CN106712816A - Design method for safe beam forming based on energy harvesting cognitive network - Google Patents

Design method for safe beam forming based on energy harvesting cognitive network Download PDF

Info

Publication number
CN106712816A
CN106712816A CN201611159727.XA CN201611159727A CN106712816A CN 106712816 A CN106712816 A CN 106712816A CN 201611159727 A CN201611159727 A CN 201611159727A CN 106712816 A CN106712816 A CN 106712816A
Authority
CN
China
Prior art keywords
user
energy
safe
time
primary user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611159727.XA
Other languages
Chinese (zh)
Other versions
CN106712816B (en
Inventor
董健
石振弘
唐锟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201611159727.XA priority Critical patent/CN106712816B/en
Publication of CN106712816A publication Critical patent/CN106712816A/en
Application granted granted Critical
Publication of CN106712816B publication Critical patent/CN106712816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • H04B7/0426Power distribution
    • H04B7/043Power distribution using best eigenmode, e.g. beam forming or beam steering

Abstract

The invention discloses a design method for safe beam forming based on an energy harvesting cognitive network. The design method comprises the steps of firstly establishing a problem of target optimization for the maximum transmission rate of a secondary user system in a cognitive wireless network by taking the energy harvesting time ratio as a variable; secondly, transforming the problem of target optimization into a problem of semi-definite relaxation by using a matrix conjugate transposition principle, and transforming the problem of semi-definite relaxation into a problem of convex optimization in an equivalent manner by adopting a Charnes-Cooper; and finally, acquiring a globally optimal solution comprising a forwarding beam forming vector and a cognitive beam forming vector through one-dimensional search for the energy harvesting time ratio, and thus solving safe rates of a primary user and a secondary user, and completing design for safe beam forming of the cognitive wireless network. The design method disclosed by the invention greatly simplifies the design process. In addition, the solving scheme not only can prevent interception of an eavesdropping user for confidential information, but also can realize increase in transmission rate at the same time, and effectively improves the performance of the system.

