Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks

被引:40
|
作者
Zhang, Jiazhen [1 ,2 ]
Tao, Xiaofeng [1 ,2 ]
Wu, Huici [1 ]
Zhang, Xuefei [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Lab Mobile Network Technol, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Res Inst, Shenzhen, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Physical layer security; SWIPT; untrusted relay; secure energy efficiency; WIRELESS INFORMATION; DIRECTIONAL ANTENNAS; BEAMFORMING DESIGN; COMMUNICATION; OPPORTUNITIES; CHALLENGES;
D O I
10.1109/ACCESS.2018.2804903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the secure transmission in two-way untrusted amplify-and forward relay networks with simultaneous wireless information and power transfer (SWIPT). Two secure SWIPT relaying strategies, namely, secure power splitting (SPS) and secure time switching (STS), are studied with the objective of secrecy rate (SR) and secure energy efficiency (SEE) maximization. First, the high signal-to-noise ratio approximations of SR and SEE are established, based on which non-convex SPS-based and convex STS-based SR maximization problems are formulated to jointly optimize the source transmit power and resource division ratio. Suboptimal solutions are obtained by employing Dinkelbach's method and Newton's method, respectively. Furthermore, to guarantee both the energy efficiency and secure quality of service (QoS) performance, SEE maximization problems are formulated with the consideration of the energy harvesting activation constraint and the target SR requirement. The intractable non-convex SEE maximization problems are reformulated as parameter programming, transformed to Lagrange dual problems, and finally solved by two SEE resource allocation algorithms with low complexity. Numerical results verify the convergence and effectiveness of the proposed algorithms and provide new insights into relaying strategy design and secure relay placement.
引用
收藏
页码:10508 / 10519
页数:12
相关论文
共 50 条
  • [1] Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay
    Mo, Jianhua
    Tao, Meixia
    Liu, Yuan
    Xia, Bin
    Ma, Xiaoli
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 4180 - 4185
  • [2] Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
    Mamaghani, Milad Tatar
    Kuhestani, Ali
    Wong, Kai-Kit
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) : 8451 - 8465
  • [3] Secure Communications in SWIPT-Enabled Two-Way Relay Networks
    Zhang, Yang
    Zhao, Xiangmo
    Xie, Ying
    IEEE ACCESS, 2019, 7 : 111890 - 111896
  • [4] Secure Beamforming in Full-Duplex Two-Way Relay Networks With SWIPT for Multimedia Transmission
    Liu, Fang
    Liu, Yahui
    Liu, Yuanan
    Yu, Jianguo
    IEEE ACCESS, 2020, 8 : 26851 - 26862
  • [5] Secure Transmission Schemes for Two-Way Relay Networks
    Luo, Miao
    Li, Xiaoping
    Wang, Jianquan
    Yin, Qinye
    Tang, Wanbin
    Li, Shaoqian
    IEEE ACCESS, 2019, 7 : 50148 - 50158
  • [6] Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks
    Li, Quanzhong
    Zhang, Qi
    Qin, Jiayin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (11) : 9006 - 9019
  • [7] Secure two-way communication via a wireless powered untrusted relay and friendly jammer
    Mamaghani, Milad Tatar
    Mohammadi, Abbas
    Yeoh, Phee Lep
    Kuhestani, Ali
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [8] Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay
    Mo, Jianhua
    Tao, Meixia
    Liu, Yuan
    Wang, Rui
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (09) : 2185 - 2199
  • [9] Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users
    Wang, Fei
    Qin, Changchun
    IET NETWORKS, 2020, 9 (01) : 1 - 6
  • [10] Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks
    Li, Quanzhong
    Yang, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 130 - 143