1. Introduction
A large quantity of bandwidth is idle and only a little bandwidth is frequently utilized in accordance with traditional spectrum allocation policy. Cognitive Radio (CR) is proposed as a potential technology to solve spectrum scarcity problem [1]. There are two classic models of cognitive radio. One is underlay spectrum sharing model and the other is overlay spectrum sharing model. In underlay spectrum sharing model, even if primary user (PU) is working, secondary user (SU) can transmit signal simultaneously under the licensed PU spectrum [2]. For underlay CR design, the interference from SUs’ communication must be tolerable to PU. Another overlay spectrum sharing model is to allow SUs to access spectral bands opportunistically while PU is idle [3]. Obviously, underlay spectrum sharing model is constrained by interference regulations, while overlay spectrum sharing model depends on accurate spectrum detections. Hence, CR has been widely investigated in wireless sensor networks and cooperative relay networks for spectral efficiency improvement [4-5].
Meanwhile, the escalating number of wireless services and the huge demand for high data rate have also led to a sharp increase in power consumption, resulting in energy shortages, especially for the energy-constrained devices such as battery-powered mobile phones [5-9]. The novel technology of simultaneous wireless information and power transfer (SWIPT) has recently attracted research attention from academia and has been seen as a promising technology that is expected to solve energy shortage problem [10]. In general, there are two kinds of protocols in SWIPT technology, namely, power splitting (PS) and time switching (TS) [11]. With TS protocol, source transmits energy through radio frequency (RF) signal to receiver in first phase and the information will be transmitted in the remaining phase. With PS protocol, the receiver will set a factor to split the received signal into two streams, one for storing energy and the other for demodulating signals.
In order to jointly improve energy efficiency and spectral efficiency, many researchers have recently focused on how to combine EH and CR [12-14]. In [15], underlay CR-EH communication system consisting of cognitive transmitter (CT), cognitive relay and cognitive destination (CD) is studied. The authors derive a closed-form expression of system outage probability. In [16], authors further illustrate outage performance analysis by jointly considering PU’ s interference threshold, CT’s transmission power constraint and path loss factors. In [17], authors analyze outage probability of EH-CR cooperative network, where CT collects energy from primary transmitter (PT) and acts as relay during PT’s signal transmission. However, because of the broadcast characteristics of radio networks and CRN’s inherent characteristics, illegal users can access PU’s channel or change the wireless environment illegitimately. As a result, legitimate SU cannot access the licensed bands or be intercepted [18]. Thus, it is extremely important of communication security in SWIPT-CR network.
The demand of secure wireless communication has been focused on by ever-increasing public attentions. For example, privacy-aware users are evaluated by quality-of-experience (QoE) guarantee [19]. Physical layer security (PLS) based on wireless physical layer characteristics is promising to prevent eavesdropping in wireless network [20]. In [21], Wyner put forward a classical wiretap model, which consists of source, destination and eavesdropper. Information sent from the source to the destination may be intercepted by an eavesdropper. In addition, Wyner introduces the concept of secret capacity, which is described as the maximum achievable data rate for secret transmission from source to destination. For a basic wire-tap channel, the secrecy capacity is defined as the difference in channel capacity between the legitimate channel from source to destination and the illegal channel from source to eavesdropper [22].
A. Related Works
Presently, PLS of wireless communication networks combining with EH and CR has been paid much attention by researchers. Ref. [18] studies a secure SWIPT-CR communication system and proposes a secure resource allocation algorithm for secondary networks. In [23], the authors study the design of artificial noise (AN) and the secure pre-coding algorithm with a guaranteed convergence performance in a multiple-input multiple-output (MIMO) SWIPT-CR communication system. The authors construct the optimal problem as secrecy rate maximization (SRM). They propose an iterative algorithm to solve the problem. Ref. [24] studies the physical layer security in a SWIPT-CR system and obtains a closed-form expression for the secrecy outage probability. Ref. [25] focuses on the designing of robust secure beamforming scheme in multiple-input single-output (MISO) SWIPT-CR system for secure SU transmission. It assumes that SU can harvest energy from cognitive base station (CBS) and use PU licensed spectrum in underlay spectrum sharing model. The authors find that there exists a trade-off between the security of the secondary network and the energy harvested by EH receivers with a max-min fairness criterion. In [26], the authors study the PLS performance of an EH underlay CR system model which is similar to [25]. But the SU in [26] collects energy from the PU rather than energy from the CBS in [25]. Ref. [27] considers a destination-assisted SWIPT-CR system. In this system, SU harvests energy from PU and acts as a relay to forward the information message of the PU.
B. Motivation and Contribution
Since eavesdroppers may intercept information in the secondary network, it is necessary to study the secure communication of SUs. Motivated by the discussion shown above, different from [23-24], we pay attention to enhancing secrecy capacity in cognitive SWIPT network. The main contributions of our work can be summarized as follows. PLS for SWIPT underlay cognitive system consisting of a SU, a SD and multiple SWIPT cognitive relays which are powered by the energy harvested from RF signal are investigated. Similar to [27], in order to interfere with eavesdropper and improve the energy harvested by the relay, a destination-assisted jamming scheme is proposed. In this scheme, when SU broadcasts its signal, secondary destination (SD) will transmit AN to interfere with the eavesdropper. In addition, the interfering signal can also provide energy to SWIPT relays. Different from [27], we analyze secrecy performance in an underlay SWIPT-CR system, where the spectrum sharing model in [27] is neither underlay nor overlay. Moreover, we consider the problem of interference from SU to PU’s communication. In order to reduce the harmful interference caused by SU, the constraint SU transmission power is taken into account. With the transmission power constraints on SU, we jointly design the beamforming vector and power splitting ratio to maximize the secrecy rate in SD. Due to the non-convexity of the optimization problem, we propose a general two-stage process. Namely, for a given power splitting ratio, the optimal beamforming vector is studied. Then, the best power splitting ratio can be obtained by one-dimensional search. Finally, in order to achieve secure communication, we also examine the conventional relay selection (CRS) scheme to improve PLS performance.
The rest structure of this paper is set as follows. In Section II, we introduce system model of this paper and the proposed optimization problem. In Section III, the solution of optimization problem is presented. Then, we analyze the PLS performance in accordance with simulation results given in the Section IV. Finally, we summarize the whole paper in Section V. A summary of the fundamental symbols used in paper is provided in Table 1.
Table 1. List of symbols.
2. System Model
Consider a cognitive SWIPT decode-and-forward (DF) relay network with underlay spectrum sharing model, as shown in Fig. 1. In the primary network, primary destination (PD) receives signals transmitted from the PU. At the same time, SU transmitter sends its secret information to SD. We assume that SU cannot directly transfer information to SD due to wireless channel attenuation. The eavesdropper EVE will overhear the transmitted information. The communication between SU and SD is divided into two phases. SU is allowed to simultaneously transmit in the licensed PU spectrum, provided that SU to PU interference level is below a predefined threshold.
Fig. 1. SWIPT undelay CR system model and the framework of transmission.
Notice that M relays denoted by energy-limited R i (i = 1, 2, …, M) that equipped with N antennas are used to assist SU’s data transmission with DF protocol. We assume that R i is only powered by the information stream from the SU and the interference stream from the SD. Furthermore, the interference flow can be used to interfere with the tapping of eavesdropper EVE. Channel state information (CSI) of all transmit links are assumed to be Rayleigh fading channels. Furthermore, we assume that all CSI, including the wiretap channel, is available [28]. When the eavesdropper is active and its transmissions can be monitored, we can obtain the eavesdropper’s CSI [29]. For example, eavesdropper is a user in network but do not get the authorization of the current services, e.g., Pay-TV broadcast services [30].
System model and frame structure of transmission are shown in Fig. 1. It should be noted that the frame work is divided into two phases. Similar to [24], we assume that SD, EVE, and all the SWIPT relays are far from PU so that we can ignore the interference from PU to these nodes. Similarly, we do not consider the interference from relays and SD to PD. Since the distance is too far, relays can't get energy from the signal sent by PU. However, it is noticeable that we can not ignore the interference from SU to PD. Because it is generally assumed that SU uses a large transmit power to meet the needs of information and energy transmission. Hence, it will cause interference to PD due to the high transmit power of the SU.
Fig. 1 (a) shows the first phase of transmission framework. In the first phase, SU broadcasts its information signals to relays with power PS (PS ≤ Γ/X , where Γ is the tolerable interference power at PD and X is the gain of the channel from SU to PD) under the jamming of AN transmitted by SD with power PD . Suppose that the transmit signal xS and AN xD have the unit energy denoted as E[| xS |2] = E[| xD |2] = 1 , signal received at R i can be expressed as
\(\boldsymbol{y}_{\mathrm{i}}=\sqrt{P_{\mathrm{S}}} \boldsymbol{h}_{i} x_{\mathrm{S}}+\sqrt{P_{\mathrm{D}}} \boldsymbol{g}_{i} x_{\mathrm{D}}+\boldsymbol{n}_{i}\) (1)
where hi and gi represent the channel coefficients of SU to Ri , SD to Ri , respectively; ni denotes N × 1 circularly symmetric complex Gaussian (CSCG) noise vector with zero mean and covariance \(\sigma_{i}^{2} \boldsymbol{I}_{N} \text { at } \mathrm{R}_{i} \text { , i.e. } \boldsymbol{n}_{i} \sim C N\left(0, \sigma_{i}^{2} \boldsymbol{I}_{N}\right)\).
Since relays in secondary network are SWIPT node with PS receiving equipment, the received signal is split into two streams, ρ portion of the received power is used for information-decoding (ID) part to decode information and the rest portion will be used as EH part for energy storage.
The received signal for EH at Ri can be written as
\(\boldsymbol{y}_{i}^{\mathrm{EH}}=\sqrt{1-\rho}\left(\sqrt{P_{\mathrm{S}}} \boldsymbol{h}_{i} x_{\mathrm{S}}+\sqrt{P_{\mathrm{D}}} \boldsymbol{g}_{i} x_{\mathrm{D}}+\boldsymbol{n}_{i}\right)\) (2)
\(\boldsymbol{y}_{i}^{\mathrm{EH}}=\sqrt{1-\rho}\left(\sqrt{P_{\mathrm{S}}} \boldsymbol{h}_{i} x_{\mathrm{S}}+\sqrt{P_{\mathrm{D}}} \boldsymbol{g}_{i} x_{\mathrm{D}}+\boldsymbol{n}_{i}\right)\) (3)
Energy harvested by R i is expressed as
\(P_{i}=(1-\rho) \eta\left(P_{\mathrm{S}}\left\|\boldsymbol{h}_{i}\right\|^{2}+P_{\mathrm{D}}\left\|\boldsymbol{g}_{i}\right\|^{2}+\sigma_{i}^{2}\right)\) (4)
where η (0 ≤η ≤ 1) is denoted as energy transduction efficiency.
The received signal for ID at Ri can be given as
\(\boldsymbol{y}_{i}^{\mathrm{ID}}=\sqrt{\rho}\left(\sqrt{P_{\mathrm{S}}} \boldsymbol{h}_{i} x_{\mathrm{S}}+\sqrt{P_{\mathrm{D}}} \boldsymbol{g}_{i} x_{\mathrm{D}}+\boldsymbol{n}_{i}\right)+\boldsymbol{n}_{\mathrm{c}}\) (5)
where nc denotes the N × 1 circuit noise vector generated by the signal frequency conversion from RF to baseband. For simplicity, we assume that circuit noise vectors at all relays are subject to \(\boldsymbol{n}_{\mathrm{c}} \sim C N\left(0, \sigma_{\mathrm{c}}^{2} \boldsymbol{I}_{N}\right)\).