Description

A kind of method for designing of the safe beam forming based on energy harvesting cognition network
Technical field
The invention belongs to field of communication security, more particularly to a kind of safe beam forming that cognition network is gathered in based on energy Method for designing.
Background technology
In face of the growing demand that is wirelessly transferred, frequency spectrum resource turns into a kind of rare resource, cognition wireless network There is the effective spectrum efficiency for improving wireless network.Carrying out cooperation transmission using secondary user's (SU) not only can be with less Resource consumption lift the transmission of primary user (PU) data, while SU can also be transmitted using the frequency spectrum resource of part primary user The information of oneself, so as to reach the effect of doulbe-sides' victory.But the collaboration communication meeting in some practical application scenes between PU and SU It is restricted, such as when sensor is used as cooperating relay, due to the finite capacity of battery, if charging or timely can not be provided When changing battery, cooperation transmission can then be interrupted.Therefore, if relaying can obtain energy from transmission environment, then coorporative network " life cycle " of network will greatly extend.In order to solve this problem, energy harvesting quilt is carried out using radio frequency (RF) signal It is recognized as a kind of effective solution.At present, the combination that wireless energy gathers in technology and cordless communication network has been obtained Extensive concern, just progressively turns into a new hot research problem in radio communication.In the radio communication gathered in based on energy In network, energy of the wireless energy harvesting node completely as entrained by radiofrequency signal is powered, and then the node is using harvesting Energy carry out associative operation and data transfer again.
Due to broadcast characteristic of the radio communication in transmission information, the information of user is easy to be stolen in transmitting procedure Listen.In the collaboration communication of energy harvesting, the transmitting terminal (ST) of secondary user's carries out the energy using harvesting as cooperating relay The signal of PU is forwarded, is possible to eavesdrop the signal of PU because of this user's receiving terminal (SR), so as to generate a series of information peace Full problem.In traditional cognition wireless network, for the safety of guarantee information, the beam forming of safety of physical layer has been carried out Extensive research.In recent years, the safety for carrying out energy harvesting and lifting physical layer using relaying is also greatly paid close attention to. ZHANG N have studied and how to design in half-duplex relay network and optimize safe wave beam from the angle of achievable safe rate Shaping and transimission power, (bibliography ZHANG N, LU N, SHEN X X.Cooperative spectrum access towards secure information transfer for CRNs[J].IEEE Journal on Selected Areas in Communications,2013,31(11):2453-2464.) in the cooperative cognitive network of energy harvesting, examine Considering SU may eavesdrop the information of PU this problem, for the safe rate design of collaborative network, there is scholar's research at present Under single-input single-output (SISO) pattern, the situation for single SR and multiple SR has carried out the fast up to safety of collaboration mode Rate is analyzed.The analysis of the cooperative cognitive network to being gathered in based on energy is only limited under the pattern of SISO above, and is not accounted for How the distribution of energy harvesting time and message processing time is optimized.
The content of the invention
The invention provides a kind of method for designing of the safe beam forming based on energy harvesting cognition network, its purpose exists In the Communication Security Problem of the safe beam forming for overcoming cooperative cognitive wireless network.
A kind of method for designing of the safe beam forming based on energy harvesting cognition wireless network, comprises the following steps:
Step one:Time ratio is gathered in as optimized variable with energy, optimization is turned to the transmission rate maximum of secondary custom system Target, builds the safe beamforming design optimization problem that cognition wireless network is gathered in based on energy so that primary user's system expires The transmit power of sufficient secure communication quality requirement and secondary custom system transmitting terminal meets secure communication limitation;
Step 2:The objective optimisation problems described in step one are converted into semidefinite decoding using Matrix Conjugate transposition principle Problem, it is convex optimization problem by semidefinite decoding problem equivalency transform to use Charnes-Cooper;
Step 3:Time is gathered in than obtaining globally optimal solution by linear search energy, the globally optimal solution is including turning Hair beamforming vectors and cognitive beamforming vectors, and then the safe rate of primary user and time user is solved, complete cognitive nothing The design of the safe beam forming of gauze network.
Further, objective optimisation problems are as follows in the step one:
s.t.
C4:0≤α<1
Wherein, T is expressed as the overall process time of cooperative cognitive wireless network, and α is that energy gathers in time ratio, wPIt is secondary user Forwarding main system beamforming vectors, wSFor subsystem sends beamforming vectors;
