z-logo
open-access-imgOpen Access
Robust secrecy energy efficiency optimisation in heterogeneous networks with simultaneous wireless information and power transfer: centralised and distributed design
Author(s) -
Bo Zhang,
Kaizhi Huang,
Liang Jin,
Ming Yi
Publication year - 2019
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2019.0399
Subject(s) - secrecy , computer science , wireless , computer network , power (physics) , wireless power transfer , distributed computing , energy transfer , telecommunications , computer security , chemistry , physics , quantum mechanics , molecular physics
With the ellipsoid‐bounded channel state information (CSI) errors, this study investigates the robust secrecy energy efficiency (SEE) optimisation in a wireless powered heterogeneous network. Specifically, the authors consider the network where multiple femtocell base stations (FBSs) are deployed under the coverage of one macrocell base station (MBS). Meanwhile, the MBS serves multiple macrocell users in the presence of a malicious multiple‐antenna eavesdropper (Eve) while each FBS serves a pair of information receiver (IR) and energy receiver (ER) with multiple antennas, where the ER attempts to wiretap the information of IR in the same femtocell. To promote the secrecy performance, artificial noise (AN) is aided into the downlink signal at the MBS and FBSs, and the problem of maximising SEE is formed in a cross‐tier multi‐cell AN‐aided transmit beamforming design. This problem is non‐convex while containing infinite constraints caused by CSI errors, which cannot be solved directly. In this regard, the authors resort to the successive convex approximation, semi‐definite relaxation techniques and Lagrange duality theory to acquire its solvable form. Moreover, to reduce the overhead of information exchange among coordinated BSs, they further propose a distributed approach based on alternative direction multiplier method. Finally, simulation results validate the effectiveness of the proposed design.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here