Next Article in Journal
ECFuse: Edge-Consistent and Correlation-Driven Fusion Framework for Infrared and Visible Image Fusion
Next Article in Special Issue
A Pattern Reconfigurable Antenna Using Eight-Dipole Configuration for Energy Harvesting Applications
Previous Article in Journal
Improved RAkEL’s Fault Diagnosis Method for High-Speed Train Traction Transformer
Previous Article in Special Issue
Outage Analysis of Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer System for Industrial Emergency Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resource Allocation for Secure MIMO-SWIPT Systems in the Presence of Multi-Antenna Eavesdropper in Vehicular Networks

by
Vieeralingaam Ganapathy
1,
Ramanathan Ramachandran
1 and
Tomoaki Ohtsuki
2,*
1
Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore 641112, India
2
Department of Information and Computer Science, Keio University, Tokyo 108-8345, Japan
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(19), 8069; https://doi.org/10.3390/s23198069
Submission received: 28 August 2023 / Revised: 14 September 2023 / Accepted: 22 September 2023 / Published: 25 September 2023
(This article belongs to the Special Issue RF Energy Harvesting and Wireless Power Transfer for IoT)

Abstract

:
In this paper, we optimize the secrecy capacity of the legitimate user under resource allocation and security constraints for a multi-antenna environment for the simultaneous transmission of wireless information and power in a dynamic downlink scenario. We study the relationship between secrecy capacity and harvested energy in a power-splitting configuration for a nonlinear energy-harvesting model under co-located conditions. The capacity maximization problem is formulated for the vehicle-to-vehicle communication scenario. The formulated problem is non-convex NP-hard, so we reformulate it into a convex form using a divide-and-conquer approach. We obtain the optimal transmit power matrix and power-splitting ratio values that guarantee positive values of the secrecy capacity. We analyze different vehicle-to-vehicle communication settings to validate the differentiation of the proposed algorithm in maintaining both reliability and security. We also substantiate the effectiveness of the proposed approach by analyzing the trade-offs between secrecy capacity and harvested energy.

1. Introduction

Simultaneous wireless information and power transfer (SWIPT) is an optimistic and robust method for sustainable power supply to wireless networks [1]. The lifetime of a typical node in wireless networks can be extended by energy harvesting. Solar and RF energy are popular sources of energy in the environment. RF energy sources are used for energy harvesting to make a system independent of weather conditions. Also, the RF signals can carry information and energy simultaneously [1], hence the name SWIPT.
The challenges of controlling the data rate and desired quality of service necessitate a cooperative multiple-input multiple-output (CMIMO) system [2]. CMIMO systems can improve the performance of wireless networks and wireless sensor networks. A comprehensive overview of various supporting technologies, such as compressive sensing and SWIPT, can be augmented to CMIMO to improve the throughput and energy efficiency performance. The challenges involved in the augmented CMIMO systems, energy-saving techniques, and overview of protocol layers are analyzed in [3]. To increase the capacity and coverage of wireless networks, heterogeneous networks with macrocells and femtocells have become a popular architecture. However, the regulation of interference between these layers still poses a serious difficulty and requires efficient mitigation techniques. In [4], a joint optimization problem of maximizing the sum rates to inter-tier interference under resource allocation constraints is proposed to reduce the interference to macrocell users.
The use of different SWIPT system settings in a variety of applications, including Internet of Things (IoT) and biosensors, has prompted researchers to investigate the reliability and sustainability of the SWIPT system by analyzing the rate–energy trade-off. In the MIMO environment, the transmit power affects the performance of the SWIPT system. The performance analysis can be conducted by calculating the mean square error (MSE) of the detected/received symbol [5] and also by analyzing the relationship between the transmit power and the interference regimes present at the receiver end [6]. Since the transmit power is directly related to the information rate of a legitimate receiver, the security aspect of wireless communication systems must be analyzed. For example, the usability of MIMO systems without secure protocols will compromise the system; therefore, secure transmission algorithms in the presence of multiple eavesdroppers are studied in [7]. The keyless physical layer security (PLS) represents a subset of theoretical paradigms in wireless communications that optimize the inherent properties of the physical layer to ensure secrecy/reliability (without the need for traditional cryptographic keys). A comprehensive survey based on keyless PLS for ensuring secrecy in the wireless network environment is studied in [8], where the security challenges in IoT and V2X networks are discussed. Also in [9], a survey is conducted of the impact of security on the sixth-generation (6G) wireless technologies, network architecture and potential applications. A detailed analysis related to the security requirements, distributed machine learning (DML) is also studied.
A multi-agent deep reinforcement learning (DRL)-based approach is studied in [10] for the vehicular edge-computing network, where a secure resource allocation strategy is proposed by optimizing the transmission power, spectrum and computation resource allocation components. The DRL approach proposed in [10] significantly reduces the delay while maintaining the confidentiality probability. In the context of IoT networks, work in [11] explores the cooperative potential of non-orthogonal multiple access (NOMA) for SWIPT, addressing the challenges of imperfect successive interference cancellation (SIC) and using deep learning to optimize the throughput performance. In [12], a novel semi-supervised intrusion detection method based on federated learning is proposed to improve the quality of the predicted outputs (thereby avoiding incorrect predictions and achieving lower communication overhead). The recent work proposed in [13] explores the potential of deep learning applications in device-to-device (D2D) unmanned aerial vehicle (UAV) communication, leveraging the use of both SWIPT and multi-agent deep Q-networks (MADQN) to improve energy efficiency based on the design of reward functions. In the context of the rapidly evolving and highly dynamic vehicular ad hoc networks (VANETs) landscape, as studied in [14], the deep neural network framework for anomaly detection contributes to jointly enhance the security and reliability of these networked systems.
Dynamic settings and the mobility of devices in wireless network environments (such as unmanned aerial vehicle (UAV) and ad hoc networks) present additional difficulties and opportunities for ensuring effective and reliable data transmission and resource management. Vehicle clustering provides a solution for dynamic wireless networks, enabling effective resource management and solving mobility issues. For ad hoc networks, the vehicle-clustering algorithm plays a key role in establishing effective communication and resource sharing among vehicles. In [15], a clustering algorithm is proposed to minimize the total energy consumption of vehicles based on their direction and entropy using a fuzzy C-means algorithm. As discussed in [16], three-dimensional trajectory planning in UAV networks is crucial to enable seamless cooperation and data exchange/collection among UAVs, optimize their flight paths, and efficiently utilize scarce resources.
The transmit power, along with the number of antennas, plays a significant role in determining the secrecy rate of the system. Due to the characteristics of RF signals in SWIPT systems, separate and co-located energy-harvesting/information-decoding (EH/ID) receivers with corresponding precoder designs are being developed [17]. The characterization of different capacity scaling techniques (in general, the capacity values vary depending on the base station (BS) antennas, signal-to-noise ratio (SNR), beamforming architecture, and coherence block size) are investigated for the massive MIMO systems under strong spatial correlation regimes as shown in [18]. Based on the optimization of transmit beamforming vectors and power-splitting ratios, the battery depletion phenomenon is mitigated by formulating an optimal resource allocation strategy based on the transmit power optimization algorithm [19]. The channel characteristics affect the received energy in a wireless network, thus affecting the energy-harvesting capability of the intended receiver. The amount of energy harvested for passively powered sensor networks is investigated in [20], where the circuit is designed and relationships between the DC power and received power are analyzed.
Vehicular networks are becoming increasingly interconnected and autonomous, leading to the need for reliable, secure, and sustainable communication mechanisms. Recent research has shown that integrating SWIPT into vehicular networks offers promising solutions to energy sustainability concerns [21,22]. As relays increasingly become “hubs”—collecting, sending, and receiving large amounts of information—the energy and security requirements of in-vehicle communication systems are increased dramatically [23]. Integrating vehicle networks with SWIPT promises a dual benefit: reliable communications, and reduced dependence on external power sources. This synergy of security and energy harvesting can significantly increase the potential autonomy of vehicular communication systems. The impact of distance and control over the power-splitting factor on physical layer security is studied in [24]. The authors also investigated jamming techniques to improve security (as the distance between jammer and eavesdropper changes).

1.1. Motivation

The presence of a sophisticated eavesdropper equipped with multiple antennas adds another layer of complexity. Multi-antenna eavesdroppers can intercept signals from different spatial paths, posing a significant threat to MIMO communications and SWIPT systems. A nuanced approach to resource allocation is essential to ensure both efficient energy harvesting and secure data transmission in such scenarios. Our work aims to address the overlapping challenges of energy and PLS management in vehicular networks, laying the foundation for a more resilient and sustainable vehicular communication system. With the significant modernization and increased applicability of MIMO-SWIPT vehicular networks in industrial applications, ensuring secure communication in the presence of potential eavesdroppers becomes a paramount concern. The potential vulnerabilities posed by multi-antenna eavesdroppers in such vehicular networks necessitate the development of robust resource allocation strategies to secure wireless power and information transmission. By optimizing the transmit power allocation, our work aims to enhance the secrecy capacity and harvested energy in MIMO-SWIPT systems, thus ensuring reliable and secure communication for vehicular applications. Our research aims to contribute to the advancement of secure resource allocation techniques, enabling sustainable and secure wireless communication integration in vehicular networks while addressing security challenges in dynamic communication environments.

1.2. Contributions

In this paper, we present a resource allocation strategy for a MIMO SWIPT system in vehicular networks to optimize the information capacity of multi-antenna Bob under resource allocation constraints in the presence of a multi-antenna passive eavesdropper. The information capacity maximization problem with secrecy rate and quality-of-service constraints is formulated for different positions of Bob, and transmit power/power-splitting (PS) ratio values are achieved using the divide-and-conquer strategy. The following dynamic scenario is considered: Bob is moving from position-A (Pos-A) to position-B (Pos-B). Also, Pos-B is further away from Alice (compared to Pos-A) because Bob traverses from Pos-A to Pos-B away from Alice in the presence of a multi-antenna eavesdropper (which is positioned relatively close to Alice). The contributions of this paper are as follows:
  • We present two transmission scenarios in SWIPT-enabled vehicular networks in the presence of a multi-antenna eavesdropper: Bob is at Pos-A, and Bob is at Pos-B.
  • We formulate corresponding optimization problems for two scenarios: when Bob is at Pos-A and when Bob is at Pos-B under resource allocation constraints.
  • We maximize the information capacity under the secrecy capacity, harvested energy requirements, and other resource allocation constraints.
  • We propose a divide-and-conquer strategy by splitting the optimization problem into two sub-problems (alternating the choice of optimization variables). By optimizing the power-splitting ratio, our proposed algorithm can allocate the harvested energy to the EH/ID receiver and maintain sufficient secrecy capacity.
  • We provide simulation results, highlighting the differences between the transmission scenarios considered. We also validate the need for the proposed scheme by analyzing the performance under the two considered scenarios.

1.3. Related Work

The transmit power parameter is one of the key variables in determining the information rate for wireless communication systems. The transmit power can be optimized by using beamforming resource allocation strategies. Since we incorporated SWIPT in the MIMO system, there is also a need to optimize the value of the power-splitting ratio. The system is modeled without the inclusion of SWIPT, and is studied in the works [6,18], where the beamforming problem for cognitive radio and MIMO environments is developed. In [6], the transmit power for secondary users is minimized, while the power for the primary user is increased. The problem is reformulated as a relaxed semidefinite problem, and transmit power/SNR analysis is performed for primary and secondary users.
In [18], the achievable rate in a MIMO environment is analyzed. The rate-scaling characteristics are studied for different values of antennas. The analytical structure of the information rate depends on the selected channel characteristics. An investigation of the use of multiple transmit/receive antennas for a single-user communication model is studied for fading and non-fading channels [25]. The capacities and error exponents of both fading and non-fading channels are formulated. The result shows that the use of multiple antennas significantly increases the information capacity of a single user.
By incorporating a SWIPT perspective into the wireless communication model, the rate–energy (R-E) characteristics are analyzed as in [1,3], and the corresponding beamforming vector optimization strategy is used to improve the efficiency (by preventing depletion and ensuring the latency/harvesting required amount of energy) as in [19]. The characteristics of EH/ID receivers are studied for various practical designs. The co-located and separated EH/ID receivers and their relationship with information rates are analyzed. The reliability of the practical parameters present in the receiver circuit must be introspected and incorporated in the study of the rate–energy trade-off. The effect of the circuit specification on the R-E region is analyzed in [3]. A multi-antenna SWIPT framework is studied in [19], where both (i) the semi-definite relaxation (SDR) approach combined with fractional programming (FP), and (ii) successive convex approximation (SCA) are proposed to achieve a robust and energy-efficient resource allocation strategy to mitigate battery depletion.
The hardware imperfections and distortions occur due to imbalance and nonlinearity in the high-power amplifier (HPA) and phase noise, which can degrade the quality of the EH/ID receivers. In [26], the estimation of distortions present in a SWIPT power-splitting system is investigated. The nonlinearity and total harmonic distortion present in the output of the HPA are analyzed using the recursive least squares technique. An analysis of the received SNR and harvested energy is performed for different harmonic distortion characteristics. In [27], a PS-based SWIPT system is studied under hardware impairments and in-phase and quadrature imbalances. An optimization problem is proposed to maximize the harvested energy under a SNR constraint in the presence of hardware impairments. An optimal value of harvested energy is achieved using bio-inspired algorithms in a Rayleigh fading environment.
The energy-harvesting capability can also cause interference in the communication environment, so the selection of optimal users based on a resource allocation strategy is developed in [28]. The use and design of appropriate variables in the resource allocation algorithms guarantee the selection of sensors and users depending on the defined optimization problem under the energy-harvesting wireless network environment [28].
The number of deployable nodes and transmission strategies is increasing in a wireless network environment, so several relay selection strategies need to be explored. In [29], a novel and efficient relay node selection scheme based on a power-splitting ratio for decoding and forward cooperative relay networks under the SWIPT framework is proposed. A power-splitting scheme is formulated to express the rate–energy exchange for the energy used for information decoding. The expression for the probability of failure is also derived, and a performance metric is analyzed in terms of energy conversion efficiency and SNR at different thresholds of the data rates.
The secrecy rate of the system is analyzed as a min-max problem for different ranges of SNR [30] in the presence of an active eavesdropper attack. The effect of multiple antennas between the sender, receiver, and eavesdropper on the secrecy rate is also analyzed. A trade-off between the average harvested energy and secrecy rate is analyzed for secure SWIPT in cell-free MIMO systems with multiple access points (APs) transmitting information to users. In [31], the authors extensively analyze the phenomenon of active pilot attack (by eavesdroppers) to compromise the base station channel and propose a methodology to achieve a secure link in intelligent reflecting surface (IRS)-assisted MIMO systems. The authors also successfully suppress the active eavesdropper using beamforming optimization (which is also validated in the trade-off curve between the secrecy capacity and eavesdropper position).
To achieve a secure wireless communication environment, a cognitive radio transmission system for decode and forward UAV with energy harvesting at the source and relay nodes is proposed [32]. The distribution of the probability of the non-zero secrecy rate of the system under the time-shared protocol is studied. A performance analysis based on the optimal secrecy rate selection strategy and the optimal antenna selection strategy at the destination node of the secondary network is investigated. The resource allocation algorithm of the SWIPT system can be extended to the security aspect of the algorithm by incorporating an analysis involving two significant characteristics: secrecy throughput, and transmission schemes, such as delay-constrained transmission and delay-tolerant transmission [33].
A resource allocation strategy is proposed to achieve a secure information rate and green power transmission for mobile receivers with distributed antennas connected to a central processor [34]. The total network transmission power is minimized under quality-of-service constraints. An optimal iterative algorithm based on generalized Bender’s decomposition is proposed.
Most practical applications require the optimization of rate and energy variables, so such variants of optimization problems are biconvex. An extensive survey of the theory of biconvex sets is given in [35], and biconvex optimization problems are solved by exploiting the properties of biconvex sets. The mathematical approach of convex optimization always aims to find optimal or suboptimal values of the variables under consideration. The penalty convex–concave approach is used to perform first-order convex approximation to solve the bilinear difference of convex problem [5]. The SDR approach for the co-located receiver is developed to achieve optimal parameter values [17].
As the technology evolves, the simulation of MIMO wireless environments requires an accurate, practical model for arriving at an optimal solution, so the nonlinear EH models are studied in [3]. The various aspects of resource allocation algorithms are developed to analyze the characteristics of MIMO system models. Resource allocation problems based on the system models provide an optimal solution to several key variables. This also helps to understand the relationship between these variables. As the deployability of SWIPT systems increases, there is a need to characterize the trade-off between the information and energy-harvesting parameters, which provides a detailed analysis on the SWIPT, WPT-enabled systems [1,3].
In summary, vehicular networks require a high rate of information exchange for synchronous and concurrent operations. Wireless networks are also growing in almost all practical aspects, so MIMO-based capabilities are being used to enhance various physical layer aspects of these systems. This use of MIMO technologies and the increasing robust use of RF signals have led to the development of SWIPT-enabled MIMO systems. From the SWIPT perspective of the wireless system, the receiver is required to maintain an optimal amount of energy-harvesting and information-decoding capability, as this feature determines the lifetime and reliability of the entire transmission.
To the best of the authors’ knowledge, the study of optimization problems under different transmission scenarios for the MIMO-SWIPT system in the presence of a multi-antenna eavesdropper has not been studied. To elaborate the specific novelty of our work, we compared it with the previous works. The main differences are as follows:
  • In [3], the main objective is to maximize the harvested energy for time-switching and power-splitting scenarios for the MIMO broadcasting system. The authors analyzed the trade-off between information capacity and energy for separated and co-located SWIPT receivers. In our proposed work, we included the maximization of the information capacity of Bob with the co-located SWIPT system in the presence of a multi-antenna eavesdropper. Our work focuses on the secrecy capacity–harvested energy trade-off under dynamic vehicular settings.
  • In [30], the authors consider active eavesdropping scenarios and solve the maximized ergodic secrecy capacity problem using semidefinite relaxation programming. We considered dynamic MIMO-SWIPT settings in the presence of multi-antenna eavesdroppers under a worst-case scenario when Bob traverses from Pos-A to Pos-B (hence different from [30]).
  • In [36], the authors propose a joint channel estimation and transmit power allocation strategy to maximize the average signal-to-error-plus-noise ratio (SENR) under resource allocation constraints. The authors use a Karush–Khun–Tucker (KKT)-based solution to arrive at the solution. Unlike [36], we proposed a “divide-and-conquer strategy” by reformulating the non-convex problem into convex sub-problems based on maximizing the information capacity in the presence of the secrecy capacity and other resource allocation constraints under dynamic vehicular environment.
The rest of the paper is organized as follows. Section 2 presents the problem formulation, where the system model for the MIMO-SWIPT system in the presence of a multi-antenna eavesdropper and the problem definition for both transmission scenarios are discussed. Section 3 presents the proposed solution for both transmission scenarios and a description of the algorithm. Section 4 describes the result obtained for both transmission scenarios. The complexity analysis is also presented in this section. Section 5 concludes the paper.

2. Problem Formulation

This section presents the system model and problem definition for two of the transmission modes, formulating the maximization of the information capacity under the secrecy capacity, harvested energy requirements, and other resource allocation constraints.

2.1. System Model

The system model of a dynamic SWIPT-based MIMO for a co-located EH/ID receiver for a power-splitting architecture in the presence of a multi-antenna eavesdropper is considered as shown in Figure 1. We consider a multi-antenna transmitter (Alice) with multiple antennas and a co-located energy-harvesting/information-decoding (EH/ID) receiver with multiple antennas in the presence of a multi-antenna passive eavesdropper (Eve) with the same number of antennas as the receiver. The number of antennas at the transmitter is N T , and the numbers of antennas at the receiver and eavesdropper are N R and N E , respectively. Let H 1 C N R × N T be the channel matrix between Alice and Bob at position-A. When Bob moves from position-A (Pos-A) to position B (Pos-B), the channel fading state changes from H 1 to H 2 . Let X C N T × N R be the transmitted signal from Alice. The covariance matrix of X is given by E [ X X H ] = Tr ( Q ) , where H E 1 and H E 2 (∈ C N E × N T ) denote the channel matrices between Alice and the eavesdropper (Eve), while Bob is at Pos-A and Pos-B, respectively. It is assumed that Eve is close to Alice.
We consider a large-scale fading model where D i is given by ( d i d 0 ) α . Here, d i is the distance between Alice and a corresponding receiver (Bob or Eve). We consider the reference distance d 0 to be 10 m. The variable α denotes the path loss exponent with α (we take it to be three). So, we have D A s = d A s d 0 α for Alice-[Bob at Pos-A]; D B s = d B s d 0 α for Alice-[Bob at Pos-B]; and D E = d E d 0 α for Alice-Eve. Using D A s (for H 1 ), D B s (for H 2 ), and D E (for H E 1 & H E 2 ), small-scale fading is incorporated using both line-of-sight and non-line-of-sight (LOS and NLOS) components. Since Bob traverses from Pos-A to Pos-B, and Pos-B is further away from Alice (than Pos-A), the value of d B s is always greater than  d A s .

2.2. Problem Definition

We aim to optimize the transmit power matrix contained in the information rate maximization problem for Bob at Pos-A in the presence of an eavesdropper. We derive a closed-form expression for obtaining the energy-harvesting values based on the nonlinear EH models and the channel fading state H 1 . Theoretically, the information rate for a SWIPT system depends on the parameters: transmit power and power sharing ratio [3]. We formulate an information rate maximization problem under transmit power and secrecy capacity constraints. The received signal is modeled as a function of the power-splitting ratio Ω p and thus determines the value of the transmit power matrix, which is used to arrive at a harvested energy value. The term “ I N R Ω p ” in (2) indicates the received signal allocated for information decoding (since we considered the co-located SWIPT system). Theoretically, I N R is the upper bound for the power-splitting ratio, forming an identity matrix of dimension N R × N R . If Ω p is allotted for energy harvesting, then the remaining I N R Ω p is naturally allotted for information decoding. The received signals at the EH Y E and ID Y I receivers can be given by
Y E 1 = Ω p H 1 X ,
Y I 1 = I N R Ω p H 1 X + N I 1 ,
where N I 1 C N R × N R C N ( 0 , σ i 2 ^ I N R ) is an additive complex Gaussian noise received at the ID portion of Bob at Pos-A. Let ρ i denote the power-splitting ratio for the i-th receiver antenna, defining Ω p as diag ρ 1 , ρ 2 , , ρ N R , 0 ≤ ρ i ≤ 1, where i varies from 1 to N R . The received signal at the eavesdropper side Y e v e is given by
Y e v e 1 = H E 1 X + N e v e 1 ,
where N e v e 1 C N E × N E C N ( 0 , σ 2 ^ I N E ) is also an additive complex Gaussian noise at Eve. Similarly, the received signals at Bob (when he is at Pos-B) are given by
Y E 2 = Ω p H 2 X ,
Y I 2 = I N R Ω p H 2 X + N I 2 .
where N I 2 C N R × N R C N ( 0 , σ i 2 ˜ I N R ) is the additive complex Gaussian noise received at the ID portion of Bob at Pos-A. Here, the noise between Alice and the corresponding EH/ID node is varied as the position is changed. The received signal at Eve’s side Y e v e 2 is given by
Y e v e 2 = H E 2 X + N e v e 2 .
where N e v e 2 C N E × N E C N ( 0 , σ 2 ˜ I N E ) is also an additive complex Gaussian noise at Eve. The optimization problem is formulated to maximize the information rate under the constraints of transmit power and secrecy capacity for Bob at Pos-A. The P 1 A problem is given by
P 1 A : max Q , Ω p log 2 I N R + I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ C 1 : Tr ( Q ) P , C 2 : 0 Ω p I N R , C 3 : Q 0 , C 4 : log 2 I N R + I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ log 2 I N E + H E 1 Q H E 1 H σ 2 ^ R , C 5 : Tr Ω p H 1 Q H 1 H E .
Constraint C1 guarantees an upper bound on the value of the transmit power available in the environment. The power-splitting ratio is also bounded between zero and one to determine the distribution of the received signal for energy harvesting or information decoding. Constraint C3 is included to guarantee a positive semidefinite property for the transmit power matrix Q. Constraint C4 is the secrecy capacity constraint that guarantees the secure transmission of information. Constraint C5 is included to satisfy the harvested energy requirement E. When Bob is at Pos-B (which is further away from Alice compared to Pos-A), the optimization problem is modified to include the channel fading H 2 , so we have a problem P 2 A , where H 1 is replaced by H 2 and H E 1 is replaced by H E 2 . The noise between Alice–Eve and Alice–Bob at Pos-B also changes. The optimization problem for Bob at Pos-B is given by
P 1 B : max Q , Ω p log 2 I N R + I N R Ω p 1 2 H 2 Q H 2 H I N R Ω p 1 2 σ i 2 ˜ C 1 : Tr ( Q ) P , C 2 : 0 Ω p I N R , C 3 : Q 0 , C 4 : log 2 I N R + I N R Ω p 1 2 H 2 Q H 2 H I N R Ω p 1 2 σ i 2 ˜ log 2 I N E + H E 2 Q H E 2 H σ 2 ˜ R , C 5 : Tr Ω p H 2 Q H 2 H E .
Although the denotation of the transmit power matrix Q remains the same, we may obtain different values of Q due to the change in channel fading states (and also due to the need to maintain positive secrecy).

3. Proposed Solution

In this section, we derive the solution to the formulated optimization problems and obtain the optimal values of transmit power matrices and power-splitting ratios for the corresponding transmission modes.

3.1. Transmission Mode Pos-A

The problem P 1 A (7) is a non-convex NP-hard problem due to its dependence on the transmit power matrix and the power splitting ratio. Also, the problem P1 is in the form of a product of variables, which requires a reformulation strategy with appropriate constraints to obtain an optimal solution. The problem P1 has two variables Ω p and Q, by transforming the problem into two sub-problems [35]: one sub-problem P 2 A to solve Q for a given value of Ω p and another sub-problem P 3 A to solve Ω p for a given value of Q. We guarantee optimal values of the transmit power matrix Q and Ω p .

3.1.1. Sub-Problem P2

Keeping the transmit power matrix Q as the only variable, the subproblem P 2 ^ A is given by
P 2 ^ A : max Q log 2 I N R + I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ C 1 : Tr ( Q ) P , C 2 : Q 0 , C 3 : log 2 I N R + I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ log 2 I N E + H E 1 Q H E 1 H σ 2 ^ R , C 4 : Tr Ω p H 1 Q H 1 H E .
Here, the constraint C 3 is in the form of a difference of concave functions and must be reformulated. Let
I N R + I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ R Ω ,
I N E + H E 1 Q H E 1 H σ 2 ^ R E .
From (10), we obtain
H 1 Q H 1 H = I N R Ω p 1 2 1 σ i 2 ^ R Ω I N R I N R Ω p 1 2 1 ,
Let T E H be the variable denoting harvested energy. After incorporating (12), we have
T E H = Tr Ω p I N R Ω p 1 2 1 σ i 2 ^ R Ω I N R I N R Ω p 1 2 1 .
Also, (11) can be rewritten as
Q = ( H E 1 ) ( σ 2 ^ ( R E I N E ) ) H E 1 H .
The inverse of a non-square matrix requires the use of a pseudoinverse or Moore–Penrose inverse. Thus, the inverse of H E 1 is represented by ( H E 1 ) (we can only use ( H E 1 ) 1 if H E 1 is a square matrix). The Moore–Penrose inverse of ( H E 1 ) is given by H E 1 H H E 1 H E 1 H 1 . Using (10) and (11), the constraint C 3 from the subproblem P 2 ˜ A can be rewritten as
log 2 R Ω log 2 R E R .
The first-order Taylor approximation is performed on the C3 [37], and C3 is modified into
log 2 R Ω log 2 R E log 2 R Ω * + Tr ( ( R Ω * ) 1 ( R Ω R Ω * ) ) log 2 R E * Tr ( ( R E * ) 1 ( R E R E * ) ) .
Since log R Ω is concave on R Ω 0 , the approximation symbol ≈ can be replaced by ≤. Using the same simplifications, the subproblem can be rewritten as P 2 ^ A as follows:
P 2 A : max R Ω , R E log 2 R Ω C 1 : Tr ( ( H E 1 ) ( σ 2 ( R E I N E ) ) ( H E 1 H ) ) P , C 2 : R E I N E , C 3 : log 2 R Ω * + Tr ( ( R Ω * ) 1 ( R Ω R Ω * ) ) log 2 R E * Tr ( ( R E * ) 1 ( R E R E * ) ) R , C 4 : T E H E .
The use of the solution variable R E from the problem P 2 A (17) is substituted in (14) to obtain the intermediate transmit power matrix Q # . The transmit power matrix Q # (computed from (14)) is used in the following subproblems to obtain the final solution.

3.1.2. Sub-Problem P3

Keeping the power-splitting ratio Ω p as the only variable, the subproblem P 3 ^ A is given by,
P 3 ^ A : max Ω p log 2 I N R + I N R Ω p 1 2 H 1 Q # H 1 H I N R Ω p 1 2 σ i 2 ^ C 1 : 0 Ω p I N R , C 2 : log 2 I N R + I N R Ω p 1 2 H 1 Q # H 1 H I N R Ω p 1 2 σ i 2 ^ log 2 I N E + H E 1 Q # H E 1 H σ 2 R , C 3 : Tr Ω p H 1 Q # H 1 H E .
where Q # is a constant, and Ω p is a variable. The objective function of the subproblem P 3 ^ A can be expressed as
W Ω I N R + I N R Ω p 1 2 H 1 Q # H 1 H I N R Ω p 1 2 σ i 2 ^ .
Here, W Ω is a function that depends on the variable Ω p . Similarly, in the case of Eve, we can express the information rate between Alice and Eve as
W E I N E + H E 1 Q # H E 1 H σ 2 ^ .
The variables W Ω and W E are positive semidefinite matrices, and the subproblem P 3 ^ A (18) can be recast into
P 3 A : max W Ω , W E , Ω p log 2 W Ω C 1 : W Ω 0 , C 2 : W E 0 , C 3 : W Ω W E , C 4 : W Ω I N R + H 1 Q # H 1 H σ i 2 ^ , C 5 : W E I N E + H E 1 Q # H E 1 H σ 2 ^ , C 6 : Tr Ω p H 1 Q # H 1 H E .
After obtaining the value of W Ω , the value of Ω p is calculated by rearranging the terms in (19). Thus, Ω p is given by
Ω p = d i a g ( I N R ( W Ω I N R ) D i 1 ) .
where D i = H 1 Q # H 1 H σ i 2 ^ , and the term d i a g denotes the diagonal elements of the matrix. Here, the constraint C3 guarantees a positive value of the secrecy capacity, and the constraints C4 and C5 denote boundary conditions for the variables W Ω and W E (since we are maximizing the objective, it is necessary to bound the values of the capacities, as they can become overbound, resulting in an unbounded problem). The values of the parameters Q and Ω p are obtained by solving P 2 A (17), P 3 A (21) and (22).

3.2. Transmission Mode Pos-B

The problem P 1 B (8) is a non-convex maximization problem; similar to the procedure shown in Section 3.1.1 and Section 3.1.2, we divide the problem into separate problems and solve for the transmit power matrix and the power-splitting ratio. The final reformulated problems for solving the maximization problem in (8) include the following procedure:
P 2 B : max r Ω , r E log 2 r Ω C 1 : Tr ( ( H E 2 ) ( σ 2 ˜ ( r E I N E ) ) ( H E 2 H ) ) P , C 2 : r E I N E , C 3 : log 2 r Ω * + Tr ( ( r Ω * ) 1 ( r Ω r Ω * ) ) log 2 r E * Tr ( ( r E * ) 1 ( r E r E * ) ) R , C 4 : T E H E .
Here, r Ω is given by
I N R + I N R Ω p 1 2 H 2 Q H 2 H I N R Ω p 1 2 σ i 2 ˜ r Ω .
The variable r E is given by
I N E + H E 2 Q H E 2 H σ 2 ˜ r E .
Similar to (13), we have a corresponding expression for denoting the harvested energy constraint:
T E H = Tr Ω p I N R Ω p 1 2 1 σ i 2 ˜ r Ω I N R I N R Ω p 1 2 1 .
By solving (23) and (25), we obtain the intermediate transmit power matrix Q # from the solution variable r E . Using the transmit power matrix Q # , we solve the upcoming problem P 3 B to obtain the power-splitting ratio:
P 3 B : max w Ω , w E , Ω p log 2 w Ω C 1 : w Ω 0 , C 2 : w E 0 , C 3 : w Ω w E , C 4 : w Ω I N R + H 2 Q # H 2 H σ i 2 ˜ , C 5 : w E I N E + H E 2 Q # H E 2 H σ 2 ˜ , C 6 : Tr Ω p H 2 Q # H 2 H E .
Similarly, the expressions for w Ω and w E are as follows:
w Ω I N R + I N R Ω p 1 2 H 2 Q # H 2 H I N R Ω p 1 2 σ i 2 ˜ ,
And,
w E I N E + H E 2 Q # H E 2 H σ 2 ˜ .
Thus, from (28), the value for Ω p also changes, and it is given by
Ω p = d i a g ( I N R ( w Ω I N R ) d i 1 ) .
Here, d i can be written as d i = H 2 Q # H 2 H σ i 2 ˜ . After solving P 2 B (23), P 3 B (27) and (30), we obtain the values of the transmit power matrix Q and the power-splitting ratio. By solving the optimization problems of the two transmission modes, we can calculate the value of the harvested energy. The closed-form expression for the harvested energy at Bob for is calculated using
Tr ( Ω p # H Q # H H ) .
Using (31), the amount of harvested energy available is then calculated.

3.3. Algorithm Description

The secure resource allocation algorithm for transmission modes (when Bob is at Pos-A and Pos-B) based on the “divide-and-conquer” approach is summarized in Algorithm 1. The intermediate counter value I c ( i ) is defined as the collection of optimization variables Q # and Ω p # at iteration-i. At the beginning of the algorithm, we initialize the maximum number of iterations L max , the initial value of the intermediate counter I c ( 0 ) , the transmit power budget P, and the desired secrecy capacity R. We also initialize a threshold ( T I c ) for the intermediate counter ( I c ). The values of the optimization variables ( Ω p # and Q # ) are computed based on the solutions of the problems P 2 A and P 3 A for Bob at Pos-A (the problems P 2 B and P 3 B are solved for Bob at Pos-B). The values of the optimization variables are stored in I c ( i ) (when the algorithm is in the i-th iteration). The difference between the current and previous values of I c is calculated to determine the threshold. Theoretically, we can conclude that the algorithm converges if the difference is less than or equal to the defined threshold T I c .
The expressions Q # and Ω p # are obtained by solving different problems [ P 2 A ; P 3 A ] when Bob is at Pos-A and [ P 2 B ; P 3 B ] when Bob is at Pos-B. Since we made the difference explicit in Algorithm 1, we excluded the use of multiple subscripts for the sake of conciseness and brevity.
Algorithm 1 Secure resource allocation for the transmission modes Pos-A and Pos-B
1:
Initialization: Choose L m a x along with P, R values and initialize the values of i, I c ( 0 ) and T I c ;
2:
repeat
  • Mode Pos-A: Calculate the value of Q using the Problem P 2 A for a givenvalue of Ω p and set Q as Q # ;
  • Mode Pos-B: Calculate the value of Q using the Problem P 2 B for a givenvalue of Ω p and set Q as Q # ;
  • Mode Pos-A: For the value of Q # , solve for the value of Ω p using the Problem P 3 A , and set Ω p as Ω p # ;
  • Mode Pos-B: For the value of Q # , solve for the value of Ω p using the Problem P 3 B , and set Ω p as Ω p # ;
3:
    Now calculate the value of harvested energyby (31) using the values of Q # and Ω p # for the corresponding modes and store in I c ( i + 1 ) .;
4:
    Set i = i + 1 ;
5:
until i value reaches L m a x or I c i I c i 1 T I c
6:
Return Q # and Ω p # as the final optimal solution.

4. Results and Discussion

In this section, we present the simulation results to illustrate the trade-off between harvested energy and secrecy capacity for a single-user multi-antenna SWIPT system in the presence of a multi-antenna eavesdropper. The Matlab and CVX tools are used to obtain the following results. The simulation results are performed to evaluate the proposed algorithm when Bob is present at Pos-A and Pos-B. The channel fading states H 1 and H 2 are generated over 1000 channel realizations. The differences between H 1 and H 2 are based on the distance between Alice and Bob. We generated the channel state conditions by varying the distance of Bob as it moves away from Alice. For Pos-A, the distance between Alice and Bob is 30 m, while for Pos-B, the distance between Alice and Bob is 80 m. The eavesdropper is stationary, and its distance from Alice is assumed to be 20 m. Table 1 shows the essential sets of simulation parameters used to generate the results. The transmit power available at Alice is varied in the range of 5 to 40 dBm. The expressions for the harvested energy in the nonlinear EH models [3] are as follows:
E n o n l i n e a r = M 1 + exp ( a ( Tr ( Ω p # H Q # H H ) b ) ) M 1 + exp ( a b ) 1 1 1 + exp ( a b ) .
Here, M denotes the maximum energy harvested at the receiver when the EH circuit is saturated, and ( a , b ) denotes the circuit parameters for the nonlinear EH model considered. For the nonlinear EH model, the circuit parameters [ a = 6400 , b = 0.003 ] and M = 0.024 are chosen as given in [3] and the harvested energy is then calculated, where the circuit parameters a , b and the maximum harvested energy M simulate the effects caused by the constraints such as current leakage and hardware sensitivity [3,20]. The noise at Bob is −30 dBm (when Bob is at Pos-A). A worst-case scenario is considered by assuming that the noise at Bob increases to 1 dBm (while at Pos-B). The noise at the eavesdropper is assumed to be −10 dBm.

4.1. Performance Analysis Based on Trade-Off between Harvested Energy and Secrecy Capacity

4.1.1. Bob at Pos-A

In Figure 2, we present the trade-off between the secrecy capacity and harvested energy for varying transmit power and transmit antenna values at Alice. The simulations are performed when the channel fading state is H 1 and Bob is at Pos-A. The co-located SWIPT setting for Bob implies that the received signal is split between energy harvesting and information decoding. As the formulated problem is information capacity maximization, the solution to the variables Ω p and Q are “fine tuned” so that the overall information capacity (thereby, the secrecy capacity) is maximized. This means that due to the maximization of the information capacity, there will be a decrease in the value of Ω p , which further decreases the value of the harvested energy (as Ω p is directly proportional to harvested energy).
The achievable harvested energy values and corresponding range are small for the lower transmit power regimes due to the directly proportional relationship between the transmit power matrix, harvested energy and the transmit power constraint C1 in P 1 A (7). However, the harvested energy range becomes wider as the transmit power value increases. This increase in range is due to the inherent properties of the transmit power matrix Q. Increasing the number of transmit antennas at Alice increases the matrix dimension of Q, which further amplifies the harvested energy (which can be verified from the harvested energy expression in (31)). Hence, we can infer that the increase in the number of transmit antennas is the least noticeable (due to the narrow range of harvested energy values) when the transmit power is low. Comparing within the higher transmit power regime, the increase in the harvested energy decreases the secrecy capacity (for all the combinations of transmit antennas at Alice). Overall, the trend of the secrecy capacity is steep. This is due to the more stringent constraint imposed by the formulated problem.

4.1.2. Bob at Pos-B

Figure 3 illustrates the relationship between the secrecy capacity and harvested energy for different transmit power values and antennas. The analysis focuses on the channel fading state H 2 , where Bob is moving away from Alice. Theoretically, this results in an overall decrease in the upper bound of both the secrecy capacity and the harvested energy. Also, increasing the harvested energy decreases the secrecy capacity values. We can conclude that the difference in harvested energy is significantly high for the high transmit power regime. In summary, increasing the transmit power increases the harvested energy values. We can also observe that increasing the number of transmit antennas at Alice has a smaller effect on the change in the harvested energy values. This difference in the consequences of varying the values of transmit antennas and transmit power can be attributed to the influence of the transmit power matrix on the proposed algorithm. The steepness of the trend of the trade-off is significantly high for the lower transmit power regime. From this observation, we can infer that the secrecy capacity decreases significantly as the harvested energy value increases. This is due to the lack of transmit power availability to maintain the required harvested energy due to the co-located nature of the SWIPT system.

4.1.3. Comparison with Benchmarks

Figure 4 illustrates the secrecy capacity performance when the transmit power and transmit antennas (of Alice) are fixed for SDP, KKT, and the proposed algorithms. The harvested energy is computed by the solution variables Q and the power-splitting ratio Ω p (which can be verified from (31)). We observe a steep decrease in the secrecy capacity values as the harvested energy increases. This is due to the co-located nature of Bob’s EH/ID. However, when comparing Pos-A and Pos-B, significant differences in the (achievable) harvested energy can be observed. This is due to the distance variation and channel fading state of Pos-A and Pos-B of Bob. We can also infer that to achieve positive secrecy capacity values between Pos-A and Pos-B, there is a significant drop in the harvested energy values between Pos-A and Pos-B. This phenomenon can be attributed to the information capacity maximization (of Bob), where our goal is to optimize the information capacity while maintaining the harvested energy and secrecy capacity requirements. Our algorithm successfully maintained the required secrecy capacity values by minimizing the harvested energy value (via the optimization of the Ω p variable). That is, a decrease in Ω p reduces the harvested energy, thereby maintaining the required secrecy capacity.

4.2. Analysis of Secrecy Capacity for Varying Number of Eavesdropper Antennas

4.2.1. Bob at Pos-A

Figure 5 shows the secrecy capacity for different numbers of eavesdropper antennas. As the number of eavesdropper antennas increases, the secrecy capacity value decreases. This is because the information capacity value of the eavesdropper increases as the number of eavesdropper antennas increases (thus decreasing the secrecy capacity value). However, when the number of eavesdropper antennas is eight, the secrecy capacity barely exceeds the secrecy capacity of 0.5 bps/Hz. This means that simultaneously increasing the number of eavesdropper antennas and decreasing the transmit power has a negative effect on the secrecy capacity values. However, the increase in transmit power has a positive effect on the secrecy capacity values, resulting in an overall increase in the secrecy capacity (seen throughout the N E regime). The secrecy capacity difference for all the algorithms is almost the same for higher transmit power values. However, for lower values of transmit power, the differences in performance based on secrecy capacity can be observed. For all the simulated configurations of N E , the proposed algorithm can achieve higher values of secrecy capacity, with a maximum difference in performance observed when N E = 4 and the transmit power is at 8 dBm.

4.2.2. Bob at Pos-B

Figure 6 shows the effect of the number of eavesdropper antennas on the secrecy capacity for varying transmit power values when Bob is at Pos-B. The cause of the overall decrease in secrecy can be attributed to the increase in the resulting distance between Alice and Bob. This increase in distance reduces the value of the secrecy capacity (compared to the value of the secrecy capacity in Figure 5). Because of the change in Bob’s trajectory (as he moves further away from Alice), the beamforming technique is ineffective. This is evident from the fact that the secrecy capacity value does not exceed 1.5 bps/Hz, even at a transmit power of 40 dBm. The decrease in secrecy capacity means that the overall information capacity of the eavesdropper increases as the number of antennas on the eavesdropper side increases. Because of the directly proportional relationship between the transmit power and the information capacity of Bob, increasing the transmit power increases the value of the secrecy capacity. This is true for all algorithms. The significant performance difference between different algorithms is observed when the transmit power is 8 dBm. This means that our proposed algorithm can maintain a relatively high secrecy capacity value, even when the transmit power is reduced.

4.3. Non-Zero Secrecy Capacity Probability Analysis

4.3.1. Bob at Pos-A

Figure 7 shows the relationship between the non-zero secrecy capacity probability and the transmit power when Bob is at Pos-A. The non-zero probability of secrecy can be defined as the probability of achieving positive values of secrecy for the simulated set of iterations. The secrecy capacity requirement is relaxed [refer Appendix A], while the harvested energy requirement is increased to a limit (for a given transmit power). This analysis provides the probability of achieving positive secrecy capacity values for the proposed algorithm while maintaining a significant harvested energy requirement. The security aspect of the proposed algorithm is tested by maintaining a stricter harvested energy requirement, thereby accessing the number of iterations (we used 1000 iterations) where the secrecy capacity values fall below zero. We can conclude that the probability of obtaining a positive secrecy capacity increases as the transmit power increases. This is because the transmit power plays a significant role in achieving the more stringent harvested energy requirement and maintaining positive secrecy capacity values. The number of transmit antennas in Alice helps increase the probability of achieving positive secrecy capacity as shown in Figure 7. Therefore, to maintain non-zero secrecy capacity for a lower power regime, we must guarantee more transmit antennas for Alice. However, the difference in probability is not significant at a high transmit power.
Comparing different algorithms, our proposed algorithm maintains a higher probability value for the entire transmit power regime. However, for the higher transmit power regime, the probability of achieving positive secrecy capacity is almost the same for N T = 16. Overall, we can conclude that under a high transmit power regime, our proposed algorithm has a high probability of generating positive secrecy capacity values compared to other algorithms.

4.3.2. Bob at Pos-B

Figure 8 illustrates the effect of transmit power on the achievable secrecy capacity for different values of transmit antennas. For a lower transmit power regime, the probability of achieving secrecy capacity is less than 0.7 for all combinations of transmit antennas. This is due to two reasons: one is the channel fading state H 2 , which negatively affects Bob’s information capacity value, and the other is the inherent nature of low transmit power (which also reduces the value of secrecy capacity). As the transmit power increases, the probability of achieving a positive secrecy capacity increases for all transmit antenna configurations. We can observe that the difference between the probabilities of N T = 16 and other N T configurations is large. This suggests that to achieve positive secrecy capacity, it is only appropriate to deploy a large number of transmit antennas for Alice for a worst-case scenario (when the eavesdropper is in a better state than Bob). Unlike Figure 7 for Bob at Pos-A, the probabilistic analysis shows a clear difference in the simulated values for all the transmit power combinations considered when Bob is at Pos-B. This means that when Bob is farther away from Alice, our proposed algorithm can maintain a higher probability of achieving positive secrecy for the entire transmit power regime. For all N T combinations, the probability value differences between SDP and the proposed algorithm are small for higher transmit power values. However, for the lower transmit power regime, the difference in probability values between the different algorithms is relatively high. In summary, for higher values of N T , the probability of achieving positive secrecy capacity increases.

4.4. Computational Complexity

The complexity analysis is performed for the proposed subproblems P2-A (17) and P3-A (21) (the computational complexity for Pos-A and Pos-B is identical; therefore, it is analyzed only for Pos-A). The increased computational complexity of the proposed algorithm is due to the presence of multiple matrices in the formulated problems. Table 2 shows the computational complexity of subproblems P2-A and P3-A, where N T , N E , and N R denote the number of antennas present at Alice, Eve, and Bob, respectively. The accuracy bounds for the proposed KKT and SDP algorithms are denoted as ϵ q , ϵ o (for individual subproblems), ϵ q ϵ o , and ϵ , respectively. Table 2 gives an approximate upper bound on the complexity per iteration for the subproblems. Also, the computational complexity remains the same for both scenarios (when Bob is at Pos-A and when Bob is at Pos-B). There are special algorithms that can have lower complexity than the KKT algorithm. However, global optimality is not guaranteed when using such low-complexity algorithms. The interior-point approximation strategy can achieve low complexity, but this resource allocation strategy primarily leads to locally optimal solutions. Our proposed “divide-and-conquer approach” is a combination of sequential programming and a branch-bound strategy [38].

5. Conclusions

This paper investigates the trade-offs between secrecy capacity–harvested energy for the MIMO SWIPT system under two dynamic transmission modes in the presence of a multi-antenna eavesdropper. The system is modeled for co-located EH/ID receivers under the PS scenario. The optimization problems are formulated to compute the transmit power matrix and the power sharing ratio. The formulated problem has multiple variables in the product form; the problem is subdivided and solved individually to obtain respective solutions. Numerical results show the relationship between the secrecy capacity and the harvested energy. The performance of the proposed solution is studied for two transmission scenarios and compared with the algorithms available in the literature. The proposed solution shows a significant performance gain in terms of the secrecy capacity values for both transmission scenarios. Further research can be carried out with multiple multi-antenna legitimate receivers in the presence of eavesdropper(s). In addition, we can also explore resource allocation strategies to secure the SWIPT network in the presence of an active eavesdropper (thus extending the study beyond the passive eavesdropping scenario) for a more robust security framework for MIMO-SWIPT systems in vehicular networks.

Author Contributions

Conceptualization of the model: R.R. and T.O.; Methodology and formulation description of the optimization problem: V.G. and R.R.; Investigation: V.G. and R.R.; Visualization of results: R.R. and T.O.; Software: V.G.; Validation: R.R. and T.O.; Writing—original draft preparation: V.G.; Writing— Review and editing, R.R. and T.O.; Supervision: R.R. and T.O. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The relation between the optimization variable Q and the channel fading state between Alice and Bob determines the secrecy capacity constraint and its variation over time. From constraint C4 in problems P 1 A (7) and P 1 B (8), we have the following secrecy constraint (for brevity, we discussed only P 1 A ):
S C C = log 2 I N R + I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ log 2 I N E + H E 1 Q H E 1 H σ 2 ^
From (A1), we can observe that the S C C depends on the variables Q and Ω p as well as on the channel fading states H 1 and H E 1 . Thus, the positive values of the secrecy capacity are determined by the change between the states of Q and the channel states. Since Eve is relatively closer to Alice, we can assume that σ i 2 ^ σ 2 ^ . Let us assume
α 1 = H 1 H E 1 ,
and,
α s c c = σ 2 ^ I N R Ω p 1 2 H 1 Q H 1 H I N R Ω p 1 2 σ i 2 ^ H E 1 Q H E 1 H
The variation of the values of α 1 and α s c c determines the “relaxation zone” of the secrecy capacity for the considered dynamic system. To achieve a positive secrecy capacity, it is always better to keep α s c c greater than one. However, to achieve high values of harvested energy for the co-located SWIPT setup, it is imperative to have high values of Ω p . This reduces Bob’s information capacity, resulting in a value between 0 and 1.

References

  1. Zhang, R.; Ho, C.K. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef]
  2. Asheer, S.; Kumar, S. A Comprehensive Review of Cooperative MIMO WSN: Its Challenges and the Emerging Technologies. Wirel. Netw. 2021, 27, 1129–1152. [Google Scholar] [CrossRef]
  3. Xiong, K.; Wang, B.; Liu, K.J.R. Rate-Energy Region of SWIPT for MIMO Broadcasting Under Nonlinear Energy Harvesting Model. IEEE Trans. Wirel. Commun. 2017, 16, 5147–5161. [Google Scholar] [CrossRef]
  4. Xu, Y.; Gui, G.; Ohtsuki, T.; Gacanin, H.; Adebisi, B.; Sari, H.; Adachi, F. Robust Resource Allocation for Two-Tier HetNets: An Interference-Efficiency Perspective. IEEE Trans. Green Commun. Netw. 2021, 5, 1514–1528. [Google Scholar] [CrossRef]
  5. Allahzadeh, S.; Daneshifar, E. Simultaneous Wireless Information and Power Transfer Optimization via Alternating Convex-Concave Procedure with Imperfect Channel State Information. Signal Process. 2021, 182, 107953. [Google Scholar] [CrossRef]
  6. Gharavol, E.A.; Liang, Y.C.; Mouthaan, K. Robust Downlink Beamforming in Multiuser MISO Cognitive Radio Networks with Imperfect Channel-State Information. IEEE Trans. Veh. Technol. 2010, 59, 2852–2860. [Google Scholar] [CrossRef]
  7. Khisti, A.; Wornell, G.W. Secure Transmission with Multiple Antennas—Part II: The MIMOME Wiretap Channel. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar] [CrossRef]
  8. Kumar, M.S.; Ramanathan, R.; Jayakumar, M. Keyless Physical Layer Security for Wireless Networks: A Survey. Eng. Sci. Technol. Int. J. 2022, 35, 101260. [Google Scholar]
  9. Porambage, P.; Gür, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The Roadmap to 6G Security and Privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
  10. Ju, Y.; Chen, Y.; Cao, Z.; Liu, L.; Pei, Q.; Xiao, M.; Ota, K.; Dong, M.; Leung, V.C.M. Joint Secure Offloading and Resource Allocation for Vehicular Edge Computing Network: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 2023, 24, 5555–5569. [Google Scholar] [CrossRef]
  11. Vu, T.H.; Nguyen, T.V.; Kim, S. Cooperative NOMA-Enabled SWIPT IoT Networks with Imperfect SIC: Performance Analysis and Deep Learning Evaluation. IEEE Internet Things J. 2022, 9, 2253–2266. [Google Scholar] [CrossRef]
  12. Zhao, R.; Wang, Y.; Xue, Z.; Ohtsuki, T.; Adebisi, B.; Gui, G. Semisupervised Federated-Learning-Based Intrusion Detection Method for Internet of Things. IEEE Internet Things J. 2023, 10, 8645–8657. [Google Scholar] [CrossRef]
  13. Ouamri, M.A.; Barb, G.; Singh, D.; Adam, A.B.M.; Muthanna, M.S.A.; Li, X. Nonlinear Energy-Harvesting for D2D Networks Underlaying UAV with SWIPT Using MADQN. IEEE Commun. Lett. 2023, 27, 1804–1808. [Google Scholar] [CrossRef]
  14. Alladi, T.; Gera, B.; Agrawal, A.; Chamola, V.; Yu, F.R. DeepADV: A Deep Neural Network Framework for Anomaly Detection in VANETs. IEEE Trans. Veh. Technol. 2021, 70, 12013–12023. [Google Scholar] [CrossRef]
  15. Zhao, H.; Tang, J.; Adebisi, B.; Ohtsuki, T.; Gui, G.; Zhu, H. An Adaptive Vehicle Clustering Algorithm Based on Power Minimization in Vehicular Ad-hoc Networks. IEEE Trans. Veh. Technol. 2022, 71, 2939–2948. [Google Scholar] [CrossRef]
  16. Sun, C.; Xiong, X.; Ni, W.; Ohtsuki, T.; Wang, X. Max-Min Fair 3D Trajectory Planning for Solar-Powered UAV-Assisted Data Collection. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC), Foshan, China, 11–13 August 2022; pp. 610–615. [Google Scholar]
  17. Zhu, X.; Zeng, W.; Xiao, C. Precoder Design for Simultaneous Wireless Information and Power Transfer Systems with Finite-Alphabet Inputs. IEEE Trans. Veh. Technol. 2017, 66, 9085–9097. [Google Scholar] [CrossRef]
  18. Nam, J.; Caire, G.; Debbah, M.; Poor, H.V. Capacity Scaling of Massive MIMO in Strong Spatial Correlation Regimes. IEEE Trans. Inf. Theory 2020, 66, 3040–3064. [Google Scholar] [CrossRef]
  19. Kumar, D.; Alcaraz López, O.L.; Joshi, S.K.; Tölli, A. Latency-Aware Multi-Antenna SWIPT System with Battery-Constrained Receivers. IEEE Trans. Wirel. Commun. 2023, 22, 3022–3037. [Google Scholar] [CrossRef]
  20. Le, T.; Mayaram, K.; Fiez, T. Efficient Far-Field Radio Frequency Energy Harvesting for Passively Powered Sensor Networks. IEEE J. Solid-State Circuits 2008, 43, 1287–1302. [Google Scholar] [CrossRef]
  21. Liang, Y.; Li, B.; Zhang, R.; Li, H.; Zhao, S. Distributed Beamforming for Energy-Harvesting Relaying in Vehicular Networks. J. Commun. Inf. Netw. 2020, 5, 160–167. [Google Scholar] [CrossRef]
  22. Yang, C.; Lu, W.; Huang, G.; Qian, L.; Li, B.; Gong, Y. Power Optimization in Two-way AF Relaying SWIPT-based Cognitive Sensor Networks. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–5. [Google Scholar]
  23. Li, Q.; Zhang, Q.; Qin, J. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-way Relay Networks. IEEE Trans. Veh. Technol. 2016, 65, 9006–9019. [Google Scholar] [CrossRef]
  24. Tashman, D.H.; Hamouda, W.; Moualeu, J.M. On Securing Cognitive Radio Networks-Enabled SWIPT Over Cascaded κ-μ Fading Channels with Multiple Eavesdroppers. IEEE Trans. Veh. Technol. 2022, 71, 478–488. [Google Scholar] [CrossRef]
  25. Telatar, E. Capacity of Multi-antenna Gaussian Channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
  26. Nair, A.R.; Kirthiga, S. Impact of Total Harmonic Distortion in SWIPT Enabled Wireless Communication Networks. In Proceedings of the 2021 Smart Technologies, Communication and Robotics (STCR), Sathyamangalam, India, 9–10 October 2021; pp. 1–5. [Google Scholar]
  27. Nair, A.R.; Kirthiga, S. Analysis of Energy Harvesting in SWIPT using Bio-inspired Algorithms. Int. J. Electron. 2022, 110, 291–311. [Google Scholar] [CrossRef]
  28. Vieeralingaam, G.; Ramanathan, R.; Jayakumar, M. Convex Optimization Approach to Joint Interference and Distortion Minimization in Energy Harvesting Wireless Sensor Networks. Arab. J. Sci. Eng. 2020, 45, 1669–1684. [Google Scholar] [CrossRef]
  29. Memon, S.; Memon, K.A.; Uqaili, J.A.; Soothar, K.K.; Uqaili, R.S.; Cengiz, K. Joint Optimal Power Splitting and Relay Selection Strategy under SWIPT. Wirel. Netw. 2021, 27, 5385–5395. [Google Scholar] [CrossRef]
  30. Alageli, M.; Ikhlef, A.; Alsifiany, F.; Abdullah, M.A.M.; Chen, G.; Chambers, J. Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems with Active Eavesdropping. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1983–1998. [Google Scholar] [CrossRef]
  31. Bereyhi, A.; Asaad, S.; Müller, R.R.; Schaefer, R.F.; Poor, H.V. Secure Transmission in IRS-assisted MIMO Systems with Active Eavesdroppers. In Proceedings of the 2020 54th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 1–4 November 2020; pp. 718–725. [Google Scholar]
  32. Ji, B.; Li, Y.; Cao, D.; Li, C.; Mumtaz, S.; Wang, D. Secrecy Performance Analysis of UAV Assisted Relay Transmission for Cognitive Network with Energy Harvesting. IEEE Trans. Veh. Technol. 2020, 69, 7404–7415. [Google Scholar] [CrossRef]
  33. Ma, R.; Wu, H.; Ou, J.; Yang, S.; Gao, Y. Power Splitting-Based SWIPT Systems with Full-Duplex Jamming. IEEE Trans. Veh. Technol. 2020, 69, 9822–9836. [Google Scholar] [CrossRef]
  34. Ng, D.W.K.; Schober, R. Secure and Green SWIPT in Distributed Antenna Networks with Limited Backhaul Capacity. IEEE Trans. Wirel. Commun. 2015, 14, 5082–5097. [Google Scholar] [CrossRef]
  35. Gorski, J.; Pfeuffer, F.; Klamroth, K. Biconvex Sets and Optimization with Biconvex Functions: A Survey and Extensions. Math. Methods Oper. Res. 2007, 66, 373–407. [Google Scholar] [CrossRef]
  36. Kim, B.; Kang, J.M.; Kim, H.M.; Kang, J. Joint Channel Estimation, Training Design, Tx Power Allocation, and Rx Power Splitting for MIMO SWIPT Systems. IEEE Commun. Lett. 2021, 25, 1269–1273. [Google Scholar] [CrossRef]
  37. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization, 1st ed.; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  38. Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 4th ed.; MIT Press: Cambridge, MA, USA, 2022. [Google Scholar]
Figure 1. System model: In the downlink transmission mode, Alice transmits information and energy signal to multi-antenna co-located EH/ID legitimate receiver (called Bob). Multi-antenna eavesdropper attempts to tap information from the Alice as the Bob moves from position A to B.
Figure 1. System model: In the downlink transmission mode, Alice transmits information and energy signal to multi-antenna co-located EH/ID legitimate receiver (called Bob). Multi-antenna eavesdropper attempts to tap information from the Alice as the Bob moves from position A to B.
Sensors 23 08069 g001
Figure 2. The trade-off between secrecy capacity and harvested energy for varying values of transmit antennas at Alice and transmit power when Bob is in Pos-A. The number of receiver antennas at Bob and eavesdropper are fixed at two.
Figure 2. The trade-off between secrecy capacity and harvested energy for varying values of transmit antennas at Alice and transmit power when Bob is in Pos-A. The number of receiver antennas at Bob and eavesdropper are fixed at two.
Sensors 23 08069 g002
Figure 3. The trade-off between secrecy capacity and harvested energy for varying values of transmit antennas at Alice and transmit power when Bob is in Pos-B. The number of receiver antennas at Bob and eavesdropper are fixed at two.
Figure 3. The trade-off between secrecy capacity and harvested energy for varying values of transmit antennas at Alice and transmit power when Bob is in Pos-B. The number of receiver antennas at Bob and eavesdropper are fixed at two.
Sensors 23 08069 g003
Figure 4. The trade-off between secrecy capacity and harvested energy for fixed value of transmit antennas (taken as 8) at Alice for Pos-A and Pos-B, analyzed for different algorithms—SDP [30] and KKT [36]. Here, transmit power is fixed at 33 dBm.
Figure 4. The trade-off between secrecy capacity and harvested energy for fixed value of transmit antennas (taken as 8) at Alice for Pos-A and Pos-B, analyzed for different algorithms—SDP [30] and KKT [36]. Here, transmit power is fixed at 33 dBm.
Sensors 23 08069 g004
Figure 5. The trade-off between secrecy capacity for varying values of transmit power and eavesdropper antennas when Bob is in Pos-A. The number of antennas at the eavesdropper side is assumed to be varying N E = 1, 2, 4, 8. Algorithms compared are SDP [30] and KKT [36].
Figure 5. The trade-off between secrecy capacity for varying values of transmit power and eavesdropper antennas when Bob is in Pos-A. The number of antennas at the eavesdropper side is assumed to be varying N E = 1, 2, 4, 8. Algorithms compared are SDP [30] and KKT [36].
Sensors 23 08069 g005
Figure 6. The trade-off between secrecy capacity for varying values of transmit power and eavesdropper antennas when Bob is at Pos-B. The number of antennas at eavesdropper side is assumed to be varying N E = 1, 2, 4, 8. Algorithms compared are SDP [30] and KKT [36].
Figure 6. The trade-off between secrecy capacity for varying values of transmit power and eavesdropper antennas when Bob is at Pos-B. The number of antennas at eavesdropper side is assumed to be varying N E = 1, 2, 4, 8. Algorithms compared are SDP [30] and KKT [36].
Sensors 23 08069 g006
Figure 7. Analysis of non-zero secrecy capacity probability versus transmit power for varying transmit antennas at Alice when Bob is at Pos-A for different algorithms—SDP [30] and KKT [36].
Figure 7. Analysis of non-zero secrecy capacity probability versus transmit power for varying transmit antennas at Alice when Bob is at Pos-A for different algorithms—SDP [30] and KKT [36].
Sensors 23 08069 g007
Figure 8. Analysis of non-zero secrecy capacity probability versus transmit power for varying transmit antennas at Alice when Bob is at Pos-B for different algorithms—SDP [30] and KKT [36].
Figure 8. Analysis of non-zero secrecy capacity probability versus transmit power for varying transmit antennas at Alice when Bob is at Pos-B for different algorithms—SDP [30] and KKT [36].
Sensors 23 08069 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValues
Number of transmit antennas at Alice2, 4, 8, 16
Number of eavesdropper antennas2, 4, 8
Noise Variance at Bob in Pos-A and Bob in Pos-B−30 dBm and 1 dBm
Circuit Parameter value a6400
Circuit Parameter value b0.003
Transmit power values5 to 40 dBm
Maximum harvested energy requirement20 dBm
Path loss exponent4
Rician factor3 dB
Reference distance10 m
Table 2. Computational complexities of the proposed, SDP and KKT-based algorithms.
Table 2. Computational complexities of the proposed, SDP and KKT-based algorithms.
AlgorithmsComplexity Comparisons
SDP algorithm [30] O ( N T 5 N R 3.5 N E 3 log ( ϵ ) )
KKT-based algorithm [36] O ( N T 2 ( N R N E ) 3 log ( ϵ q ϵ o ) )
Proposed algorithmP2-A: O ( N E ( N T N R ) 2 log ( ϵ q ) )
P3-A: O ( N T N E 2 N R 3 log ( ϵ o ) )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ganapathy, V.; Ramachandran, R.; Ohtsuki, T. Resource Allocation for Secure MIMO-SWIPT Systems in the Presence of Multi-Antenna Eavesdropper in Vehicular Networks. Sensors 2023, 23, 8069. https://doi.org/10.3390/s23198069

AMA Style

Ganapathy V, Ramachandran R, Ohtsuki T. Resource Allocation for Secure MIMO-SWIPT Systems in the Presence of Multi-Antenna Eavesdropper in Vehicular Networks. Sensors. 2023; 23(19):8069. https://doi.org/10.3390/s23198069

Chicago/Turabian Style

Ganapathy, Vieeralingaam, Ramanathan Ramachandran, and Tomoaki Ohtsuki. 2023. "Resource Allocation for Secure MIMO-SWIPT Systems in the Presence of Multi-Antenna Eavesdropper in Vehicular Networks" Sensors 23, no. 19: 8069. https://doi.org/10.3390/s23198069

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop