Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 10; no. 1; pp. 40 - 54 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.01.2015
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1556-6013 1556-6021 |
DOI | 10.1109/TIFS.2014.2363033 |
Cover
Abstract | This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms. |
---|---|
AbstractList | This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR), and multiple single-antenna energy-harvesting receivers (ERs) for simultaneous wireless information and power transfer. The design is to keep the message secret to the ERs while maximizing the information rate at the IR and meeting the energy harvesting constraints at the ERs. Technically, our objective is to optimize the information-bearing beam and artificial noise energy beam for maximizing the secrecy rate of the IR subject to individual harvested energy constraints of the ERs for the case where the ERs can collude to perform joint decoding in an attempt to illicitly decode the secret message to the IR. As a by-product, we also solve the total power minimization problem subject to secrecy rate and energy harvesting constraints. Both scenarios of perfect and imperfect channel state information (CSI) at the transmitter are addressed. For the imperfect CSI case, we study both eavesdroppers' channel covariance-based and worst case-based designs. Using semidefinite relaxation (SDR) techniques, we show that there always exists a rank-one optimal transmit covariance solution for the IR. Furthermore, if the SDR results in a higher rank solution, we propose an efficient algorithm to always construct an equivalent rank-one optimal solution. Computer simulations are carried out to demonstrate the performance of the proposed algorithms. |
Author | Wong, Kai-Kit Khandaker, Muhammad R. A. |
Author_xml | – sequence: 1 givenname: Muhammad R. A. surname: Khandaker fullname: Khandaker, Muhammad R. A. email: m.khandaker@ucl.ac.uk organization: Department of Electronic and Electrical Engineering, University College London, London, U.K – sequence: 2 givenname: Kai-Kit surname: Wong fullname: Wong, Kai-Kit email: kai-kit.wong@ucl.ac.uk organization: Department of Electronic and Electrical Engineering, University College London, London, U.K |
BookMark | eNp9kMFOAjEQhhuDiYA-gPGyiRcvi53tttCjkkVIMJqI5023ncVFaLFdTHh7dwPhwMHT_Ifvm5n8PdKxziIht0AHAFQ-LmaTj0FCIR0kTDDK2AXpAuciFjSBzikDuyK9EFaUpimIUZdkryp8o4meUW1K5zeVXUaVjeovjN49BrQaI1dGmUW_3MdT5X8x1C2UqSYZ77Zb9OGaXJZqHfDmOPvkc5ItxtN4_vYyGz_NY82ErGNDsRSMoUCtKNWp5KXkRWE4lyPBCkMVL1NIhOAG-HDETMoBUzCGa6WKQrM-eTjs3Xr3s2s-yTdV0LheK4tuF3IQHFI6GnLWoPdn6MrtvG2-ayhGgQspeEPBgdLeheCxzLe-2ii_z4HmbbF5W2zeFpsfi22c4Zmjq1rVlbO1V9X6X_PuYFaIeLokZJJwJtkfWNWG_Q |
CODEN | ITIFA6 |
CitedBy_id | crossref_primary_10_1109_TIFS_2015_2477050 crossref_primary_10_3390_e22111261 crossref_primary_10_1109_TIFS_2017_2774441 crossref_primary_10_1109_TIFS_2017_2721908 crossref_primary_10_1109_TWC_2016_2605102 crossref_primary_10_1016_j_phycom_2022_101791 crossref_primary_10_1109_ACCESS_2020_2986025 crossref_primary_10_1109_TVT_2020_2994446 crossref_primary_10_1109_TVT_2016_2578313 crossref_primary_10_1109_COMST_2020_3017665 crossref_primary_10_1177_1550147717711591 crossref_primary_10_1109_JSYST_2019_2920751 crossref_primary_10_1109_ACCESS_2022_3163580 crossref_primary_10_1109_TIFS_2016_2627219 crossref_primary_10_1109_COMST_2015_2499783 crossref_primary_10_1016_j_comcom_2021_07_017 crossref_primary_10_1109_TGCN_2019_2900343 crossref_primary_10_1109_ACCESS_2018_2804924 crossref_primary_10_1109_TVT_2016_2520565 crossref_primary_10_1007_s12083_016_0509_5 crossref_primary_10_1109_TCOMM_2018_2874658 crossref_primary_10_1109_TIFS_2017_2746063 crossref_primary_10_1109_TIFS_2016_2611478 crossref_primary_10_1109_JSAC_2018_2872370 crossref_primary_10_1109_TIFS_2018_2815541 crossref_primary_10_1109_TWC_2017_2675402 crossref_primary_10_1109_TWC_2018_2822286 crossref_primary_10_1109_ACCESS_2019_2902570 crossref_primary_10_1587_transcom_2017ISP0004 crossref_primary_10_1109_TVT_2015_2499439 crossref_primary_10_1109_LCOMM_2016_2550025 crossref_primary_10_1109_TCCN_2021_3130968 crossref_primary_10_1109_LWC_2015_2483496 crossref_primary_10_1109_TWC_2015_2472405 crossref_primary_10_1109_ACCESS_2018_2796075 crossref_primary_10_1109_LCOMM_2015_2454514 crossref_primary_10_1007_s11276_019_02049_9 crossref_primary_10_1109_TVT_2017_2740282 crossref_primary_10_1016_j_comnet_2018_03_018 crossref_primary_10_1109_TASE_2015_2497663 crossref_primary_10_12720_jcm_11_8_740_747 crossref_primary_10_1109_TWC_2016_2536732 crossref_primary_10_1016_j_aeue_2017_04_017 crossref_primary_10_1109_ACCESS_2017_2691798 crossref_primary_10_1109_TCOMM_2019_2910260 crossref_primary_10_1007_s11081_020_09570_3 crossref_primary_10_1109_JSYST_2017_2713881 crossref_primary_10_1109_TVT_2017_2756877 crossref_primary_10_1109_ACCESS_2019_2936098 crossref_primary_10_1109_COMST_2018_2883144 crossref_primary_10_1109_TVT_2017_2717949 crossref_primary_10_1109_ACCESS_2018_2825387 crossref_primary_10_1631_FITEE_1601832 crossref_primary_10_1109_TCOMM_2016_2573822 crossref_primary_10_1109_TWC_2018_2883563 |
Cites_doi | 10.1109/ICASSP.2013.6638563 10.1109/TSP.2012.2212013 10.1109/TSP.2013.2253771 10.1109/WCL.2014.030514.140057 10.1109/TWC.2013.031813.120224 10.1109/TCOMM.2013.13.120855 10.1109/TSP.2010.2094610 10.1109/ISIT.2008.4595260 10.1137/S1052623403421498 10.1002/nav.3800090303 10.1109/WCL.2012.053112.120212 10.1109/ISIT.2010.5513714 10.1109/TWC.2008.060848 10.1109/TWC.2012.113012.120500 10.1017/CBO9780511804441 10.1109/SECONW.2014.6979707 10.1109/LSP.2013.2247999 10.1109/TSP.2011.2146775 10.1109/TSP.2014.2303422 10.1109/TIT.2010.2048445 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2015 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jan 2015 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
DOI | 10.1109/TIFS.2014.2363033 |
DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Civil Engineering Abstracts Civil Engineering Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1556-6021 |
EndPage | 54 |
ExternalDocumentID | 3516571331 10_1109_TIFS_2014_2363033 6922539 |
Genre | orig-research |
GrantInformation_xml | – fundername: Engineering and Physical Sciences Research Council; U.K. Engineering and Physical Sciences Research Council grantid: EP/K015893/1 funderid: 10.13039/501100000266 |
GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD ESBDL HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D F28 |
ID | FETCH-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3 |
IEDL.DBID | RIE |
ISSN | 1556-6013 |
IngestDate | Thu Sep 04 19:03:39 EDT 2025 Sun Jun 29 16:45:55 EDT 2025 Thu Apr 24 23:01:22 EDT 2025 Tue Jul 01 02:34:10 EDT 2025 Wed Aug 27 08:33:28 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | energy beamforming energy harvesting Colluding eavesdroppers masked beamforming |
Language | English |
License | https://creativecommons.org/licenses/by/3.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c369t-d0ef633e6eca00c495f95bbd559863bd0a5f412665d15783d451e41dd5caabbc3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/6922539 |
PQID | 1630156965 |
PQPubID | 85506 |
PageCount | 15 |
ParticipantIDs | proquest_journals_1630156965 crossref_primary_10_1109_TIFS_2014_2363033 ieee_primary_6922539 proquest_miscellaneous_1651408753 crossref_citationtrail_10_1109_TIFS_2014_2363033 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2015-Jan. 2015-1-00 20150101 |
PublicationDateYYYYMMDD | 2015-01-01 |
PublicationDate_xml | – month: 01 year: 2015 text: 2015-Jan. |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on information forensics and security |
PublicationTitleAbbrev | TIFS |
PublicationYear | 2015 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref12 ref15 ref14 grant (ref19) 2010 ref11 ref10 ref2 (ref25) 2004 ref1 ref17 ref16 khandaker (ref13) 0 ref24 ref20 ref22 ref21 ref8 ref7 strum (ref18) 2001 ref9 ref4 ref3 ref6 ref5 bertsekas (ref23) 1999 |
References_xml | – year: 2004 ident: ref25 – ident: ref11 doi: 10.1109/ICASSP.2013.6638563 – ident: ref7 doi: 10.1109/TSP.2012.2212013 – year: 1999 ident: ref23 publication-title: Nonlinear Programming – ident: ref17 doi: 10.1109/TSP.2013.2253771 – year: 2001 ident: ref18 publication-title: Using SeDuMi 1 02 a Matlab Toolbox for Optimization Over Symmetric Cones – ident: ref9 doi: 10.1109/WCL.2014.030514.140057 – ident: ref1 doi: 10.1109/TWC.2013.031813.120224 – ident: ref4 doi: 10.1109/TCOMM.2013.13.120855 – ident: ref16 doi: 10.1109/TSP.2010.2094610 – ident: ref2 doi: 10.1109/ISIT.2008.4595260 – ident: ref24 doi: 10.1137/S1052623403421498 – year: 2010 ident: ref19 publication-title: CVX MATLAB Software for Disciplined Convex Programming – ident: ref21 doi: 10.1002/nav.3800090303 – ident: ref6 doi: 10.1109/WCL.2012.053112.120212 – ident: ref3 doi: 10.1109/ISIT.2010.5513714 – ident: ref14 doi: 10.1109/TWC.2008.060848 – ident: ref5 doi: 10.1109/TWC.2012.113012.120500 – year: 0 ident: ref13 article-title: Robust secrecy beamforming in the presence of energy-harvesting eavesdroppers publication-title: IEEE Wireless Commun Lett – ident: ref20 doi: 10.1017/CBO9780511804441 – ident: ref10 doi: 10.1109/SECONW.2014.6979707 – ident: ref8 doi: 10.1109/LSP.2013.2247999 – ident: ref22 doi: 10.1109/TSP.2011.2146775 – ident: ref12 doi: 10.1109/TSP.2014.2303422 – ident: ref15 doi: 10.1109/TIT.2010.2048445 |
SSID | ssj0044168 |
Score | 2.4068325 |
Snippet | This paper considers a multiple-input single-output downlink system consisting of one multiantenna transmitter, one single-antenna information receiver (IR),... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 40 |
SubjectTerms | Algorithms Array signal processing Byproducts Channels Colluding eavesdroppers Design engineering Energy beamforming Energy harvesting Erbium Infrared radiation Interference Joints Masked beamforming Mathematical models Optimization Receivers Vectors |
Title | Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers |
URI | https://ieeexplore.ieee.org/document/6922539 https://www.proquest.com/docview/1630156965 https://www.proquest.com/docview/1651408753 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS-wwEB90T3rwW1zfKhHeSezamKb7clTZRYWVByp4K2kyBVHbRXcv769_M2m7-IV4C-00DZmP_CbJzAD8Jr_H6IHzkfHkoiSpptYgSSLpGN-HgowcOzy-Ti_ukqt7fb8AR_NYGEQMl8-wz81wlu8rN-OtsuPUkPQpswiLJGZ1rFZrdWlVr8PeqPeInAzVnGDK2BzfXo5u-BJX0j9RKZls9W4NCkVVPlnisLyMVmHcDqy-VfLYn03zvvv3IWfjT0e-BisNzhSntWCswwKWG7Da1nAQjUpvwPKbhISbMBzb10f04gztM6NZeigeSkEgUfwNcUoORVWIYQgYjLiuECfpIKKhpZZ_qSYTgpNbcDca3p5fRE2hhcip1EwjH2ORKoUpOhvHjnymwug89yF5u8p9bHWRSFrKtZek4conWmIivdfO2jx3ahs6ZVXiDggvbaELHVsnHZuDHLFwboD4h5CSdrILcTv1mWuykHMxjKcseCOxyZhbGXMra7jVhcP5J5M6Bcd3xJs8-3PCZuK70Gv5mzVK-poRFOVAcpPqLhzMX5N68ZmJLbGaMQ0hSs76r3a_7vkXLNH_db0r04PO9GWGe4RTpvl-END_sp7jEg |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwED-N8gA8UNhAlHVgJJ4Q6WJsp_PjNrVqYZ2Q6KS9RY59kaZBUm3tC389d05SjQ9NvFnJ2bJ8vrvf2b47gPfk91gz9iGxgVwUnRlqjbVOpGd8Hwsycuzw4jybXejPl-ZyBz5uY2EQMT4-wxE3411-qP2Gj8oOM0u7T9kH8JDsvjZNtFand8muN4FvNH5CboZq7zBlag-X8-k3fsalR59URkpb_WaFYlmVv3RxNDDTPiy6qTXvSq5Hm3Ux8j__yNr4v3N_Bk9bpCmOm63xHHaw2oV-V8VBtEK9C0_upCTcg8nC3V5jECfofjCepY_iqhIEE8XXGKnkUdSlmMSQwYQrC3GaDiKaOGqFm3q1IkD5Ai6mk-XpLGlLLSReZXadhBTLTCnM0Ls09eQ1ldYURYjp21URUmdKLcmYmyBJxlXQRqKWIRjvXFF49RJ6VV3hKxBButKUJnVeelYIBWLp_RjxiLCS8XIAabf0uW_zkHM5jO959EdSmzO3cuZW3nJrAB-2XVZNEo77iPd49beE7cIPYNjxN2_F9DYnMMqh5DYzA3i3_U0CxrcmrsJ6wzSEKTnvv3r975HfwqPZcnGWn83Pv-zDY5qLac5ohtBb32zwgFDLungTN-svvDjmXw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Masked+Beamforming+in+the+Presence+of+Energy-Harvesting+Eavesdroppers&rft.jtitle=IEEE+transactions+on+information+forensics+and+security&rft.au=Khandaker%2C+Muhammad+R.+A&rft.au=Wong%2C+Kai-Kit&rft.date=2015-01-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1556-6013&rft.eissn=1556-6021&rft.volume=10&rft.issue=1&rft.spage=40&rft_id=info:doi/10.1109%2FTIFS.2014.2363033&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3516571331 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-6013&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-6013&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-6013&client=summon |