PPIt is the average transmitting power of primary user's transmitting terminal, hPSTRepresent primary user to the channel of time user, N0It is noise work( Rate,It is main custom system demand rate,It is eavesdropping end user system limiting speed, η is energy conversion efficiency, η ∈ [0, 1], ψ0Time initial energy of user is represented,It is represented sequentially as time user to eavesdropping end, secondary user to k-th Eavesdropping end, secondary user to the channel vector h for receiving userSShSPConjugate transposition, hPP、hPSWithRepresent respectively primary Family to receive user, subsystem to receive user, main system to k-th eavesdropping put between channel vector;nPRWithPoint Not Biao Shi primary user's receiving terminal, first eavesdropping point and k-th eavesdropping point place additive white Gaussian noise, K for eavesdrop end number;
In cognition wireless network primary user's transmitting terminal be PT, secondary user's transmitting terminal be ST, primary user's receiving terminal be PR, secondary use Family receiving terminal is SR, and, used as primary user's system, the transmission channel of ST to PR is used as secondary custom system, PT for the transmission channel of PT to PR Main system is formed to the transmission channel between ST, PR and SR, the transmission channel between ST to PR, SR forms subsystem, and main There is the signal that K-1 legal SR eavesdrops PT and ST in the coverage of system and subsystem.
Further, the objective optimisation problems described in step one are converted to half by the utilization Matrix Conjugate transposition principle It refers to utilize Matrix Conjugate transposition principle by w to determine relaxation problemS、wP、hSShSPChanged, appoint and take the energy harvesting time Than α, objective optimisation problems are converted into semidefinite decoding problem:
s.t.
Wherein,βpIt is intermediate variable, Wherein Tr (i) is expressed as the mark of matrix;
Equal intermediate variable, With Respectively secondary user forwards the conjugate transposition of main system beamforming vectors, subsystem send wave The conjugate transposition of beam shaping vector.
Further, it is convex optimization problem by described semidefinite decoding problem equivalency transform to use Charnes-Cooper:
s.t.
C1:Tr(HSSWP)+λN0=1
C5:WP≥0,WS≥0,λ≥0
Wherein, HSS、HSPWSAnd WPIt is intermediate variable, Withλ is lax conversion contraction-expansion factor.
Further, the solution procedure for described convex optimization problem is as follows:
Step 1):Set linear search precision Δ α, concurrently set energy harvesting the time than initial value;
Energy gather in the time than initial value according to practical application request set, span is 0-1, and value is smaller, searches The scope of rope is bigger.
Step 2):Equation group to convex optimization problem is solved, and obtains local optimum solution vector
Step 3):IfWithThen the local optimum solution vector of convex optimization problem is
Otherwise, the optimal solution vector of convex optimization problem isWhereinWithWherein, rank is expressed as rank of matrix;
Step 4):Search value α=α+Δ α is updated, if α >=1, into step 5), otherwise, return to step 2);
Step 5):All of local optimum solution vector is substituted into convex optimization problem so that convex optimization problem is used for corresponding time Local optimum solution vector and corresponding energy harvesting time ratio when the transmission rate of family system is maximum is global optimum's solution vectorIt is rightWithCarry out Eigenvalues Decomposition EVD:Obtain primary user and time use The optimal safe rate at family
Beneficial effect
The invention provides a kind of method for designing of the safe beam forming based on energy harvesting cognition network, first with energy The amount harvesting time is used for variable, and the objective optimization for building the peak transfer rate of time custom system in cognition wireless network is asked Topic, and cause that objective optimisation problems meet the secure communication quality of primary user's system and the transmit power satisfaction of subsystem transmitting terminal Subsystem secure communication quality;Secondly, the objective optimisation problems described in step one are changed using Matrix Conjugate transposition principle It is semidefinite decoding problem, it is convex optimization problem by semidefinite decoding problem equivalency transform to use Charnes-Cooper;Finally by The linear search energy harvesting time is to forward beamforming vectors and cognitive beamforming vectors than obtaining globally optimal solution, and then The safe rate of primary user and time user is solved, the design of the safe beam forming of cognition wireless network is completed.By that will solve After changing twice, it is convex optimization to dissolve to the non-convex optimization problem of time custom system peak transfer rate in cognition wireless network Problem solving, greatly simplify design process, meanwhile, the solution scheme for being proposed can not only prevent eavesdropping user to secrecy The intercepting and capturing of information, while can realize the increase of transmission rate again, effectively raise the performance of system.
Brief description of the drawings
Fig. 1 is safe beamforming design method flow in a kind of harvesting cognition network based on energy of the present invention Figure;
Fig. 2 is system model;
Fig. 3 is the safe rate influence for eavesdropping nodes to secondary custom system;
Fig. 4 is safe rate influence of the initialization energy in ST on secondary custom system, (K=2);
Fig. 5 is safe rate influence of the initialization energy in ST on primary user's system, (K=2).
