Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2015-01, Vol.10 (1), p.40-54 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 54 |
---|---|
container_issue | 1 |
container_start_page | 40 |
container_title | IEEE transactions on information forensics and security |
container_volume | 10 |
creator | Khandaker, Muhammad R. A. Wong, Kai-Kit |
description | This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms. |
doi_str_mv | 10.1109/TIFS.2014.2363033 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1630156965</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6922539</ieee_id><sourcerecordid>3516571331</sourcerecordid><originalsourceid>FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</originalsourceid><addsrcrecordid>eNpdkEtLw0AUhQdRsFZ_gLgJuHGTOjfzaGapJbWFioJ1PUxmbmpq83CmFfrvTWjpwtU9i-9cDh8ht0BHAFQ9LufTj1FCgY8SJhll7IwMQAgZS5rA-SkDuyRXIawp5RxkOiDZqwnf6KJnNFXR-KqsV1FZR9svjN49BqwtRk0RZTX61T6eGf-LYdtDmemS803bog_X5KIwm4A3xzskn9NsOZnFi7eX-eRpEVsm1TZ2FAvJGEq0hlLLlSiUyHMnhEolyx01ouCQSCkciHHKHBeAHJwT1pg8t2xIHg5_W9_87LoluiqDxc3G1NjsggYpgNN0LFiH3v9D183O1926jmIUhFRSdBQcKOubEDwWuvVlZfxeA9W9WN2L1b1YfRTbde4OnRIRT7xUSSKYYn_ARnOO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1630156965</pqid></control><display><type>article</type><title>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</title><source>IEEE Electronic Library (IEL)</source><creator>Khandaker, Muhammad R. A. ; Wong, Kai-Kit</creator><creatorcontrib>Khandaker, Muhammad R. A. ; Wong, Kai-Kit</creatorcontrib><description>This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2014.2363033</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Array signal processing ; Byproducts ; Channels ; Colluding eavesdroppers ; Design engineering ; Energy beamforming ; Energy harvesting ; Erbium ; Infrared radiation ; Interference ; Joints ; Masked beamforming ; Mathematical models ; Optimization ; Receivers ; Vectors</subject><ispartof>IEEE transactions on information forensics and security, 2015-01, Vol.10 (1), p.40-54</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</citedby><cites>FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6922539$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids></links><search><creatorcontrib>Khandaker, Muhammad R. A.</creatorcontrib><creatorcontrib>Wong, Kai-Kit</creatorcontrib><title>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.</description><subject>Algorithms</subject><subject>Array signal processing</subject><subject>Byproducts</subject><subject>Channels</subject><subject>Colluding eavesdroppers</subject><subject>Design engineering</subject><subject>Energy beamforming</subject><subject>Energy harvesting</subject><subject>Erbium</subject><subject>Infrared radiation</subject><subject>Interference</subject><subject>Joints</subject><subject>Masked beamforming</subject><subject>Mathematical models</subject><subject>Optimization</subject><subject>Receivers</subject><subject>Vectors</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNpdkEtLw0AUhQdRsFZ_gLgJuHGTOjfzaGapJbWFioJ1PUxmbmpq83CmFfrvTWjpwtU9i-9cDh8ht0BHAFQ9LufTj1FCgY8SJhll7IwMQAgZS5rA-SkDuyRXIawp5RxkOiDZqwnf6KJnNFXR-KqsV1FZR9svjN49BqwtRk0RZTX61T6eGf-LYdtDmemS803bog_X5KIwm4A3xzskn9NsOZnFi7eX-eRpEVsm1TZ2FAvJGEq0hlLLlSiUyHMnhEolyx01ouCQSCkciHHKHBeAHJwT1pg8t2xIHg5_W9_87LoluiqDxc3G1NjsggYpgNN0LFiH3v9D183O1926jmIUhFRSdBQcKOubEDwWuvVlZfxeA9W9WN2L1b1YfRTbde4OnRIRT7xUSSKYYn_ARnOO</recordid><startdate>201501</startdate><enddate>201501</enddate><creator>Khandaker, Muhammad R. A.</creator><creator>Wong, Kai-Kit</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope></search><sort><creationdate>201501</creationdate><title>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</title><author>Khandaker, Muhammad R. A. ; Wong, Kai-Kit</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Array signal processing</topic><topic>Byproducts</topic><topic>Channels</topic><topic>Colluding eavesdroppers</topic><topic>Design engineering</topic><topic>Energy beamforming</topic><topic>Energy harvesting</topic><topic>Erbium</topic><topic>Infrared radiation</topic><topic>Interference</topic><topic>Joints</topic><topic>Masked beamforming</topic><topic>Mathematical models</topic><topic>Optimization</topic><topic>Receivers</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khandaker, Muhammad R. A.</creatorcontrib><creatorcontrib>Wong, Kai-Kit</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khandaker, Muhammad R. A.</au><au>Wong, Kai-Kit</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2015-01</date><risdate>2015</risdate><volume>10</volume><issue>1</issue><spage>40</spage><epage>54</epage><pages>40-54</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2014.2363033</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2015-01, Vol.10 (1), p.40-54 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_1630156965 |
source | IEEE Electronic Library (IEL) |
subjects | Algorithms Array signal processing Byproducts Channels Colluding eavesdroppers Design engineering Energy beamforming Energy harvesting Erbium Infrared radiation Interference Joints Masked beamforming Mathematical models Optimization Receivers Vectors |
title | Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T12%3A42%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Masked%20Beamforming%20in%20the%20Presence%20of%20Energy-Harvesting%20Eavesdroppers&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Khandaker,%20Muhammad%20R.%20A.&rft.date=2015-01&rft.volume=10&rft.issue=1&rft.spage=40&rft.epage=54&rft.pages=40-54&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2014.2363033&rft_dat=%3Cproquest_cross%3E3516571331%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1630156965&rft_id=info:pmid/&rft_ieee_id=6922539&rfr_iscdi=true |