Abstract

In this paper, we investigate different secrecy energy efficiency (SEE) optimization problems in a multiple-input single-output underlay cognitive radio (CR) network in the presence of an energy harvesting receiver. In particular, these energy efficient designs are developed with different assumptions of channels state information (CSI) at the transmitter, namely perfect CSI, statistical CSI and imperfect CSI with bounded channel uncertainties. In particular, the overarching objective here is to design a beamforming technique maximizing the SEE while satisfying all relevant constraints linked to interference and harvested energy between transmitters and receivers. We show that the original problems are non-convex and their solutions are intractable. By using a number of techniques, such as non-linear fractional programming and difference of concave (DC) functions, we reformulate the original problems so as to render them tractable. We then combine these techniques with the Dinkelbach’s algorithm to derive iterative algorithms to determine relevant beamforming vectors which lead to the SEE maximization. In doing this, we investigate the robust design with ellipsoidal bounded channel uncertainties, by mapping the original problem into a sequence of semidefinite programs by employing the semidefinite relaxation, non-linear fractional programming and S-procedure. Furthermore, we show that the maximum SEE can be achieved through a search algorithm in the single dimensional space. Numerical results, when compared with those obtained with existing techniques in the literature, show the effectiveness of the proposed designs for SEE maximization.

Highlights

  • Wireless communications is one of the underpinning technologies of the modern society, and it isThe associate editor coordinating the review of this manuscript and approving it for publication was Khaled Rabie.not an overstatement to say that it plays an indispensable role in most communication infrastructures

  • The path loss coefficients caused by large-scale fading are modelled as di−α, where di is the distance between the SU-Tx and user i, and α = 2.7 denotes the path loss exponent

  • The original problem was not convex due to the non-linear fractional objective function. To overcome this non-convexity issue, we reformulated the original problem into a convex one by exploiting SDR, non-linear fractional and difference of concave (DC) programming

Read more

Summary

INTRODUCTION

Wireless communications is one of the underpinning technologies of the modern society, and it is. Most of the literature on physical layer security focuses primarily on efficiently utilizing the required transmit power to offer different quality-of-service requirements, such as achieving better secrecy rates [22], [34]–[39] These designs do not consider the secrecy energy efficiency (SEE), which is a suitable performance metric for measuring the efficient utilization of the power consumption in secure communication systems. 3) we consider a robust design with ellipsoidal based channel uncertainties for all channels This robust SEE maximization problem is non-convex in its original form and we first reformulate it into a series of semidefinite programs (SDP) by employing the SDR and non-linear fractional programming [43]. HN denotes the set of all N ×N Hermitian matrices. ln(x) is the natural logarithm of x

SYSTEM MODEL
SEE MAXIMIZATION WITH PERFECT CSI
DC PROGRAMMING
COMPUTATIONAL COMPLEXITY
SEE MAXIMIZATION WITH STATISTICAL CSI
NON-LINEAR FRACTIONAL PROGRAMMING
SEE MAXIMIZATION WITH IMPERFECT CSI
SIMULATION RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.