Abstract

In this work, we investigate the secrecy energy efficiency (SEE) optimization problem for a multiple-input single-output (MISO) cognitive radio (CR) network based on a practical nonlinear energy-harvesting (EH) model. In particular, the energy receiver (ER) is assumed to be a potential eavesdropper due to the open architecture of a CR network with simultaneous wireless information and power transfer (SWIPT), such that the confidential message is prone to be intercepted in wireless communications. The aim of this work is to provide a secure transmit beamforming design while satisfying the minimum secrecy rate target, the minimum EH requirement, and the maximum interference leakage power to primary user (PU). In addition, we consider that all the channel state information (CSI) is perfectly known at the secondary transmitter (ST). We formulate this beamforming design as a SEE maximization problem; however, the original optimization problem is not convex due to the nonlinear fractional objective function. To solve it, a novel iterative algorithm is proposed to obtain the globally optimal solution of the primal problem by using the nonlinear fractional programming and sequential programming. Finally, numerical simulation results are presented to validate the performance of the proposed scheme.

1. Introduction

As a promising approach to simultaneously improving both energy efficiency (EE) and spectrum efficiency (SE) in next generation wireless communication systems [1], the wideband energy-harvesting CR network has attracted significant attention recently. The harvested energy is environmentally friendly as it can greatly reduce carbon emissions and enable the energy-limited sensor node or low-power devices to operate continuously without periodic battery replacements [2]. Energy harvesting from radio frequency (RF) signals is more controllable and reliable than other ambient renewable resources, such as solar and wind; thus it is able to provide relatively stable power to wireless communication networks [3]. Many existing works on energy-harvesting CR network adopted a linear EH model, where it was assumed that the conversed power at the ER linearly increases with the input power [4]. However, in practice, both the harvested energy and the practical power conversion are highly nonlinear; thus, employing the linear EH model to characterize the end-to-end wireless energy transmission may lead to resource allocation mismatch.

As is known to us all, RF signals can transfer information jointly with energy via the same carrier, which facilitates SWIPT technique [58]. However, due to the inherent nature of SWIPT and the openness of wireless medium, malicious receivers within the cover range can illegitimately access the spectrum bands and analyze the transmission without being detected, which makes the confidential messages transmitted in SWIPT systems vulnerable to eavesdropping [9]. Consequently, how to achieve secure communication while guaranteeing efficient EH is of significant importance for CR network. To handle this challenge, an emerging technique termed as PHY layer security has attracted considerable interest in recent years [1014]. By exploiting the physical properties of wireless channels, PHY layer security has great potential to achieve “perfect secrecy” and is identified as a significant complement to traditional cryptographic techniques. To the best of the authors’ knowledge, the SEE maximization problem in CR network with SWIPT based on a nonlinear EH model is still in its infancy. Motivated by the aforementioned aspects, we formulate the transmit covariance matrix design problem to maximize the SEE under the constraints of PU’s quality-of-service (QoS) requirement, EH requirement, and total transmit power limit for CR network. In addition, the ER is considered to be a potential eavesdropper and the transmission is susceptible to be intercepted. The original SEE maximization problem is nonconvex and thus difficult to solve directly. To circumvent this issue, the variable substitutions and semidefinite relaxation (SDR) are used, and we reformulate the optimization problem into a tractable form by exploiting an iterative algorithm which combines nonlinear fractional programming [15, 16] and difference-of-concave functions (DC) approaches [17].

The remainder of this paper is organized as follows. In Section 2, the system model is presented. Section 3 presents the SEE maximization problem under the assumption of perfect channel state information (CSI) available at the transmitter, and a novel iterative algorithm is proposed to solve the optimization problem. Section 4 provides simulation results to validate the performance of the proposed algorithms and finally conclusions are addressed in Section 5.

Notations. Vectors and matrices are denoted by lower and upper case boldface letters, respectively. represents the set of Hermitian matrices with size, and represents an identity matrix with appropriate size. Rank() denotes the rank of matrix , and indicates the trace of matrix . and stand for the inverse and Hermitian transpose operations, respectively. means that the matrix is a Hermitian positive semidefinite (definite) matrix. The distribution of a circularly symmetric complex Gaussian (CSCG) random variable with mean and variance is denoted by , and finally the symbol denotes the expectation.

2. System Model and Problem Statement

2.1. System Model

As depicted in Figure 1, a downlink MISO energy-harvesting CR network with SWIPT is considered. The ST is equipped with antennas while the primary receiver (PR), SR, and ER have all a single antenna. Since the RF signals transmitted by ST and SR carry confidential information, a potential issue might arise as the ER is a passive eavesdropper in this CR network. In this paper, we focus on the worst-case scenario whereby ER can only harvest energy when it does not attempt to decode the confidential message. The channel coefficients between the ST and PR, SR, and ER are denoted by , , and , respectively. Then, the signals received at SR and ER can be written aswhere is the corresponding precoding beamforming vector and represents the confidential information-bearing symbol intended for SR. Without loss of generality, we assume that . and denote the additive white Gaussian noise (AWGN) at SR and ER, respectively.

According to the notion of information-theoretic security, the achievable secrecy rate of SR can be expressed aswhere and are given bywhere is the transmit covariance matrix. , and denotes the maximum transmit power at the transmitter.

Following the similar power consumption model utilized in [14], the total power consumption at ST can be written aswhere is the power amplifier efficiency and is the average energy consumption of the transmitter circuits. is assumed to be one without loss of generality in this paper; that is, . The SEE is defined as the ratio between the achievable secrecy rate and the total power consumption, which can be expressed as

2.2. Energy-Harvesting Model

In the existing literature on the SWIPT, the power converted by the energy-harvesting receiver is typically modeled as an overly simplistic linear EH model, which can be defined aswhere is a fixed constant that indicates the power conversion efficiency, is the power conversed at the ER, and is the received RF power at the ER.

In the linear EH model, the conversion efficiency is independent of the received RF signals. However, in practice, the power conversion efficiency is greatly relative to the input power level and the EH circuits generally result in a nonlinear end-to-end wireless power transfer. According to the practical nonlinear EH model given by [18], the harvested energy at the ER is typically modeled aswhere , , and is a constant, denoting the maximum harvested energy of ER when the actual EH circuit reaches saturation. and are constants that indicate the joint effects of various nonlinear phenomena caused by hardware limitation. In practice, one can readily determine parameters , , and by the standard curve fitting method.

3. Problem Formulation

In this section, our objective is to maximize the SEE of energy-harvesting CR network with SWIPT while satisfying the PR’s QoS requirement and EH constraint. Thus, the SEE maximization problem can be mathematically formulated as follows:

In (8a)–(8f), the constraint C1 is given to guarantee the security of ST in the secondary network. C2 guarantees that energy harvested by the ER is no less than when it does not attempt to eavesdrop the confidential information. The interference power constraint C3 is imposed in order to protect the QoS of PU and C4 denotes the transmit power constraint of the ST.

Due to the fractional objective function as well as the harvested energy constraint C2, the problem in (8a)–(8f) is not convex and very difficult to solve. In what follows, we first handle the nonconvex constraint and then propose an iterative method to find the optimal solution to the above complex problem. The nonlinear EH function (7) for ER can be reformulate as

By defining , , , according to the fact that , where and are vectors, the constraint C2 can be transformed into

Then, problem (8a)–(8f) can be reformulated to be problem (11a)–(11g) equivalently:

As a result, we handle it with SDR by dropping the rank-one matrix C6. Specifically, we relax constraint C6 in (11a)–(11g) by removing constraint from the problem. Nevertheless, problem (11a)–(11g) is still a nonconvex problem due to the fractional objective function. Thereby, it cannot be solved directly by using traditional method [19]. To tackle this difficulty, we convert this problem into a convex one through nonlinear fractional and sequential convex programming in the following subsections.

3.1. Nonlinear Fractional Programming

The optimization problem in (11a)–(11g) is known as a fractional programming problem with nonlinear as well as linear terms in the numerator and denominator. To solve it, the original problem is transformed into a parameter problem with respect to , given as

Proposition 1. Denote that is the unique zero solution to ; then has the same optimal solution as the objective function in (11a)–(11g), and the maximum SEE can be derived when the following condition is satisfied:where and represent the optimal secrecy rate and power consumption, respectively.

Proof. Please refer to [15].

From this proposition, the optimal of problem (12a)–(12f) can be obtained by seeking the unique zero solution of . Hence, our strategy is to optimize (12a)–(12f) with a given and iteratively seek based on Dinkelbach’s method.

3.2. Sequential Programming

As is known to us all, DC programming is an optimization method to solve nonconvex problems. Particularly, this technique can be applied to an optimization problem when the objective function is in a difference-of-concave form. Since the context of problem (12a)–(12f) falls into this category, DC programming can be utilized to solve this issue. Sequential programming can tackle the DC problems but is not limited to DC programming and indeed it has been used in conjunction with fractional optimization in previous works [11, 12]. The basic idea of our sequential method is to locally linearize the nonconcave functions in (12a)–(12f) at some feasible point and then iteratively solve the linearized problem; that is,where we define the function to approximate the second term of the objective function in (12a)–(12f).

Thus, the original fractional problem to be solved in each iteration of the sequential programming takes the form shown in (14) [11]. It is easy to prove that the approximated problem in (14) is convex with respect to , and the optimal can be iteratively obtained by solving problem (14) based on updating . According to the above analysis, an algorithm characterized by fractional programming and sequential convex optimization is developed, which solves the SEE maximization problem by two-layer embedded iterations. The process of proposed iterative algorithm is stated as follows:(1)Input settings: the error tolerances , ;(2)Initialization , choose an initial value such that ;(3)Repeat(4)For the given , search the optimal and of (12a)–(12f);(5)Initial , and ;(6)Repeat(7)Solve the problem (14) with via interior-point method and obtain ;(8)Compute ;(9);(10)Update ;(11);(12)Return and for updating ;(13)Update to obtain ;(14);(15)Until satisfied;(16)Return , , .

It is worth noting that only when , the optimal solution, that is, is recovered by the eigenvalue decomposition of . Otherwise, the approximate optimal solution is obtained by using the largest eigenvalue of [20]. Provided that problem (11a)–(11g) is feasible, we will find that the optimal will be always rank-one. In other words, the SDR is tight and the global optimal solution to the primal problem can be guaranteed; besides, the corresponding SEE can be attained via single-stream transmit beamforming.

4. Numerical Results

In this section, we provide numerical simulation results to testify the availability of our proposed scheme. In our examples, the ST is equipped with three antennas, while the PR, SR, and ER each use a single antenna. The maximum interference leakage to the PU is assumed to be 0 dB, and the energy conversion ratio is assumed to be 0.5. Besides, all the channel coefficients are generated by CSCG with zero mean and unit variance. Regarding the nonlinear EH model parameters, we adopt  mW, , and . In addition, the convergence tolerances and are set to be .

Figure 2 evaluates the convergence behavior of the proposed algorithm. Here, the maximum transmit power and the energy-harvesting requirement are assumed to be 20 dB and 0 dB, respectively. Figure 2(a) illustrates the convergence of achieved SEE for the target secrecy rate bps/Hz. Moreover, the convergence of parameters and , which describe the termination of the iterative processes, is depicted in Figures 2(b) and 2(c), respectively. From the simulation results, we can see that the maximum SEE and the convergence can be achieved with a limited number of iterations.

Figure 3 depicts the achieved SEE versus the target secrecy rate for different transmit power consumption and EH requirements. As can be observed, the optimal SEE decreases as the target secrecy rate increases. Note that the zero SEE means that the optimization problem is not feasible. If the problem is feasible with a given target secrecy rate constraint, we notice that the SEE can achieve a better performance with a larger transmit power consumption and smaller EH requirement. In addition, increasing the total transmit power is able to achieve a higher target secrecy rate.

Figure 4 shows the average SEE of the proposed scheme versus the maximum transmit power . The target secrecy rate and the energy-harvesting requirement are assumed to be 0.5 bps/Hz and 0 dB, respectively. Here, the results of the secrecy rate maximization (SRM) [21] and the energy efficiency maximization (EEM) [22] scheme are also provided for comparison, and it is observed that the proposed SEE maximization scheme achieves a similar performance to that of the SRM scheme when  dBm, since both schemes use all of the transmit power to obtain the maximum SEE. However, the performance of SRM scheme is degraded drastically as increases, while the SEE maximization scheme remains the same. This can be explained as follows. The performance gain of our proposed scheme is kept because it ceases allocating more transmit power to avoid sacrificing the SEE; besides, exceedingly large transmit power can cause saturation in EH circuits. However, the SRM scheme still increases transmit power to obtain higher secrecy rate. Meanwhile, both of the proposed schemes significantly outperform the EEM scheme which focuses only on the EE and ignores the existence of the potential eavesdropper.

5. Conclusions

In this paper, we study the secure beamforming design for SWIPT based on a nonlinear EH model considering a potential eavesdropper. In particular, the transmit covariance matrix is designed to maximize the SEE while meeting the EH requirement and interference power constraint. Since the SEE maximization problem is not convex and thus difficult to solve directly, we convert the original problem into a convex one by exploiting nonlinear fractional and sequential programming. Simulation results are provided to validate the performance of our proposed scheme.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work is supported in part by the Natural Science Foundation of China under Grant 61571460 and Grant 60972042 and in part by the National Postdoctoral Program for Innovative Talents under Grant BX201700108.