: Outage constrained robust transmit optimization for multiuser MISO downlinks: tractable approximations by conic optimization. IEEE Trans. Signal Process. 62(21), 5690–5705 (2014)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Wang, S., Wang, B.: Robust secure transmit design in mimo channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(11), 2147–2151 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.LGIPMUniversity of LorraineMetzFrance

Personalised recommendations