Specific embodiment
Below in conjunction with example and accompanying drawing, the present invention is described further.
Embodiment 1:
By the indoor environment for designing a radio sensing network or WiFi and the shared 2.4GHz band resources of ZigBee In, wherein WiFi and ZigBee is respectively primary user and time user carries out data transmission, and emulation tool uses matlab.
As shown in figure 1, it is a kind of based on energy harvesting cognition network in safe beam forming method for designing, specifically include with Lower step:
Step 1:Time ratio is gathered in as optimized variable with energy, optimization mesh is turned to the transmission rate maximum of secondary custom system Mark, builds the safe beamforming design optimization problem that cognition wireless network is gathered in based on energy so that primary user's system meets The transmit power of secure communication quality requirement and secondary custom system transmitting terminal meets secure communication limitation.
As shown in Fig. 2 carrying out collaboration communication between a main system and a subsystem for energy constraint.Main system includes Transmission channel between PT to ST, PR and SR, subsystem includes the transmission channel between ST to PR, SR, while subsystem Coverage in also there is K-1 SR user and may eavesdrop the signal of PT, it is assumed that ST outfit N root antennas, other terminals are matched somebody with somebody Standby 1 antenna.Within the system, PT sends the data of secrecy to PR, and the frequency spectrum using primary user after ST receives information is provided Source carries out relay forwarding, while also sending unclassified data gives its corresponding receiving terminal SR.If the transmission energy of ST is too low, The efficiency of collaboration communication will also become very low.Therefore, time conversion relaying (TSR) agreement is employed at ST ends so that ST can be The alternate operation of energy harvesting and information processing is carried out in transmission time T.
Therefore, it is necessary to carry out obtaining energy from the transmission of primary user in advance before collaboration communication is carried out;Simultaneously in number According to the transmission stage, other the ZigBee users in effective range are likely to carry out monitoring decoding to main user data.In TSR associations In view, all times T is divided into three phases, as shown in table 1:
TSR agreements in table 1ST
(1) energy harvesting stage α T:
In this stage, PT sends special energy signal xe, the energy signal that ST will be received using power conversion circuits Be converted to energy, PR, SR and SRkDo not carry out any operation.Now according to TSR agreements, the energy ψ of ST harvestingshIt is expressed as ψh=α T ηPp|hPST|2
Wherein, η ∈ [0,1] are energy conversion efficiency;PpIt is the average transmitting power at PT ends;hPSTRepresent the letter of PT to ST Road vector, because the noise that antenna and rectifier are produced is too small, therefore the energy of harvesting is ignored.
(2) information reconnaissance phase (1- α) T/2
In this stage, PT sends security information xPTo ST.Now ST receive signal be
Wherein, nSTFor average is 0, white complex gaussian noise, i.e. n are expressed asST, PR, SR1 and eavesdropping end SRk(k∈{2,..., K }) signal of PT is also received in this stage.Now PR, SR1 and SRkThe signal of reception is respectively
Wherein, hPP, hPSWithPT to PR, SR1 and k-th eavesdropping point SR are represented respectivelykChannel vector, nPR,PR, SR1 and k-th eavesdropping point SR are represented respectivelykThe additive white Gaussian noise at place.Primary user's signal profit that ST will be received Forwarding (amplify-and-forward, AF) is amplified with maximum-ratio combing (maximal ratio combining, MRC) Process, therefore signal to be sent is expressed as
(3) information re-transmission stage (1- α) T/2:
In this stage, ST uses the remaining energy ψ 0 and energy ψ of harvestingh, and using forwarding beamforming vectors wPWith Cognitive beamforming vectors wS, the security information of simultaneous transmission primary user and the information of their own.Now, PR, SR1 and SRkReceive Signal be respectively:
Wherein, hSP, hSSWithST to PR, SR and k-th eavesdropping point SR are represented respectivelykChannel vector,
Then object function is established, the object function for combining safe beam forming optimization design is that maximized realization is secondary The transmission rate of user, while ensureing that PU meets the transmit power limitation of security restriction and ST in qualified function.Therefore, combine Optimization
s.t.
Problem (P1) formula is expressed as:
C4:0≤α<1
Step 2:The objective optimisation problems described in step one are converted into semidefinite decoding using Matrix Conjugate transposition principle Problem, it is convex optimization problem by semidefinite decoding problem equivalency transform to use Charnes-Cooper;
Realization and primary user's system of the peak transfer rate of time custom system are can be seen that from above combined optimization problem Demand rateEavesdropping end user system limiting speedAnd initialization energy is related to harvesting energy.Knowable to analysis (P1), Combined optimization problem (P1) is the optimization problem of non-convex, it is impossible to while it is time user's forwarding main system beamforming vectors to obtain wP, it is that subsystem sends beamforming vectors wSOptimization solution of the time than α is gathered in energy, in order to solve the combined optimization of non-convex Problem (P1) first appoint take energy gather in the time than α, optimization problem is converted into semidefinite decoding (SDR) problem.It is assumed that energy is gathered in Time ratioIt is the constant between 0-1, by variable wPIt is expressed as
DefinitionWithProblem (P1) relaxation problem (P2) can be expressed as:
s.t.
Wherein,
Object function in problem (P2) is fractional form, therefore can be changed using Charnes-Cooper, is made WithRelaxation problem (P2) is equivalent It is (P3)
s.t.
C1:Tr(HSSWP)+λN0=1
C5:WP≥0,WS≥0,λ≥0
Step 3:Time is gathered in than obtaining globally optimal solution by linear search energy, the globally optimal solution is including forwarding Beamforming vectors and cognitive beamforming vectors, and then the safe rate of primary user and time user is solved, complete cognition wireless The design of the safe beam forming of network;
Step 1):Linear search precision Δ α=0.01 is set, concurrently set the energy harvesting time than initial value α= 0.1;
Step 2):Equation group to convex optimization problem is solved, and obtains local optimum solution vector
Step 3):IfWithThen the local optimum solution vector of convex optimization problem is
Otherwise, the optimal solution vector of convex optimization problem isWhereinWith
Step 4):Search value α=α+Δ α is updated, if α >=1, into step 5), otherwise, return to step 2);
Step 5):All of local optimum solution vector is substituted into convex optimization problem so that convex optimization problem is used for corresponding time Local optimum solution vector and corresponding energy harvesting time ratio when the transmission rate of family system is maximum is global optimum's solution vectorIt is rightWithCarry out Eigenvalues Decomposition EVD:Obtain primary user and time The optimal safe rate of user
In the environment of simulation, it is assumed that the signal transmitting power P of PTPRemaining energy ψ in=20dB, ST0=10dB, hair Channel model between sending end and receiving terminal isD represents distance, and μ=3.5 represent path loss index, and ω is obeyed [0,2 π) be uniformly distributed.Noise normalized covariance N0=1.It is assumed that the antenna number N=4 in ST, from ST to other-end Distance is 2m, and the distance of PT to PR is 4m;PR minimum essential requirement speedSRkMonitor minimum needed for primary user's signal Speed
Step 4:Find safe rate influence of the eavesdropping nodes on secondary custom system.
Fig. 3 represented under different-energy conversion efficiency, eavesdropping node SRkThe increase of quantity is to secondary custom system security performance Influence.From the figure, it can be seen that the safe rate of secondary custom system is reduced with the increase of eavesdropping nodes.Meanwhile, it is secondary The safe transmission speed of user is reduced with the reduction of energy conversion efficiency η, but prioritization scheme security performance still better than Security performance when noenergy is gathered in.Work as ψ0When=0dB, η=0.8,0.5,0.3, when safe rate is gathered in than noenergy Safe rate is higher by about 0.85bit/s/Hz, 0.67bit/s/Hz and 0.5bit/s/Hz respectively.
Step 5:Find safe rate influence of the initialization energy in ST on secondary custom system, K=2.
Fig. 4 is illustrated under eavesdropping nodes K=2 and different energy conversion efficiencies, and the initialization energy of ST is to secondary use The influence of the safe rate of family system.It can be seen that the safe rate of secondary custom system is with ST initialization energy Increase and increase.In relatively low initialization energy range, secondary custom system security performance is substantially better than secondary when noenergy is gathered in The security performance of custom system.Even if during energy conversion efficiency η=0.3, the safe rate of secondary user is received still better than noenergy The safe rate for cutting.When energy is initialized in scope higher, the secondary user security speed of noenergy harvesting is close to energy Measure the secondary user security speed of harvesting.
Step 6:Find safe rate influence of the initialization energy in ST on primary user's system, K=2.
Fig. 5 is illustrated under eavesdropping nodes K=2 and different energy conversion efficiencies, and the initialization energy of ST is to primary The influence of the safe rate of family system.The wherein safe rate demand of primary user's systemCan from Fig. 5 Go out, it is low initialization energy range in (0dB-10dB), when scheme η=0.3 proposed by the present invention and noenergy harvesting feelings Under condition, the safe rate of PU can not meet demand.When energy conversion efficiency η=0.5, when 0.8, the safe rate of primary user PU The demand of safe rate is satisfied by whole initialization energy range.With the increase of initialization energy, gathered in using energy When PU safe rates be provided without energy gather in when PU safe rates move closer to.Thus illustrate in relatively low relay transmission Under energy, the transmission rate of PU can be influenceed by serious;With the lifting of energy conversion efficiency, the transmission energy of relaying also can Increase, therefore can also cause that primary user's speed meets transmission demand in relatively low initialization energy range.
Although the present invention has been presented for some embodiments of the present invention, it will be appreciated by those of skill in the art that Without departing from the spirit of the invention, the embodiments herein can be changed, above-described embodiment be it is exemplary, Should not be using the embodiments herein as the restriction of interest field of the present invention.

