Next Article in Journal
Asynchronous Fault Location in Transmission Lines Considering Accurate Variation of the Ground-Mode Traveling Wave Velocity
Next Article in Special Issue
Energy Efficiency and Network Performance: A Reality Check in SDN-Based 5G Systems
Previous Article in Journal
Study and Optimization of Design Parameters in Water Loop Heat Pump Systems for Office Buildings in the Iberian Peninsula
Previous Article in Special Issue
An Efficient Energy Saving Scheme for Base Stations in 5G Networks with Separated Data and Control Planes Using Particle Swarm Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient Subcarrier Pairing and Power Allocation for DF Relay Networks with an Eavesdropper

1
IDCOM, School of Engineering, University of Edinburgh, Edinburgh EH9 3JL, UK
2
Department of Communication Engineering, National Central University, Taoyuan 32001, Taiwan
*
Author to whom correspondence should be addressed.
Energies 2017, 10(12), 1953; https://doi.org/10.3390/en10121953
Submission received: 13 October 2017 / Revised: 13 November 2017 / Accepted: 17 November 2017 / Published: 24 November 2017
(This article belongs to the Special Issue Energy-Efficient Computing and Networking in the 5G Era)

Abstract

:
Algorithms for joint subcarrier pairing and power allocation are investigated in order to maximize the worst-case energy efficiency (EE) in dual-hop decode-and-forward (DF) relay networks in the presence of an active eavesdropper. Accordingly, we study the impact of number of subcarriers on the trade-off in performance between the EE and the spectrum efficiency (SE). The formulated EE optimization problem is the ratio of the secure SE over the entire power consumption in the network, subject to the constraints of total transmit power and subcarrier pairing. A near-optimal iterative algorithm is proposed to perform the subcarrier pairing and power allocation for achieving the maximum EE in the networks. Furthermore, a suboptimal algorithm is proposed with two-step resource allocation. By considering the subcarrier channel quality of the source-to-relay and relay-to-destination links, the subcarrier pairing is first performed, followed by an energy-efficient iterative power allocation scheme to maximize the EE. Numerical results validate the effectiveness and correctness of the proposed algorithms.

1. Introduction

The enormous growth of energy consumption in wireless communication networks has recently drawn significant attention from both academics and industry. The energy consumption in telecommunication networks is predicted to surge rapidly due to the increasing escalation of data rates and the use of numerous smart devices [1]. Improving the energy efficiency (EE) of networks is of paramount importance in striving towards green 5G radio [2]. Accordingly, investigation on energy-aware system design and power and subcarrier allocation techniques that provide significant energy savings [3] is inevitable in the research of future wireless communications systems.
Cooperative communications have been proven to be promising technologies for enhancing the throughput, extending the coverage, and enhancing the link reliability. Various relaying protocols have been proposed, among which amplify-and-forward (AF) and decode-and-forward (DF) are two main protocols [4]. In the AF protocol, the relay retransmits the amplified signal to the destination, while in the DF protocol, the relay decodes the received signals and retransmits the re-encoded information bits to the destination. While in terms of implementation complexity the AF protocol has an advantage over others, when the channel quality of the source-to-relay (SR) link is good, the DF protocol performs better than the AF protocol. Furthermore, different channel coding can be used at the source and the relay nodes for the DF protocol, which is another advantage of it.
With regard to the power consumption in wireless networks, dynamic power consumption due to transmit power, which is allocated in response to the instantaneous channel conditions, and static power consumption due to signal processing at each node, site cooling, battery backup, etc., are the two main sources of power dissipation [5]. Further, for DF relay networks, the EE performance is highly dependent on these two sources [6]. Accordingly, in this paper, through a joint optimization of the subcarrier pairing and transmit power allocation, we will maximize the EE of a dual-hop DF relay network in the presence of an eavesdropper. Of late, resource allocation has been studied in literature for enhancing the throughput of DF relay networks. In [7,8], the optimal power allocation schemes were investigated to maximize the rate in DF networks under total transmit power or individual power constraints. Similarly, the authors in [9,10] studied the optimization problems for joint subcarrier pairing and power allocation with a total network power constraint or with individual power constraints for the source and the relay nodes. In particular, to overcome the interference problem, the authors in [10] performed a joint optimization of relay selection, power allocation, and subcarrier assignment. Further, in these existing works [7,8,9,10,11], the throughput maximization was the main design goal. However, similar resource allocation schemes cannot be directly used when the network EE is considered to be the objective function. In this regard, in [12], an energy-efficient resource allocation algorithm was proposed for downlink network with a large number of transmit antennas. However, instead of worst-case EE maximization, the authors of [12] focused on maximizing the total EE for downlink networks. Moreover, the scheme described in [12] cannot be easily applied to multi-hop scenarios.
Additionally, due to the broadcasting nature of wireless channels, a secure exchange of information between mobile users is required. In [13], a secure cooperative communications scheme was investigated for cognitive radio networks, and a joint destination-aided cooperative jamming and precoding technique for dual-hop AF MIMO relay networks was proposed. Further, Yang et al. in [14] comprehensively analyzed secrecy performance for multiuser regenerative relay wiretap networks, while the authors in [15] proposed an artificial-noise (AN)-aided relay selection scheme to enhance the security of DF relay networks. The power allocation scheme is investigated in [16] for maximizing the secure energy efficiency (SEE) for the DF relay network, but only for a single subcarrier.
Considering the aforementioned discussions, in this paper we jointly investigate both secure transmission and EE maximization issues for a dual-hop DF relay network, which consists of one source node, one destination node, and one relay node with an eavesdropper between the relay node and the destination node. The key contributions are highlighted as follows:
  • In contrast to [13,14,15,16,17], where the secure sum rate/EE maximization for a single subcarrier is served as the main design goal, in this paper, a joint optimization problem is formulated to maximize the secure EE of the network, subject to a total transmit power budget. The original optimization problem is NP-hard. We first transform the secure EE problem into an equivalent convex problem for finding the optimal power allocation under given subcarrier pairing. The optimization problem then becomes a mixed-integer binary non-linear programming problem. Instead of searching over all possible subcarrier pairing combinations, a near-optimal EE maximization (EEM) algorithm is found by using the Hungarian method to reduce the computational burden. To get more insights, we derive a closed-form expression for the source and the relay power allocation.
  • Furthermore, a suboptimal algorithm with even less complexity but acceptable performance degradation is investigated. Next, we analyze the complexity of the proposed algorithms, and evaluate the performance and compare with an EEM algorithm without an eavesdropper (EEM w/o E) by computer simulation for understanding the trade-off between them.
The organization of this paper is as follows. The system model and problem formulation are described in Section 2. A near-optimal subcarrier pairing and power allocation algorithm for maximizing the EE is presented in Section 3, whereas the suboptimal algorithm is illustrated in Section 4. The complexity analysis is presented in Section 5, followed by the numerical results in Section 6. Finally, Section 7 concludes the paper.

2. System Model and Problem Formulation

2.1. System Model

We consider a dual-hop DF relay network as shown in Figure 1, with a single source-destination pair ( S - D ), a single relay node (R), and an eavesdropper node (E) between the relay node and the destination node. We assume that all the nodes have a single antenna and full channel state information (CSI) knowledge by performing conventional pilot-based channel estimation methods. By utilizing the channel reciprocity scheme between forward and backward transmissions through orthogonal pilot signals, the CSIs can be estimated at the relay and the destination nodes. The reciprocity is practical as long as the coherence time of the channel is larger than the dual-hop communication time. The destination then feeds back the estimated CSI to the relay. Due to the path-loss and large-scale fading, the direct link between the source and the destination nodes is ignored. Moreover, the relay node is operated in a half-duplex mode with two transmission phases. The eavesdropper can overhear the information transmitted by the relay node. In the first hop, the source node sends signals to the relay node, whereas the relay re-transmits the re-encoded signals to the destination node during the second hop. In the meantime, the source node stays ideal. The eavesdropper eavesdrops the transmitted messages in the second time slot. Moreover, the SR and relay-to-destination (RD) channels on any subcarrier are assumed to be frequency-flat.
Let K = { 1 , 2 , , K } denote a set of subcarriers within the available bandwidth. The channel coefficient of the SR link on the ith subcarrier, i K , is denoted by h S R , i , and that of the RD link on the jth subcarrier, j K , is expressed as h R D , j . Further, the channel coefficient for the relay-to-eavesdropper (RE) link on the jth subcarrier is given by h R E , j .
The signal received by the relay node in the first phase on the ith subcarrier is written as
y R , i = P S , i h S R , i s i + n R , i
where s i is the transmitted signal from the source node on the ith subcarrier with unit power, i.e., E s i 2 = 1 , P S , i indicates its transmit power, and n R , i denotes zero-mean Gaussian noise at the relay node with variance σ R , i 2 . Using (1), the signal-to-noise power ratio (SNR) at the relay node is
Γ S R , i = P S , i h S R , i 2 σ R , i 2
Supposing that the relay node decodes the data symbol perfectly, in the second phase, the received signal at the destination node and the eavesdropper on the jth subcarrier can be expressed as
y D , j = P R , j h R D , j s j + n D , j
y E , j = P R , j h R E , j s j + n E , j
where n D , j and n E , j are defined similar to n R , i but with variance σ D , j 2 and σ E , j 2 , respectively. Using (3) and (4), the SNR at the destination and the eavesdropper can be written as
Γ R D , j = P R , j h R D , j 2 σ D , j 2
Γ R E , j = P R , j h R E , j 2 σ E , j 2
The secrecy rate R s e c ( i , j ) with the pairing of the ith subcarrier for the SR link and the jth subcarrier for the RD link is given by
R s e c ( i , j ) = 1 2 log 2 1 + min Γ S R , i , Γ R D , j log 2 1 + Γ R E , j +
where · + = max 0 , · and 1 / 2 is due to the fact that transmission takes place in two hops. Further, both the transmit and static power dissipation are taken into account to design energy-efficient relay networks. The transmit power relies upon instantaneous channel coefficients, while the static power involves the processing and circuit power. Therefore, we define the total power dissipation in the network as follows [6]:
P t o t a l = i = 1 K P S , i + P S P , S source power dissipation + j = 1 K P R , j + P S P , R relay power dissipation
where P S P , S and P S P , R denote the total static power consumption at the source and the relay nodes, respectively.

2.2. Optimization Problem Formulation

The key task of this work is to maximize the EE through the joint optimization of the subcarrier pairing and power allocation. From (7) and (8), the objective function is expressed as
Σ E P S , P R , ρ = 1 2 i = 1 K j = 1 K ρ i , j log 2 1 + min Γ S R , i , Γ R D , j 1 2 j = 1 K log 2 1 + Γ R E , j i = 1 K j = 1 K ρ i , j P S , i + P R , j + P S C P P S , P R , ρ
where P S = P S , 1 , P S , 2 , , P S , K and P R = P R , 1 , P R , 2 , , P R , K are the transmit power vectors for the source and the relay nodes, respectively, while P S C = P S P , S + P S P , R . The term i = 1 K j = 1 K ρ i , j P S , i + P R , j serves as the actual transmit power consumption under subcarrier pairing, and ρ { 0 , 1 } K × K is a matrix with the entry ρ i , j which represents a subcarrier pairing indicator to guarantee that each subcarrier in the SR hop is only paired with a single subcarrier in the RD hop, i.e., ρ i , j = 1 when the ith subcarrier in the SR hop is paired with the jth subcarrier in the RD hop and ρ i , j = 0 otherwise. With total transmit power and subcarrier pairing constraints, the secure energy efficiency (EE) maximization problem can be formulated as follows:
( P . 1 ) max P S , P R , ρ Σ E P S , P R , ρ s . t . C . 1 i = 1 K j = 1 K ρ i , j P S , i + P R , j P m a x ; C . 2 j = 1 K ρ i , j = 1 , i ; C . 3 ρ i , j { 0 , 1 } , i , j ; C . 4 P S , i 0 , P R , j 0 , i , j .
where the objective function Σ E P S , P R , ρ denotes the secure EE and the constraint C . 1 presents the entire power consumption under the subcarrier paring condition with a maximum transmit power budget P m a x for the source and the relay nodes. Here, the subcarrier pairing constraint C . 2 ensures that each subcarrier in the first hop is only paired with a single subcarrier in the second hop, and vice versa, while C . 3 stipulates that the subcarrier pairing variables take binary values. The constraint C . 4 makes the transmit power values of the source and the relay nodes non-negative.

3. Energy-Efficient Subcarrier Pairing and Power Allocation Algorithm

The objective function in (33) is in a fractional form and the optimization problem is mixed-integer binary non-linear programming. In result, the problem becomes non-convex [18]. To make the problem tractable, an auxiliary variable Ω i , i 1 , , K is introduced and change of variables P ^ S , i = ln P S , i , P ^ R , j = ln P R , j , and Ω ^ i = ln Ω i is applied to transform the problem as follows:
( P . 2 ) max P S , P R , ρ , Ω 1 2 i = 1 K j = 1 K ρ i , j log 2 1 + e Ω ^ i j = 1 K log 2 1 + Γ ^ R E , j i = 1 K j = 1 K ρ i , j e P ^ S , i + e P ^ R , j + P S C s . t . C . 1 i = 1 K j = 1 K ρ i , j e P ^ S , i + e P ^ R , j P m a x ; C . 2 C . 4 ; C . 5 e Ω ^ i P ^ S , i σ R , i 2 h S R , i 2 1 , i ; C . 6 e Ω ^ j P ^ R , j σ D , j 2 h R D , j 2 1 , j .
where Ω = Ω 1 , Ω 2 , , Ω K and Γ ^ R E , j can be given as
Γ ^ R E , j = e P ^ R , j h R E , j 2 σ E , j 2 , j
To deal with the fractional objective function, we now transform the objective function in (11) into a subtractive form by using a successive convex approximation (SCA) method to impose two lower bounds as follows:
log 2 1 + e Ω ^ i α i d ln 2 Ω ^ i + β i d , i
log 2 1 + Γ ^ R E , j α j e ln 2 P ^ R , j + ln h R E , j 2 ln σ E , j 2 + β j e , j
where the coefficients in (13) are determined in the following manner [6]:
α i d = ξ i 1 + ξ i
β i d = log 2 1 + ξ i α i d log 2 ξ i
for any ξ i > 0 . Note that the equality in (13) holds when α i d = Ω ^ i / 1 + Ω ^ i and β i d = log 2 1 + Ω ^ i α i d log 2 Ω ^ i , and the equality holds for α i d , β i d = ( 0 , 1 ) if Ω ^ i . Also, α j e and β j e are defined similarly. After substituting (13) and (14) into (11) the objective function turns out to be concave-over-convex and thus we apply the well-known Dinkelbach method to transform it into a subtractive form [19]:
( P . 3 ) max P S , P R , ρ , Ω 1 2 i = 1 K j = 1 K ρ i , j α i d ln 2 Ω ^ i + β i d j = 1 K α j e ln 2 P ^ R , j + ln h R E , j 2 ln σ E , j 2 β j e Ψ ( t ) i = 1 K j = 1 K ρ i , j e P ^ S , i + e P ^ R , j + P S C s . t . C . 1 C . 6
where Ψ ( t ) is a positive parameter at iteration t and it is treated as a penalty factor for the power utilization. When the parameter approaches zero, it indicates that the penalty is zero for the power utilization, and the resource allocation problem converts into a problem of secure sum rate maximization in a relay network. However, for another extreme case where Ψ ( t ) approaches infinity, no transmission is the best policy to maximize the objective function in (17).
We first discuss the optimal solution for a given parameter Ψ ( t ) . For simplicity, we use Ψ instead of Ψ ( t ) in the remaining parts of this paper. Since the problem ( P . 3 ) is a mixed-binary integer non-linear programming problem, the computational complexity is very high for finding the globally optimal solution. For a fixed subcarrier pairing in (17), the problem ( P . 3 ) becomes a standard convex optimization problem, and the optimal solution can be determined by applying the dual decomposition method.
The Lagrangian function of (17) can be given by
L P S , P R , ρ , Ω , λ , μ , ν = 1 2 i = 1 K j = 1 K ρ i , j α i d ln 2 Ω ^ i + β i d j = 1 K α j e ln 2 P ^ R , j + ln h R E , j 2 ln σ E , j 2 β j e Ψ i = 1 K j = 1 K ρ i , j e P ^ S , i + e P ^ R , j + P S C λ i = 1 K j = 1 K ρ i , j e P ^ S , i + e P ^ R , j P m a x i = 1 K μ i e Ω ^ i P ^ S , i σ R , i 2 h S R , i 2 1 j = 1 K ν j e Ω ^ j P ^ R , j σ D , j 2 h R D , j 2 1
where λ 0 is a Lagrangian dual variable associated with the transmit power constraint. The vectors μ = μ 1 , μ 2 , , μ K T and ν = ν 1 , ν 2 , , ν K T are the dual variables corresponding to the constraints C . 5 and C . 6 , respectively. Then, the dual Lagrangian function can be written as
g λ , μ , ν max P S , P R , ρ , Ω L P S , P R , ρ , Ω , λ , μ , ν
and the dual optimization problem is
min λ , μ , ν 0 g λ , μ , ν
This dual problem is divided into a master problem and a subproblem, and an iterative approach is adopted to solve it. In the subproblem, the P S , P R , and ρ are obtained for fixed Lagrangian multipliers, whereas by resolving the master problem, we update λ , μ , and ν .

3.1. Solution of the Subproblem

By employing the Karush-Kuhn-Tucker (KKT) conditions, we can find the optimal power allocation for a given subcarrier pairing ( i , j ) . To find the optimal P R , j ( t + 1 ) and Ω i ( t + 1 ) in iteration ( t + 1 ) , we take the partial derivative of (18) with respect to P R , j and Ω i and equate the results to zero as
P R , j ( t + 1 ) = ν j e Ω ^ j σ D , j 2 h R D , j 2 α j e ln 2 Ψ + λ i = 1 K ρ i , j 1 2 +
Ω i ( t + 1 ) = α i d 2 ln 2 j = 1 K ρ i , j μ i σ R , i 2 e P ^ S , i h S R , i 2 ν i σ D , i 2 e P ^ R , i h R D , i 2 +
The source power at the ( t + 1 ) t h iteration, P S , i ( t + 1 ) , can be updated through the subgradient method as
P S , i ( t + 1 ) = P S , i ( t ) + ε 1 ( t ) μ i ( t ) σ R , i ( t ) 2 h S R , i ( t ) 2 + Ψ ( t ) + λ ( t ) j = 1 K ρ i , j ( t ) +
where ε 1 ( t ) is a positive step size. To determine the optimal subcarrier pairing, we put (23) and (21) into (18), yielding
L P S , P R , ρ , Ω , λ , μ , ν = i = 1 K j = 1 K ρ i , j Y i , j + Z λ , μ , ν
where
Y i , j = α i d 2 ln 2 ln Ω i + β i d 2 Ψ + λ P S , i + P R , j
Z λ , μ , ν = j = 1 K α j e ln 2 ln P R , j + ln h R E , j 2 ln σ E , j 2 β j e Ψ P S C + λ P m a x i = 1 K μ i Ω i σ R , i 2 P S , i h S R , i 2 1 j = 1 K ν j Ω j σ D , j 2 P R , j h R D , j 2 1
The first term in Y i , j denotes the sum rate obtained for the given subcarrier pairing i , j , while the remaining term Z λ , μ , ν , which is always independent of ρ i , j , works as a penalty for the power dissipation.
As a result, for the optimal power allocation P R , P S derived in (21) and (23), the optimal subcarrier pairing ρ can be found by solving the problem ( P . 4 ) as follows:
( P . 4 ) max ρ i = 1 K j = 1 K ρ i , j Y i , j s . t . C . 2 & C . 3
Define a K × K matrix Y as follows:
Y = Y 1 , 1 Y 1 , K Y K , 1 Y K , K
The optimal subcarrier pairing ρ can be determined by choosing exactly one value in each row and column of the matrix Y with the help of the Hungarian method [20] such that the sum of these K values is maximized.

3.2. Solution of the Master Problem

Using the subgradient method, the dual variables λ , μ , and ν can be iteratively updated as
λ ( l + 1 ) = λ ( l ) ε 2 ( l ) P m a x i = 1 K j = 1 K ρ i , j P S , i + P R , j +
μ i ( l + 1 ) = μ i ( l ) ε 3 ( l ) 1 Ω i σ R , i 2 P S , i h S R , i 2 +
ν i ( l + 1 ) = ν i ( l ) ε 4 ( l ) 1 Ω j σ D , j 2 P R , j h R D , j 2 +
where ε i ( l ) , i { 2 , 3 , 4 } , are positive step sizes. The parameter Ψ ( t ) can be updated as [6]:
Ψ ( t ) = 1 2 i = 1 K j = 1 K ρ i , j α i d ln 2 ln Ω i + β i d j = 1 K α j e ln 2 ln P R , j + ln h R E , j 2 ln σ E , j 2 β j e i = 1 K j = 1 K ρ i , j e P ^ S , i + e P ^ R , j + P S C
The Ψ -based iterative EEM algorithm for joint power allocation and subcarrier pairing is finally summarized in Algorithm 1.
Algorithm 1: Iterative EEM Algorithm.
1:
Initialize the maximum number of iterations I m a x and the step sizes α , ϵ 1 , ϵ 2 and ϵ 3 ;
2:
Set the iteration counter t = 0 and the penalty parameter Ψ ( t ) = 0.001 ;
3:
Initialize ρ i , j , P S , i ( t ) , P R , j ( t ) ;
4:
repeat
5:
   repeat (Solving problem ( P . 3 ) )
6:
     Update P R , j , Ω i , and P S , i using (21)), (22)), and (23)
     with respect to the penalty Ψ ( t ) .
7:
     Update λ , μ and ν using (29), (30) and (31).
8:
     Update ρ i , j by solving (17).
9:
   until convergence.
10:
   Update Ψ ( t + 1 ) using (32).
11:
   Set P S , i ( t + 1 ) P S , i ( t ) , P R , j ( t + 1 ) P R , j ( t ) and t t + 1 .
12:
until convergence or t > I m a x .
The quality-of-service (QoS)-based joint subcarrier pairing and power allocation design for maximizing the secrecy EE can be formulated as:
max P S , P R , ρ Σ E P S , P R , ρ s . t . C . 1 i = 1 K j = 1 K ρ i , j P S , i + P R , j P m a x ; C . 2 j = 1 K ρ i , j = 1 , i ; C . 3 ρ i , j { 0 , 1 } , i , j ; C . 4 1 2 log 2 1 + min Γ S R , i , Γ R D , j R ( i , j ) , m i n , ( i , j ) ; C . 5 P S , i 0 , P R , j 0 , i , j .
Note that the constraint C . 4 denotes the quality-of-service (QoS) metric for a user pair on the ( i , j ) th subcarrier pair. Accordingly, we can resolve the new optimization problem in a same way as the problem in ( P . 1 ) .

4. Energy-Efficient Suboptimal Resource Allocation Algorithm

The complexity of the near-optimal algorithm proposed in Section 3 becomes high when the value of K is large. Therefore, a low-complexity suboptimal algorithm with two steps is investigated in this section, whose EE and SE performance is near that of the near-optimal one. This suboptimal algorithm is elaborated:
  • Intuitively, a higher power value is allocated to a subcarrier pair with better channel quality from the source to the destination nodes. Hence, the subcarriers of the SR and RD links with a higher end-to-end channel gain are paired together with a higher priority. Firstly, the SR subcarriers are organized in a descending order according to their channel gains, and the RD subcarriers are also ordered in similar way. Then, the corresponding subcarriers are paired with each other in sequence. We set ρ i , j = 1 , if the ith subcarrier of the SR link is paired with the jth subcarrier of the RD link; otherwise, ρ i , j = 0 .
  • The next step is to get the optimal power allocation P S , P R for maximizing EE by solving ( P . 3 ) for the obtained subcarrier pairing ρ i , j in the step 1.

5. Complexity Analysis

In this section, the complexity analysis is presented to demonstrate the complexity reduced by the near-optimal and the suboptimal algorithms when the penalty factor Ψ converges in L iterations.
We begin with the complexity analysis of the near-optimal EEM algorithm as follows. Due to K subcarriers in each hop, K 2 subproblems are required to be solved in order to find the optimal solutions of ( P . 3 ) . Since the near-optimal solution P S , i , P R , j , Ω i is found with the total power constraint, the complexity is O V 3 + 1 , where the maximum power level for the source and the relay nodes on each subcarrier are denoted by V. Moreover, finding the optimal subcarrier pairing using the Hungarian produces a complexity of O K 3 . The complexity due to updating a dual variable is O 2 ϱ (for example, ϱ = 2 for the ellipsoid method [21]). Hence, the overall complexity for updating dual variables is O 2 2 ϱ . Supposing the dual objective function converges in W iterations, the entire complexity for the near-optimal EEM algorithm is O 2 2 ϱ K 2 W L V 3 + K + 1 .
However, the implementation of the subcarrier pairing in step 1 of suboptimal algorithmin requires a complexity of O 2 K , while the power allocation has the complexity of O K V 3 + 1 and the total complexity for updating dual variables is O 2 2 ϱ . If the dual objective function converges in W iterations, the overall complexity for the suboptimal algorithm becomes O 2 2 ϱ K W L V 3 + 3 with W = W . Finally, the complexity of the optimal exhaustive search (ES) algorithm [22] is given by O 2 2 ϱ W L K ! V 3 + 1 . Table 1 presents the summary of the complexity comparison of the three algorithms.

6. Simulation Results and Discussion

The Monte Carlo simulation results are presented in this section to figure out the performance of the proposed algorithms. The value of P m a x is less than 20 dBm, whereas the circuit power dissipation at each node is assumed to be 10 dBm. The total number of subcarriers, K, is set as 5 or 10. The Third-Generation Partnership Project (3GPP) path-loss model is used in our simulations [23]. Additionally, both the Rayleigh fading, C N ( 0 , 1 ) , and the log-normal shadowing effects, ln N ( 0 , 8 dB ) , are considered. The circuit and processing power dissipation values at each node are assumed to be 10 dBm, respectively, while the adjacent subcarriers frequency spacing is set to be 12 kHz. The thermal noise density is 174 dBm/Hz. In the proposed EEM algorithm, the value of the maximum number of inner and outer iterations is 10, while we set the convergence tolerance value as 10 5 . The initial value of the penalty factor Ψ is 0.001 . The distances from the source node to the relay node and from the relay node to the destination and eavesdropper nodes are denoted by d S R , d R D , and d R E , respectively. As benchmarks, we also simulate the performance of the EEM w/o E.
Figure 2 illustrates the convergence behavior of the designed algorithms for a single channel realization with K = 5 , d S R = d R D = 200 m, d R E = 300 m, and P m a x = 5 dBm. It can be observed that the EE performance of the proposed algorithms and also EEM w/o E increases monotonically with the number of iterations, and the iterative algorithms converge within five iterations.
Figure 3 and Figure 4 show the average EE and SE performance of different algorithms and illustrate the impact of K on the EE and SE performance for K = 5 and 10 , d S R = d R D = 200 m, and d R E = 300 m. It can be observed in Figure 3 and Figure 4 that the average EE and SE performance of the algorithms increases significantly as P m a x increases, and it remains constant after P m a x = 5 dBm. Furthermore, when K is increased from 5 to 10, the average EE is rapidly enhanced because of the better utilization of the available power budget and frequency diversity, while SE decreases due to the increase of the static power consumption. In general, we can observe that when the eavesdropper is active, the performance of the proposed algorithms is worse than that of the EEM w/o E.

7. Conclusions

In this work, we resort to the joint design of subcarrier pairing and power allocation to improve the EE of the DF relay network in the presence of an active eavesdropper. The original problem is highly non-convex. We transform this problem into a convex optimization problem. A dual decomposition-based, iterative algorithm for joint subcarrier pairing and power allocation is investigated for maximizing the EE. A suboptimal algorithm is also investigated to solve the problem with relatively lower complexity. The simulation results demonstrate that the EE performance of the proposed algorithms can be enhanced by increasing K in the joint design.

Acknowledgments

This work was supported by the Ministry of Science and Technology of Taiwan under Grant MOST 106-2221-E-008-014.

Author Contributions

Keshav Singh and Sudip Biswas performed the simulation, analyzed the results and wrote the paper; Meng-Lin Ku and Tharmalingam Ratnarajah proposed the problem and helped in designing the system model and the problem formulation.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, Y.; Zhang, S.; Xu, S.; Li, G. Fundamental trade-offs on green wireless networks. IEEE Commun. Mag. 2011, 49, 30–37. [Google Scholar] [CrossRef]
  2. Wong, V.W.S.; Schober, R.; Ng, D.W.K.; Wang, L.-C. Key Technologies for 5G Wireless Systems; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
  3. Han, C.; Harrold, T.; Armour, S.; Krikidis, I.; Videv, S.; Grant, P.; Haas, H.; Thompson, J.; Ku, I.; Wang, C.-X.; et al. Green radio: Radio techniques to enable energy-efficient networks. IEEE Commun. Mag. 2011, 49, 46–54. [Google Scholar] [CrossRef]
  4. Laneman, J.N.; Tse, D.N.C.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  5. Arnold, O.; Richter, F.; Fettweis, G.; Blume, O. Power consumption modeling of different base station types in heterogeneous cellular networks. In Proceedings of the Future Network and Mobile Summit 2010, Florence, Italy, 16–18 June 2010; pp. 1–8. [Google Scholar]
  6. Singh, K.; Ku, M.-L. Toward green power allocation in relay-assisted multiuser networks: A pricing-based approach. IEEE Trans. Wirel. Commun. 2015, 14, 2470–2486. [Google Scholar] [CrossRef]
  7. Vandendorpe, L.; Duran, R.; Louveaux, J.; Zaidi, A. Power allocation for OFDM transmission with DF relaying. In Proceedings of the IEEE International Conference on Communications, Beijing, China, 19–23 May 2008; pp. 3795–3800. [Google Scholar]
  8. Vandendorpe, L.; Louveaux, J.; Oguz, O.; Zaidi, A. Rate-optimized power allocation for DF-relayed OFDM transmission under sum and individual power constraints. EURASIP J. Wirel. Commun. Netw. 2009. [Google Scholar] [CrossRef]
  9. Li, W.Y.; Wang, W.; Kong, J.; Peng, M. Subcarrier pairing for amplify-and-forward and decode-and-forward OFDM relay links. IEEE Commun. Lett. 2009, 13, 209–211. [Google Scholar] [CrossRef]
  10. Dang, W.; Tao, M.; Mu, H.; Huang, J. Subcarrier-based resource allocation for cooperative multi-relay OFDM systems. IEEE Trans. Wirel. Commun. 2010, 9, 1640–1649. [Google Scholar] [CrossRef]
  11. Seong, K.; Mohseni, M.; Cioffi, J.M. Optimal resource allocation for OFDMA downlink systems. In Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006; pp. 1394–1398. [Google Scholar]
  12. Ng, D.W.K.; Lo, E.S.; Schober, R. Energy-efficient resource allocation in OFDMA systems with large numbers of base station antennas. IEEE Trans. Wirel. Commun. 2012, 11, 3292–3304. [Google Scholar] [CrossRef]
  13. Abedi, M.R.; Mokari, N.; Javan, M.R.; Yanikomeroglu, H. Secure communication in OFDMA-based cognitive radio networks: An incentivized secondary network coexistence approach. IEEE Trans. Veh. Technol. 2017, 66, 1171–1185. [Google Scholar] [CrossRef]
  14. Yang, M.; Guo, D.; Huang, Y.; Duong, T.Q.; Zhang, B. Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 2016, 15, 8009–8024. [Google Scholar] [CrossRef]
  15. El Shafie, A.; Mabrouk, A.; Tourki, K.; Al-Dhahir, N. A secure relay selection AN-aided scheme for dual-hop DF relay networks with two-sided eavesdropping. IEEE Wirel. Commun. Lett. 2017, 6, 474–477. [Google Scholar] [CrossRef]
  16. Farhat, J.; Brante, G.; Souza, R.D. On the secure energy efficiency of TAS/MRC with relaying and jamming strategies. IEEE Signal Process. Lett. 2017, 24, 1228–1232. [Google Scholar] [CrossRef]
  17. Xiong, J.; Cheng, L.; Ma, D.; Wei, J. Destination-aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems. IEEE Trans. Veh. Technol. 2016, 65, 7274–7284. [Google Scholar] [CrossRef]
  18. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  19. Dinkelbach, W. On nonlinear fractional programming. Manag. Sci. 1967, 13, 492–498. [Google Scholar] [CrossRef]
  20. Kuhn, H.W. The Hungarian method for the assignment problem. In 50 Years of Integer Programming 1958–2008; Springer: Berlin/Heidelberg, Germany, 2010; pp. 29–47. [Google Scholar]
  21. Zhang, H.; Liu, Y.; Tao, M. Resource allocation with subcarrier pairing in OFDMA two-way relay networks. IEEE Wirel. Commun. Lett. 2012, 1, 61–64. [Google Scholar] [CrossRef]
  22. Yu, W.; Lui, R. Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun. 2006, 54, 1310–1322. [Google Scholar] [CrossRef]
  23. 3rd Generation Partnership Project 3GPP, Further Advancements for E-UTRA Physical Layer Aspects (release 9), 3GPP TR 36.814, V9.0.0. Valbonne, France, 2010. Available online: http://www.qtc.jp/3GPP/Specs/36814-900.pdf (accessed on 23 November 2017).
Figure 1. A decode-and-forward (DF) relay network with an eavesdropper.
Figure 1. A decode-and-forward (DF) relay network with an eavesdropper.
Energies 10 01953 g001
Figure 2. Convergence behavior of the proposed algorithms. EE: energy efficiency; EEM w/o E: EEM algorithm without an eavesdropper.
Figure 2. Convergence behavior of the proposed algorithms. EE: energy efficiency; EEM w/o E: EEM algorithm without an eavesdropper.
Energies 10 01953 g002
Figure 3. Average EE versus different P m a x .
Figure 3. Average EE versus different P m a x .
Energies 10 01953 g003
Figure 4. Average spectrum efficiency (SE) versus different P m a x .
Figure 4. Average spectrum efficiency (SE) versus different P m a x .
Energies 10 01953 g004
Table 1. Complexity comparison. ES: exhaustive search; EEM: energy efficiency maximization.
Table 1. Complexity comparison. ES: exhaustive search; EEM: energy efficiency maximization.
AlgorithmComplexity
Optimal ES O 2 2 ϱ W L K ! V 3 + 1
EEM O 2 2 ϱ K 2 W L V 3 + K + 1
Suboptimal O 2 2 ϱ K W L V 3 + 3

Share and Cite

MDPI and ACS Style

Singh, K.; Ku, M.-L.; Biswas, S.; Ratnarajah, T. Energy-Efficient Subcarrier Pairing and Power Allocation for DF Relay Networks with an Eavesdropper. Energies 2017, 10, 1953. https://doi.org/10.3390/en10121953

AMA Style

Singh K, Ku M-L, Biswas S, Ratnarajah T. Energy-Efficient Subcarrier Pairing and Power Allocation for DF Relay Networks with an Eavesdropper. Energies. 2017; 10(12):1953. https://doi.org/10.3390/en10121953

Chicago/Turabian Style

Singh, Keshav, Meng-Lin Ku, Sudip Biswas, and Tharmalingam Ratnarajah. 2017. "Energy-Efficient Subcarrier Pairing and Power Allocation for DF Relay Networks with an Eavesdropper" Energies 10, no. 12: 1953. https://doi.org/10.3390/en10121953

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop