Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers

This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2015-01, Vol.10 (1), p.40-54
Hauptverfasser: Khandaker, Muhammad R. A., Wong, Kai-Kit
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 54
container_issue 1
container_start_page 40
container_title IEEE transactions on information forensics and security
container_volume 10
creator Khandaker, Muhammad R. A.
Wong, Kai-Kit
description This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.
doi_str_mv 10.1109/TIFS.2014.2363033
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1630156965</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6922539</ieee_id><sourcerecordid>3516571331</sourcerecordid><originalsourceid>FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</originalsourceid><addsrcrecordid>eNpdkEtLw0AUhQdRsFZ_gLgJuHGTOjfzaGapJbWFioJ1PUxmbmpq83CmFfrvTWjpwtU9i-9cDh8ht0BHAFQ9LufTj1FCgY8SJhll7IwMQAgZS5rA-SkDuyRXIawp5RxkOiDZqwnf6KJnNFXR-KqsV1FZR9svjN49BqwtRk0RZTX61T6eGf-LYdtDmemS803bog_X5KIwm4A3xzskn9NsOZnFi7eX-eRpEVsm1TZ2FAvJGEq0hlLLlSiUyHMnhEolyx01ouCQSCkciHHKHBeAHJwT1pg8t2xIHg5_W9_87LoluiqDxc3G1NjsggYpgNN0LFiH3v9D183O1926jmIUhFRSdBQcKOubEDwWuvVlZfxeA9W9WN2L1b1YfRTbde4OnRIRT7xUSSKYYn_ARnOO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1630156965</pqid></control><display><type>article</type><title>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</title><source>IEEE Electronic Library (IEL)</source><creator>Khandaker, Muhammad R. A. ; Wong, Kai-Kit</creator><creatorcontrib>Khandaker, Muhammad R. A. ; Wong, Kai-Kit</creatorcontrib><description>This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2014.2363033</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Array signal processing ; Byproducts ; Channels ; Colluding eavesdroppers ; Design engineering ; Energy beamforming ; Energy harvesting ; Erbium ; Infrared radiation ; Interference ; Joints ; Masked beamforming ; Mathematical models ; Optimization ; Receivers ; Vectors</subject><ispartof>IEEE transactions on information forensics and security, 2015-01, Vol.10 (1), p.40-54</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</citedby><cites>FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6922539$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids></links><search><creatorcontrib>Khandaker, Muhammad R. A.</creatorcontrib><creatorcontrib>Wong, Kai-Kit</creatorcontrib><title>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.</description><subject>Algorithms</subject><subject>Array signal processing</subject><subject>Byproducts</subject><subject>Channels</subject><subject>Colluding eavesdroppers</subject><subject>Design engineering</subject><subject>Energy beamforming</subject><subject>Energy harvesting</subject><subject>Erbium</subject><subject>Infrared radiation</subject><subject>Interference</subject><subject>Joints</subject><subject>Masked beamforming</subject><subject>Mathematical models</subject><subject>Optimization</subject><subject>Receivers</subject><subject>Vectors</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNpdkEtLw0AUhQdRsFZ_gLgJuHGTOjfzaGapJbWFioJ1PUxmbmpq83CmFfrvTWjpwtU9i-9cDh8ht0BHAFQ9LufTj1FCgY8SJhll7IwMQAgZS5rA-SkDuyRXIawp5RxkOiDZqwnf6KJnNFXR-KqsV1FZR9svjN49BqwtRk0RZTX61T6eGf-LYdtDmemS803bog_X5KIwm4A3xzskn9NsOZnFi7eX-eRpEVsm1TZ2FAvJGEq0hlLLlSiUyHMnhEolyx01ouCQSCkciHHKHBeAHJwT1pg8t2xIHg5_W9_87LoluiqDxc3G1NjsggYpgNN0LFiH3v9D183O1926jmIUhFRSdBQcKOubEDwWuvVlZfxeA9W9WN2L1b1YfRTbde4OnRIRT7xUSSKYYn_ARnOO</recordid><startdate>201501</startdate><enddate>201501</enddate><creator>Khandaker, Muhammad R. A.</creator><creator>Wong, Kai-Kit</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201501</creationdate><title>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</title><author>Khandaker, Muhammad R. A. ; Wong, Kai-Kit</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Array signal processing</topic><topic>Byproducts</topic><topic>Channels</topic><topic>Colluding eavesdroppers</topic><topic>Design engineering</topic><topic>Energy beamforming</topic><topic>Energy harvesting</topic><topic>Erbium</topic><topic>Infrared radiation</topic><topic>Interference</topic><topic>Joints</topic><topic>Masked beamforming</topic><topic>Mathematical models</topic><topic>Optimization</topic><topic>Receivers</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khandaker, Muhammad R. A.</creatorcontrib><creatorcontrib>Wong, Kai-Kit</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khandaker, Muhammad R. A.</au><au>Wong, Kai-Kit</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2015-01</date><risdate>2015</risdate><volume>10</volume><issue>1</issue><spage>40</spage><epage>54</epage><pages>40-54</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2014.2363033</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2015-01, Vol.10 (1), p.40-54
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_1630156965
source IEEE Electronic Library (IEL)
subjects Algorithms
Array signal processing
Byproducts
Channels
Colluding eavesdroppers
Design engineering
Energy beamforming
Energy harvesting
Erbium
Infrared radiation
Interference
Joints
Masked beamforming
Mathematical models
Optimization
Receivers
Vectors
title Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T12%3A42%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Masked%20Beamforming%20in%20the%20Presence%20of%20Energy-Harvesting%20Eavesdroppers&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Khandaker,%20Muhammad%20R.%20A.&rft.date=2015-01&rft.volume=10&rft.issue=1&rft.spage=40&rft.epage=54&rft.pages=40-54&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2014.2363033&rft_dat=%3Cproquest_cross%3E3516571331%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1630156965&rft_id=info:pmid/&rft_ieee_id=6922539&rfr_iscdi=true