Claims (5)

1. it is a kind of based on energy harvesting cognition wireless network safe beam forming method for designing, it is characterised in that including with Lower step:
Step one:Time ratio is gathered in as optimized variable with energy, optimization aim is turned to the transmission rate maximum of secondary custom system, Build the safe beamforming design optimization problem that cognition wireless network is gathered in based on energy so that primary user's system meets safety The transmit power of QoS requirement and secondary custom system transmitting terminal meets secure communication limitation;
Step 2:The objective optimisation problems described in step one are converted into semidefinite decoding using Matrix Conjugate transposition principle to ask Topic, it is convex optimization problem by semidefinite decoding problem equivalency transform to use Charnes-Cooper;
Step 3:Time is gathered in than obtaining globally optimal solution by linear search energy, the globally optimal solution is including forwarding ripple Beam shaping vector sum cognition beamforming vectors, and then the safe rate of primary user and time user is solved, complete cognitive wireless The design of the safe beam forming of network.
2. method according to claim 1, it is characterised in that objective optimisation problems are as follows in the step one:
max w S , w P , &alpha; ( 1 - &alpha; ) T 2 log 2 ( 1 + | h S S H w S | 2 ( P P | | h P S T | | 4 + | | h P S T | | 2 N 0 ) | h S S H w P | 2 + N 0 )
s.t.
C 3 : ( P P | | h P S T | | 4 + | | h P S T | | 2 N 0 ) | w P | 2 + | w S | 2 &le; 2 ( &psi; 0 + &alpha;T&eta;P p | h P S T | 2 ) ( 1 - &alpha; ) T
C4:0≤α<1
Wherein, T is expressed as the overall process time of cooperative cognitive wireless network, and α is that energy gathers in time ratio, wPFor secondary user forwards Main system beamforming vectors, wSFor subsystem sends beamforming vectors;
PPIt is the average transmitting power of primary user's transmitting terminal, hPSTRepresent primary user to the channel of time user, N0It is noise power, It is main custom system demand rate,It is eavesdropping end user system limiting speed, η is energy conversion efficiency, η ∈ [0,1], ψ0Table Show time initial energy of user,Be represented sequentially as time user to eavesdropping end, secondary user to k-th eavesdrop end, Channel vector h of the secondary user to reception userSShSPConjugate transposition, hPP、hPSWithRepresent primary user to connecing respectively Receive user, subsystem to reception user, main system to the channel vector between k-th eavesdropping point;nPRWithRepresent respectively Additive white Gaussian noise at primary user's receiving terminal, first eavesdropping point and k-th eavesdropping point, K is eavesdropping end number;
Primary user's transmitting terminal is that PT, secondary user's transmitting terminal are that ST, primary user's receiving terminal are PR in cognition wireless network, and secondary user connects The transmission channel of receiving end SR, PT to PR as primary user's system, the transmission channel of ST to PR as secondary custom system, PT to ST, Transmission channel between PR and SR forms main system, and the transmission channel between ST to PR, SR forms subsystem, and main system with There is the signal that K-1 legal SR eavesdrops PT and ST in the coverage of subsystem.
3. method according to claim 2, it is characterised in that the utilization Matrix Conjugate transposition principle is by institute in step one It refers to utilize Matrix Conjugate transposition principle by w that the objective optimisation problems stated are converted to semidefinite decoding problemS、wP、hSShSPEnter Row conversion, appoints and takes the energy harvesting time than α, and objective optimisation problems are converted into semidefinite decoding problem:
m a x w S , w P T r ( H &OverBar; S S W &OverBar; S ) T r ( H &OverBar; S S W &OverBar; P ) + N 0
s.t.
C 3 : T r ( W &OverBar; P ) + T r ( W &OverBar; S ) &le; 2 ( &psi; 0 + &alpha;T&eta;P p | | h P S T | | 2 ) ( 1 - &alpha; ) T
Wherein,βpIt is intermediate variable, Wherein Tr () is expressed as the mark of matrix;
Equal intermediate variable, With Respectively secondary user forwards the conjugate transposition of main system beamforming vectors, subsystem send wave The conjugate transposition of beam shaping vector.
4. method according to claim 3, it is characterised in that asked described semidefinite decoding using Charnes-Cooper Topic equivalency transform is convex optimization problem:
m a x w S , w P , &lambda; T r ( H S S W S )
s.t.
C1:Tr(HSSWP)+λN0=1
C 4 : T r ( W P ) + T r ( W S ) &le; 2 &lambda; ( &psi; 0 + &alpha;T&eta;P p | | h P S T | | 2 ) ( 1 - &alpha; ) T
C5:WP≥0,WS≥0,λ≥0
Wherein, HSS、HSPWSAnd WPIt is intermediate variable, Withλ is lax conversion contraction-expansion factor.
5. method according to claim 4, it is characterised in that the solution procedure for described convex optimization problem is as follows:
Step 1):Set linear search precision Δ α, concurrently set energy harvesting the time than initial value;
Step 2):Equation group to convex optimization problem is solved, and obtains local optimum solution vector
Step 3):IfWithThen the local optimum solution vector of convex optimization problem is
Otherwise, the optimal solution vector of convex optimization problem isWhereinWithWherein, rank is expressed as rank of matrix;
Step 4):Search value α=α+Δ α is updated, if α >=1, into step 5), otherwise, return to step 2);
Step 5):All of local optimum solution vector is substituted into convex optimization problem so that corresponding user system of convex optimization problem Local optimum solution vector and corresponding energy harvesting time ratio when the transmission rate of system is maximum is global optimum's solution vectorIt is rightWithCarry out Eigenvalues Decomposition EVD:Obtain primary user and time The optimal safe rate of user
CN201611159727.XA 2016-12-15 2016-12-15 A kind of design method of the safe beam forming based on energy harvesting cognition network Active CN106712816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611159727.XA CN106712816B (en) 2016-12-15 2016-12-15 A kind of design method of the safe beam forming based on energy harvesting cognition network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611159727.XA CN106712816B (en) 2016-12-15 2016-12-15 A kind of design method of the safe beam forming based on energy harvesting cognition network

Publications (2)

Publication Number Publication Date
CN106712816A true CN106712816A (en) 2017-05-24
CN106712816B CN106712816B (en) 2019-11-29

Family

ID=58937847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611159727.XA Active CN106712816B (en) 2016-12-15 2016-12-15 A kind of design method of the safe beam forming based on energy harvesting cognition network

Country Status (1)

Country Link
CN (1) CN106712816B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109195169A (en) * 2018-09-04 2019-01-11 中国人民解放军陆军工程大学 A kind of cognition eavesdropping networked physics layer safe transmission method based on energy acquisition technology
CN110601736A (en) * 2019-08-09 2019-12-20 中央民族大学 Multi-antenna full-duplex cognitive radio energy capturing and information transmission method
CN110912597A (en) * 2019-11-07 2020-03-24 南京邮电大学 Robust safety beam forming method based on multi-objective optimization
CN111446993A (en) * 2020-03-26 2020-07-24 南京邮电大学 Beam forming method for safety-oriented communication in cognitive radio network
WO2020215801A1 (en) * 2019-04-26 2020-10-29 深圳先进技术研究院 Method and device for relay network energy efficiency optimized distribution, terminal, and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070173214A1 (en) * 2006-01-05 2007-07-26 University Of Pittsburgh-Of The Commonwealth System Of Higher Education Wireless autonomous device system
US7698926B2 (en) * 2007-04-26 2010-04-20 Honeywell International Inc. Electrical connection of energy harvesting devices
US20140036877A1 (en) * 2012-08-01 2014-02-06 Texas Instruments Incorporated Scheduling Energy Harvesting Nodes in a Wireless Sensor Networks
KR101393934B1 (en) * 2013-06-12 2014-05-12 인하대학교 산학협력단 Apparatus and method of energy harvesting in the interference alignment systems
CN104135770A (en) * 2014-07-02 2014-11-05 北京邮电大学 Energy distribution method of system for simultaneous transmission of wireless information and energy
CN104883741A (en) * 2015-04-09 2015-09-02 南京邮电大学 Resource allocation algorithm for cognitive radio network
KR101579705B1 (en) * 2015-01-30 2015-12-23 세종대학교산학협력단 Wi-Fi Backscatter System and Method For Beamforming using The Same
CN105375955A (en) * 2015-10-26 2016-03-02 西安电子科技大学 Cooperative transmission method in simultaneous wireless information and power transfer relay network
CN105744629A (en) * 2016-04-02 2016-07-06 南京邮电大学 Method for optimal distribution of time of energy harvesting relay system based on relay selection
CN106102117A (en) * 2016-06-13 2016-11-09 西安交通大学 Double bounce has safe transmission method based on energy harvesting in buffer network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070173214A1 (en) * 2006-01-05 2007-07-26 University Of Pittsburgh-Of The Commonwealth System Of Higher Education Wireless autonomous device system
US7698926B2 (en) * 2007-04-26 2010-04-20 Honeywell International Inc. Electrical connection of energy harvesting devices
US20140036877A1 (en) * 2012-08-01 2014-02-06 Texas Instruments Incorporated Scheduling Energy Harvesting Nodes in a Wireless Sensor Networks
KR101393934B1 (en) * 2013-06-12 2014-05-12 인하대학교 산학협력단 Apparatus and method of energy harvesting in the interference alignment systems
CN104135770A (en) * 2014-07-02 2014-11-05 北京邮电大学 Energy distribution method of system for simultaneous transmission of wireless information and energy
KR101579705B1 (en) * 2015-01-30 2015-12-23 세종대학교산학협력단 Wi-Fi Backscatter System and Method For Beamforming using The Same
CN104883741A (en) * 2015-04-09 2015-09-02 南京邮电大学 Resource allocation algorithm for cognitive radio network
CN105375955A (en) * 2015-10-26 2016-03-02 西安电子科技大学 Cooperative transmission method in simultaneous wireless information and power transfer relay network
CN105744629A (en) * 2016-04-02 2016-07-06 南京邮电大学 Method for optimal distribution of time of energy harvesting relay system based on relay selection
CN106102117A (en) * 2016-06-13 2016-11-09 西安交通大学 Double bounce has safe transmission method based on energy harvesting in buffer network

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
HONG XING ET AL: "Secure wireless energy harvesting-enabled AF-relaying SWIPT networks", 《2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)》 *
MUHAMMAD R. A. KHANDAKER ET AL: "Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers", 《IEEE WIRELESS COMMUNICATIONS LETTERS》 *
NING ZHANG ET AL: "Cooperative Spectrum Access Towards Secure Information Transfer for CRNs", 《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》 *
朱锐等: "基于能量收割的认知无线电预编码优化", 《清华大学学报(自然科学版)》 *
谢显中等: "基于半定规划方法的多个窃听用户认知网络物理层安全优化设计", 《电子与信息学报》 *
马亚燕: "采用博弈论的认知无线网络主用户和不可信任次用户的协作策略", 《西安交通大学学报》 *
高锐锋等: "基于时频资源分配的认知无线中继网络物理层安全研究", 《计算机科学》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109195169A (en) * 2018-09-04 2019-01-11 中国人民解放军陆军工程大学 A kind of cognition eavesdropping networked physics layer safe transmission method based on energy acquisition technology
CN109195169B (en) * 2018-09-04 2022-11-11 中国人民解放军陆军工程大学 Cognitive eavesdropping network physical layer secure transmission method based on energy acquisition technology
WO2020215801A1 (en) * 2019-04-26 2020-10-29 深圳先进技术研究院 Method and device for relay network energy efficiency optimized distribution, terminal, and storage medium
CN111866904A (en) * 2019-04-26 2020-10-30 深圳先进技术研究院 Optimal distribution method, device, terminal and storage medium for energy efficiency of relay network
CN110601736A (en) * 2019-08-09 2019-12-20 中央民族大学 Multi-antenna full-duplex cognitive radio energy capturing and information transmission method
CN110601736B (en) * 2019-08-09 2023-10-24 中央民族大学 Multi-antenna full-duplex cognitive radio energy capturing and information transmitting method
CN110912597A (en) * 2019-11-07 2020-03-24 南京邮电大学 Robust safety beam forming method based on multi-objective optimization
CN111446993A (en) * 2020-03-26 2020-07-24 南京邮电大学 Beam forming method for safety-oriented communication in cognitive radio network
CN111446993B (en) * 2020-03-26 2023-03-14 南京邮电大学 Beam forming method for safety-oriented communication in cognitive radio network

Also Published As

Publication number Publication date
CN106712816B (en) 2019-11-29

Similar Documents

Publication Publication Date Title
Liu et al. RF energy harvesting wireless powered sensor networks for smart cities
CN106712816B (en) A kind of design method of the safe beam forming based on energy harvesting cognition network
Liu et al. QoS-aware throughput maximization in wireless powered underground sensor networks
Hao et al. Green communication for NOMA-based CRAN
Zhai et al. Simultaneous wireless information and power transfer at 5G new frequencies: Channel measurement and network design
Li et al. Physical layer security in overlay cognitive radio networks with energy harvesting
CN103415077B (en) A kind of joint relay selection and the method and system of power distribution
Wang et al. Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks
Li et al. Energy-efficient resources allocation with millimeter-wave massive MIMO in ultra dense HetNets by SWIPT and CoMP
Han et al. Research on energy-efficient routing algorithm based on SWIPT in multi-hop clustered WSN for 5G system
Ha et al. Performance analysis for RF energy harvesting mobile edge computing networks with SIMO/MISO-NOMA schemes
CN107769823A (en) A kind of information energy cooperative beam manufacturing process based on cognition bilateral relay network
Xu et al. Weighted sum rate maximization in IRS-BackCom enabled downlink multi-cell MISO network
Zhang et al. Performance analysis and optimization for power beacon-assisted wireless powered cooperative NOMA systems
Alsharoa et al. Near-optimal power allocation with PSO algorithm for MIMO cognitive networks using multiple AF two-way relays
Jiang et al. On the coverage of UAV-assisted SWIPT networks with nonlinear EH model
Hu et al. Security optimization for an AF MIMO two-way relay-assisted cognitive radio nonorthogonal multiple access networks with SWIPT
Wu et al. Joint sensing and transmission optimization for IRS-assisted cognitive radio networks
Su et al. Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting
US8976888B2 (en) Method for uplink multi-user cooperation communication
CN113518357B (en) Relay method of passive Internet of things
CN105848266A (en) Multi-antenna communication network circulating energy collection method with minimal energy consumption
Mao et al. Joint distributed beamforming and backscattering for UAV-assisted WPSNs
Rahman et al. A new energy harvesting scheme for multi-relay cooperative networks
Truong et al. Performance analysis of RF energy harvesting NOMA mobile edge computing in multiple devices IIoT networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Dong Jian

Inventor after: Shi Heyuan

Inventor after: Shi Zhenhong

Inventor after: Tang Gun

Inventor before: Dong Jian

Inventor before: Shi Zhenhong

Inventor before: Tang Gun

CB03 Change of inventor or designer information