To avoid the influence of xD on Ri , zero forcing (ZF)-based beamforming scheme is implemented. Applying the receiver vector \(\boldsymbol{w}_{i}\left(\left\|\boldsymbol{w}_{i}\right\|^{2}=1 ; i=1,2, \cdots, M\right)\) which lies in the null space of \(\boldsymbol{g}_{i}, \text { i.e. } \boldsymbol{w}_{i}^{\mathrm{H}} \boldsymbol{g}_{i}\). The estimated signal at Ri can be expressed as
\(y_{i}=\boldsymbol{w}_{i}^{\mathrm{H}}\left[\sqrt{\rho}\left(\sqrt{P_{\mathrm{S}}} \boldsymbol{h}_{i} x_{\mathrm{S}}+\sqrt{P_{\mathrm{D}}} \boldsymbol{g}_{i} x_{\mathrm{D}}+\boldsymbol{n}_{i}\right)+\boldsymbol{n}_{\mathrm{c}}\right] \) (6)
Thus, we can get the Signal to Interference plus Noise Ratio (SINR) in Ri
\(\gamma_{i}=\frac{\rho P_{\mathrm{S}}\left|\boldsymbol{w}_{i}^{\mathrm{H}} \boldsymbol{h}_{i}\right|^{2}}{\rho\left(P_{\mathrm{D}}\left|\boldsymbol{w}_{i}^{\mathrm{H}} \boldsymbol{g}_{i}\right|^{2}+\rho \sigma_{i}^{2}\right)+\sigma_{\mathrm{c}}^{2}}\) (7)
In order to maximize the SINR of Ri , the optimization problem is written as max γi
\(\begin{aligned} \text { s.t. } & \boldsymbol{w}_{i}^{\mathrm{H}} \boldsymbol{g}_{i}=0 \\ & \boldsymbol{w}_{i}^{\mathrm{H}} \boldsymbol{w}_{i}=1 \end{aligned}\) (8)
The problem in (7) is also called the null-steering beamformer and we can get the optimal solution from [29] as
\(\boldsymbol{w}_{i}=\frac{\left(\boldsymbol{I}_{N}-\boldsymbol{S}_{i}\right) \boldsymbol{h}_{i}}{\left\|\left(\boldsymbol{I}_{N}-\boldsymbol{S}_{i}\right) \boldsymbol{h}_{i}\right\|}\) (9)
where \(\boldsymbol{S}_{i}=\boldsymbol{g}_{i}\left(\boldsymbol{g}_{i}^{\mathrm{H}} \boldsymbol{g}_{i}\right)^{-1} \boldsymbol{g}_{i}^{\mathrm{H}}\).
Then, we consider the signal received at EVE from SU, which can be obtained as
\(y_{\mathrm{E} 1}=\sqrt{P_{\mathrm{S}}} \alpha x_{\mathrm{S}}+\sqrt{P_{\mathrm{D}}} \beta x_{\mathrm{D}}+n_{\mathrm{E} 1}\) (10)
where α and β denote SU to EVE channel coefficient and SD to EVE channel coefficient respectively; nE1 ~ CN (0,\(\sigma_{\mathrm{E} 1}^{2}\)) is a CSCG random noise variable with zero mean and variance \(\sigma_{\mathrm{E} 1}^{2}\) received by EVE.
Hence, SINR at EVE can be written as
\(\gamma_{\mathrm{E} 1}=\frac{P_{\mathrm{S}}|\alpha|^{2}}{P_{\mathrm{D}}|\beta|^{2}+\sigma_{\mathrm{E} 1}^{2}}\) (11)
SU chooses the j-th relay Rj by using the CRS scheme [31]. Mathematically, the relay selection criterion is given by
\(\mathrm{R}_{j}=\underset{\mathrm{R}_{i}, i=1,2, \cdots, M}{\arg \max } \gamma_{i}\) (12)
Substitute (8) into (6), (11) can be rewritten as
\(\mathrm{R}_{j}=\underset{\mathrm{R}_{i}, i=1,2, \cdots, M}{\arg \max }\left\|\boldsymbol{h}_{i}\right\|^{2}\) (13)
Fig. 1 (b) shows the second phase of transmission framework. In the second phase, Rj transmit xS to SD with energy collected in the first phase. The transmit data at Rj is given by
\(\boldsymbol{x}_{j}=\sqrt{P_{j}} \boldsymbol{w}_{\mathrm{D}} x_{\mathrm{s}}\) (14)
where \(\boldsymbol{w}_{\mathrm{D}} \in \mathbb{C}^{N \times 1}\) denotes the beamforming vector for SD.
Then, we can get the expression of received signal
\(y_{\mathrm{D}}=\sqrt{P_{j}} \boldsymbol{q}_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}} x_{\mathrm{S}}+n_{\mathrm{D}}\) (15)
where qj is the channel gain coefficients from Rj to SD; \(n_{\mathrm{D}} \sim C N\left(0, \sigma_{\mathrm{D}}^{2}\right)\) denotes a CSCG random variable received by SD.
According to (14), SINR at SD can be shown as
\(\gamma_{\mathrm{D}}=(1-\rho) P_{\mathrm{r}}\left|\boldsymbol{q}_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}\right|^{2} / \sigma_{\mathrm{D}}^{2}\) (16)
where \(P_{\mathrm{r}}=\eta\left(P_{\mathrm{S}}\left\|\boldsymbol{h}_{j}\right\|^{2}+P_{\mathrm{D}}\left\|\boldsymbol{g}_{j}\right\|^{2}+\sigma_{j}^{2}\right)\).
In the same way, we can easily obtain the expression of received signal at EVE
\(y_{\mathrm{E} 2}=\sqrt{P_{j}} z_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}} x_{\mathrm{S}}+n_{\mathrm{E} 2}\) (17)
where zj represents a CSCG channel fading coefficient from Rj to EVE; \(n_{\mathrm{E} 2} \sim C N\left(0, \sigma_{\mathrm{E} 2}^{2}\right)\) represents a CSCG random variable at EVE. SINR at EVE can be expressed as
\(\gamma_{\mathrm{E} 2}=(1-\rho) P_{\mathrm{r}}\left|z_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}\right|^{2} / \sigma_{\mathrm{E} 2}^{2} \) (18)
Similar to [32], we assume that Rj and SD can successfully decode the message. For a two-hop DF-based relay channel, the achievable secrecy rate at SD can be written as
\(R_{\mathrm{S}}=\frac{1}{2}\left\{\min \left[\log _{2}\left(1+\gamma_{j}\right), \log _{2}\left(1+\gamma_{\mathrm{D}}\right)\right]-\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}\right)\right\}_{+}\) (19)
The security rate refers to the transmission rate with the condition that eavesdropper cannot eavesdrop the legitimate information [32]. Then, we mainly study the joint design of power splitting ratio ρ and beamforming vector wD to maximize the achievable secrecy rate at SD. Hence, we formulate the optimum problem as below.
\(\mathcal{P} 1: \max _{w_{\mathrm{D}}, 0 \leq \rho \leq 1} R_{\mathrm{S}}\) (19a)
\(\text { s.t. }\left\|\boldsymbol{w}_{\mathrm{D}}\right\|^{2} \leq 1\) (19b)
where || wD ||2≤ 1 denotes Rj transmission power constraint.
3. Optimization Solution
It is apparent that optimum Problem (P1) shown in (19) is non-convex, because both the objective function and the constraint condition are non-convex with respect to ρ and wD. In this section, we propose a general algorithm based on SDR to solve Problem (P1) with two-stage procedure. We find that the constraint condition shown in (19) is only related with beamforming vector wD. Hence, we can firstly get the optimal wD for a given power splitting ratio ρ. Next, the optimal ρ can be searched through the bisection method.
When relay applies DF protocol, the total channel capacity of the secondary network depends on the link with the smaller capacity in SU to Rj and Rj to SD. Thus, the system capacity achieves the max value with γJ= γD [32]. Moreover, we note that wD is only depend on variable ρ from (6). Then, with fixed ρ, we have Problem (P2)
\(\mathcal{P} 2: \max _{w_{\mathrm{D}}} \log _{2}\left(1+\gamma_{\mathrm{D}}\right)-\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}\right)\) (20a)
\(\begin{array}{l} \text { s.t. }\left\|\boldsymbol{w}_{\mathrm{D}}\right\|^{2} \leq 1 \end{array}\) (20b)
If the optimum Problem (P2) is resolved, we can obtain the optimal wD for a given power splitting ratio ρ . Since if γJ= γD, Problem (P1) and (P2) are equivalent, so that the optimal ρ can be searched with the equation relationship γJ= γD. Next, we propose an SDR-based algorithm to solve Problem (P2). From (10), it is obvious that γE1 is a constant. Hence, we focus on γE2 and give the following proposition shown as below.
Proposition 1: For a given Problem (P2), there always exists SINR value threshold γe (γe > 0), such that the Problem (P3) as follow can get a solution that same as (P2).
\(\mathcal{P} 3: \max _{w_{\mathrm{D}}} \log _{2}\left(1+\gamma_{D}\right)\) (21a)
s.t. γE2 ≤ γe (21b)
|| wD ||2 ≤ 1 (21c)
Proof: Refer to Appendix A.
The Problem (P3) also can be reformulated as
\(\mathcal{P} 4: \max _{w_{\mathrm{D}}}(1-\rho) P_{\mathrm{r}}\left|\boldsymbol{q}_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}\right|^{2} / \sigma_{\mathrm{D}}^{2}\) (22a)
\(\text { s.t. }(1-\rho) P_{\mathrm{r}}\left|z_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}\right|^{2} / \sigma_{\mathrm{E} 2}^{2} \leq \gamma_{\mathrm{e}}\) (22b)
|| wD ||2 ≤ 1 (22c)
We can observe that Problem (P4)’s objective function does not involve a logarithmic function while that in Problem (P3) does, which means there exists difference between these two problems. It is denoted that Problem (P3) and Problem (P4) are equivalent, since they have the same optimal solution of wD.
With a given SINR value threshold e e γe (γe > 0), we define g(γe) as the optimal solution of Problem (P4). Then, we have following proposition.
Proposition 2: Problem (P4-EQV) can get a solution that same as Problem (P2).
\(\text { P4-EQV }: \max _{\gamma_{\mathrm{e}}>0} R\left(\gamma_{\mathrm{e}}\right):=\log _{2}\left(1+g\left(\gamma_{\mathrm{e}}\right)\right)-\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{e}}\right)\) (23)
Proof: Refer to Appendix B.
Proposition 2 establishes the relationship between Problem (P2) and the auxiliary function g(γe) related to Problem (P4). The equivalence between Problem (P4-EQV) and (P2) means that by solving the optimal γe in Problem (P4-EQV), we can obtain an optimal beamforming vector wD where g(γe) is an embedded optimization problem of wD in Problem (P4-EQV). Comparing Problem (P2) and its equivalent Problem (P4-EQV), we can find that the search of optimal beamforming vector wD is equivalent to search the corresponding value γe.
We assume that \(\gamma_{\mathrm{e}}^{*}\) is the optimal solution for the Problem (P4-EQV). As denoted above, with \(\gamma_{\mathrm{e}}=\gamma_{\mathrm{e}}^{*}\), Problem (P2) can get a solution that same as Problem (P4). Hence, we have following two-step method to solve the Problem (P2): Firstly, by solving (P4) with any γe, g(γe) can be obtained. Secondly, we can get the best γe in Problem (P4-EQV) by one-dimension search in the range γe > 0. Therefore, we focus on how to solve Problem (P4) in the rest of this section.
Note that Problem (P4) is still non-convex. The SDR of Problem (P4) can be written as the equivalent problem by ignoring the rank-one constraint on WD shown as below, where \(\boldsymbol{Q}_{j}=\boldsymbol{q}_{j} \boldsymbol{q}_{j}^{\mathrm{H}}, \boldsymbol{Z}_{j}=\boldsymbol{z}_{j} \boldsymbol{z}_{j}^{\mathrm{H}}, \boldsymbol{W}_{\mathrm{D}}=\boldsymbol{w}_{\mathrm{D}} \boldsymbol{w}_{\mathrm{D}}^{\mathrm{H}}\). This is a convex semi-definite programming (SDP) that can be efficiently solved by a convex optimization solver (such as the CVX tool).
\(\mathcal{P} 4-\mathrm{SDR}: \max _{W_{\mathrm{D}}}(1-\rho) P_{\mathrm{r}} \operatorname{Tr}\left(\boldsymbol{Q}_{j} \boldsymbol{W}_{\mathrm{D}}\right) / \sigma_{\mathrm{D}}^{2}\) (24a)
\(\text { s.t. }(1-\rho) P_{\mathrm{r}} \operatorname{Tr}\left(\boldsymbol{Z}_{j} \boldsymbol{W}_{\mathrm{D}}\right) \leq \gamma_{\mathrm{e}} \sigma_{\mathrm{E} 2}^{2}\) (24b)
Tr(WD)≤1 (24c)
Proposition 3: the optimal solution of Problem (P4-SDR) \(W_{\mathrm{D}}^{*}\) always satisfies rank(\(W_{\mathrm{D}}^{*}\))=1.
Proof: Refer to Appendix C.
According to Proposition 3, if the optimal solution \(W_{\mathrm{D}}^{*}\) of Problem (P4-SDR) can be obtained, we can get \(W_{\mathrm{D}}^{*}\) through the eigenvalue decomposition (EVD) of \(W_{\mathrm{D}}^{*}\) with rank(\(W_{\mathrm{D}}^{*}\))=1. As a result, (P4) can be solved with a fixed γe. Then, we will derive the optimal γe* shown as below.
We define λ1 and λ2 to be the dual variables of (P4-SDR) that related SINR constraint of EVE and the power constraint in (24), respectively. Thus, the Lagrangian function of Problem (P4-SDR) can be constructed as
L(WD,λ1,λ2,γe) = Tr(AWD) + B (25)
where
A = (1-ρ)PrQj - λ1(1-p)PrZj - λ2IN (26)
\(B=\lambda_{1} \gamma_{\mathrm{e}} \sigma_{\mathrm{E} 2}^{2}+\lambda_{2}\) (27)
The Largrangian dual function is given by
\(F\left(\lambda_{1}, \lambda_{2}, \gamma_{\mathrm{e}}\right)=\max _{W_{\mathrm{D}} \geq 0} L\left(W_{\mathrm{D}}, \lambda_{1}, \lambda_{2}, \gamma_{\mathrm{e}}\right)\) (28)
Since the Problem (P4-SDR) is convex and its duality gap is zero and the strong duality holds [33]. Therefore,
\(g\left(\gamma_{\mathrm{e}}\right)=\min _{\lambda_{1} \geq 0, \lambda_{2} \geq 0} F\left(\lambda_{1}, \lambda_{2}, \gamma_{\mathrm{e}}\right)\) (29)
According to [34], R(γe) in (23) has only one maximum point over γe > 0 . Thus, we can find the optimal γe* by one-dimensional search. Therefore, we can find the optimal value along the gradient direction of γe.
By (23), we can express the gradient of the gradient of Υe as
\(\frac{d R\left(\gamma_{\mathrm{e}}\right)}{d \gamma_{\mathrm{e}}}=\frac{\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{e}}\right) d g\left(\gamma_{\mathrm{e}}\right) / d \gamma_{\mathrm{e}}-\left(1+g\left(\gamma_{\mathrm{e}}\right)\right)}{\left(1+g\left(\gamma_{\mathrm{e}}\right)\right)\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{e}}\right) \ln 2}\) (30)
Define λ1* and λ2* to be the optimal dual solutions of (P4-SDR). Based on (29), we can get
\(d g\left(\gamma_{\mathrm{e}}\right) / d \gamma_{\mathrm{e}}=\lambda_{1}^{*} \sigma_{\mathrm{E} 2}^{2}\) (31)
So far, Problem (P1)’s optimal solution can be derived of by fixing ρ . Then, optimal ρ can be obtained via the relationship γj = γD. It can be easily observed that as ρ increases, γj increases and γD decreases. In addition, \(\gamma_{j}^{\max }>\gamma_{\mathrm{D}}^{\min }\) and \(\gamma_{\mathrm{D}}^{\max }>\gamma_{j}^{\min }\).
\(h(\rho)=\gamma_{\mathrm{D}}-\gamma_{j}\) (32)
It is easy to conclude that, h(ρ) in (32) is increasing with ρ . Hence, there is only one value of optimal ρ (ρ*) satisfying the condition h(ρ*)=0. We can get the best value of ρ (ρ*) by one-dimensional search.
In conclusion, we use a three-step approach to solve Problem (P1). Firstly, we fixed ρ and γe by one-dimensional search. Thirdly, the optimal ρ* is obtained by bisection. At last, repeat the above steps until the problem is solved. The specific steps have been summarized in the Table 2 show as below.
Table 2. Specific steps of searching the optimum solution for Problem (P1)
4. Simulation Results and Performance Analysis
In this section, simulation results are given to verify PLS performance of the proposed scheme in this paper. The impacts of tolerable interference power at PD Γ , artificial noise power D and the number of relays M on the SD achievable secrecy rate are investigated with performance analysis shown as below. The specific values assigned to system parameters are originated from [27], [35-37].
Simulation parameters are set as follows. In order to simplify the process without losing generality, we set the noise power of all nodes to 0dBm and set the channel gain of SU to PD as 1. Other channel vectors and coefficients are randomly generated from i.i.d. Rayleigh fading with the respective average power values. According to [35], we set the path loss exponent to be 3. In the secondary network, the distance between SU and EVE is set to be 6m, other distances are all set to be 4m [27]. There are M = 5 relays in the secondary network and each relay is equipped with N = 4 antennas, while other nodes are equipped with single antenna. The transmission power of SD is set to be PD = 20dBm and the tolerable interference power at PD is set to be Γ = 30dBm . According to [36], the energy-harvesting efficiency η is set as 0.8. In order to better observe the impact of SU transmit power on system performance, we assume that the SU transmits signal with PS = Γ/X .
We illustrate the two-stage optimization approach to solve Problem (P2) and Problem (P3), as proposed in Section II and Section III, respectively. Fig. 2 shows the relationship between R(γe) and γe(γe > 0) with a fixed ρ . We can observe that with ρ = 0.3 and ρ = 0.5 (and many others used in our simulations for which the results are not shown here due to the space limitation), there is only one single optimal γe to maximixe R(γe), which means we can find a γe for (P3) ((uniqueness of γe* in (P3)) to solve (P2). For example, R(γe) achieves the peak values with γe* = 0.105 for ρ = 0.3 and γe*=0.075 for ρ=0.5, respectively. Fig. 3 and Fig. 4 show the plot of h(ρ) over 0 ≤ ρ ≤ 1 and the relationship between Rs and ρ, respectively. It can be observed from Fig. 3 and Fig. 4 that the optimal point ρ* =0.15 with h(ρ) = 0 can make Rs get the maximum value (uniqueness of ρ* in (P1)).
Fig. 2. R(γe) versus γe (with ρ = 0.3 and ρ = 0.5 )
Fig. 3. h(ρ ) versus ρ .
Fig. 4. RS versus ρ .
Fig. 5 shows the secrecy rate of SD versus tolerable interference power at PD. Furthermore, for security comparison, the proposed SDR-based algorithm is compared with the ZF-based solution [37]. It can be easily observed that the achieved secrecy rates increase with the growth of tolerable interference power at PD for all schemes. From Fig. 5, it is obvious that the proposed SDR-based scheme outperforms ZF-based scheme when tolerable interference power is more than 10 dBm. When tolerable interference power is less than 10 dBm, SD secrecy rate performance of SDR-based scheme is slightly worse than ZF-based scheme due to the accuracy of the one-dimensional search for γe*. When the tolerable interference power at PD is fixed, SD secrecy rate increases with CRS for two schemes, which verifies that the CRS in (11) is beneficial to the SD secrecy performance in the system.
Fig. 5. Secrecy rate of SD versus tolerable interference power at PD.
Fig. 6 depicts the secrecy rate performance versus the artificial noise power at SD. From this figure, we can find that the secrecy performances with ZF-based scheme and SDR-based scheme both up with the increase of AN power at SD. It can be also observed that the performance gap between the ZF-based scheme and SDR-based scheme becomes smaller for higher PD. The reason is that, EVE is interfered by the AN transmitted from SD in first phase. At the same time, energy harvested by optimal relay also enhances with power of AN increases, which leads to the improvement of the SINR at SD in the second phase. According to (18), when jamming power is particularly large, the secrecy rate mainly depends on SINR at relays in the first phase. Hence, the gap between the two schemes will become smaller and smaller as the power of AN increases. Moreover, in order to demonstrate the advantages of CRS, SD secrecy rate performance without CRS is also provided as comparison. It is significant that the SD secrecy performance enhances with the application of CRS.
Fig. 6. Secrecy rate of SD versus the artificial noise power at SD.
Fig. 7 shows the relationship between the secrecy rate performance and the number of relays. As expected, the secrecy rate of secondary network improves with the increase of M. In addition, under the same number of relays, the performance of SDR-based scheme is further better than ZF-based scheme.
Fig. 7. Secrecy rate of SD versus number of relays.
5. Conclusions
In this paper, we have considered the physical layer security for cognitive radio cooperative systems with SWIPT technology. Under the power constraint of secondary user, the joint power split ratio and beamforming design is studied to maximize the secret information transmission rate to the secondary destination. By applying SDR method, a general two-stage procedure has been proposed to solve the formulated non-convex design problems. In addition, extensive simulation results are provided to evaluate the security performance of our proposed scheme.
Appendixes
A. Proof of Proposition 1
For the fixed ρ , we assume that \(\boldsymbol{w}_{\mathrm{D}}^{*}\) is the optimal solution of Problem (P2) and define \(\gamma_{\mathrm{e}}^{*}=\gamma_{\mathrm{E} 2}^{*}=(1-\rho) P_{\mathrm{r}}\left|z_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}^{*}\right|^{2} / \sigma_{\mathrm{E} 2}^{2} \). Similarly, \(\boldsymbol{w}_{\mathrm{DA}}^{*}\) is assumed to be the Problem (P3)’s optimal solution and \(\gamma_{\mathrm{E} 2 \mathrm{~A}}^{*}\) is defined as \(\gamma_{\mathrm{E} 2 \mathrm{~A}}^{*}=(1-\rho) P_{\mathrm{r}}\left(z_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{DA}}^{*}\right)^{2} / \sigma_{\mathrm{E} 2}^{2}\). If \(\boldsymbol{w}_{\mathrm{DA}}^{*}\) satisfies \(\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2 \mathrm{~A}}^{*}\right)>\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}^{*}\right)\), then for the Problem (P2), solution \(\boldsymbol{w}_{\mathrm{D}}^{*}\) is better than \(\boldsymbol{w}_{\mathrm{D}}^{*}\), which means that \(\boldsymbol{w}_{\mathrm{D}}^{*}\) is not the optimal solution of Problem (P2) and does not satisfy with our assumption. Therefore, it must be \(\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2 \mathrm{~A}}^{*}\right)>\log _{2}\left(1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}^{*}\right)\). Then, for \(\gamma_{\mathrm{e}}=\gamma_{\mathrm{e}}^{*}, \boldsymbol{w}_{\mathrm{D}}^{*}\) can also be regarded as the optimal solution of Problem (P3). Hence, we have Proposition 1.
B. Proof of Proposition 2
It is easy to see that the following problem is equivalent to Problem (P2)
\(\begin{array}{cc} \mathcal{P} 2.1: & \max _{w_{\mathrm{D}}, 0 \leq \rho \leq 1} \frac{1+\gamma_{\mathrm{D}}}{1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}} \\ \text { s.t. } & \left\|\boldsymbol{w}_{\mathrm{D}}\right\|^{2} \leq 1 \end{array}\) (B1)
We assume that \(\boldsymbol{w}_{\mathrm{D}}^{*}\) is the optimal solution of Problem (P2.1) and define \(\gamma_{\mathrm{c}}^{*}=\gamma_{E 2}^{*}=(1-\rho) P_{\mathrm{r}}\left|z_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}^{*}\right|^{2} / \sigma_{\mathrm{E} 2}^{2}, \gamma_{D}^{*}=(1-\rho) P_{\mathrm{r}}\left|\boldsymbol{q}_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D}}^{*}\right|^{2} / \sigma_{\mathrm{D}}^{2}\). Thus, for Problem (P2.1), the optimal objective value is \(T^{*}=\frac{1+\gamma_{D}^{*}}{1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}^{*}}\).
Similarly, \(\boldsymbol{w}_{\mathrm{D} 1}^{*}\) is assumed to be the optimal solution of Problem (P4) at \(\gamma_{\mathrm{e}}=\gamma_{\mathrm{el}}^{*}{ }^{*}\). If \(\boldsymbol{w}_{\mathrm{D} 1}^{*}\) satisfies \((1-\rho) P_{\mathrm{r}}\left|\boldsymbol{q}_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D} 1}^{*}\right|^{2} / \sigma_{\mathrm{D}}^{2}>\gamma_{D}^{*}\), for Problem (P2.1), solution \(\boldsymbol{w}_{\mathrm{D} 1}^{*}\) is better than \(\boldsymbol{w}_{\mathrm{D}}^{*}\), which contradicts the assumption that \(\boldsymbol{w}_{\mathrm{D}}^{*}\) is the optimal solution of Problem (P2.1). In another case, we assume that \((1-\rho) P_{\mathrm{r}}\left|\boldsymbol{q}_{j}^{\mathrm{H}} \boldsymbol{w}_{\mathrm{D} 1}^{*}\right|^{2} / \sigma_{\mathrm{D}}^{2}<\gamma_{D}^{*}\), which contradicts the assumption that \(\boldsymbol{w}_{\mathrm{D} 1}^{*}\) is the optimal solution of Problem (P4), because \(\boldsymbol{w}_{\mathrm{D}}^{*}\) is better. Thus, \(\gamma_{D}^{*}=g\left(\gamma_{c}\right)\) can be obtained. For Problem (P4-EQV), T∗ can be achieved with \(\gamma_{\mathrm{e}}=\gamma_{\mathrm{e1}}^{*}\).
Furthermore, we assume that the optimal solution of Problem (P4-EQV) is \(\gamma^{*}{ }_{\mathrm{e} 2}^{}\) and the corresponding optimal value is T2*. Then, \(\boldsymbol{w}_{\mathrm{D} 2}^{*}\) is assumed to be the optimal solution of Problem (P4) with \(\gamma_{\mathrm{e}}=\gamma_{\mathrm{e2}}^{*}\). Inequality \(T_{2}^{*} \leq T^{*}\) can be proved in follows. If \(T_{2}^{*}>T^{*}\), then \(\boldsymbol{w}_{\mathrm{D} 2}^{*}\) is a better solution of Problem (P2.1), which contradicts the presumption that \(\boldsymbol{w}_{\mathrm{D} }^{*}\) is the optimal solution of Problem (P2.1). Thus, it can be seen that T∗ is not only achievable for Problem (P4-EQV), but also the optimal value of Problem (P4-EQV) where the optimal solution is \(\boldsymbol{w}_{\mathrm{D} 2}^{*}=\boldsymbol{w}_{\mathrm{D}}^{*}\) and \(\gamma_{\mathrm{e} 2}^{*}=\gamma_{\mathrm{e} 1}^{*}\) (Note that wD is a hidden design variable for Problem (P4-EQV)). Hence, we have Proposition 2.
C. Proof of Proposition 3
The KKT conditions of Problem (P4-SDR) can be expressed as
\(\begin{array}{cc} \mathcal{P} 2.1: & \max _{w_{\mathrm{D}}, 0 \leq \rho \leq 1} \frac{1+\gamma_{\mathrm{D}}}{1+\gamma_{\mathrm{E} 1}+\gamma_{\mathrm{E} 2}} \\ \mathrm{s.t.} & \left\|\boldsymbol{w}_{\mathrm{D}}\right\|^{2} \leq 1 \end{array}\) (C1)
Firstly, it is easily to observe that rank(A*) ≤ N. Then, we have Lemma 1.
Lemma 1: Two matrices Y and Z with the same dimension hold that rank(Y+Z) ≥ rank( Z) - rank(Y).
Proof: We know that if two matrices Y and Z with the same dimension,
rank(Y)+rank(Z)≥rank(Y+Z) is established. Therefore, we can get rank(Y+Z)+rank(-Y)≥rank(Z). Because rank(-Y)=rank(Y), we have rank(Y+Z)≥rank(Z)-rank(Y).
Consider the non-trivial case where \(W_{\mathrm{D}}^{*} \neq 0\), we define \(\boldsymbol{Y}=(1-\rho) P_{\mathrm{r}} \boldsymbol{Q}_{j}\), \(\boldsymbol{Z}=-\lambda_{1}^{*}(1-\rho) P_{\mathrm{r}} \boldsymbol{Z}_{j}-\lambda_{2}^{*} \boldsymbol{I}_{N}\). As a result, we have
\(\operatorname{rank}\left(A^{*}\right)=\operatorname{rank}(\boldsymbol{Y}+\boldsymbol{Z}) \geq \operatorname{rank}(\boldsymbol{Z})-\operatorname{rank}(\boldsymbol{Y})=N-1\) (C2)
According to the Sylvester inequality, we have
\(\operatorname{rank}\left(\boldsymbol{A}^{*}\right)+\operatorname{rank}\left(\boldsymbol{W}_{\mathrm{D}}^{*}\right)-N \leq \operatorname{rank}\left(\boldsymbol{A}^{*} \boldsymbol{W}_{\mathrm{D}}^{*}\right)=0\) (C3)
According to (C2) and (C3), we can get
\(N-1 \leq \operatorname{rank}\left(A^{*}\right) \leq N-\operatorname{rank}\left(W_{\mathrm{D}}^{*}\right)\) (C4)
Therefore, Proposition 3 can be proved as below.
\(\operatorname{rank}\left(\boldsymbol{W}_{\mathrm{D}}^{*}\right)=1\) (C5)
References
- S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, Feb. 2005. https://doi.org/10.1109/JSAC.2004.839380
- C. Tang, G. Pan and T. Li, "Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels," IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 609-612, Dec. 2014. https://doi.org/10.1109/LWC.2014.2350501
- S. Sun, Y. Ju and Y. Yamao, "Overlay cognitive radio OFDM system for 4G cellular networks," IEEE Wireless Communications, vol. 20, no. 2, pp. 68-73, Apr. 2013. https://doi.org/10.1109/MWC.2013.6507396
- O. B. Akan, O. B. Karli and O. Ergul, "Cognitive radio sensor networks," IEEE Network, vol. 23, no. 4, pp. 34-40, Jul.-Aug. 2009. https://doi.org/10.1109/MNET.2009.5191144
- X. Huang, T. Han and N. Ansari, "On green-energy-powered cognitive radio networks," IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 827-842, Second Quarter 2015. https://doi.org/10.1109/COMST.2014.2387697
- L. Zhou, D. Wu, J. Chen and Z. Dong, "When computation hugs intelligence: content-aware data processing for industrial IoT," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1657-1666, June 2018. https://doi.org/10.1109/JIOT.2017.2785624
- A. Bayat and S. Aissa, "Full-duplex cognitive radio with asynchronous energy-efficient sensing," IEEE Transactions on Wireless Communications, vol. 17, no. 2, pp. 1066-1080, Feb. 2018. https://doi.org/10.1109/TWC.2017.2774268
- L. Zhou, D. Wu, J. Chen and Z. Dong, "Greening the smart cities: energy-efficient massive content delivery via D2D communications," IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1626-1634, April 2018. https://doi.org/10.1109/TII.2017.2784100
- C. Jiang, H. Zhang, Y. Ren and H. Chen, "Energy-efficient non-cooperative cognitive radio networks: micro, meso, and macro views," IEEE Communications Magazine, vol. 52, no. 7, pp. 14-20, Jul. 2014. https://doi.org/10.1109/mcom.2014.6852078
- R. Zhang and C. K. Ho, "MIMO broadcasting for simultaneous wireless information and power transfer," IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 1989-2001, May 2013. https://doi.org/10.1109/TWC.2013.031813.120224
- X. Chen, Z. Zhang, H. Chen and H. Zhang, "Enhancing wireless information and power transfer by exploiting multi-antenna techniques," IEEE Communications Magazine, vol. 53, no. 4, pp. 133-141, Apr. 2015. https://doi.org/10.1109/MCOM.2015.7081086
- V. Nguyen, S. Dinh-Van and O. Shin, "Opportunistic relaying with wireless energy harvesting in a cognitive radio system," in Proc. of 2015 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, pp. 87-92, 2015.
- C. Xu, M. Zheng, W. Liang, H. Yu and Y. Liang, "Outage performance of underlay multihop cognitive relay networks with energy harvesting," IEEE Communications Letters, vol. 20, no. 6, pp. 1148-1151, Jun. 2016. https://doi.org/10.1109/LCOMM.2016.2547985
- J. He, S. Guo, F. Wang and Y. Yang, "Relay selection and outage analysis in cooperative cognitive radio networks with energy harvesting," in Proc. of 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, pp. 1-6, 2016.
- Y. Liu, S. A. Mousavifar, Y. Deng, C. Leung and M. Elkashlan, "Wireless energy harvesting in a cognitive relay network," IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2498-2508, Apr. 2016. https://doi.org/10.1109/TWC.2015.2504520
- T. Le and O. Shin, "Wireless energy harvesting in cognitive radio with opportunistic relays selection," in Proc. of 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, 2015, pp. 949-953, 2015.
- J. He, S. Guo, G. Pan, Y. Yang and D. Liu, "Relay cooperation and outage analysis in cognitive radio networks with energy harvesting," IEEE Systems Journal, vol. 12, no. 3, pp. 2129-2140, Sep. 2018. https://doi.org/10.1109/JSYST.2016.2628862
- D. W. K. Ng, E. S. Lo and R. Schober, "Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer," IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3166-3184, May 2016. https://doi.org/10.1109/TVT.2015.2436334
- L. Zhou, D. Wu, X. Wei and Z. Dong, "Seeing isn't believing: QoE evaluation for privacy-aware users," IEEE Journal on Selected Areas in Communications, vol. 37, no. 7, pp. 1656-1665, July 2019. https://doi.org/10.1109/JSAC.2019.2916452
- D. Wang, B. Bai, W. Zhao and Z. Han, "A survey of optimization approaches for wireless physical layer security," IEEE Communications Surveys & Tutorials, vol.21, no.2, pp.1878-1911, Second Quarter 2019. https://doi.org/10.1109/COMST.2018.2883144
- A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no, 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- S. Leung-Yan-Cheong and M. Hellman, "The gaussian wire-tap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978. https://doi.org/10.1109/TIT.1978.1055917
- B. Fang, Z. Qian, W. Zhong and W. Shao, "AN-aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels," IEEE Communications Letters, vol. 19, no. 9, pp. 1632-1635, Sep. 2015. https://doi.org/10.1109/LCOMM.2015.2449315
- A. Singh, M. R. Bhatnagar and R. K. Mallik, "Secrecy outage of a simultaneous wireless information and power transfer cognitive radio system," IEEE Wireless Communications Letters, vol. 5, no. 3, pp. 288-291, Jun. 2016. https://doi.org/10.1109/LWC.2016.2544828
- F. Zhou, Z. Li, J. Cheng, Q. Li and J. Si, "Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT," IEEE Transactions on Wireless Communications, vol. 16, no. 4, pp. 2450-2464, Apr. 2017. https://doi.org/10.1109/TWC.2017.2665465
- P. Yan, Y. Zou and J. Zhu, "Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems," IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2084-2096, Mar. 2018. https://doi.org/10.1109/TVT.2017.2725989
- R. Su, Y. Wang and R. Sun, "Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems," in Proc. of 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1-6, 2018.
- Y. Liu and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical layer security," in Proc. of 2012 IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, pp. 282-287, 2012.
- L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010. https://doi.org/10.1109/TSP.2009.2038412
- Y. Yang, Q. Li, W. Ma, J. Ge and M. Lin, "Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks," in Proc. of 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Darmstadt, pp. 360-364, 2013.
- S. Jia, J. Zhang, H. Zhao and R. Zhang, "Relay selection for improved security in cognitive relay networks with jamming," IEEE Wireless Communications Letters, vol. 6, no. 5, pp. 662-665, Oct. 2017. https://doi.org/10.1109/LWC.2017.2728528
- J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4871-4884, Oct. 2011. https://doi.org/10.1109/TSP.2011.2161295
- S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, pp. 215-288, 2004.
- L. Liu, R. Zhang and K. Chua, "Secrecy wireless information and power transfer with MISO beamforming," IEEE Transactions on Signal Processing, vol. 62, no. 7, pp. 1850-1863, Apr. 2014. https://doi.org/10.1109/TSP.2014.2303422
- J. Jacob, A. Panicker, J. Mathew and A. P. Vinod, "Exploration of a distributed approach for simulating spectrum sensing in cognitive radio," in Proc. of 2011 International Conference on Communications and Signal Processing, Calicut, pp. 250-254, 2011.
- R. Sun, Y. Wang, X. Wang and Y. Zhang, "Transceiver design for cooperative non-orthogonal multiple access systems with wireless energy transfer," IET Communications, vol. 10, no. 15, pp. 1947-1955, 2016. https://doi.org/10.1049/iet-com.2016.0120
- W. Lu, Y. Jiang, C. Yin, X. Tao and P. Lai, "Security beamforming algorithms in multibeam satellite systems," in Proc. of 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, pp. 1272-1277, 2017.