Next Article in Journal
Radar/INS Integration and Map Matching for Land Vehicle Navigation in Urban Environments
Previous Article in Journal
Monte Carlo Simulation of Diffuse Optical Spectroscopy for 3D Modeling of Dental Tissues
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resource Allocation for a Secure SWIPT Network Based on a Quantitative Energy Harvesting Mechanism

1
School of Information and Electrical Engineering, Hebei University of Engineering, Handan 056038, China
2
Institute of Advanced Computing and Digital Engineering, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(11), 5117; https://doi.org/10.3390/s23115117
Submission received: 30 April 2023 / Revised: 21 May 2023 / Accepted: 25 May 2023 / Published: 27 May 2023
(This article belongs to the Section Electronic Sensors)

Abstract

:
Simultaneous wireless information and power transfer (SWIPT) technology can effectively extend the lifecycle of energy-constrained networks. In order to improve the energy harvesting (EH) efficiency and network performance in secure SWIPT networks, this paper studies the resource allocation problem based on the quantitative EH mechanism in the secure SWIPT network. Based on a quantitative EH mechanism and nonlinear EH model, a quantified power-splitting (QPS) receiver architecture is designed. This architecture is applied in the multiuser multi-input single-output secure SWIPT network. With the goal of maximizing the network throughput, the optimization problem model is established under the conditions of meeting the legal user’s signal-to-interference-plus-noise ratio (SINR), EH requirements, the total transmit power of the base station, and the security SINR threshold constraints. Due to the coupling of variables, the problem is a nonconvex optimization problem. To deal with the nonconvex optimization problem, a hierarchical optimization method is adopted. Firstly, an optimization algorithm based on the optimal received power of EH circuit is proposed, and a power mapping table is constructed through the optimization algorithm, from which the optimal power ratio to meet the user’s EH requirements is obtained; then, the nonconvex problem is transformed into a convex problem by using variable substitution, semidefinite relaxation, dichotomous optimization, etc. The simulation results show that compared with the power splitting receiver architecture, the input power threshold range of the QPS receiver architecture is larger, which can avoid the EH circuit falling into the saturated working area and maintain high network throughput.

1. Introduction

With the large-scale commercial use of 5G technology, the situation of the Internet of Everything has gradually formed [1,2,3], energy-constrained networks such as wireless sensor networks and remote wireless LANs are troubled by the continuous supply of energy, and it is difficult to achieve large-scale development and application [4,5]. Simultaneous wireless information and power transfer (SWIPT) technology uses radio frequency (RF) signals to carry information and energy and simultaneously realizes information decoding (ID) and energy harvesting (EH) [6,7,8]; it prolongs the lifecycle of wireless sensor network nodes, provides a new opportunity for the development of energy-constrained networks, and has become one of the hot technologies currently researched in the field of wireless communication. SWIPT receivers convert collected RF signals into energy or information required by the terminal equipment.
When collecting wireless energy in the SWIPT network, the energy carried by the RF signal is transmitted to the receiving end through the antenna at the transmitting end. After collecting the RF signals, the antenna at the receiving end converts the energy in the signal through the nonlinear EH circuit and outputs the converted energy to the energy demand end to complete the collection, distribution, and utilization of wireless energy. The conversion efficiency of the RF to direct current (RF-DC) is a key indicator for evaluating the EH circuit, which indicates the ratio of the output power of the circuit to the power of the input RF signal. Many research works have shown that with the increase in the input RF signal power, the conversion efficiency of the RF-DC gradually decreases in the saturation region [9,10,11]. Therefore, in order to reduce the energy loss, designing new EH receivers and energy receiving mechanisms is important to improve the conversion efficiency of the RF-DC. Multiantenna technology can improve the channel capacity and communication rate. In the network based on SWIPT technology, multiple users can simultaneously transmit the required data in the same spectrum through multiantenna technology [12]. However, the combined application of the multiantenna technology and SWIPT technology not only has a large energy consumption [13], increasing the energy consumption costs, but also leads to serious inter-symbol interference and spectrum overlap. Therefore, it is not only necessary to design a communication system with high energy conversion efficiency to extend the lifecycle of energy-constrained terminal equipment but also to take effective measures to combat channel interference. It is worth noting that orthogonal frequency division multiplexing (OFDM) technology divides channels into mutually orthogonal subchannels, which can effectively reduce inter-symbol interference [14]. The combination of SWIPT and OFDM technologies can not only give full play to their respective technical advantages but can also effectively combat the above channel fading issues, significantly improving network throughput [15].
In addition, the broadcast characteristics of wireless channels can easily lead to user information leakage; so, it is an important issue to ensure the security of user communication. In [16], the author used the hybrid beamforming design scheme to improve the security energy efficiency of the system. In [17], the author used the signal-to-leakage-plus-noise ratio to improve the security energy efficiency of multibeam communication system. In [18], the author used the inter-user interference to realize the robust beamforming design, which aimed to enhance the system communication security and guarantee the EH requirements. When users collect wireless energy, other user information can be obtained through RF signals. To interfere with eavesdroppers intercepting legitimate user information, a common method is to add artificial noise (AN) to the received signal of the legitimate users [19,20].
In SWIPT-based networks, the application of multiantenna technology, AN technology, OFDM technology, etc., in network optimization and resource allocation has been studied in many existing works. In [15], based on the OFMA technology, in the IRS-assisted SWIPT network, the author used the nonlinear energy collection model to jointly optimize the PS ratio and transmit power to improve the network information transmission rate. In [21], a receiver based on double-layer power splitting (PS) architecture was used in a multiantenna SWIPT network to optimize the confidentiality energy efficiency. In [22], a multiuser SWIPT network model with nonlinear energy collection was constructed. In order to maximize the EH while minimizing the transmission power consumption, beamforming design and antenna selection schemes were layered and optimized. In [23], AN-assisted transmission was used to maximize the confidentiality efficiency of the SWIPT network and jointly optimized the digital precoding vectors, the AN covariance matrix, and power allocation ratios under nonlinear EH constraints. The authors in [21,24] studied the power allocation of multiuser multiple-input single-output (MISO) systems with multiple nonlinear EH circuit models, used multiple energy collection circuits to collect energy, and proposed PS EH receiver architecture, which breaks through the performance limitation of a single EH circuit on the system saturation effect. However, the distance of the PS EH system they designed was relatively complex, and there was still a certain distance from the actual application.
Improving the efficiency of wireless energy collection and the stability of energy supply can effectively extend the lifecycle of energy limited local area networks. Therefore, it is necessary to design a new type of EH model. With the explosive growth in the data transmission volume, it is necessary to improve the information transmission rate while ensuring communication security. Quantitative EH is the process of optimizing, segmenting, and collecting energy during the energy collection process. The nonlinear EH model can also adopt the method of quantifying the EH. The above research adopted the nonlinear EH model and did not study the information transmission rate of the secure SWIPT system based on the quantified EH model.
Therefore, in order to fill the research gap, this paper explores the performance of a secure SWIPT network based on quantized EH receiver models. In this paper, we propose a quantitative EH model, which is applied to multiuser MISO-SWIPT networks to maximize the throughput of the SWIPT network, while meeting the signal-to-interference-plus-noise ratio (SINR) requirements of legitimate users, the EH requirements, the total transmission power of the base stations, and the security SINR threshold constraints. While ensuring the security of user communication, the transmission rate of information is improved. The main contributions are summarized as follows:
  • We quantify the energy collection process to improve the conversion efficiency of the EH process. Compared with the receiver architecture containing multiple nonlinear EH circuits, the quantized power division receiver architecture proposed in this paper considers the RF-DC conversion efficiency of the circuit in the EH receiver, quantifies the input power of the receiver based on the optimal receiving power, and improves the conversion efficiency of the receiver EH process.
  • To meet the user’s EH demand, an optimization algorithm (Figure 1) based on EH circuit characteristics is proposed to construct a power mapping table. In order to facilitate obtaining the minimum input power of the receiver corresponding to the user’s EH requirements, this paper proposes an optimization algorithm based on the circuit input and output power characteristics to determine the number of power shunts and constructs the corresponding power mapping table between the user’s EH demand and the minimum input power of the receiver. We search the power mapping table to find the circuit input power and power shunt number that meet the user’s EH needs.
  • The hierarchical optimization method is used to solve the nonconvex optimization problem constructed in this paper. First, the equivalent transformation method is used to transform some constraints into convex constraints. Then, the power mapping table is used to transform the EH requirements constraints that are difficult to solve directly. Secondly, the variable replacement, semidefinite relaxation, binary optimization, and other methods are used to transform the problem into a convex optimization problem. Finally, the convex optimization problem is solved with the help of optimization tools CVX and the optimization algorithm.
  • We design a joint optimization algorithm (Figure 1) based on a QPS receiver to maximize network throughput. With the help of the power mapping table, a joint optimization algorithm based on the quantized power segmentation and dichotomous method is designed to optimize the allocation of resources in the secure energy-carrying network based on QPS receivers and to maximize the throughput of SWIPT network.
The simulation results show that the joint optimization algorithm has good convergence under the quantized EH model. Compared with the PS receiver architecture, the QPS receiver architecture based on the nonlinear quantized power division model can avoid the EH circuit falling into the saturated working area and can maintain high network throughput. In addition, compared with the PS receiver architecture, the QPS receiver can maintain a near-optimal EH conversion efficiency in a wide receiving power domain, which helps to improve the RF-DC conversion efficiency of the receiver.
The rest of this paper is organized as follows. Section 2 presents the system and network models. In Section 3, the problem formulation, transformation methods, and optimization process are elaborated. In Section 4, the simulation results and analysis are provided. Finally, the paper is concluded in Section 5.
Algorithm 1. Optimize power allocation for the power mapping table
1: Input parameters a n , b n   M n , etc., P n ( 0 ) = 0 ;
2: Let the input power P n ( t ) = t ( m W ) , f ( t ) = E n l / P n l , l ( 0 , 1 ) ;
3: η Q = P n / E n N L , E n N L = E n l + [ L ] P o ;
4: P o = arg max f ( t ) : = { t | t > 0 } ;
5: y n ( t / n ) = E n l ( t / n ) = φ n ( P n ( t ) ) M n Ω n 1 Ω n ;
6: Loop solution;
   initialization, t = 0.1 , T = 70 ( m W ) , etc., shunt number L o = n = 1 , N Z + ;
   for  t = 0.1 ; t T ; t = t + 0.1  do
     if  n < = N , then
       y n ( t / n ) > = y n + 1 ( t / n + 1 ) , output y * = y n ( t / n ) , t * = t , L o * = n * = n ; Break;
     else  n = n + 1 ; return if;
7: Output result, conversion efficiency:  η * = y * / t * ; return { y * , t * , L o * , η * , η Q } .
Algorithm 2. The joint resource optimization algorithm based on the QPS EH mechanism and dichotomous method
1: Initialization γ n , P max , Γ ¯ , K , δ n 2 , N , and other parameters;
2: Build the power mapping table through Algorithm 1;
3: Input, l = 0 , r = 1 , t = 0 , C ( 0 ) = 0 , ρ n ( t ) = 0 , and n = 1 , 2 , , M ;
4: Let t = t + 1 , ρ n ( t ) = L + l 2 , n = 1 , 2 , , M ;
5: Find the power mapping table according to the user requirements E min , n to obtain P n and the optimal shunt number L o * ;
6: Solve the optimization problem P 4 to obtain { W n * , W E * , Z n * } and C ( t ) ;
7: Update  Δ ρ n ( t ) = ρ n ( t ) + τ ;
8: Substitute  Δ ρ n ( t ) into P 4 to obtain Δ C ( t ) ;
9: If  Δ C ( t ) C ( t ) > ξ , then  l = ρ n ( t ) , else  r = ρ n ( t ) ;
10: Iteration steps 4 ~ 10 , until  r l ε ;
11: Assignment ρ n * = l , judge the rank of W n * ( t ) , W E * ( t ) , and Z n * ( t ) separately; if the rank is 1, then perform rank-one decomposition, else Gaussian randomization is carried out to obtain the optimized variable, and obtain w n * ( t ) , w E * ( t ) , and z n * ( t ) ;
12: Return { w n * , w E * , z n * , ρ n * , L o * } .

2. System Model

2.1. Transmission Scheme

This paper investigates a multiuser MISO secure SWIPT network in the downlink. As shown in Figure 2, the SWIPT network adopts an OFDM access mode, there are I single antenna users within the coverage area of the multiantenna BS, and the network bandwidth is divided into multiple quadrature subchannels. When the BS transmits signals to N legitimate users with N T antennas, idle K users ( K = I N ) may eavesdrop on legitimate user information. For simplicity, we use n and k to indicate the n th legitimate recipient and the k th eavesdropper, respectively, n N { 1 , 2 , , N } , k K { 1 , 2 , , K } .
In order to ensure the security of communication, artificial noise (AN) is embedded in the transmitted signal. Thus, the transmitted signal can be given by:
x = n = 1 N w n s n + z n + w E ,   n ,
where s n represents the user’s independent Gaussian data symbol, E { | s n | 2 } = 1 , w n N T × 1 is the beamforming vector of the n th legitimate receiver, and z n N T × 1 represents the AN vector with a power of P n H = T r ( z n z n H ) . w E is the energy signal transmitted by the transmitter, which is a Gaussian pseudo-random sequence that supplies energy to the user, i.e., w E C N ( 0 , W E ) , where W E represents the covariance matrix of the energy signal at the transmitter. In addition, all subchannels adopt block static flat fading channels, the channel vector within the block remains unchanged, and the equivalent channel responses from the BS to the n th legitimate user and the k th eavesdropping user are denoted by h n N T × 1 and g k N T × 1 , respectively. The signal received by the n th legitimate user can be written as follows:
y n = h n H w n s n + h n H ( z n + w E ) + n n ,   n ,
where n n C N ( σ n 2 ) is the Additive White Gaussian Noise (AWGN) at the n th user, and the power is σ n 2 . Since σ n 2 generally has much lower noise power than the noise power δ n 2 introduced by the baseband processing circuit in ID process, similar to many existing works [21,25], σ n 2 is ignored in the analysis below.
In the legal channel, the AN is transmitted in zero space and can be eliminated by the receiver. Let z n R n d n , where R n R n H = I , d n C N ( 0 , Σ ) , R n is the orthogonal basis of h n H zero space, and h n H R n = 0 , so that the AN contained in the received signal by legitimate user n is completely eliminated. The receiving end of the legitimate user n applies PS power splitting technology, the power splitting ratio ρ n for ID, 0 < ρ n < 1 , H, and the remaining power proportional 1 ρ n is used for EH; so, the legitimate user n in the downlink receives the signal for EH, which can be expressed as:
y n E H = 1 ρ n ( h n H w n s n + h n H w E ) ,   n .
Assuming that the interference with the energy signal w E can be perfectly eliminated by the ID process of each legitimate receiver [12], the signals collected for the ID by legitimate users can be given as:
y n I D = ρ n ( h n H w n s n + ϑ n ) ,   n ,
where ϑ n C N ( 0 , δ n 2 ) is the noise generated by the ID receiver processing the baseband signal, with a mean of zero and a variance of δ n 2 . Since the OFDM access transmission mode is used, and the subchannels for transmitting information between users are orthogonal to each other, the SINR of the legitimate users n can be expressed as:
S I N R n = ρ n | h n H w n | 2 δ n 2 ,   n .
Eavesdropping users cannot obtain the AN signal designs for legitimate channels; so, the AN cannot be eliminated. When eavesdropping user k collects information from legitimate user n , its received signal can be given by:
y k , n E A = g k H w n s n + g k H z n + ϑ n ,   n .
The noise σ n 2 generated by the antenna is small enough relative to the EH power to be ignored during the EH process [26]. According to the user’s EH power distribution ratio, the n th user’s EH power can be determined by:
P n = ( 1 ρ n ) E { i = 1 N | h n H w n | 2 + | h n H w E | 2 + | h n H z n | 2 } ,   n .
When user k intercepts the received information of legitimate user n , its SINR can be written as:
y k , n E A ( w n , z n ) = | g k H w n | 2 | g k H w n | 2 + δ n 2 ,   n , k ,
and the total transmit power of the BS can be given by:
P T ( w n , w E , z n ) = n = 1 N ( | | w n | | 2 + | | z n | | 2 ) + | | w E | | 2 ,   n .

2.2. Quantitative EH Model

Due to the nonlinear characteristics of the diode, there is a saturated input voltage. Therefore, in the nonlinear EH circuit, during the process of gradually increasing the input power, the RF-DC conversion efficiency of the actual energy acquisition circuit first increases and then decreases, and the energy conversion efficiency is not high. Thus, when the input power is large, it is necessary to use the multi-energy harvesting circuit to collect energy, and the energy allocation problem of the multi-energy harvesting circuit is worth studying.
From a practical perspective, this section introduces a nonlinear EH model with adjustable parameters based on the sigmoidal (S-type) function [27], which combines the actual measurement data of [28] and adjusts the parameters to accurately simulate the input and output power characteristics of the EH circuits. The EH model [27], based on the S-type function has been widely used in the nonlinear energy collection network model [24,26,29,30] since it was proposed. The input and output power characteristics and conversion efficiency curves of the EH circuit are shown in Figure 3. It is worth noting that when the input power is connected to the area around 21.5 mW, it is closer to the saturation output power (23 mW) of the EH circuit, and the conversion efficiency is higher. In this case, while maintaining high conversion efficiency, it ensures the efficient utilization of the input power threshold of the EH circuit. Based on the above analysis and experimental comparison of the EH circuit’s power distribution with a nonlinear S-type function EH model, a receiver system architecture using quantified power allocation is proposed.
In the ID, in order to avoid the input power of the EH circuit in the saturation zone, a quantified power-splitting (QPS) receiver based on multiple EH circuits is proposed. Since the ID and EH processes are in different modules, the QPS receiver divides the RF signal power received by legitimate user n into two parts, one for the ID and one for the EH. Then, according to the characteristics of the circuit, as shown in Figure 3a, since the ratio of the input power to the output power of a single EH circuit is maximum at P o , the received power P n is quantized by the input power at P o (i.e., quantization power), and the number of power shunts is determined by the ratio of the received power to the quantified power, which is given by the following formula:
L = P n P o ,   n ,
l = L [ L ] ,
P n l = l P n ,   n .
Let L o = [ L ] , represent the number of power shunts, [ · ] represents the rounding operation, and l is the fractional part of L . For a legitimate user n , the total power collected during the EH process in the QPS receiver can be expressed as:
E n N L = E n l + [ L ] P o ,   n ,
E n l = φ n M n Ω n 1 Ω n ,   n ,
Ω n = 1 1 + exp ( a n b n ) ,   n ,
φ n = M n 1 + exp ( a n ( P n l b n ) ) ,   n ,
where φ n is the sigmoidal function, and Ω n is a constant to guarantee an input/output response of zero. In addition, parameters a n and b n are constants related to circuit characteristics. M n is a constant representing the maximum output power of a single EH circuit at saturation. Note that parameters a n , b n , and M n can be obtained by the curve fitting tool [27]. The proposed QSP EH model is used to describe the throughput of the system, and the resource allocation algorithm is designed. The network throughput based on the QPS receiver architecture can be given by C = T n = 1 N log ( 1 + ρ n | h n H w n | 2 δ n 2 ) .

3. Problem Formulation and Transformation Solution

3.1. Problem Formulation

In the multiantenna MISO-SWIPT communication network based on OFDM, the nonlinear multi-circuit QPS EH model is used to establish the optimization problem P 1 , with the constraints of the legitimate users’ SINR requirements, the EH requirements, the total transmission power of BS, and the security SINR threshold, aiming at maximizing the throughput of the SWIPT network. This optimization problem is mathematically formulated as:
P 1 :   max | w n , w E , z n , ρ n , L o | T n = 1 N log ( 1 + ρ n | h n H w n | 2 δ n 2 )
subject   to   ρ n | h n H w n | 2 δ n 2 γ n ,   n ,
n = 1 N ( | | w n | | 2 + | | z n | | 2 ) + T r ( W E ) P max
E n N L E min , n ,   n ,
| g k w n | 2 | g k w n | 2 + δ n 2 Γ ¯ ,   n , k ,
0 < ρ n < 1 ,   n ,
W E = 0 ,
L o N + .
In the formula, γ n , E min , n , and Γ ¯ , respectively indicate for the target SINR, the minimum harvest power required by user n , the maximum transmission power of the BS, and the upper limit of the SINR noise ratio of the illegally received signal by the eavesdropping user; L o is a positive integer, and (23) is the semi-positive definite Hermitian matrix of the energy signal. However, the constraint set in problem P 1 contains quadratic terms, has variable coupling, and is a nonconvex constraint set, which makes the problem difficult to solve.

3.2. Problem Transformation

3.2.1. Constraints Transformation

To solve problem P 1 , the partial constraint is expressed in an equivalent form. First, the nonconvex constraints (18) and (20) of problem P 1 are expressed in equivalent form, i.e., the requirement for the signal quality and the requirements for the EH. Equivalently, we express constraint (18) as:
| h k H w k | 2 γ k δ n 2 ρ n ,   n .
Since 1 / ρ n is a convex function, (25) is a convex constraint on ρ n . Note that because Ω n has no effect on the design of the optimization problem, E n N L is used directly to describe the harvested power at the n th user. Thus, the inverse function of (15) can be written as:
P n ( E n l ) = b n 1 a n ln ( M n E n l E n l ) ,   n ,
and with Equations (10), (13), and (26), constraints (20) can be transformed as:
n = 1 N ( | h n H w n | 2 + | h n H z n | 2 ) + | h n H w E | 2 P n ( E min , n ) 1 ρ n ,   n ,
which is a convex constraint about ρ n , because 1 / ( 1 ρ n ) is a convex function. Inequality (21) can be replaced with the following constraints:
| g n H w n | 2 Γ ¯ | g n H w n | 2 δ n 2 ,   n .
The following determines the more independent integer variable L o . When the EH circuit characteristics are determined, for a given EH requirement E min , n , each power shunt number L o has a unique optimal EH circuit number corresponding to it. Based on this observation, by searching for the conversion efficiency mapping table corresponding to the EH circuit’s input and output power, the uniquely determined optimal number of power shunts can be obtained. Part of the conversion efficiency mapping is shown in Table 1, and the method of obtaining Table 1 is summarized as Algorithm 1.

3.2.2. The Power Mapping Table

The steps of applying Algorithm 1 to construct the power mapping table are summarized on page 4.
Algorithm 1 starts from the actual characteristics of the EH circuit; when determining the number of power shunts, the number of comparisons is small, which is effective for determining the L o from small to large, and the mapping table required for EH can be constructed efficiently and completely. In [24], the author adopted the SMO method (with a computational complexity of O ( M ^ 2 L ) ), and the proposed Algorithm 1 has a lower computational complexity ( O ( 10 N T ) ).
In addition, building the mapping table offline does not add computational complexity to the inline beamforming design. Table 1 shows an example of a mapping table, where M k = 23   mW , and L o * represents the optimal number of power shunts. η 2 , η 3 , and η * represent the two and three equal divisions of power P n and the optimal conversion efficiency, respectively.
The conversion efficiency units are %, the power units are mW , η Q , and η 1 , which represent the RF-DC conversion efficiency of the QPS receivers and the traditional single-circuit EH receivers, respectively, and η 1 P n < E min , n indicates that the user EH requirements are not supported. It can be seen that the QPS receiver improves the conversion efficiency of the RF-DC and, more importantly, breaks through the limitation of the output DC power. According to the correspondence of the mapping table, the EH requirements constraint of user n can be satisfied by the convex constraint (27).
Figure 4 shows the conversion efficiency trend plotted by the reference Algorithm 1, showing the change trend of the input and output conversion efficiency of some EH circuits. With the gradual increase in the input power, when the number of circuits is 1~3, only part of the power segment occupies the optimal EH conversion efficiency; in sharp contrast to this, with the increase in the input power, the conversion efficiency ( η Q ) of the quantified power input curve was around the optimal EH conversion efficiency, fluctuating slightly and tending toward the optimal EH conversion efficiency. It can be seen that the quantized power input scheme has better stability than the optimal shunt input scheme, and the EH conversion efficiency η Q of the QPS receiver tends to the optimal EH conversion efficiency when the input power is large. Therefore, a quantized QPS receiver with stable output EH conversion efficiency is adopted.

3.2.3. Variable Substitution and Optimization Solution

We define Z n = z n z n H , n and obtain | | w n | | 2 = T r ( W n ) , | | z n | | 2 = T r ( Z n ) ; similarly, we define H n = h n h n H and G k = g k g k H , n , k , the matrix W n is positively definite, satisfying R a n k ( W n ) = 1 , n , and after variable substitution, the optimization problem P 1 can be rewritten as:
P 2 :   max | W n , W E , Z n , ρ n | T n = 1 N log ( 1 + ρ n T r ( H n W n ) δ n 2 ) .
s . t .   T r ( H n W n ) γ n δ n 2 ρ n ,   n ,
n = 1 N ( T r ( W n ) + T r ( Z n ) ) + T r ( W E ) P max ,
n = 1 N ( T r ( H n W n ) + T r ( H n Z n ) ) + T r ( H n W E ) P n ( E min , n ) 1 ρ n ,   n ,
T r ( G k W n ) Γ ¯ T r ( G k Z n ) δ n 2 ,   n , k ,
0 < ρ n < 1 ,   n ,
W n , W E , Z n = 0 ,   n ,
R a n k ( W n ) = 1 , R a n k ( W E ) = 1 , R a n k ( Z n ) = 1 ,   n .
Using the semidefinite relaxation (SDR) method, dropping the rank-one constraint in the problem P 2 , the optimization problem can be relaxed as:
P 3 :   max | W n , W E , Z n , ρ n | T n = 1 N log ( 1 + ρ n T r ( H n W n ) δ n 2 ) ,
s . t .   ( 30 ) ( 35 ) .
Since the objective function (29) and constraints (30) and (32) have coupling variables ρ n , when ρ n is determined, the optimization problem P 3 can be rewritten as:
P 4 :   max | W n , W E , Z n | T n = 1 N log ( 1 + ρ n T r ( H n W n ) δ n 2 ) ,
s . t .   ( 30 ) ( 35 ) .
As shown in Equation (41), the Hessen matrix of the objective function of problem P 4 is α 2 and has eigenvalues less than zero; thus, Equation (39) is a concave function. Constraints (30)–(35) are convex sets. Therefore, the optimization problem P 4 is a convex problem that can be solved by the CVX toolbox [31].
α 2 = [ 1 ( δ n 2 ρ n 2 + T r ( H n W n ) ) 2 0 0 0 ] .
For the variable ρ n , within its feasible range, the optimal solution ρ n * can be obtained by dichotomy, and after determining ρ n * , the optimization tool CVX is used to solve the problem P 4 to obtain the optimal solution { W n * , W E * , Z n * }. The P 1 problem is equivalent to the P 2 problem, the P 2 problem is transformed into the P 3 problem by the SDR method, and the solution to the P 3 problem is an approximate solution of P 2 . Thus, the solution to the P 3 problem, which is obtained by using the dichotomy and the CVX tool, is the approximate optimal solution of the original optimization problem P 1 .
The solution method of the original problem is summarized as an optimization Algorithm 2, which is based on the QPS EH mechanism and the dichotomous method, and is summarized on page 5.

4. Simulation Results

This section compares and analyzes the performance of the joint optimization algorithm under the EH models and QSP receiver architecture. In the multiuser MISO secure SWIPT network model, as shown in Figure 2, the distance between the BS and the legitimate users as well as the eavesdropping users was equal, and both were set as d = 2   m . The number of antennas equipped with the BS was N T = 4 . The legitimate users and the eavesdropping users were equipped with a single antenna. The target SINR of the legitimate user was γ n = 10 dB . In addition, the BS transmit power was P max = P ¯ × N = 30 dBm . The number of legitimate users was N = 3 , and the number of eavesdropping users was K = 1 . The noise power at the ID process was δ n 2 = 40 dBm . Channel models h n and g k are random variables that follow the Gaussian distribution of zero mean and unit variance. The user’s EH threshold E min , n = 42 mW , and the security SINR threshold Γ ¯ = 0 dB . The parameters of the nonlinear EH circuits were M n = 23 mW , a = 1900 and, b = 0.003 .
When the transmission power of the BS was fixed, the relationship between the system throughput and the EH threshold under different EH models is shown in Figure 5. The system throughput decreased with the increase in the EH threshold. Since the BS transmission power remained unchanged, more power was allocated to the EH process. The energy allocated to the ID process was reduced, and the system data transmission rate was reduced. Compared with the steeper curve of the linear EH model, the trend of the nonlinear QPS EH model curve was more realistic. When the conversion efficiency of the linear EH model was set to 0.4 and 0.7, the energy that could be collected by the EH circuit was reduced due to misestimation, which could not meet the user’s energy collection needs; thus, the algorithm designed in this paper allocates more energy to the EH process under the linear EH model. When the linear EH conversion efficiency reached 0.9, as the energy collection circuit reached the saturation zone, the conversion efficiency decreased, and the actual collected energy was less than the theoretical calculation, resulting in the user’s EH requirements not being met. Therefore, compared with the linear EH model, the resource allocation scheme based on the nonlinear EH model can predict the network performance more accurately and meet the user’s EH requirements.
Figure 6 shows the variation trend of the network throughput with user EH thresholds under different receiver architectures. Compared with other receiver models, the QPS receiver model maintained a high network throughput. With the increase in the EH threshold, the energy used to decode the legitimate user information decreased; thus, the system throughput under different receiver models gradually decreased. When the single PS receiver model was adopted, and the EH threshold was greater than 20 mW, the EH capacity range of the PS receiver exceeded the EH threshold and could not meet the user’s EH requirements. When the EH threshold was greater than 23 mW, due to the limitation of the saturated output power (the saturation output power threshold was 23 mW), the system allocated all the energy to the EH process, which still could not meet the user’s EH requirements, and the system could not perform the ID process. Although the limitation of saturated output power could be avoided by using a QPS receiver model with a power splitting ratio of 0.5, the reachable network throughput was lower than that of the QPS receiver model, because the receive power splitting ratio ρ n was not optimized.
The relationship between the system throughput between the different EH thresholds and the safety SINR thresholds is shown in Figure 7. The system throughput increased with the increase in the safety SINR threshold. The reason is that when the security SINR threshold of eavesdropping users increased, the power allocated to the AN decreased, and the energy used for the ID processing of legitimate users increased, resulting in greater system throughput. When the security SINR was constant, the system throughput decreased with the increase in the EH threshold. The reason is that the energy used for the ID decreased with the increase in the user’s EH requirements, resulting in the decrease in the information transmission rate.
The relationship between different BS transmission powers and network throughputs is shown in Figure 8. The network throughput increased with the total transmission power of the BS. This is because when the network EH threshold and security SINR remained unchanged, the energy used for the ID increased with the increase in the BS total transmission power, resulting in greater network throughput. When the transmission distance was constant, the network throughput increased with the increase in the number of the BS antennas. The reason is that the channel gain of SWIPT system increased with the increase in the number of the BS antennas, and the transmission quality of the signal increased. When the number of the BS antennas was constant, the network throughput decreased with the increase in the distance between the BS and the user. The reason is that with the increase in the transmission distance between the user and the BS, the signal transmission path loss increased, which made the channel transmission quality worse, resulting in a decrease in network throughput.
The convergence of the joint optimization algorithms based on the quantized EH and dichotomous method is shown in Figure 9. Due to the advantages of the dichotomous method and the range of the PS factor being (0, 1), in the first five iterations of the network throughput and the PS factor, the search range of the optimization variables of the algorithm was rapidly narrowed, and the range of the optimal value was approximated. Then, the algorithm began to refine the search, converged at the tenth iteration, and the PS factor and network throughput reached the optimal value, indicating that the joint optimization algorithm had good convergence.

5. Conclusions

This paper aimed to maximize the network throughput and study the resource allocation problem in multiuser MISO secure SWIPT networks with an AN. Inspired by the nonlinear EH model, a QSP receiver architecture based on quantitative EH mechanism was designed, and the receiver was applied to the EH process to avoid the receiver’s EH circuit operating in the saturation region. Under the conditions of satisfying the requirements of legitimate users’ SINR, the EH requirements, the total transmitted power of the BS, and the security SINR threshold constraints, a joint optimization algorithm based on the quantization model was proposed to solve the nonconvex optimization problem of maximizing the network throughput. The QSP receiver architecture proposed in this paper can achieve near optimal EH conversion efficiency, and compared with the PS receiver architecture, the input power threshold range is larger, which can avoid the saturation zone of the EH circuit and maintain high network throughput. However, the QPS EH mechanism proposed in this paper has not been applied in practice. Therefore, the gap between the theoretical and practical applications provides a direction for future research.

Author Contributions

Conceptualization, L.Z. and L.X.; methodology, L.Z.; software, L.Z.; validation, L.Z., L.X. and X.G.; formal analysis, L.Z.; investigation, L.Z.; resources, L.X.; data curation, L.Z.; writing—original draft preparation, L.Z.; writing—review and editing, L.Z. and L.X.; visualization, L.Z.; supervision, L.X., X.G. and C.W.; project administration, L.X.; funding acquisition, L.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work is partly supported by the Natural Science Foundation of Hebei Province under grant F2021402009.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lv, Z.; Lou, R.; Li, J.; Singh, A.K.; Song, H. Big data analytics for 6G-enabled massive internet of things. IEEE Internet Things J. 2021, 8, 5350–5359. [Google Scholar] [CrossRef]
  2. Liu, J.S.; Lin, C.H.R.; Hu, Y.C.; Donta, P.K. Joint beamforming, power allocation, and splitting control for SWIPT-enabled IoT networks with deep reinforcement learning and game theory. Sensors 2022, 22, 2328. [Google Scholar] [CrossRef] [PubMed]
  3. Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2019, 7, 16–32. [Google Scholar] [CrossRef]
  4. Tin, P.T.; Nguyen, T.N.; Tran, D.H.; Voznak, M.; Phan, V.-D.; Chatzinotas, S. Performance enhancement for full-duplex relaying with time-switching-based SWIPT in wireless sensors networks. Sensors 2021, 21, 3847. [Google Scholar] [CrossRef]
  5. Ijemaru, G.K.; Ang, K.L.M.; Seng, J.K.P. Wireless power transfer and energy harvesting in distributed sensor networks: Survey, opportunities, and challenges. Int. J. Distrib. Sens. Netw. 2022, 18, 15501477211067740. [Google Scholar] [CrossRef]
  6. Huang, J.; Zhou, Y.; Ning, Z.; Gharavi, H. Wireless power transfer and energy harvesting: Current status and future prospects. IEEE Wirel. Commun. 2019, 26, 163–169. [Google Scholar] [CrossRef] [PubMed]
  7. Basim, M.; Khan, D.; Ain, Q.U.; Shehzad, K.; Shah, S.A.A.; Jang, B.-G.; Pu, Y.-G.; Yoo, J.-M.; Kim, J.-T.; Lee, K.-Y. A Highly Efficient RF-DC Converter for Energy Harvesting Applications Using a Threshold Voltage Cancellation Scheme. Sensors 2022, 22, 2659. [Google Scholar] [CrossRef]
  8. Perera, T.D.P.; Jayakody, D.N.K.; Pitas, I.; Garg, S. Age of information in swipt-enabled wireless communication system for 5GB. IEEE Wirel. Commun. 2020, 27, 162–167. [Google Scholar] [CrossRef]
  9. Boshkovska, E.; Ng, D.W.K.; Zlatanov, N.; Koelpin, A.; Schober, R. Robust resource allocation for MIMO wireless powered communication networks based on a non-linear EH model. IEEE Trans. Commun. 2017, 65, 1984–1999. [Google Scholar] [CrossRef]
  10. Huda, S.M.A.; Arafat, M.Y.; Moh, S. Wireless power transfer in wirelessly powered sensor networks: A review of recent progress. Sensors 2022, 22, 2952. [Google Scholar] [CrossRef]
  11. Xiong, K.; Wang, B.; Liu, K.J.R. Rate-energy region of SWIPT for MIMO broadcasting under nonlinear energy harvesting model. IEEE Trans. Wirel. Commun. 2017, 16, 5147–5161. [Google Scholar] [CrossRef]
  12. Ng, D.W.K.; Lo, E.S.; Schober, R. Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wirel. Commun. 2014, 13, 4599–4615. [Google Scholar] [CrossRef]
  13. Ai, B.; Guan, K.; He, R.; Li, J.; Li, G.; He, D.; Zhong, Z.; Huq, K.M.S. On indoor millimeter wave massive MIMO channels: Measurement and simulation. IEEE J. Select. Areas Commun. 2017, 35, 1678–1690. [Google Scholar] [CrossRef]
  14. Hwang, T.; Yang, C.; Wu, G.; Li, S.; Li, G.Y. OFDM and its wireless applications: A survey. IEEE Trans. Veh. Technol. 2008, 58, 1673–1694. [Google Scholar] [CrossRef]
  15. Peng, X.; Wu, P.; Tan, H.; Xia, M. Optimization for IRS-Assisted MIMO-OFDM SWIPT System with Nonlinear EH Model. IEEE Internet Things J. 2022, 9, 25253–25268. [Google Scholar] [CrossRef]
  16. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secrecy-energy efficient hybrid beamforming for satellite-terrestrial integrated networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [Google Scholar] [CrossRef]
  17. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based secure energy efficient beamforming in multibeam satellite systems. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 2085–2088. [Google Scholar] [CrossRef]
  18. Lin, Z.; Lin, M.; Zhu, W.P.; Wang, J.-B.; Cheng, J. Robust secure beamforming for wireless powered cognitive satellite-terrestrial networks. IEEE Trans. Cogn. Commun. Netw. 2020, 7, 567–580. [Google Scholar] [CrossRef]
  19. Phan, V.D.; Nguyen, T.N.; Le, A.V.; Voznak, M. A study of physical layer security in SWIPT-based decode-and-forward relay networks with dynamic power splitting. Sensors 2021, 21, 5692. [Google Scholar] [CrossRef]
  20. Xu, Y.; Xie, H.; Liang, C.; Yu, F.R. Robust secure energy-efficiency optimization in SWIPT-aided heterogeneous networks with a nonlinear energy-harvesting model. IEEE Internet Things J. 2021, 8, 14908–14919. [Google Scholar] [CrossRef]
  21. Lu, Y.; Xiong, K.; Fan, P.; Ding, Z.; Zhong, Z.; Ben Letaief, K. Secrecy energy efficiency in multi-antenna SWIPT networks with dual-layer PS receivers. IEEE Trans. Wirel. Commun. 2020, 19, 4290–4306. [Google Scholar] [CrossRef]
  22. Jalali, J.; Khalili, A.; Rezaei, A.; Famaey, J.; Saad, W. Power-efficient Antenna Switching and Beamforming Design for Multiuser SWIPT with Non-Linear Energy Harvesting. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8 January 2023; pp. 746–751. [Google Scholar]
  23. Zhu, Z.; Ma, M.; Sun, G.; Hao, W.; Liu, P.; Chu, Z.; Lee, I. Secrecy Rate Optimization in Nonlinear Energy Harvesting Model-Based mmWave IoT Systems With SWIPT. IEEE Syst. J. 2022, 16, 5939–5949. [Google Scholar] [CrossRef]
  24. Lu, Y.; Xiong, K.; Fan, P.; Zhong, Z.; Ai, B.; Letaief, K.B. Worst-case energy efficiency in secure SWIPT networks with rate-splitting ID and power-splitting EH receivers. IEEE Trans. Wirel. Commun. 2021, 21, 1870–1885. [Google Scholar] [CrossRef]
  25. Chen, H.; Li, Y.; Jiang, Y.; Ma, Y.; Vucetic, B. Distributed power splitting for SWIPT in relay interference channels using game theory. IEEE Trans. Wirel. Commun. 2014, 14, 410–420. [Google Scholar] [CrossRef]
  26. Zargari, S.; Khalili, A.; Wu, Q.; Mili, M.R.; Ng, D.W.K. Max-min fair energy-efficient beamforming design for intelligent reflecting surface-aided SWIPT systems with non-linear energy harvesting model. IEEE Trans. Veh. Technol. 2021, 70, 5848–5864. [Google Scholar] [CrossRef]
  27. Boshkovska, E.; Ng, D.W.K.; Zlatanov, N.; Schober, R. Practical non-linear energy harvesting model and resource allocation for SWIPT systems. IEEE Commun. Lett. 2015, 19, 2082–2085. [Google Scholar] [CrossRef]
  28. Guo, J.; Zhu, X. An improved analytical model for RF-DC conversion efficiency in microwave rectifiers. In Proceedings of the 2012 IEEE/MTT-S International Microwave Symposium Digest, Montreal, QC, Canada, 17–22 June 2012; pp. 1–3. [Google Scholar]
  29. Peng, C.; Chen, Y.; Chen, Q.; Tang, Z.; Li, L.; Gui, W. A remaining useful life prognosis of turbofan engine using temporal and spatial feature fusion. Sensors 2021, 21, 418. [Google Scholar] [CrossRef]
  30. Gautam, S.; Solanki, S.; Sharma, S.K.; Chatzinotas, S.; Ottersten, B. Hybrid active-and-passive relaying model for 6G-IoT greencom networks with SWIPT. Sensors 2021, 21, 6013. [Google Scholar] [CrossRef]
  31. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
Figure 1. The flow charts of the proposed Algorithms 1 and 2.
Figure 1. The flow charts of the proposed Algorithms 1 and 2.
Sensors 23 05117 g001
Figure 2. The multiuser MISO secure SWIPT network.
Figure 2. The multiuser MISO secure SWIPT network.
Sensors 23 05117 g002
Figure 3. The input and output power figure and the conversion efficiency figure of the single EH circuit. (a) A comparison between the output power for the S-type function EH model in [27] and the measurement data from practical EH circuits in [28]; (b) the conversion efficiency figure of the single EH circuit.
Figure 3. The input and output power figure and the conversion efficiency figure of the single EH circuit. (a) A comparison between the output power for the S-type function EH model in [27] and the measurement data from practical EH circuits in [28]; (b) the conversion efficiency figure of the single EH circuit.
Sensors 23 05117 g003
Figure 4. The partial conversion efficiency comparison curve.
Figure 4. The partial conversion efficiency comparison curve.
Sensors 23 05117 g004
Figure 5. The relationship between the throughput and the EH threshold under different EH models.
Figure 5. The relationship between the throughput and the EH threshold under different EH models.
Sensors 23 05117 g005
Figure 6. The throughput under different receiver architectures varies with the EH threshold.
Figure 6. The throughput under different receiver architectures varies with the EH threshold.
Sensors 23 05117 g006
Figure 7. The network throughput under different security thresholds.
Figure 7. The network throughput under different security thresholds.
Sensors 23 05117 g007
Figure 8. The relationship between the network throughput and BS transmit power.
Figure 8. The relationship between the network throughput and BS transmit power.
Sensors 23 05117 g008
Figure 9. The convergence effect of the joint optimization algorithms.
Figure 9. The convergence effect of the joint optimization algorithms.
Sensors 23 05117 g009
Table 1. Part of the power mapping table ( M n = 23   mW ).
Table 1. Part of the power mapping table ( M n = 23   mW ).
P n E min , n η 1 η 2 η 3 η Q η * L o *
2920.9173.8370.74/72.0973.831
3122.5270.6173.62/72.6473.622
3526.7164.1978.1261.0476.3178.122
4032.2656.9881.0766.8280.6481.072
5038.0745.9479.3476.5476.1479.342
5239.6044.1978.1677.7576.1578.163
5340.4943.3677.5178.4776.4078.473
5542.4941.8076.1179.3977.2579.393
5845.8739.6473.8380.5479.0980.543
6048.1638.3372.2381.0780.2781.073
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, L.; Xue, L.; Gong, X.; Wang, C. Resource Allocation for a Secure SWIPT Network Based on a Quantitative Energy Harvesting Mechanism. Sensors 2023, 23, 5117. https://doi.org/10.3390/s23115117

AMA Style

Zhu L, Xue L, Gong X, Wang C. Resource Allocation for a Secure SWIPT Network Based on a Quantitative Energy Harvesting Mechanism. Sensors. 2023; 23(11):5117. https://doi.org/10.3390/s23115117

Chicago/Turabian Style

Zhu, Long, Liang Xue, Xuan Gong, and Chunjie Wang. 2023. "Resource Allocation for a Secure SWIPT Network Based on a Quantitative Energy Harvesting Mechanism" Sensors 23, no. 11: 5117. https://doi.org/10.3390/s23115117

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop