Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers

This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 10; no. 1; pp. 40 - 54
Main Authors Khandaker, Muhammad R. A., Wong, Kai-Kit
Format Journal Article
LanguageEnglish
Published New York IEEE 01.01.2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2014.2363033

Cover

Abstract This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.
AbstractList This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms.
Author Wong, Kai-Kit
Khandaker, Muhammad R. A.
Author_xml – sequence: 1
  givenname: Muhammad R. A.
  surname: Khandaker
  fullname: Khandaker, Muhammad R. A.
  email: m.khandaker@ucl.ac.uk
  organization: Department of Electronic and Electrical Engineering, University College London, London, U.K
– sequence: 2
  givenname: Kai-Kit
  surname: Wong
  fullname: Wong, Kai-Kit
  email: kai-kit.wong@ucl.ac.uk
  organization: Department of Electronic and Electrical Engineering, University College London, London, U.K
BookMark eNp9kMFOAjEQhhuDiYA-gPGyiRcvi53tttCjkkVIMJqI5023ncVFaLFdTHh7dwPhwMHT_Ifvm5n8PdKxziIht0AHAFQ-LmaTj0FCIR0kTDDK2AXpAuciFjSBzikDuyK9EFaUpimIUZdkryp8o4meUW1K5zeVXUaVjeovjN49BrQaI1dGmUW_3MdT5X8x1C2UqSYZ77Zb9OGaXJZqHfDmOPvkc5ItxtN4_vYyGz_NY82ErGNDsRSMoUCtKNWp5KXkRWE4lyPBCkMVL1NIhOAG-HDETMoBUzCGa6WKQrM-eTjs3Xr3s2s-yTdV0LheK4tuF3IQHFI6GnLWoPdn6MrtvG2-ayhGgQspeEPBgdLeheCxzLe-2ii_z4HmbbF5W2zeFpsfi22c4Zmjq1rVlbO1V9X6X_PuYFaIeLokZJJwJtkfWNWG_Q
CODEN ITIFA6
CitedBy_id crossref_primary_10_1109_TIFS_2015_2477050
crossref_primary_10_3390_e22111261
crossref_primary_10_1109_TIFS_2017_2774441
crossref_primary_10_1109_TIFS_2017_2721908
crossref_primary_10_1109_TWC_2016_2605102
crossref_primary_10_1016_j_phycom_2022_101791
crossref_primary_10_1109_ACCESS_2020_2986025
crossref_primary_10_1109_TVT_2020_2994446
crossref_primary_10_1109_TVT_2016_2578313
crossref_primary_10_1109_COMST_2020_3017665
crossref_primary_10_1177_1550147717711591
crossref_primary_10_1109_JSYST_2019_2920751
crossref_primary_10_1109_ACCESS_2022_3163580
crossref_primary_10_1109_TIFS_2016_2627219
crossref_primary_10_1109_COMST_2015_2499783
crossref_primary_10_1016_j_comcom_2021_07_017
crossref_primary_10_1109_TGCN_2019_2900343
crossref_primary_10_1109_ACCESS_2018_2804924
crossref_primary_10_1109_TVT_2016_2520565
crossref_primary_10_1007_s12083_016_0509_5
crossref_primary_10_1109_TCOMM_2018_2874658
crossref_primary_10_1109_TIFS_2017_2746063
crossref_primary_10_1109_TIFS_2016_2611478
crossref_primary_10_1109_JSAC_2018_2872370
crossref_primary_10_1109_TIFS_2018_2815541
crossref_primary_10_1109_TWC_2017_2675402
crossref_primary_10_1109_TWC_2018_2822286
crossref_primary_10_1109_ACCESS_2019_2902570
crossref_primary_10_1587_transcom_2017ISP0004
crossref_primary_10_1109_TVT_2015_2499439
crossref_primary_10_1109_LCOMM_2016_2550025
crossref_primary_10_1109_TCCN_2021_3130968
crossref_primary_10_1109_LWC_2015_2483496
crossref_primary_10_1109_TWC_2015_2472405
crossref_primary_10_1109_ACCESS_2018_2796075
crossref_primary_10_1109_LCOMM_2015_2454514
crossref_primary_10_1007_s11276_019_02049_9
crossref_primary_10_1109_TVT_2017_2740282
crossref_primary_10_1016_j_comnet_2018_03_018
crossref_primary_10_1109_TASE_2015_2497663
crossref_primary_10_12720_jcm_11_8_740_747
crossref_primary_10_1109_TWC_2016_2536732
crossref_primary_10_1016_j_aeue_2017_04_017
crossref_primary_10_1109_ACCESS_2017_2691798
crossref_primary_10_1109_TCOMM_2019_2910260
crossref_primary_10_1007_s11081_020_09570_3
crossref_primary_10_1109_JSYST_2017_2713881
crossref_primary_10_1109_TVT_2017_2756877
crossref_primary_10_1109_ACCESS_2019_2936098
crossref_primary_10_1109_COMST_2018_2883144
crossref_primary_10_1109_TVT_2017_2717949
crossref_primary_10_1109_ACCESS_2018_2825387
crossref_primary_10_1631_FITEE_1601832
crossref_primary_10_1109_TCOMM_2016_2573822
crossref_primary_10_1109_TWC_2018_2883563
Cites_doi 10.1109/ICASSP.2013.6638563
10.1109/TSP.2012.2212013
10.1109/TSP.2013.2253771
10.1109/WCL.2014.030514.140057
10.1109/TWC.2013.031813.120224
10.1109/TCOMM.2013.13.120855
10.1109/TSP.2010.2094610
10.1109/ISIT.2008.4595260
10.1137/S1052623403421498
10.1002/nav.3800090303
10.1109/WCL.2012.053112.120212
10.1109/ISIT.2010.5513714
10.1109/TWC.2008.060848
10.1109/TWC.2012.113012.120500
10.1017/CBO9780511804441
10.1109/SECONW.2014.6979707
10.1109/LSP.2013.2247999
10.1109/TSP.2011.2146775
10.1109/TSP.2014.2303422
10.1109/TIT.2010.2048445
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2015
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2015
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
DOI 10.1109/TIFS.2014.2363033
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Civil Engineering Abstracts
Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1556-6021
EndPage 54
ExternalDocumentID 3516571331
10_1109_TIFS_2014_2363033
6922539
Genre orig-research
GrantInformation_xml – fundername: Engineering and Physical Sciences Research Council; U.K. Engineering and Physical Sciences Research Council
  grantid: EP/K015893/1
  funderid: 10.13039/501100000266
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
ESBDL
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
F28
ID FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3
IEDL.DBID RIE
ISSN 1556-6013
IngestDate Thu Sep 04 19:03:39 EDT 2025
Sun Jun 29 16:45:55 EDT 2025
Thu Apr 24 23:01:22 EDT 2025
Tue Jul 01 02:34:10 EDT 2025
Wed Aug 27 08:33:28 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords energy beamforming
energy harvesting
Colluding eavesdroppers
masked beamforming
Language English
License https://creativecommons.org/licenses/by/3.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/6922539
PQID 1630156965
PQPubID 85506
PageCount 15
ParticipantIDs proquest_journals_1630156965
crossref_primary_10_1109_TIFS_2014_2363033
ieee_primary_6922539
proquest_miscellaneous_1651408753
crossref_citationtrail_10_1109_TIFS_2014_2363033
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-Jan.
2015-1-00
20150101
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 2015-Jan.
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information forensics and security
PublicationTitleAbbrev TIFS
PublicationYear 2015
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref12
ref15
ref14
grant (ref19) 2010
ref11
ref10
ref2
(ref25) 2004
ref1
ref17
ref16
khandaker (ref13) 0
ref24
ref20
ref22
ref21
ref8
ref7
strum (ref18) 2001
ref9
ref4
ref3
ref6
ref5
bertsekas (ref23) 1999
References_xml – year: 2004
  ident: ref25
– ident: ref11
  doi: 10.1109/ICASSP.2013.6638563
– ident: ref7
  doi: 10.1109/TSP.2012.2212013
– year: 1999
  ident: ref23
  publication-title: Nonlinear Programming
– ident: ref17
  doi: 10.1109/TSP.2013.2253771
– year: 2001
  ident: ref18
  publication-title: Using SeDuMi 1 02 a Matlab Toolbox for Optimization Over Symmetric Cones
– ident: ref9
  doi: 10.1109/WCL.2014.030514.140057
– ident: ref1
  doi: 10.1109/TWC.2013.031813.120224
– ident: ref4
  doi: 10.1109/TCOMM.2013.13.120855
– ident: ref16
  doi: 10.1109/TSP.2010.2094610
– ident: ref2
  doi: 10.1109/ISIT.2008.4595260
– ident: ref24
  doi: 10.1137/S1052623403421498
– year: 2010
  ident: ref19
  publication-title: CVX MATLAB Software for Disciplined Convex Programming
– ident: ref21
  doi: 10.1002/nav.3800090303
– ident: ref6
  doi: 10.1109/WCL.2012.053112.120212
– ident: ref3
  doi: 10.1109/ISIT.2010.5513714
– ident: ref14
  doi: 10.1109/TWC.2008.060848
– ident: ref5
  doi: 10.1109/TWC.2012.113012.120500
– year: 0
  ident: ref13
  article-title: Robust secrecy beamforming in the presence of energy-harvesting eavesdroppers
  publication-title: IEEE Wireless Commun Lett
– ident: ref20
  doi: 10.1017/CBO9780511804441
– ident: ref10
  doi: 10.1109/SECONW.2014.6979707
– ident: ref8
  doi: 10.1109/LSP.2013.2247999
– ident: ref22
  doi: 10.1109/TSP.2011.2146775
– ident: ref12
  doi: 10.1109/TSP.2014.2303422
– ident: ref15
  doi: 10.1109/TIT.2010.2048445
SSID ssj0044168
Score 2.4068325
Snippet This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR),...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 40
SubjectTerms Algorithms
Array signal processing
Byproducts
Channels
Colluding eavesdroppers
Design engineering
Energy beamforming
Energy harvesting
Erbium
Infrared radiation
Interference
Joints
Masked beamforming
Mathematical models
Optimization
Receivers
Vectors
Title Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
URI https://ieeexplore.ieee.org/document/6922539
https://www.proquest.com/docview/1630156965
https://www.proquest.com/docview/1651408753
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS-wwEB90T3rwW1zfKhHeSezamKb7clTZRYWVByp4K2kyBVHbRXcv769_M2m7-IV4C-00DZmP_CbJzAD8Jr_H6IHzkfHkoiSpptYgSSLpGN-HgowcOzy-Ti_ukqt7fb8AR_NYGEQMl8-wz81wlu8rN-OtsuPUkPQpswiLJGZ1rFZrdWlVr8PeqPeInAzVnGDK2BzfXo5u-BJX0j9RKZls9W4NCkVVPlnisLyMVmHcDqy-VfLYn03zvvv3IWfjT0e-BisNzhSntWCswwKWG7Da1nAQjUpvwPKbhISbMBzb10f04gztM6NZeigeSkEgUfwNcUoORVWIYQgYjLiuECfpIKKhpZZ_qSYTgpNbcDca3p5fRE2hhcip1EwjH2ORKoUpOhvHjnymwug89yF5u8p9bHWRSFrKtZek4conWmIivdfO2jx3ahs6ZVXiDggvbaELHVsnHZuDHLFwboD4h5CSdrILcTv1mWuykHMxjKcseCOxyZhbGXMra7jVhcP5J5M6Bcd3xJs8-3PCZuK70Gv5mzVK-poRFOVAcpPqLhzMX5N68ZmJLbGaMQ0hSs76r3a_7vkXLNH_db0r04PO9GWGe4RTpvl-END_sp7jEg
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED-N8gA8UNhAlHVgJJ4Q6WJsp_PjNrVqYZ2Q6KS9RY59kaZBUm3tC389d05SjQ9NvFnJ2bJ8vrvf2b47gPfk91gz9iGxgVwUnRlqjbVOpGd8Hwsycuzw4jybXejPl-ZyBz5uY2EQMT4-wxE3411-qP2Gj8oOM0u7T9kH8JDsvjZNtFand8muN4FvNH5CboZq7zBlag-X8-k3fsalR59URkpb_WaFYlmVv3RxNDDTPiy6qTXvSq5Hm3Ux8j__yNr4v3N_Bk9bpCmOm63xHHaw2oV-V8VBtEK9C0_upCTcg8nC3V5jECfofjCepY_iqhIEE8XXGKnkUdSlmMSQwYQrC3GaDiKaOGqFm3q1IkD5Ai6mk-XpLGlLLSReZXadhBTLTCnM0Ls09eQ1ldYURYjp21URUmdKLcmYmyBJxlXQRqKWIRjvXFF49RJ6VV3hKxBButKUJnVeelYIBWLp_RjxiLCS8XIAabf0uW_zkHM5jO959EdSmzO3cuZW3nJrAB-2XVZNEo77iPd49beE7cIPYNjxN2_F9DYnMMqh5DYzA3i3_U0CxrcmrsJ6wzSEKTnvv3r975HfwqPZcnGWn83Pv-zDY5qLac5ohtBb32zwgFDLungTN-svvDjmXw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Masked+Beamforming+in+the+Presence+of+Energy-Harvesting+Eavesdroppers&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Khandaker%2C+Muhammad+R.+A&rft.au=Wong%2C+Kai-Kit&rft.date=2015-01-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=10&rft.issue=1&rft.spage=40&rft_id=info:doi/10.1109%2FTIFS.2014.2363033&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3516571331
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon