Next Article in Journal
Measurement, Validation and Uncertainty of an Experimental Procedure to Characterize the Size-of-Source Effect of Radiation Thermometers, in the Framework of an Industrial Calibration Laboratory
Previous Article in Journal
A Permanent Magnet Ferromagnetic Wear Debris Sensor Based on Axisymmetric High-Gradient Magnetic Field
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Secure Resource Allocation for RIS-Aided SWIPT Communication Systems

1
School of Information and Control Engineering, China University of Mining and Technology, Xuzhou 221116, China
2
Xuzhou College of Industrial Technology, Xuzhou 221140, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(21), 8274; https://doi.org/10.3390/s22218274
Submission received: 13 September 2022 / Revised: 22 October 2022 / Accepted: 24 October 2022 / Published: 28 October 2022
(This article belongs to the Section Intelligent Sensors)

Abstract

:
Aiming at the influence of channel uncertainty, user information leakage and harvested energy improvement, this paper proposes a robust resource allocation algorithm for reconfigurable intelligent reflector (RIS) multiple-input single-output systems based on imperfect channel state information. First, considering the legal user minimum secret rate constraint, the base station maximum transmit power constraint and the RIS phase shift constraint with the bounded channel uncertainty, a joint optimization of the base station active beam, energy beam and RIS phase shift is established. A multivariate coupled nonlinear resource allocation problem for matrices is addressed. Then, using S-procedure and alternating optimization methods, the original non-convex problem is transformed into a deterministic convex optimization problem and an alternating optimization algorithm based on continuous convex approximation is proposed. The simulation results show that the proposed algorithm has better fairness harvested energy compared with the traditional robust algorithm.

1. Introduction

With the development and popularization of Internet of Things technology, the rapid increase in the number of wireless devices and data traffic brings huge energy consumption [1,2,3]. In order to solve this problem, energy harvesting technology is emerging as the times require [4,5,6]. Energy harvesting is the key to realizing green and sustainable communication, which can solve the contradiction between unlimited energy supply and limited IoT battery capacity and prolong the life of IoT devices [7,8]. However, the power supply or data transmission by the base station to the device is easily blocked by obstacles, which reduces the charging efficiency and transmission quality. To solve this problem, Reconfigurable Intelligent Surface (RIS) was proposed as a new technology [9,10,11,12]. Specifically, RIS consists of a large number of low-cost passive reflective elements, which can independently adjust the phase shift and amplitude of the incident signal, thereby changing the reflection route [13]. Because RIS is easy to deploy and can be reconfigured through passive beamforming, integrating it into existing communication systems is an effective way to solve the above problems.
Therefore, in recent years, a large number of scholars have conducted in-depth research on RIS-assisted communication technology. For example, ref. [14] considers the service quality constraints of the nonlinear energy harvesting receiver and the information decoding receiver, and jointly optimizes the base station beamforming vector and the transmission mode selection of each region of the RIS to minimize the transmit power of the base station. Reference [15] considers the maximum transmit power constraint, the minimum energy harvesting constraint and the RIS phase shift constraint of the base station and proposes a multi-objective optimization framework, which maximizes the system sum rate by jointly optimizing the base station energy, information beamforming and RIS phase shift. However, the above work does not consider the harvested energy efficiency optimization problem. Based on this, ref. [16] considers the minimum rate constraint, energy harvesting constraint and transmission power constraint and jointly optimizes the information and energy beamforming of the base station, RIS phase shift and power allocation ratio, the maximum minimum system energy efficiency. For the RIS-assisted wireless power supply communication system, based on the bounded channel uncertainty, ref. [17] maximizes the robust energy efficiency of the system by jointly optimizing the energy beam and RIS phase shift. However, the above work does not consider the issue of network information security. Based on this, ref. [18] studied the RIS-assisted multi-user Multiple-Input Single-Output (MISO) secure communication problem considering artificial noise, which aims to maximize the total secrecy rate of the system by jointly optimizing the RIS phase shift, the beamforming vector at the base station and the artificial noise. This work ensures security, but cannot be directly applied to wireless energy-carrying communication systems. For the RIS-assisted MISO system, ref. [19] considered the impact of transceiver hardware impairment and developed a novel secure energy efficiency maximization algorithm, while ensuring the constraints of the base station transmit power and the RIS modulo-one constraint. In [20], a multi-antenna full-duplex jammer is considered for the RIS-assisted single-input multiple-output communication system, which exploits the block coordinate descent method to study the problem of maximizing secure energy efficiency. Reference [21] studies a number-capable simultaneous interpretation algorithm for the RIS-assisted MISO SWIPT network, which maximizes the secure rate and speed of network weighting. However, the above work assumes that the Channel State Information (CSI) is perfectly known and ignores the influence of channel uncertainty. Due to the influence of channel estimation error, quantization error and feedback delay, it is difficult for the base station to obtain accurate CSI [22], so that the designed algorithm often does not meet the actual needs in the actual system.
In order to improve the harvested energy of the system and overcome the influence of channel uncertainty and security risks caused by eavesdroppers, this paper proposes a robust secure resource allocation algorithm for RIS-assisted MISO SWIPT systems with channel uncertainties in the presence of multiple single-antenna potential eavesdroppers. The main contributions are as follows:
  • For an RIS-assisted MISO communication system consisting of multiple energy receiving devices, multiple information receivers and multiple eavesdroppers, a joint optimization of multi-variable coupling of information beam, energy beam, RIS phase shift, nonlinear energy efficiency maximization resource allocation problem is investigated considering the security rate constraint, the maximum transmit power constraint and the minimum energy harvesting constraint. This problem is a nonlinear and non-convex optimization problem with parameter perturbation and it is not easy to obtain an analytical solution.
  • In order to solve this problem, the S-Procedure method is used to convert channel uncertainty constraints into deterministic constraints; on this basis, alternating optimization methods are used to convert non-convex problems into deterministic and convex optimization problems and propose an alternating optimization algorithm based on continuous convex approximation.
  • Simulation results show that the proposed algorithm has good convergence, energy efficiency and robustness.

2. Network Model and Problem Formulation

A multi-user RIS-assisted MISO communication system is considered in this paper, which consists of a base station with M antennas, an RIS with N reflection units, K single-antenna legitimate users, L eavesdroppers and R energy harvesting devices. Every user device or eavesdropper receives the base, the direct signal from the station and the reflected signal from the RIS. Define the set of legitimate users as K = { 1 , 2 , , K } ( k K ) , the set of eavesdroppers as L = { 1 , 2 , , L } ( l L ) , the set of energy harversting devices as R = { 1 , 2 , , R } ( r R ) and the set of reflection elements as N = { 1 , 2 , , N } ( n N ) . We define H B I C N × M as the channel between base station and RIS. h k B U C M × 1 , h l B E C M × M and g r B H C M × 1 denote the channel between base station and k-th legal user, l-th eavesdropper and r-th energy harvesting device, respectively, while h k I U C N × 1 , h l I E C N × 1 and g r I H C N × 1 represent the channel between RIS and k-th legal user, l-th eavesdropper and r-th energy harvesting device. Θ = diag ( q ) is defined as the phase shift matrix, where q = [ q 1 , q 2 , , q N ] , q n = e j θ n , θ n [ 0 , 2 π ] .
It is assumed that each information receiver and energy harvesting device is equipped with unique information and energy beam; then, the received signal at the base station can be written as
x = k = 1 K w k s k I D + r = 1 R v r s r E H
where s k I D and s r E H represent the information signal sent by the base station to the k-th legal user and the energy signal of the r-th energy harvesting device, satisfying E { | s k I D | 2 } = 1 and E { | s r E H | 2 } = 1 . The vector w k C M × 1 and v r C M × 1 denote the information beam and energy beam from the base station to the k-th legal user, respectively. Therefore, the total transmit power of the base station can be represented as
E ( x H x ) = k = 1 K w k 2 + r = 1 R v r 2
According to the system model diagram and the above signal definition, the received signal of the k-th legitimate user and the corresponding eavesdropping signal of the l-th eavesdropper can be expressed as follows:
y k = ( ( h k IU ) H Θ H BI + ( h k BU ) H ) x + n k
y e , l = ( ( h l IE ) H Θ H BI + ( h l BE ) H ) x + n l
where n k CN ( 0 , σ k 2 ) and n l CN ( 0 , δ l 2 ) denote the noise of the k-th legitimate user and l-th eavesdropper, respectively. Then, the rate of the k-th legitimate user and l-th eavesdropper can be expressed as
R k = B log 2 ( 1 + γ k )
R k , l = B log 2 ( 1 + γ k , l )
where γ k = | h k H w k | 2 j k K | h k H w j | 2 + r = 1 R | h k H v r | 2 + δ k 2 , γ k , l = | g l H w k | 2 j k K | g l H w j | 2 + r = 1 R | g l H v r | 2 + σ k 2 , h k H = ( h k I U ) H Θ H BI + ( h k BU ) H , g l H = ( h l I E ) H Θ H BI + ( h l BE ) H . For security provisioning in our considered systems, we adopt the worst-case assumption on the eavesdropping capabilities of potential eavesdroppers. Therefore, the channel capacity between the AP and the l-th potential eavesdropper for decoding the signal of the k-th legitimate user is given by
R k sec = ( R k max l L R k , l ) +
where ( x ) + = max ( 0 , x ) . Due to the low power of background noise power, we ignore the influence of noise power. Hence, the energy collected by each energy harvesting device is
E r = ρ k = 1 K G r H w k 2 + r = 1 R G r H v r 2
where ρ [ 0 , 1 ] is the energy conversion efficiency factor. Without loss of generality, ρ is set to 1 in the paper.
Since the eavesdroppers are randomly distributed in the network and do not have any cooperation with the base station, the relevant CSI cannot be estimated accurately. Here, we consider the following bounded eavesdropping channel uncertainty model:
h l BE = h ¯ l BE + Δ h l BE , h l IE = h ¯ l IE + Δ h l IE , Ω E = { Δ h l BE F ε l BE , Δ h l IE F ε l IE }
where h ¯ l BE C M × 1 and h ¯ l IE C N × 1 denote the estimated channel, Δ h l BE C M × 1 and Δ h l IE C N × 1 are the corresponding channel uncertainties, ε l BE and ε l IE represent the corresponding upper bound of the estimated error. Based on the above description, the robust resource allocation problem of maximizing fairness-aware harvested energy of the system can be described as
max w k , v r , θ n min r R k = 1 K G r H w k 2 + r = 1 R G r H v r 2 s . t . C 1 : R k sec R k min , Δ h l BE F ε l BE , Δ h l IE F ε l IE C 2 : k = 1 K w k 2 + r = 1 R v r 2 P max C 3 : 0 θ n 2 π
where C 1 represents the minimum security rate constraint of the legal user k and R k min is the corresponding minimum security rate threshold; C 2 represents the maximum transmit power constraint of the base station, where P max is the maximum transmit power of the base station; C 3 represents the phase shift constraint of RIS. Since the objective function in Equation (10) is non-concave form and there are coupled variables in constraints C1 and C2, Equation (10) is a non-convex optimization problem.

3. Robust Resource Allocation Algorithm

Obviously, the formulated optimization problem (10) cannot be directly solved by exploiting the standard convex theory. In order to obtain the solution of the considered problem (10), we firstly utilize the the S-procedure method to transform the channel uncertainty constraints into deterministic linear constraints. Then, the solution is obtained using an alternating optimization method. In order to remove the coupling between optimization variables and make the problem easy to solve, the active beamformer at the base station is optimized as the passive phase shift at the RIS is fixed, then the passive phase shift is optimized as the active beamformer at the base station is fixed.

3.1. Optimizing Active Beamformer

As the Θ is fixed, the channels between base station and the legal users as well as the the channels from the base station to the energy harvesting users are fixed. For further processing, we define W k = w k w k H , H k = h k h k H , V r = v r v r H , G ¯ r = G r G r H . Then, the optimization problem (10) subject to W k and V r can be reformulated as
max W k , V r min r R k = 1 K Tr ( G ¯ r W k ) + m = 1 R Tr ( G ¯ r V m ) s . t . C 1 : R k max l L R k , l R k min , Δ h l BE F ε l BE , Δ h l IE F ε l IE C 2 ¯ : k = 1 K Tr ( W k ) + r = 1 R Tr ( V r ) P max C 4 : W k 0 , V r 0 C 5 : Rank ( W k ) = 1
The slack variable t is introduced; then, the above optimization problem can be expressed as
max W k , V r t s . t . C 1 : R k max l L R k , l R k min , Δ h l BE F ε l BE , Δ h l IE F ε l IE C 2 ¯ : k = 1 K Tr ( W k ) + r = 1 R Tr ( V r ) P max C 4 : W k 0 , V r 0 C 5 : Rank ( W k ) = 1 C 6 : k = 1 K Tr ( G ¯ r W k ) + m = 1 R Tr ( G ¯ r V m ) > = t
Furthermore, another slack variable τ k , l max is introduced; then, the constraint C 2 can be expressed as
C 1 ¯ : R k τ k , l max R k min , R k , l τ k , l max Δ h l BE F ε l BE , Δ h l IE F ε l IE
where τ k , l max is the maximum eavesdrop rate of each eavesdropper. The eavesdrop rate is represented as
R k , l = B log 2 k = 1 K | g l H w k | 2 + r = 1 R | g l H v r | 2 + σ l 2 j k K | g l H w j | 2 + r = 1 R | g l H v r | 2 + σ l 2 < = τ k , l max
The legal information rate R k can be formulated as
R k = B log 2 k = 1 K Tr ( H k W k ) + r = 1 R Tr ( H k V r ) + δ k 2 B log 2 j k K Tr ( H k W j ) + r = 1 R Tr ( H k V r ) + δ k 2
However, the optimization problem (12) belongs to the DC programming problem, the second term in (15) is processed using the first-order Taylor expansion. Defining the second term in (15) as D 1 ( W k , V r ) , we have
D 1 ( W k , V r ) D 1 ( W k ( i ) , V r ( i ) ) + Tr ( V r ( i ) H D 1 ( W k ( i ) , V r ( i ) ) ( V r V r ( i ) ) ) + k = 1 K Tr W k ( i ) H D 1 ( W k ( i ) , V r ( i ) ) ( W k W k i )
where
V r ( i ) H D 1 ( W k ( i ) , V r ( i ) ) = B ln 2 k = 1 K H k j k K Tr ( H k W j ) + r = 1 R Tr ( H k V r ) + δ k 2
W k ( i ) H D 1 ( W k ( i ) , V r ( i ) ) = B ln 2 k j K H k j k K Tr ( H k W j ) + r = 1 R Tr ( H k V r ) + δ k 2
Since the objective function of Equation (12) is maximization, the lower bound of D 1 ( W k , V r ) is taken to replace it; then, R k can be expressed as
R ^ k = B log 2 j = 1 K Tr ( H k W j ) + r = 1 R Tr ( H k V r ) + δ k 2 Tr V r ( i ) H D 1 ( W k ( i ) , V r ( i ) ) ( V r V r ( i ) ) k = 1 K Tr W k ( i ) H D 1 ( W k ( i ) , V r ( i ) ) ( W k W k i )
However, (12) contains uncertainty constraints, which are difficult to handle. To make the problem easy to solve, the new optimization variable β is introduced, which is defined as
β 1 , 1 β 1 , 2 β 1 , L β 2 , 1 β 2 , 2 β 2 , L β K , 1 β K , 2 β K , L
Then, the eavesdrop rate R k , l of the k-th eavesdropper can be equivalently transformed into the following expression:
k = 1 K | g l H w k | 2 + r = 1 R | g l H v r | 2 + δ l 2 β k , l 2 τ k , l max B , Δ h l BE , Δ h l IE Ω E
j k K | g l H w j | 2 + r = 1 R | g l H v r | 2 + δ l 2 β k , l , Δ h l BE , Δ h l IE Ω E
Moreover, (21) and (22) can be rewritten as
( h ¯ l IE ) H Θ H BI + h ¯ l BE H k = 1 K W k + r = 1 R V r ( h ¯ l IE ) H Θ H BI + h ¯ l BE H H + 2 Re { ( h ¯ l IE ) H Θ H BI + h ¯ l BE H k = 1 K W k + r = 1 R V r ( Δ h l BE + Δ h l IE ) } + ( Δ h l BE + Δ h l IE ) H k = 1 K W k + r = 1 R V r + ( Δ h l BE + Δ h l IE ) H k = 1 K W k + r = 1 R V r ( Δ h l BE + Δ h l IE ) + δ l 2 β k , l 2 τ k , l max B
( h ¯ l IE ) H Θ H BI + h ¯ l BE H j k K W j + r = 1 R V r ( h ¯ l IE ) H Θ H BI + h ¯ l BE H H + 2 Re { ( h ¯ l IE ) H Θ H BI + h ¯ l BE H j k K W j + r = 1 R V r ( Δ h l BE + Δ h l IE ) } + ( Δ h l BE + Δ h l IE ) H j k K W j + r = 1 R V r + ( Δ h l BE + Δ h l IE ) H j k K W j + r = 1 R V r ( Δ h l BE + Δ h l IE ) + δ l 2 β k , l 2 τ k , l max B
The estimated channel vector and channel estimation error of the eavesdropper are defined as
g ¯ l H = ( h ¯ l IE ) H , ( h ¯ l BE ) H , Δ g l H = ( Δ h l IE ) H , ( Δ h l IE ) H
Hence, (23) and (24) can be rewritten as
Δ g l H Γ Δ g l + 2 Re { Δ g l H Γ g ¯ l } + g ¯ l H Γ g ¯ l + δ l 2 β k , l τ k , l max B 0 , Δ g l F ε l E
Δ g l H Γ k Δ g l + 2 Re { Δ g l H Γ k g ¯ l } + g ¯ l H Γ k g ¯ l + δ l 2 β k , l τ k , l max B 0 , Δ g l F ε l E
where ε l E = ε l BE + ε l IE . Since Equations (26) and (27) contain infinite linear inequalities, in order to deal with this problem, Theorem 1 is used for transformation.
Theorem 1
(S-Procedure [16]). Define f 1 ( x ) and f 2 ( x ) as
f m ( x ) = x H A m x + 2 Re { b m H x } + c m , m = 1 , 2
where A m R N × N , b m R N × 1 , x R N × 1 , c m R . If and only if λ 0 , f 1 ( x ) 0 f 2 ( x ) 0 , which yields
λ A 1 b 1 b 1 H c 1 A 2 b 2 b 2 H c 2 0 ,
Applying Theorem 1, (26) and (27) convert to a finite number of linear matrix inequalities, such as
λ l I N + M Γ Γ H g ¯ l ( Γ H g ¯ l ) H λ l ( ε l E ) 2 g ¯ l H Γ g ¯ l Z 1 0 .
λ ¯ l I N + M Γ k Γ k H g ¯ l ( Γ k H g ¯ l ) H λ ¯ l ( ε l E ) 2 g ¯ l H Γ k g ¯ l Z 1 0 .
where
Γ = Θ H BI j = 1 K W j + r = 1 R V r ( H BI ) H G Θ H BI j = 1 K W j + r = 1 R V r ( Θ H BI j = 1 K W j + r = 1 R V r ) H j = 1 K W j + r = 1 R V r 0 .
Γ k = Θ H BI j k K W j + r = 1 R V r ( H BI ) H G Θ H BI j k K W j + r = 1 R V r ( Θ H BI j k K W j + r = 1 R V r ) H j k K W j + r = 1 R V r 0 .
Z 1 = δ l 2 β k , l 2 τ k , l max B , Z 2 = δ l 2 β k , l , λ l and λ ¯ l denote the new slack variables. Let λ = [ λ 1 , λ 2 , , λ L ] and λ ¯ = [ λ ¯ 1 , λ ¯ 2 , , λ ¯ L ] . Then, the optimization problem (12) can be reformulated as
max W k , V r , t , β k , l , λ l , λ ¯ t s . t . : C ¯ 2 , C 4 , C 5 , C 6 R ^ k τ k , l max > = R k min λ l I N + M Γ Γ H g ¯ l ( Γ H g ¯ l ) H λ l ( ε l E ) 2 g ¯ l H Γ g ¯ l Z 1 0 λ ¯ l I N + M Γ k Γ k H g ¯ l ( Γ k H g ¯ l ) H λ ¯ l ( ε l E ) 2 g ¯ l H Γ k g ¯ l Z 1 0
It can be easily known that (34) is still a convex problem only due to the non-convex constraint Rank ( W k ) = 1 . Herein, we adopt the semidefinite relaxation technique (SDR), dropping the constraint Rank ( W k ) = 1 . Therefore, the above problem is a convex problem, which can be solved by the standard convex solver, such as, CVX. However, this does not guarantee Rank ( W k ) = 1 . If Rank ( W k ) = 1 , the optimal solution w k can be obtained by eigenvalue decomposition. Otherwise, a rank-one solution can be constructed by the Gaussian randomization method.

3.2. Optimizing Phase Shift

As w k , v r and t are fixed, the optimization problem (12) subject to phase shift θ n can be reformulated as
max t , θ n t s . t . C 1 : R k sec R k min , Δ h l BE F ε l BE , Δ h l IE F ε l IE k = 1 K G r H w k 2 + r = 1 R G r H v r 2 > = t C 3 : 0 θ n 2 π
Define q ¯ = [ q ; 1 ] , Q = q ¯ q ¯ H , Φ k = [ diag ( ( h k IU ) H ) H BI ; ( h k BU ) H ] , Φ l = [ diag ( ( h l IE ) H ) H BI ; ( h l BE ) H ] , Φ r = [ diag ( ( g r IH ) H ) H BI ; ( g r BH ) H ] ; then, (35) becomes
max t , λ l , λ ¯ , Q t s . t . R ˜ k τ k , l max R k min , k = 1 K Tr ( Φ r W k ( Φ r ) H Q ) + m = 1 R Tr ( Φ r V m ( Φ r ) H Q ) > = t C 3 ^ : Q n , n = 1 , Q 0 λ l I N + M Γ Γ H g ¯ l ( Γ H g ¯ l ) H λ l ( ε l E ) 2 g ¯ l H Γ g ¯ l Z 1 0 λ ¯ l I N + M Γ k Γ k H g ¯ l ( Γ k H g ¯ l ) H λ ¯ l ( ε l E ) 2 g ¯ l H Γ k g ¯ l Z 1 0 Rank ( Q ) = 1
where
R ˜ k = B log 2 k = 1 K Tr ( Φ k W k ( Φ k ) H Q ) + r = 1 R Tr ( Φ k V r ( Φ k ) H Q ) + σ k 2 Tr Q H D ˜ 1 ( Q ( i ) ) ( Q Q ( i ) )
Q H D ˜ 1 ( Q ( i ) ) = B ln 2 k = 1 K Φ k j k K W j + r = 1 R V r ( Φ k ) H j k K Tr ( Φ k W j ( Φ k ) H Q ) + r = 1 R Tr ( Φ k V r ( Φ k ) H Q ) + σ k 2
For the non-convex terms Γ and Γ k in (36), we use singular value decomposition to transform, for example,
H BI j = 1 K W j + r = 1 R V r ( H BI ) H = i s i d i H
H BI j k K W j + r = 1 R V r ( H BI ) H = i s ¯ i d ¯ i H
Moreover, we have
Θ H H BI j = 1 K W j + r = 1 R V r ( H BI ) H Θ = i S i q ¯ ( q ¯ ) H D i H
Θ H H BI j k K W j + r = 1 R V r ( H BI ) H Θ = i S ¯ i q ¯ ( q ¯ ) H D ¯ i H
where S i = [ diag ( s ) i , 0 ] , S ¯ i = [ diag ( s ¯ i ) , 0 ] , D i = [ diag ( d i ) ; 0 ] , D ¯ i = [ diag ( d ¯ i ) ; 0 ] . If Q satisfies Rank ( Q ) = 1 , then Θ = diag ( Q N + 1 , 1 : N ) , where Q N + 1 , 1 : N = [ Q N + 1 , 1 , Q N + 1 , 2 , , Q N + 1 , N ] . Based on the above analysis, Γ and Γ k in (34) can be re-expressed as
Γ ^ = i S i Q D i diag ( Q N + 1 , 1 : N ) H BI j = 1 K W j + r = 1 R V r diag ( Q N + 1 , 1 : N ) H BI j = 1 K W j + r = 1 R V r H j = 1 K W j + r = 1 R V r 0 , k .
Γ ^ k = i S ¯ i Q ¯ D i diag ( Q N + 1 , 1 : N ) H BI j k K W j + r = 1 R V r diag ( Q N + 1 , 1 : N ) H BI j k K W j + r = 1 R V r H j k K W j + r = 1 R V r 0 , k .
Based on the above operation, the optimization problem (36) is transformed into the following problem:
max t , λ l , λ ¯ , Q t s . t . R ˜ k τ k , l max R k min , k = 1 K Tr ( Φ r W k ( Φ r ) H Q ) + m = 1 R Tr ( Φ r V m ( Φ r ) H Q ) > = t C 3 ^ : Q n , n = 1 , Q 0 λ l I N + M Γ ^ Γ ^ H g ¯ l ( Γ ^ H g ¯ l ) H λ l ( ε l E ) 2 g ¯ l H Γ ^ g ¯ l Z 1 0 λ ¯ l I N + M Γ ^ k Γ ^ k H g ¯ l ( Γ ^ k H g ¯ l ) H λ ¯ l ( ε l E ) 2 g ¯ l H Γ ^ k g ¯ l Z 1 0 Rank ( Q ) = 1
However, there is a rank-one constraint in (45) and the semidefinite relaxation method is generally used to discard the rank-one constraint; then, (45) becomes a convex optimization problem, and then uses the CVX toolbox to solve the problem. To handle the rank-one constraint, the equivalent substitution can be used to express the rank-one constraint as
Rank ( Q ) = 1 Q Q 2 = 0
If X R M × M , the inequality X = i σ i X 2 holds, where σ i is the i-th largest singular value and the equation holds if and only if Rank ( X ) = 1 . Therefore, the penalty function method is used to put this constraint into the objective function for processing. Penalty factor μ > 0 is introduced. Then, (45) can be written as
max t , λ l , λ ¯ , Q t + 1 2 μ ( Q Q 2 ) s . t . R ˜ k τ k , l max R k min , k = 1 K Tr ( Φ r W k ( Φ r ) H Q ) + m = 1 R Tr ( Φ r V m ( Φ r ) H Q ) > = t C 3 ^ : Q n , n = 1 , Q 0 λ l I N + M Γ ^ Γ ^ H g ¯ l ( Γ ^ H g ¯ l ) H λ l ( ε l E ) 2 g ¯ l H Γ ^ g ¯ l Z 1 0 λ ¯ l I N + M Γ ^ k Γ ^ k H g ¯ l ( Γ ^ k H g ¯ l ) H λ ¯ l ( ε l E ) 2 g ¯ l H Γ ^ k g ¯ l Z 1 0
Let Q be the optimal solution of problem (45) and the penalty factor be μ . When μ 0 , the limit value of Q is an optimal solution to (45). Therefore, when the penalty factor is sufficiently small, a rank-one solution can be obtained by solving (47). However, the penalty function of (47) is a non-convex DC form; then, the first-order Taylor expansion is used for processing; that is
1 2 μ Q 2 1 2 μ Q ( i ) 2 + Q 1 2 μ Q ( i ) 2 ( Q Q ( i ) )
where Q 1 2 μ Q ( i ) 2 = 1 2 μ λ max ( Q ) λ max H ( Q ) , λ max ( Q ) denotes the eigenvector corresponding to the largest eigenvalue. Then, (47) can be equivalently transformed into the following problem:
max t , λ l , λ ¯ , Q t + 1 2 μ ( Q Q ( i ) 2 Q Q ( i ) 2 ( Q Q ( i ) ) ) s . t . R ˜ k τ k , l max R k min , k = 1 K Tr ( Φ r W k ( Φ r ) H Q ) + m = 1 R Tr ( Φ r V m ( Φ r ) H Q ) > = t C 3 ^ : Q n , n = 1 , Q 0 λ l I N + M Γ ^ Γ ^ H g ¯ l ( Γ ^ H g ¯ l ) H λ l ( ε l E ) 2 g ¯ l H Γ ^ g ¯ l Z 1 0 λ ¯ l I N + M Γ ^ k Γ ^ k H g ¯ l ( Γ ^ k H g ¯ l ) H λ ¯ l ( ε l E ) 2 g ¯ l H Γ ^ k g ¯ l Z 1 0
Problem (49) belongs to the SDP programming, which can be solved via the CVX solver. Under the alternating optimization framework, (10) is overcome by solving problems (34) and (49) in an iterative form. The proposed robust resource allocation Algorithm 1 is summarized as follows.
Algorithm 1 Proposed Robust Resource Allocation Algorithm
1:
Input: The channels h k , H B I , h k B U , h l I E , h l B E , k , l ;
2:
Output: W k , V r and q ;
3:
Initialization: l = 0 , W k ( n ) = W k ( 0 ) , V r ( n ) = V r ( 0 ) , q ( 0 ) and a threshold ϖ ;
4:
Repeat
  • Solve (34) via CVX tool to get W k ( i + 1 ) , V r ( i + 1 ) , t ( i + 1 )
  • Solve (49) via CVX tool to get q ( i + 1 ) ,
  • i = i + 1 ;
5:
Until | t ( i + 1 ) t ( i ) | ϖ .
6:
end

4. Simulation Results

In this section, the effectiveness of the proposed algorithm is verified by simulation. The simulation scenario is shown in Figure 1, assuming that the base station is located at ( 0 , 0 ) , the information receivers are located in a circle with a center of ( x I U , 0 ) with the radius equal to 1 m, the eavesdroppers are located in a circle with a center of ( x E , 0 ) with the radius equal to 1 m, the energy receivers are located in a circle with a center of ( x R , 0 ) with the radius equal to 1 m, and the RIS is located at ( x R I S , y R I S ) . Define the system bandwidth and pass-loss as 10 MHz and L ( d ) = T 0 ( d / d 0 ) α , where T 0 = 30 dB denotes the pass-loss with d 0 = 1 m; d indicates the communication distance. Let the path loss factors from the base station to the RIS, the user and the eavesdropper and the energy harvesting device be α BI = 2.2 , α BR = 3.8 , α BU = 3.8 , α BE = 2.8 , respectively, while the RIS to the user, eavesdropper and energy harvesting concerning the path loss factors of the device are α I U = 2.4 , α I R = 2.2 , α I E = 2.4 respectively. Define the maximum estimation error of the wiretap channel as ε E = ε l E , l ; its normalized estimation error is expressed as ξ = ε E g l F .
Figure 2 shows convergence performance of the max-min harvested energy among all of the energy receivers. It can be seen from the figure that the proposed algorithm in this paper reaches convergence after only a few iterations, which illustrates the proposed algorithm has good convergence. As the number of base station antennas increase, the harvested energy of the system increases. Because the number of antennas is increased, the energy beamforming gain and the signal beamforming gain are increased and the beamforming effect is improved, so that the max-min harvested energy is improved.
Figure 3 shows the relationship between the system energy efficiency and P max . It can be seen from Figure 3 that under the same number of RIS reflection units, the max-min harvested energy increases with the increase in the maximum transmit power P max . The main reason is that increasing P max can increase the feasible region, thereby improving the transmission rate. We can also conclude that when the number of reflectors of the RIS increases, the harvested energy also increases. This is because adjusting the phase shift can reflect more received signals from the base station, provide more flexibility for resource allocation, improve the beam gain from the RIS to the legitimate user link and thus improve the max-min harvested energy.
Figure 4 presents the relationship between the max-min harvested energy and the number of transmit antennas. Under the same number of users, the max-min harvested energy of the system increases with the increase in the number of transmit antennas. When the number of system users increases, the max-min harvested energy among all the energy receivers is increased because the proposed algorithm maximizes the max-min harvested power of the system. As the number of users is increased, the available resource is also increased, thereby allowing harvested energy improvement.
Figure 5 presents the max-min harvested energy by the energy receiver versus receiver position. Comparison and analysis are made from the perspective of different numbers of RIS reflection elements and without RIS. It can be seen that the power collected by the energy harvesting device decreases as the distance between the receiver and the base station increases. As expected, more power can be collected with RIS than without RIS, especially when the number of reflectors is large. Because the use of the RIS adds an additional reflection link, the reception gain of the energy receiver is enhanced.
To further verify the performance of the proposed algorithm, the max-min harvested energy robust algorithm based on imperfect CSI is denoted as the proposed algorithm; the max-min harvested energy algorithm based on perfect CSI is defined as “proposed algorithm (perfect CSI)”; the max-min harvested energy robust algorithm based on imperfect CSI with random phase shift is denoted as “Random Phase Shift”; the max-min harvested energy algorithm without considering IRS is defined as “Without RIS”.
Figure 6 shows the relationship between the max-min harvested energy and the user secure rate threshold. With the increase in R k min , the max-min harvested energy of different algorithms gradually decreases. As R k min increases, the system must allocate additional power to satisfy the secrecy rate constraint, resulting in a decrease in fairness harvested energy. The fairness-aware harvested energy of the proposed robust algorithm with imperfect CSI is significantly higher than that of the conventional algorithm without RIS, which indicates that the proposed algorithm can utilize the spatial degrees of freedom to provide security more effectively than the algorithm without RIS, even in the presence of uncertain channel parameters. However, the max-min harvested energy of the proposed algorithm is slightly lower than that of the perfect CSI algorithm because the base station and RIS can not allocate beams accurately due to the existence of channel uncertainty parameters. As can be observed, for the proposed scheme, the average max-min harvested energy decreases as the quality of the CSI degrades. In particular, the worse the quality of the estimated CSI, the more difficult it is for the base station to perform accurate beamforming and efficient AN jamming, which results in a lower achievable fairness harvested energy.

5. Conclusions

In order to improve the ability of the RIS-assisted MISO system to overcome channel uncertainty and user information leakage, this paper proposes a resource allocation algorithm based on the bounded channel uncertainty model to maximize the minimum harvested energy of the system. Considering the necessary physical constraints and user transmission quality constraints, a multi-variable coupled robust harvested energy optimization problem is constructed. The original problem is transformed into a deterministic problem by using S-procedure methods; at the same time, the problem is transformed into a convex optimization problem by using the alternating optimization method. The simulation results verify the superiority of the algorithm in this paper.

Author Contributions

Conceptualization, B.Y. and Z.R.; methodology, B..Y.; software, B.Y.; validation, B.Y., B.Y. and S.T.; formal analysis, B.Y.; investigation, B.Y.; resources, B.Y.; data curation, B.Y.; writing—original draft preparation, B.Y.; writing—review and editing, B.Y.; visualization, B.Y.; supervision, B.Y.; project administration, B.Y.; funding acquisition, Z.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lee, J.B.; Rong, Y.; Gopal, L.; Chiong, C.W.R. Mutual Information Maximization for SWIPT AF MIMO Relay Systems With Non-Linear EH Models and Imperfect Channel State Information. IEEE Trans. Veh. Technol. 2022, 71, 8503–8518. [Google Scholar] [CrossRef]
  2. Jin, Y.; Guo, R.; Zhou, L.; Hu, Z. Secure Beamforming for IRS-Assisted Nonlinear SWIPT Systems With Full-Duplex User. IEEE Commun. Lett. 2022, 26, 1494–1498. [Google Scholar] [CrossRef]
  3. Xu, X.; Zhang, S.; Gao, F.; Wang, J. Sparse Bayesian Learning Based Channel Extrapolation for RIS Assisted MIMO-OFDM. IEEE Trans. Commun. 2022, 70, 5498–5513. [Google Scholar] [CrossRef]
  4. Singh, S.K.; Agrawal, K.; Singh, K.; Bansal, A.; Li, C.P.; Ding, Z. On the Performance of Laser-Powered UAV-Assisted SWIPT Enabled Multiuser Communication Network With Hybrid NOMA. IEEE Trans. Commun. 2022, 70, 3912–3929. [Google Scholar] [CrossRef]
  5. Wu, Y.; Song, Y.; Wang, T.; Dai, M.; Quek, T.Q.S. Simultaneous Wireless Information and Power Transfer Assisted Federated Learning via Nonorthogonal Multiple Access. IEEE Trans. Green Commun. Netw. 2022, 6, 3912–3929. [Google Scholar] [CrossRef]
  6. Wang, C.; Deng, D.; Xu, L.; Wang, W. Resource Scheduling Based on Deep Reinforcement Learning in UAV Assisted Emergency Communication Networks. IEEE Trans. Commun. 2022, 70, 3834–3848. [Google Scholar] [CrossRef]
  7. Hu, C.; Li, Q.; Zhang, Q.; Qin, J. Security Optimization for an AF MIMO Two-Way Relay-Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With SWIPT. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1846–1861. [Google Scholar] [CrossRef]
  8. Egashira, E.N.; Osorio, D.P.M.; Olivo, E.E.B. Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks. IEEE Trans. Veh. Technol. 2022, 71, 6859–6863. [Google Scholar] [CrossRef]
  9. Zhang, C.; Chen, W.; Chen, Q.; He, C. Distributed Intelligent Reflecting Surfaces-Aided Device-to-Device Communications System. J. Commun. Inf. Netw. 2021, 6, 197–207. [Google Scholar] [CrossRef]
  10. Dang, J.; Zhang, Z.; Wu, L. Joint beamforming for intelligent reflecting surface aided wireless communication using statistical CSI. China Commun. 2020, 17, 147–157. [Google Scholar] [CrossRef]
  11. Chu, Z.; Xiao, P.; Mi, D.; Chen, H.; Hao, W. Intelligent reflecting surfaces enabled cognitive internet of things based on practical pathloss model. China Commun. 2020, 17, 1–16. [Google Scholar] [CrossRef]
  12. Yuan, J.; Liang, Y.C.; Joung, J.; Feng, G.; Larsson, E.G. Intelligent Reflecting Surface-Assisted Cognitive Radio System. IEEE Trans. Commun. 2021, 69, 675–687. [Google Scholar] [CrossRef]
  13. Dong, L.; Wang, H.M.; Bai, J.; Xiao, H. Double Intelligent Reflecting Surface for Secure Transmission With Inter-Surface Signal Reflection. IEEE Trans. Veh. Technol. 2021, 70, 2912–2916. [Google Scholar] [CrossRef]
  14. Xu, D.; Jamali, V.; Yu, X.; Ng, D.W.K.; Schober, R. Optimal Resource Allocation Design for Large IRS-Assisted SWIPT Systems: A Scalable Optimization Framework. IEEE Trans. Commun. 2022, 70, 1423–1441. [Google Scholar] [CrossRef]
  15. Khalili, A.; Zargari, S.; Wu, Q.; Ng, D.W.K.; Zhang, R. Multi-Objective Resource Allocation for IRS-Aided SWIPT. IEEE Wirel. Commun. Lett. 2021, 10, 1324–1328. [Google Scholar] [CrossRef]
  16. Zargari, S.; Khalili, A.; Zhang, R. Energy Efficiency Maximization via Joint Active and Passive Beamforming Design for Multiuser MISO IRS-Aided SWIPT. IEEE Wirel. Commun. Lett. 2021, 10, 557–561. [Google Scholar] [CrossRef]
  17. Xu, Y.; Xie, H.; Wu, Q.; Huang, C.; Yuen, C. Robust Max-Min Energy Efficiency for RIS-Aided HetNets With Distortion Noises. IEEE Trans. Commun. 2021, 70, 1457–1471. [Google Scholar] [CrossRef]
  18. Yu, X.; Xu, D.; Sun, Y.; Ng, D.W.K.; Schober, R. Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces. IEEE J. Sel. Areas Commun. 2020, 38, 2637–2652. [Google Scholar] [CrossRef]
  19. Zhou, G.; Pan, C.; Ren, H.; Wang, K.; Peng, Z. Secure wireless communication in RIS-aided MISO system with hardware impairments. IEEE Wirel. Commun. Lett. 2021, 10, 1309–1313. [Google Scholar] [CrossRef]
  20. Wang, Q.; Zhou, F.; Hu, R.Q.; Qian, Y. Energy Efficient Robust Beamforming and Cooperative Jamming Design for IRS-Assisted MISO Networks. IEEE Trans. Wirel. Commun. 2021, 20, 2592–2607. [Google Scholar] [CrossRef]
  21. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z. Simultaneous transmission and reflection reconfigurable intelligent surface assisted secrecy MISO networks. IEEE Commun. Lett. 2021, 25, 3498–3502. [Google Scholar] [CrossRef]
  22. Xu, Y.; Zhao, X.; Liang, Y.C. Robust power control and beamforming in cognitive radio networks: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 1834–1857. [Google Scholar] [CrossRef]
Figure 1. Simulation scenario.
Figure 1. Simulation scenario.
Sensors 22 08274 g001
Figure 2. Convergence performance of the proposed algorithm under different numbers of reflecting elements.
Figure 2. Convergence performance of the proposed algorithm under different numbers of reflecting elements.
Sensors 22 08274 g002
Figure 3. Relationship between max-min harvested energy and the maximum transmit power of base station.
Figure 3. Relationship between max-min harvested energy and the maximum transmit power of base station.
Sensors 22 08274 g003
Figure 4. The relationship between the max-min harvested energy and the number of transmit antennas.
Figure 4. The relationship between the max-min harvested energy and the number of transmit antennas.
Sensors 22 08274 g004
Figure 5. Max-min harvested energy by an energy receiver versus receiver location.
Figure 5. Max-min harvested energy by an energy receiver versus receiver location.
Sensors 22 08274 g005
Figure 6. The relationship between the max-min harvested energy and the user secure rate threshold.
Figure 6. The relationship between the max-min harvested energy and the user secure rate threshold.
Sensors 22 08274 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yu, B.; Ren, Z.; Tang, S. Robust Secure Resource Allocation for RIS-Aided SWIPT Communication Systems. Sensors 2022, 22, 8274. https://doi.org/10.3390/s22218274

AMA Style

Yu B, Ren Z, Tang S. Robust Secure Resource Allocation for RIS-Aided SWIPT Communication Systems. Sensors. 2022; 22(21):8274. https://doi.org/10.3390/s22218274

Chicago/Turabian Style

Yu, Bencheng, Zihui Ren, and Shoufeng Tang. 2022. "Robust Secure Resource Allocation for RIS-Aided SWIPT Communication Systems" Sensors 22, no. 21: 8274. https://doi.org/10.3390/s22218274

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop