Abstract

We investigate multiple-input single-output secured cognitive radio networks relying on simultaneous wireless information and power transfer (SWIPT), where a multiantenna secondary transmitter sends confidential information to multiple single-antenna secondary users (SUs) in the presence of multiple single-antenna primary users (PUs) and multiple energy-harvesting receivers (ERs). In order to improve the security of secondary networks, we use the artificial noise (AN) to mask the transmit beamforming. Optimization design of AN-aided transmit beamforming is studied, where the transmit power of the information signal is minimized subject to the secrecy rate constraint, the harvested energy constraint, and the total transmit power. Based on a successive convex approximation (SCA) method, we propose an iterative algorithm which reformulates the original problem as a convex problem under the perfect channel state information (CSI) case. Also, we give the convergence of the SCA-based iterative algorithm. In addition, we extend the original problem to the imperfect CSI case with deterministic channel uncertainties. Then, we study the robust design problem for the case with norm-bounded channel errors. Also, a robust SCA-based iterative algorithm is proposed by adopting the -Procedure. Simulation results are presented to validate the performance of the proposed algorithms.

1. Introduction

The fifth-generation (5G) wireless technology is expected to satisfy an increasing demand for wireless device, such as high data service and radio coverage [1, 2]. However, the explosive increase of mobile terminal has resulted in severe scarcity of radio spectrum resources, which has become an outstanding problem [35]. As one of the most efficient ways to alleviate the problem of spectrum scarcity for green communications and networks, cognitive radio (CR) is a promising approach for heightening the spectrum utilization ratio [6, 7]. In CR networks, so long as the interference produced by the secondary transmitter (ST) is tolerable to each primary user (PU), a secondary user (SU) can employ the licensed spectrum of the primary system [8]. Although CR technology can significantly increase in the spectrum efficiency, the energy scarcity still give rise to a major bottleneck problem for the quality of service (QoS) and the long lifetime of wireless users [9].

Recently, a promising technique, simultaneous wireless information and power transfer (SWIPT), has been proposed to use the radio frequency- (RF-) enabled signal harvesting power in wireless networks, which can greatly help to solve the bottleneck problem of energy scarcity [1018]. Compared to the conventional energy harvesting techniques, such as solar power and wind, there is an advantage for SWIPT in providing more stable and controllable energy to portable wireless devices [10]. For the SWIPT operation, the work [16] examined colocated receivers which employ a power splitter for energy harvesting (EH) and information decoding (ID). Therefore, it is really important to research the combining SWIPT with CR, which has the dual function of improving both the energy efficiency and spectrum efficiency, and it has attracted more attention in [1928]. In SWIPT-based CR system, the energy efficiency optimization was considered in [19, 20]. Moreover, the SWIPT approach for CR schemes was investigated in cooperative relay networks [21], a thresholding-based antenna selection multiple-input multiple-output (MIMO) systems [22], multiuser MISO system [2325, 27], cooperative nonorthogonal multiple access networks [26], and sensing-Based wideband CR [28].

On the other hand, secrecy transmission has gained attentions in communication systems [29]. Unlike traditional cryptographic methods which are normally adopted in the network layer, physical layer security was developed from information theoretical aspects to improve the secrecy capacity of wireless transmission systems [30]. In the conventional SWIPT systems, since the energy-harvesting receivers (ERs) are normally assumed to be closer to the transmitter compared with information receivers (IRs), this results in a new information security issue. In such a situation, ERs have a possibility of eavesdropping the information sent to the IRs and thus can become potential eavesdroppers [31]. As a result, physical layer security has been recognized as an important issue for SWIPT systems [32]. Moreover, a few techniques have been proposed for multiple antenna secrecy systems to cause more interference to eavesdroppers [31, 33]. In SWIPT operation, artificial noise (AN) was embedded in the transmit beamforming signal to confuse the eavesdroppers and harvest power simultaneously [33].

In addition, due to the inherent characteristics of CR with SWIPT, ERs may illegitimately access the PU bands and change the radio environment. In this case, the legitimate SU is unable to use frequency bands of the PU. Thus, in order to satisfy secure communication and EH requirement, the security of CR SWIPT with ERs is also of great importance [3438]. In [34], an outage-constrained secrecy rate maximization (SRM) problem has been investigated in an underlay MIMO CR network where the secondary transmitter (ST) provides SWIPT to all receivers. In order to guarantee secure communication and energy harvesting in MISO CR network with SWIPT, [35] studied a robust secure AN-aided beamforming and power splitting (PS) design under imperfect channel state information (CSI). For a CR network consisting of a PS-based to decode information and harvest energy simultaneously, [36] analyzed the behavior of the nodes by using game theoretic techniques and proved the existence of a unique Nash equilibrium (NE) strategy. Considering a system with ERs acting as potential eavesdroppers in CR-based SWIPT, [37] has derived a closed-form analytical expression for the exact secrecy outage probability. In a CR MIMO-SWIPT broadcast channel, [38] studied the SRM problem by designing secrecy AN-aided precoding.

Motivated by the above observations, in this paper, we study secrecy transmission over a MISO CR system with SWIPT, which consists of one primary transmitter-receiver pair (denoted as PT and PU), one multiantenna ST, multiple SUs, and multiple ERs (potentially eavesdropper). Under the perfect CSI case, we formulate a transmit power of the information signal minimization (TPISM) problem subject to the secrecy rate constraint for SUs and PU, the harvested energy constraint for ERs, and total transmit power constraint. We seek to jointly design strategies of secure beamforming and AN for MISO CR with SWIPT wiretap channels. Then, the framework is extended to robust designs for the imperfect CSI case by adopting deterministic CSI uncertainties. The main contributions for this paper are summarized as follows:(i)For the two different types of channel models, the secrecy rate constraint with linear fractional programming is equivalently converted into several constraints with exponential form by introducing exponential variables.(ii)For the perfect CSI case at ST and PT, unlike the conventional semidefinite relaxation (SDR), we propose a novel reformulation of the TPISM problem. A successive convex approximation- (SCA-) based iterative algorithm is proposed, where the nonconvex constraint is approximated as a convex one.(iii)For the imperfect CSI case, we use the norm-bounded channel uncertainty to model channel. First, by applying the triangle inequality, the original constraints can be transformed as the infinitely inequality constraints. Then, by employing -Procedure we convert these infinitely inequality constraints into finite linear matrix inequalities (LMIs). At last, by utilizing a SCA method, the recast TPISM problem is transformed to a semidefinite programming (SDP) problem, which can be directly solved to obtain a local optimal solution. A robust SCA-based iterative algorithm is proposed.

The rest of this paper is organized as follows: Section 2 presents the system model and problem formulation. In Section 3, the SCA-based iterative algorithm is proposed with perfect CSI case. Robust SCA-based iterative algorithm is developed with imperfect CSI case in Section 4. Section 5 illustrates the simulation results. Finally, we conclude the paper in Section 6.

Notation. Vectors and matrices are denoted by bold lowercase and uppercase letters, respectively. represents the Hermitian transpose. For a vector , indicates the Euclidean norm. defines the absolute value of a complex scalar. and describe the space of complex matrices and Hermitian matrices, respectively. For a matrix , means that is positive semidefinite, and indicate the trace, respectively. describes the mathematical expectation. stands for the real part of a complex number. equals . denote the identity matrix with appropriate size.

2. System Model and Problem Formulation

In this section, we consider a MISO secured SWIPT cognitive radio networks, which consists of one PT, one PU, one multiantenna ST, SU, and ERs, as shown in Figure 1. We assume that the ST is equipped with transmit antennas and each ER and each SU has one receive antenna. This system operates as follows: the primary network shares their frequency spectrum with the secondary network, whereas the confidential messages from the PT and the ST are intercepted by the eavesdroppers.

In order to achieve secure transmission, the ST employs transmit beamforming with AN, which acts as interference to the ERs and provides energy to the SUs. The transmit signal vector from the ST can be written aswhere defines the transmit beamforming vector, with is the information-bearing signal intended for the SUs, and represents the energy-carrying AN.

We assume a frequency-flat slow-fading channel. Therefore, the received signal at the PU, the th SU, and the th ER can be given by, respectively,where and are denotes by the channel between the PT and PU as well as that between the ST and PU, and indicate the channel between the PT and the th SU as well as that between the ST and the th SU, and are the channel between the PT and the th ER as well as that between the ST and the th ER, is confidential information-bearing signal for the PU from the PT satisfying , and represents the transmitting power from the PT. In addition, , , and denote the complex Gaussian noise at the PU, the th SU, and the th ER, respectively.

Thus, the channel capacity of the th SU can be written aswhere . According to [3, 25], it is assumed that the th SU can successfully decode the information from the PT by exploiting the successive interference cancellation and, thus, (5) can be rewritten as

Moreover, the channel capacity of the th ER for decoding the desired signal of the th SU can be represented as

Thus, the secrecy capacity of the th SU can be written as

In order to achieve the more reliable secrecy capacity (i.e., the minimum channel capacity at the -th SU), (7) can be thus rewritten as

Then, we can obtain a lower bound of the secrecy capacity of the th SU as follows:

Additionally, the channel capacity of the PU can be expressed asThe channel capacity of the th ER for decoding the PU is given as

Hence, the secrecy capacity of the PU under the considered worst case scenario can be written as

Moreover, the harvested power at the th ER is expressed as, respectively,where denote the energy conversion efficiency at the th ER.

In this paper, our aim is to minimize the transmit power of the information signal subject to the secrecy rate constraint at the SUs, the harvested energy constraint at the ERs, and the total transmit power constraint. Based on the system models, the TPISM problem is formulated aswhere is the total transmit power, and denote the secrecy capacity requirement of the th SU and the PU, and mean the harvested power requirement of the th ER, respectively. The constraints (15b) and (15c) guarantee that the minimum secrecy rate should be achieved by the th SU and the PU, respectively. The constraint (15d) guarantees that the minimum harvested power at the th ER is no less than , respectively. The constraint (15e) limits the total transmit power of the ST. It is seen that problem (15a) are nonconvex, difficult to be solved directly.

3. Proposed Algorithm with Perfect CSI

In this section, we investigate a joint design of the transmit beamforming and AN for systems under the assumption that the PT and ST can obtain perfect CSI. Problems (15a)–(15f) can be rewritten as

In order to solve the nonconvex problems (16a)–(16e), we firstly define and denote . Then, the constraints (16b) and (16c) can be reformulated aswhere they can be also rewritten as

For solving linear fractional programming (18a) and (18b), we can introduce the following exponential variables to equivalently convert. Then, we introduce slack variables , , , , , , , and . Equations (18a) and (18b) can be transformed as follows, respectively:

It is noted that the aforementioned constraints (19a), (19d), (19e), (20a), (20d), and (20e) are not still convex. Firstly, (19a) and (20a) can be reshaped respectively as the following convex constraints:Secondly, an SCA method is used to jointly design the secure beamforming and AN matrix. Let us define , , , and as the variables , , , and at the th iteration for the SCA method. By adopting a Taylor series expansion , we can convert the nonconvex constraints (19d), (19e), (20d), and (20e) to their corresponding convex approximations as

At last, we consider the constraints (16d) and (15e), which can be converted asAccording to equations from (16a) to (23b), an SCA-based iterative algorithm is proposed. At the th iteration, by removing the nonconvex rank-one constraint , problems (16a)–(16e) can be thus reformed as

For given as the optimal solution obtained at the th iteration, problem (24) is convex by removing the nonconvex constraint, which can be solved by using an CVX tools [39]. From SCA method, the convex approximation with the current solution is iteratively updated until the constraints (22a)–(22d) hold with equality, which implies that (16a)–(16e) can be optimally solved. The optimal solution obtained by the proposed SCA-based iterative algorithm at the th iteration is assumed to be (, , , and ), which can achieve a stable point until the SCA-based iterative algorithm converges [35], and this is summarized in Algorithm 1.

Set and initialize .
Repeat
(i) Solve problem (24) with
and denote a solution by .
(ii) Update .
Until Convergence

4. Proposed Algorithm with Imperfect CSI

Because of channel estimation and quantization errors, it may not be possible to have perfect CSI in practice. In this section, we extend the proposed algorithm to more practical scenarios with imperfect CSI. First, we introduce one scenario of the norm-bounded channel uncertainty and then provide the problem formulation based on the norm-bounded channel uncertainty. Moreover, we consider a joint robust design of transmit beamforming and AN.

4.1. Norm-Bounded Channel Uncertainty

Now, we adopt imperfect CSI based on the deterministic model [31, 35]. In particular, we assume that the actual channel vector lies within a ball with the radius around the estimated channel vector from the BS to the kth user, i.e.,where , , , , , and are the estimated channel available, the channel estimation errors , , , , , and are bounded by , , , , , and , respectively.

By taking the norm-bounded channel uncertainty model into account, the TPISM problem can be rewritten as

Utilizing a similar methodology in (17a)–(18b), the constraints (26b) and (26c) can be reformulated as

Then, by introducing , , , , , , , and as slack variables, we equivalently convert the linear fractional programming (27a) and (27b) as follows, respectively:

By employing the slack variables (i.e., , , , and ) for (28b)–(28e), respectively, (28a)–(28e) can be equivalently modified as

For the worst-case based design in (26b)–(26d), the PT channel gains are upper-bounded and lower-bounded using the following triangle inequality properties:Applying (31), it follows that

Similarly, we introduce the slack variables , , , and for (29b)-(29e). Then, by substituting the above results (32) into (29b) and (29e), respectively, we can equivalently express (29a)–(29e) asIn order to make (26b)–(26d) more tractable, by applying -procedure [40], we can convert the infinitely inequality constraints (30a)-(30d) and (33a)-(33d) into finite linear matrix inequalities (LMIs). For completeness, the -procedure is presented in Lemma 1 in the following.

Lemma 1 (-procedure [40, Appendix B.2]). Let a function with be defined aswhere , , and . Then, holds if and only if there exists such that provided that there is a point which satisfies .

To employ the -procedure, we rewrite the constraint (30a) asAccording to Lemma 1, by using a slack variable , (36) can be expressed asUsing the same approach for the constraints (30b)-(30d) and (33a)-(33d), we havewhere , , , , , , and are slack variables.

By using the above results of Taylor series expansion in (22a)–(22d), we can transform the nonconvex constraints (30g), (30h), (33g), and (33h) into the corresponding convex forms, respectively, aswhere , , , and are the variables , , , and at the th iteration for the SCA method.

Here, we consider the EH constraint (30c). By use the inequalities (32) and (26d) can be rewritten as

Introducing slack variables , we can transform (41) as

Finally, similarly to (21a) and (21b), we need to recast the nonconvex constraints (28a) and (29a) as follows:Combining all the results in (27a)–(34) and (36)–(43b), (26b)–(26d) can be reformed asFor given at the th iteration, problem (44) is a convex SDP form without the nonconvex rank-one constraint , which can be solved by convex optimization packages such as CVX [39], to update the solution for the iteration until the algorithm converges. In addition, the proposed robust SCA-based iterative algorithm with imperfect CSI is summarized in Algorithm 2.

Set and initialize .
Repeat
(i) Solve problem (44) with
and denote a solution by .
(ii) Update .
Until Convergence

5. Simulation Results

In this section, we provide the simulation results to validate the performance of our proposed algorithms. We consider a system with two SUs and two ERs. The ST is equipped with six transmit antennas (). We define m, m, and m as the distance between the ST and the th SU, the th ER, and the PU, respectively. Also, we fix m, m, and m as the distance between the PT and the th SU, the th ER, and the PU, respectively, unless otherwise specified. Thus, the estimated channels , , , , , and , are respectively, modelled as , , , , , and , where , , and , and we set the speed of light, the carrier frequency, and the path loss exponent as , MHz, and , respectively. In addition, the noise power at the PU, SU, and ER is assumed to be . Also the additional noise power of all the SUs is . We fix the channel error bound for the deterministic model as and . The EH efficiency coefficients are set to 0.3. In our simulations, we compare the following transmit designs: the perfect CSI case, robust SCA-based scheme, no-AN scheme which is obtained by setting , and the nonrobust scheme which assumes no uncertainty in the CSI.

Figure 2 illustrates the convergence performance of the proposed SCA-aided iterative algorithm with respect to (w.r.t.) iteration numbers. Here, we set bps/Hz, dBm, dBm, and . It is easily seen from the plots that the convergence of all perfect CSI cases can be quickly achieved within 5 iterations. It is observed that robust SCA-based scheme converges slower than the perfect CSI case regardless of . This is due to the fact that the number of variables in the robust SCA-based scheme is greater than the perfect CSI case.

Figure 3 compares the average transmit power of the information signal w.r.t. the target secrecy rate at SU with bps/Hz, dBm and dBm. It is observed that the performance gaps of perfect CSI scheme with and over the robust SCA-aided iterative algorithm are dB and dB at all target secrecy rate region, respectively. Also, the transmit power for the no-AN scheme grows faster than the robust schemes as increases. We can see that, for and , the robust SCA-aided iterative algorithm outperforms the no-AN scheme and nonrobust scheme. This is due to the help of the AN.

Moreover, the transmit power of the information signal performance is plotted in Figure 4 with bps/Hz, dBm, and dBm. One can observe from Figure 4 that the average transmit power of the information signal increases as the target secrecy rate at PU becomes large. Also, the performance gap between the robust SCA-aided iterative algorithm and the no-AN scheme becomes large at high secrecy rate region. Also, there are dB and dB gaps between perfect CSI and robust SCA-aided iterative algorithm curves for and , respectively.

Finally, in Figure 5, the transmit power of the information signal w.r.t. the target harvested power is illustrated with bps/Hz and dBm. We can see that the robust SCA-aided iterative algorithm with outperforms the nonrobust scheme by dB and the performance gains of the robust SCA-aided iterative algorithm over the no-AN scheme become larger as the target harvested power increases. Similarly, when dBm, the performance of the proposed algorithms changes slowly. This is due to the introduction of AN for the CR system.

6. Conclusion

In this paper, we have studied AN-aided secure beamforming designs for MISO Secured CR networks with SWIPT. Our aim is to minimize the transmit power of the information signal subject to the secrecy rate constraint, the harvested energy constraint, and total transmit power constraint. As the original problem is nonconvex, we recast the original problem as a convex form by using SCA method. Then, we have proposed an SCA-based iterative algorithm for the perfect CSI case. Moreover, we have extended the proposed algorithm to the norm-bounded channel uncertainty model. Finally, simulation results have been given to validate the performance of our proposed algorithms.

Data Availability

The original code of this paper cannot be made available.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported in part by the National Nature Science Foundation of China under Grants no. 61571402 and 61771431 and by the National Science and Technology Major Project under Grant no. 2017ZX03001001.