Journal on Communications ›› 2019, Vol. 40 ›› Issue (1): 110-118.doi: 10.11959/j.issn.1000-436x.2019016

• Papers • Previous Articles     Next Articles

Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver

Wei WANG1,Xinrui LI1,Liuguo YIN1,Guoan ZHANG1,Shibing ZHANG1   

  1. 1 School of Electronics and Information,Nantong University,Nantong 226019,China
    2 Nantong Research Institute for Advanced Communication Technologies,Nantong 226019,China
    3 School of Information Science and Technology,Tsinghua University,Beijing 100084,China
  • Revised:2018-12-24 Online:2019-01-01 Published:2019-02-03
  • Supported by:
    The National Natural Science Foundation of China(61771263);The National Natural Science Foundation of China(61871241);The Six Categories Talent Peak of Jiangsu Province(KTHY-039);The Science and Technology Program of Nantong(GY22017013)

Abstract:

Taking into account the wireless physical layer security in energy-constrained relaying systems,a secure resource allocation scheme was proposed under simultaneous wireless information and power transfer (SWIPT) protocol.The utility optimization problem was considered aiming to maximize the secrecy rate by jointly optimizing the power splitting (PS) ratio and the transmit powers under the constraint of the transmit powers of the nodes and the harvested energy of the relay.The objective problem,which is non-convex,was decoupled into two subproblems.One was to optimize the PS ratio,another was to optimize the transmit powers.The optimal solution of the subproblems can be obtained in the closed-form.Then,the suboptimal solution is obtained with the proposed convergent iterative algorithm.Simulation results show the effects of artificial noise signal,residual self-interference signal,transmit power of nodes,amplification factor of relay and other factors on the security performance.Compared with the traditional gradient descent algorithm,the proposed algorithm can reduce more than 80% of the computational load,while the algorithm has the slightly better performance.

Key words: physical layer security, full-duplex node, simultaneous wireless information and power transfer

CLC Number: 

No Suggested Reading articles found!