Abstract

In this paper, secure transmission in a simultaneous wireless information and power transfer technology-enabled heterogeneous network with the aid of multiple IRSs is investigated. As a potential technology for 6G, intelligent reflecting surface (IRS) brings more spatial degrees of freedom to enhance physical layer security. Our goal is to maximize the secrecy rate by carefully designing the transmit beamforming vector, artificial noise vector, and reflecting coefficients under the constraint of quality-of-service. The formulated problem is hard to solve due to the nonconcave objective function as well as the coupling variables and unit-modulus constraints. Fortunately, by using alternating optimization, successive convex approximation, and sequential Rank-1 constraint relaxation approach, the original problem is transformed into convex form and a suboptimal solution is achieved. Numerical results show that the proposed scheme outperforms other existing benchmark schemes without IRS and can maintain promising security performance as the number of terminals increases with lower energy consumption.

1. Introduction

Recently, with the vigorous development of the mobile Internet of Things (IoT), higher data rate and seamless network coverage will be required in the next generation network. The heterogeneous network (HetNet) with simultaneous wireless information and power transfer technology (SWIPT) provides a promising green solution for the connection requirements and power supply of massive energy-limited IoT nodes [1, 2].

However, SWIPT-enabled HetNet poses unprecedented security challenges to traditional security strategies. On the one hand, dynamic network topology makes it difficult for access control and key distribution management. On the other hand, energy receiver (ER) is closer to base stations (BSs) than information receiver (IR) and the behavior of energy harvesting and information decoding is uncontrollable by BS, which has the potential to become an eavesdropper [3]. In recent years, physical layer security (PLS) has emerged as a lightweight secure technique by utilizing the inherent characteristics of wireless environment [4]. Compared to conventional single-tier networks, the complicated multilayer network architectures with the co-frequency mutual interference and the unsubscribed ER make it more challenging to implement PLS. In [5], artificial noise (AN) scheme is exploited to degrade eavesdropping capability in a SWIPT-enabled two-tier HetNet and a near optimal solution based on successive convex approximation (SCA) for secrecy rate maximization is proposed. In [6], a more complex multitier HetNet where exist one macro base station (MBS) and multiple femto base stations (FBS) in co-channel deployment with the goal of sum logarithmic secrecy rate maximization is considered. Then, centralized and distributed secure beamforming schemes are discussed, respectively. Furthermore, in [7], the authors explore the robust secrecy energy efficiency maximization designs under deterministic channel state information (CSI) error, and a suboptimal algorithm based on alternative direction multiplier method is proposed. However, existing works have some drawbacks. In order to make the legitimate signal sent by BS lie into the null space of malicious ERs’ channels, additional transmitting antennas are needed, which in turn increases the complexity of the equipment. In order to degrade the ERs’ channels, the AN technique is adopted, which in turn consumes extra energy. This motivates us to consider a novel scheme to increase the spatial dimension with lower energy consumption.

Meanwhile, intelligent reflecting surface (IRS), which is a planar array consisting of a large number of low-cost composite material elements, has been regarded as a revolutionary technique to improve energy efficiency for 6G wireless networks [8]. Each element at the IRS can adjust the reflecting coefficients independently, and the combined signal composed of the direct-link and reflect-link signal at intended receivers can be enhanced or weakened. Moreover, due to passive characteristics, less power is consumed than traditional transceivers or relays [9]. Thus, as a new promising solution, IRS has been studied in different scenarios such as physical layer security [10, 11], coverage extension [12], energy efficiency enhancement [13], and so on. In [14], IRS-assisted secure communication in multiple-input multiple-output system with two different phase shifting capabilities is investigated. In [15], the authors focus on exploiting multiple IRSs in a SWIPT system for improving the wireless power transfer efficiency. In [16], the secure issue assisted with IRS is discussed in a SWIPT-enabled multiple-input single-output system, while this model does not consider ER as a potential eavesdropper.

To the best of our knowledge, by far there is no prior work that studies IRS enhanced secure communication problem for SWIPT-enabled HetNets. Massive passive elements at the IRS can provide more degrees of freedom (DoF) to strike a balance between secure energy efficiency and system complexity. Moreover, under the constraint of quality-of-service (QoS), complex cross-layer interference and more designing parameters pose challenges for resource allocation. Thus, how to jointly optimize the secure transmit precoders and the phase shifts is a meaningful but still an open problem.

Motivated by the aforementioned observations, in this paper, we study an IRS-assisted SWIPT HetNet system aimed at maximizing the secrecy rate of the IR, while guaranteeing QoS requirements of microusers (MUs) and ERs. An efficient solution based on alternating optimization and SCA technique is proposed. Our main contributions are summarized as follows:(1)It is the first time to exploit IRSs to enhance security performance of SWIPT-enabled HetNet system, in which the IRSs are deployed nearby the MBS and FBS, respectively. FBS shares downlink spectrum resource with MBS. In this model, secure beamforming and AN techniques are utilized to ensure secure communication and charging. Meanwhile, the IRSs provide extra DoF to properly exploit mutual channel interference. Then, a resource allocation problem aimed at secrecy rate maximization is established by jointly designing the transmit precoder, artificial noise vector, and reflecting coefficients.(2)A suboptimal iterative algorithm is proposed. The problem is highly nonconvex because of the strong coupling of the design variables. To tackle it, we first decompose the problem into two subproblems by applying an alternating optimization algorithm. Then, each subproblem is transformed into convex form step by step with SCA and semidefinite relaxation (SDR) techniques. Moreover, to ensure the convergence of the algorithm, for the first subproblem, the rank of the optimal solution is proved to be 1, and for the second subproblem, sequential Rank-1 constraint relaxation (SROCR) approach is utilized to approximate Rank-1 solution. Finally, the computational complexity is analyzed.(3)The simulation results show that by carefully designing the reflecting coefficients of IRSs, the secrecy performance can be significantly enhanced compared to conventional schemes without IRS. Moreover, when the number of low-cost reflecting units increases, the proposed transmission strategy can provide higher secrecy rate with low energy consumption, which further verifies that our scheme is quite suitable for future massive IoT node scenario.

The remainder of this paper is organized as follows. Section 2 introduces the system model and formulates the secrecy rate maximization problem under QoS constraints. Section 3 focuses on the secure beamforming design. Section 4 and Section 5 provide simulation results and conclusions, respectively.

2. Signal Model and Problem Formulation

2.1. Signal Model

An IRS-assisted SWIPT HetNet system is considered, where exist a macrocell and a femtocell, as depicted in Figure 1. The macrocell shares the same spectrum resources as the femtocell. The MBS equipped with antennas serves single-antenna MUs. The FBS equipped with antennas serves single-antenna FUs, one IR, and ERs. Based on the mechanism of [17], separate ER and IR are adopted. IRS-1 and IRS-2 are deployed on walls or buildings near MBS and FBS (as illustrated in [18], the large-scale loss of the reflection path and the product of the distances of the BS-IRS and IRS-user channels are in the direct ratio; when the IRS is deployed far away from users or BSs, the incremental performance is relatively small; considering the location uncertainty of the users in HetNet, deploying the IRS near the BSs is a relatively optimal choice), respectively, and are controlled by the BS via separate wireless link. Since FBS cannot strictly control the behavior of ERs, the malicious ER may change its mode to decode confidential information intended for the legitimate IRs. Further, we assume that the ERs can only wiretap the IR in the same femtocell, due to long-distance loss. Since the MU has a stronger ability against eavesdropping than the IR and its main consideration is high transmission rate, eavesdroppers are not considered in the macrocell. For notational simplicity, the th ER in the femtocell and the th MU in the macrocell are denoted by and , respectively. The set of ERs is represented as , and the set of MUs is represented as .

In this paper, a quasi static Rician fading environment is considered. The channel vectors from MBS to IRS-1, , IR, and are denoted by , , , and , respectively. Similarly, the channel vectors from FBS to IRS-2, IR, and are denoted by , , and , respectively; the interference channel vector from FBS to is denoted by ; the reflecting channel vectors from IRS-1 to , IR, and are represented as , , and , respectively; the channel vectors from IRS-2 to , IR, and are represented as , , and , respectively. Then, the phase shift matrix at the IRS is represented as , , where is the phase shift on the incident signal at its th reflecting element. Notice that passive eavesdropper’s CSI is hard to obtain, while the ER, as a user in the SWIPT network, needs to feed back information to the FBS [17]; it is reasonable that ERs’ CSI can be acquired by the FBS. And in this paper, centralized manner is adopted for HetNet. Global CSI of all channel vectors is supposed to be known by MBS and FBS, where local CSI can be shared via wired link between MBS and FBS. From Figure 1, the signal obtained at each user is composed of reflected signal and direct signal which is different from the model without IRS and thus needs to be reanalyzed.

The transmitted signal from MBS is given bywhere intended for is the information signal transmitted by MBS and is the associated beamforming vector.

Considering the presence of malicious ERs in the femtocell, a secure beamforming scheme with the aid of AN is exploited. Thus, the signal sent by FBS is expressed aswhere and represent the independent information signal and AN signal and and represent the corresponding beamforming and AN vectors, respectively.

The signal received at contains not only the target signal sent by MBS but also the co-channel interference from FBS and the reflecting signal from IRS-1 or IRS-2, and thus the signal can be given aswhere is the additive white Gaussian noise (AWGN) with variance at .

Let , where , . By changing variables as , , where , , we can obtain the signal-to-interference-plus noise ratio (SINR) at aswhere , , , and is a slack variable and is set as an arbitrary phase rotation.

Similarly, considering the co-channel interference, the signal received at IR can be given bywhere denotes the AWGN at IR. Like , the corresponding SINR at IR can be derived aswhere , , , and .

Due to the openness of wireless environment, ERs can receive the information-bearing signal intended for IR. And malicious ER may change its mode to extract the secure information transformed to the IR rather than just receiving the energy. Thus, like IR, the SINR at malicious can be given bywhere , , , and .

Then, the total power usage of the whole system can be expressed as

For , when working on energy harvesting mode and considering the linear energy harvesting model [19], the harvested energy is expressed aswhere represents the efficiency of energy conversion.

Due to the limited hardware capabilities, it is difficult to adopt a collaborative eavesdropping strategy for ERs, although they are arbitrarily distributed nearby FBS. Therefore, considering the noncolluding eavesdropping [20], the achievable instantaneous secrecy rate is written aswhere means the max of and 0.

2.2. Problem Formulation

From formulas (4)–(9), we can see that co-channel interference and AN vector may degrade the data rate of legitimate users, while it is a beneficial factor to harvest energy and weaken eavesdropping channel. Thus, it is very appealing to carefully design transmit precoder and phase shifts to cripple the eavesdropping capabilities at ERs and have a minimal effect at and IR. Based on the above analysis, our goal is to design the vector , , , , to maximize the secrecy rate at IR, while subjecting to the energy requirements for each ER, SINR requirement for each MU, and the total power usage. Accordingly, we can formulate the above problem aswhere denotes the required SINR at , represents the maximum power constraint, and is the energy requirement at , respectively. In addition, constraint (11c), which discusses the total transmit power constraint, can be easily extended to the separate power threshold at MBS and FBS. It is worth noting that due to the nonconcave objective function as well as the coupling variables and unit-modulus constraints, problems (11a)–(11e) are nonconvex, which are hard to solve optimally. In the following sections, we aim at developing an efficient algorithm to find a near optimal solution.

3. Secure Beamforming Design

In this section, firstly, alternating optimization is exploited to decompose the joint optimization problem into two subproblems. Then, for each subproblem, by using SDR and SCA-based iterative, nonconvex objective functions and constraints are approximated to convex form, which can be efficiently solved.

3.1. Optimizing for Given

For given , we denote , , , and , where , , and can be viewed as the equivalent channels from MBS/FBS to users, respectively. Define new matrices as , , and . Then, it follows that , , , and . Due to Rank-1 constraints, the problem is intractable and the SDR technique is utilized to drop these constraints [21]. Then, exploiting the properties of matrix traces and introducing several new real-valued auxiliary variables , , , and , we rewrite problems (11a)–(11e) equivalently as

Note that problems (11a)–(11e) and problems (12a)–(12h) are equivalent due to the fact that formulas (12a)–(12d) hold with equality at the optimal solution. Then, it can be observed that since constraints (12c), (12d), and (12e) are nonconvex, problems (12a)–(12h) remain nonconvex. To deal with this predicament, an iterative algorithm is utilized to approximate the original problem.

Transformation of Constraints (12d) and (12e) For the fractional and logarithmic forms in formulas (12d) and (12e), by introducing auxiliary variables and and using the properties of exponential operations, it can be derived into

Clearly, (13b) and (13c) are convex constraints while (13a) remains nonconvex following from the fact that both sides of the constraints are convex. To tackle it, first-order Taylor expansion is employed to approximate the exponential function of the right-hand side (13a) in an iterative manner. At the th iteration, is denoted as the value solved at the current iteration and is denoted as a feasible point. Then, as , the lower bound of the exponential function can be given by [22]

With (14), (13a) can be expressed as the following linear inequality in an iterative manner:

Furthermore, note that although some nonlinear solvers (e.g., Fmincon) can be utilized to solve the exponential inequality in (13b), the required computation time is high in general. Fortunately, based on the result in [23], by introducing slack variables , , a series of conic constraints can be used to approximate formula (13b):where , and the factor decides the accuracy of the approximation.

Transformation of Constraint (12c) For the fractional and logarithmic forms in formula (12c), we introduce auxiliary variables , , and after several exponential operations, we have

Clearly, (17b) and (17c) are convex constraints while (17a) remains nonconvex. Next, we focus on nonconvex constraint (17a). Similar to (13a), for the th SCA iteration, is denoted as the value solved at the current iteration and is denoted as a feasible point; then, we can transform (17a) into convex form:

For (17b), to reduce the computational complexity, like (13b), a series of conic constraints can be utilized to approximate the exponential cone. The details are omitted, due to space limitation.

Finally, the approximated form of problems (12a)–(12h) is given by problem (19). And we can easily observe that problem (19) is a convex semidefinite programming problem, which can be directly solved via the CVX solver. The detailed procedure is listed in Algorithm 1.

Initialization: set and initialize feasible solutions to problem (19).
(1) Repeat: n;  = n + 1;
(2) Solve the convex problem (19) with and the optimal values are denoted by ;
(3) Updata
(4) Until: convergence

Notice that since the Rank-1 constraints are relaxed in (12a)–(12h), there is no guarantee that the rank of the obtained , , and is one and the vectors , , and may not be directly obtained. If the obtained solution is not Rank-1, Gaussian randomization is used for recovering vector approximately [24]. Fortunately, for problems (12a)–(12h), we can obtain Proposition 1 and then directly recover based on the eigenvalue decomposition. Moreover, simulations show that the obtained is always Rank-1, which indicates that the rank relaxation is tight.

Proposition 1. The solution , solved in problems (12a)–(12h) must be Rank-1.

Proof. See Appendix A.

3.2. Optimizing for Given

For given , we denote , , , , , and , where , , , , and . Define new matrices as , . Then, it follows that , , and . Besides, the diagonal elements of the matrix or are all 1 due to constraint (11e). Similar to (12a)–(12h), exploiting the properties of matrix traces and introducing several new real-valued auxiliary variables , , and , we rewrite problems (11a)–(11e) equivalently as

Problems (20a)–(20j) are nonconvex with the nonconvex constraints (20c)–(20e) and Rank-1 constraints (20h)–(20i). Similar to (12a)–(12h), formulas (20c), (20d), and (20e) are reformulated to convex constraints by employing Taylor series expansion. Firstly, we introduce auxiliary variables , , denote , as the value solved at the th iteration, and denote , as a feasible point at the th iteration. Then, (20c), (20d), and (20e) can be approximated in an iterative manner:

For the constraint of Rank-1 like (20j), the classic approach is firstly dropping (20j) and solving problem (20a)–(20j). Then, the Gaussian randomization method is employed to find a Rank-1 solution when the optimal solution does not satisfy Rank-1. However, the solution deriving from Gaussian randomization may not satisfy all the constraints, which is not a feasible solution. Fortunately, invoked by [25], SROCR approach is suited for problems (20a)–(20j) to approximate a Rank-1 solution. First, constraint (20g) is replaced with the relaxed constraint which makes the largest eigenvalue to trace ratio of with the factor . Then, problems (20a)–(20j) are formulated aswhere is the corresponding eigenvector and is the obtained solution at the th iteration. It is easily seen that problems (22a)–(22c) are a convex problem, which can be solved by CVX solver. By adjusting the factor from 0 to 1 after each iteration, we can obtain a locally optimal Rank-1 solution. The detail is similar to [26], which is omitted for conciseness. In fact, simulations show that the optimal matrices and are always Rank-1 only with the SDR method.

After extracting from , due to introducing slack variable in (4), the phase shifts at the IRS can be given by

3.3. Overall Algorithm

To summarize, the overall algorithm to solve problem (11a)–(11e) is described in Algorithm 2, where denotes the maximum number of iterations.

Initialization: set and randomly construct reflection coefficients vector as , ;
(1) Repeat
(2) Solve (12a)–(12h) for given , according to Algorithm 1 and obtain the optimal , , ;
(3) Solve (20a)–(20j) for given , , and obtain the optimal , ;
(4) Updata ;
(5) Until the decreasing rate of the objective value is below the error or the iteration number meets .
3.3.1. Convergence Analysis

For the lth alternating iteration, denote as the objective function value, where is the feasible solution. Then, for the (l + 1)th iteration, is the feasible solution of problems (12a)–(12h), and is the feasible solution of problem (20a)–(20j). Then, we havewhere inequality (a) holds due to the fact that SCA-based algorithm in Step 2 converges and problems (12a)–(12h) are solved optimally. Then, similarly, inequality (b) holds. This indicates that the object value given in the ( + 1)th iteration is not smaller than that in the th iteration. That is to say, after each iteration, the object value is nondecreasing. Furthermore, along with the QoS constraint, the secrecy performance is upper bounded, which means that it must guarantee to converge after some iterations.

3.3.2. Complexity

The main complexity of Algorithm 2 lies on Steps 2 and 3. For Step 2, the complexity for solving (19) using the interior-point method, which is denoted as , depends on two parts, the number of variables and the number of constraints, and is summarized in Table 1. Then, denote as the SCA iteration numbers, and we can have the complexity of Step 2 as . Similarly, the complexity of Step 3 is , where denotes the complexity for solving (22), denotes the SCA iteration numbers, and denotes the SROCR iteration numbers. Furthermore, the major complexity of Algorithm 2 is given by , where denotes the alternating iteration numbers.

Remark 1. We can easily extend our framework to the scenario consisting of multiple cells and IRSs, where cross-tier interference among multiple cells should be more carefully exploited to enhance secrecy performance and guarantee the QoS requirements of different users. With our proposed algorithm, this challenging problem can be solved similarly.

4. Numerical Results

In this section, we present numerical results to validate the performance of the proposed scheme. Simulation setups are depicted in Figure 2, where MBS, FBS, IRS-1, IRS-2, and IR are located at (0, 0), (50, 50), (5, 0), (50, 52), and (75, 75) in meter (m), respectively. The MBS serves 2 MUs which are located at (0, 40) and (40, 0) in meter (m), respectively, and ERs are randomly deployed on a circle with a radius of 3 m centered on the FBS.

The channel between node to node is modeled as , where is the large-scale path loss at the reference distance , represents the distance from to , and represents the path loss exponent. Besides, is the small-scale fading component and is given bywhere denotes the Rician factor, is the non-line-of-sight (NLoS) component, and is the LoS component. We assume that for cross-layer channels, only NLoS component exists and the corresponding is set to 0; for the reflecting channel in the same cell, since IRSs are deployed vertically higher than users, where exists less scatter [15], Rician factor and path loss exponent are set as , ; for the other channels, we set , , respectively. The rest of the parameters are listed as follows: , , , , , , , , , , and . The following results are achieved by the average of simulating over 100 random channel realizations.

With the purpose of analyzing the advantage of our scheme, three benchmark schemes are also described as follows.

Scheme 1. With IRS but without AN (IRS, no AN). In this case, FBS does not transmit AN vector by setting and solving problems (11a)–(11e).

Scheme 2. With IRS and random phase shifts (IRS random phase, AN). In this case, the phase shift of each element at the IRS is randomly chosen in . Then, we only design the transmit beamforming at the MBS or FBS by solving problems (12a)–(12h).

Scheme 3. Without IRS but with AN (No IRS, AN). In this case, the MBS or FBS serves terminals without IRSs [5], by setting and solving problems (12a)–(12h).
The secrecy rate at IR versus the system transmit power is shown in Figure 3. We can observe that with the increase of the transmit power, the secrecy rates of all the schemes improve, in other words, increasing the transmission power in exchange for security. Under the same power usage constraint, the proposed scheme significantly outperforms the other three benchmark schemes. It indicates that by providing more spatial DoFs, passive IRS can enhance security with less energy consumption. Moreover, as the transmission power is relatively small, the performance of the scheme without IRS but with AN outperforms the scheme with IRS but without AN, and as the transmission power increases to a level, the performance gap is gradually narrowing. The reason is that due to very short access distance of ER, the constraint of energy harvesting and the objective of degrading wiretapping channel are hard to meet simultaneously, and without the constraint of modulus 1, the AN technique can provide more adjustment degree than IRS. Thus, it further illustrates that the AN technique is still needed in the power-limited system and reasonable parameters are very necessary for SWIPT-enabled HetNets.
Figure 4 shows the secrecy rate gains versus the number of ERs. We can observe that with the increase of the number of ERs, the secrecy rates of four schemes are all decreasing. As we know, when the number of ERs exceeds that of the BS’s antennas, it is hard to suppress the signal in the ERs’ direction to guarantee non-negative secrecy, while for Scheme 2, only with passive IRS, the system can maintain a positive secrecy rate. Moreover, the scheme with passive IRS and AN significantly outperforms the other three benchmark schemes, which indicates that IRS can provide an effective choice for secure massive IoT scenarios.
We further examine the secrecy rate at IR versus different in Figure 5. It is observed that the performance of the schemes with IRS is increasing as the number of reflecting elements increases. The reason is that IRS with larger elements can provide more DoFs to degrade the reception at the ERs and satisfy QoS constraints. In fact, the number of reflecting elements can reach 100 or more at a low cost [9], which could bring more performance gain. From Figures 35, we can also see that the performance of Scheme 2 is slightly better than that of Scheme 3. It means that IRS, without well designed reflection coefficients, may not enhance the performance, although the number of channel paths actually increases. And the performance gap becomes more obvious with increasing number of reflecting elements.

5. Conclusion

In this paper, we have presented an investigation of IRS-assisted secure SWIPT HetNet system. The secrecy rate maximization problem under the constraint of QoS is established by jointly designing transmit beamforming vectors, AN vectors, and phase shifts. Specifically, we invoke an alternating optimization and SCA techniques to transform the nonconvex original problem into convex and obtain a suboptimal solution. Numerical results show that the proposed scheme could effectively exploit co-channel interference as a favorable factor, and it could maintain promising security performance when the number of terminals increases. Furthermore, considering the passive nature of the IRS, the instantaneous CSI of the reflecting link is difficult to obtain. Therefore, it is worthwhile to investigate the resource allocation scheme under outdated CSI in the future.

Appendix

A. Proof of Proposition 1

The original problem (12a)–(12h) can be equivalently written aswhere , , and are the introduced slack variables. Utilizing the Lagrange multiplier, the above problem can be transformed aswhere , , , , and represent the Lagrange multipliers of problem (A.1) corresponding to the constraints in (A.1a)–(A.1e), respectively. By further simplifying, we can get

According to the definition of the secrecy rate and formula (11a), we can easily have and , and , and based on the properties of positive semidefinite matrix, we can get . Then, we can derive the following solution: . Further, according to Karush–Kuhn–Tucker condition, we get .

Therefore, we can get . When , the transmission rate of IR is zero, which is unfeasible in this case. Therefore, the optimal beamforming must be Rank-1. Likewise, the rank of can be proved to be one, which is omitted here.

Data Availability

All figures were drawn by the tools of Visio and Matlab. The data used to support this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This study was supported in part by the National Natural Science Foundation of China under grant nos. 61871404, 61801435, and 61941114 and in part by the China Postdoctoral Science Foundation under grant no. 2018M633733.