Secure Transmission for Heterogeneous Cellular Networks with ...

2 downloads 0 Views 695KB Size Report
cerning the energy harvesting constraint recorded at each ER and the transmit power ... this challenge, we transform it into a series of semidef- inite programs ...
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE SYSTEMS JOURNAL

1

Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer Bin Li, Zesong Fei, Senior Member, IEEE, Zheng Chu, and Yan Zhang, Senior Member, IEEE

Abstract—In this paper, we investigate an artificial-noise-aided secure beamforming design for simultaneous wireless information and power transfer in a two-tier downlink heterogeneous cellular network, in which each energy receiver in a femtocell is seen as a potential eavesdropper to wiretap the confidential message intended for the information receiver. Our design objective is to maximize the secrecy rate at the information receiver, while satisfying the signal-to-interference-plus-noise ratio requirement of each macrouser and the energy harvesting and transmit power constraints. Both the scenarios of perfect and imperfect channel state information (CSI) are considered. With perfect CSI, the formulated optimization problem constitutes a difference of a convex function programming problem, which is hard to directly solve. To tackle this challenge, we transform it into a series of semidefinite programs by using successive convex approximation, and an iterative algorithm is proposed to arrive at a provably convergent solution. With imperfect CSI, we address robust secure beamforming relying on the worst-case design philosophy. To circumvent this predicament, we resort to the S-procedure to reformulate the robust quadratic matrix inequality (QMI) constraints and then obtain the linear matrix inequality representations for these QMIs. Numerical results are finally presented to demonstrate the performance of our proposed schemes in improving the secrecy rate of heterogeneous cellular networks. Index Terms—Beamforming, heterogeneous cellular networks (HCNs), quadratic matrix inequality (QMI), secrecy, simultaneous wireless information and power transfer (SWIPT), successive convex approximation (SCA).

I. INTRODUCTION INCE the tremendous popularity of Internet-enabled smart devices (e.g., smart phones and electronic tablets) has spurred the explosive growth of high-rate multimedia wireless services, it becomes urgent for mobile operators to achieve

S

Manuscript received March 1, 2017; revised April 24, 2017; accepted June 6, 2017. This work was supported in part by the National Natural Science Foundation of China under Grant 61371075 and Grant 61421001, in part by the 111 Project of China under Grant B14010, in part by the projects 240079/F20 funded by the Research Council of Norway, and in part by the Newton Fund/British Council Institutional Links under Grant ID 216429427, Project code 101977. (Corresponding author: Zesong Fei.) B. Li and Z. Fei are with the School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China (e-mail: [email protected]; [email protected]). Z. Chu is with the School of Science and Technology, Middlesex University, London NW4 4BT, U.K. (e-mail: [email protected]). Y. Zhang is with the Department of Informatics, University of Oslo, Norway, and also with the Simula Research Laboratory, Norway (e-mail: [email protected]). Digital Object Identifier 10.1109/JSYST.2017.2713881

higher capacity and coverage for next-generation 5G wireless communications. One viable solution to do so is to increase cell density for higher spatial spectrum reuse [1], [2]. Recently, a heterogeneous cellular network (HCN) has emerged to be a promising network densification architecture and has attracted substantial interests due to achieving seamless coverage and higher data rate. In HCNs, small cells (e.g., picocells, femtocells, or Wi-Fi hotspots) are deployed within the coverage of an existing macrocell and share the same spectrum resource, but the main challenge is the resulting increased cross-tier interference as the spectral efficiency increases [3]. As the HCN creates a multitier topology where multiple terminals are deployed with dissimilar characteristics and the broadcasting nature of wireless channels, the wireless information of HCNs is particularly vulnerable to eavesdropping. As a result, how to secure wireless data transmission is of much concern facing HCNs. Responding to this, physical layer security (PLS) has been identified as a prominent technique to carry out secure communications by utilizing the random characteristics of physical channels such as noises and interferences [4]–[7], and it has been shown to be capable of substantially improving wireless security performance in HCNs [8], [9]. The idea of using PLS to achieve secure information transmission in HCNs was first investigated in [8], where the authors introduced PLS into a two-tier downlink HCN, and three transmit beamforming schemes were proposed to maximize the achieved secrecy rate. Wang et al. [9] analyzed the connection probability and the secrecy probability of the randomly located user in a K-tier HCN and derived the tractable expressions for the two metrics, respectively. In [10], the authors showed the closed-form expressions of the secrecy outage probability in a K-tier HCN, in which a base station (BS) association constraint was imposed. The authors of [11] further addressed the problem of secured coverage for a K-tier HCN operating with coordinated multipoint transmission, where the performance analysis of the secured coverage probability was conducted. In addition, Wang et al. [12] studied the secrecy and energy efficiency performance of a heterogeneous cloud radio access network assisted by massive multiple-input multiple-output. With the intention of satisfying the high energy consumption due to the ever-increasing traffic needs in 5G, simultaneous wireless information and power transfer (SWIPT) has envisioned as a promising energy source for powering the energy-constrained wireless systems [13], in which wireless devices can harvest

1937-9234 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications standards/publications/rights/index.html for more information.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 2

energy from man-made radio frequency (RF) signals instead of natural sources such as wind and solar in a self-supplied fashion [14]. SWIPT can apply into the emerging market of HCNs, which avoids the frequent recharging and replacement of batteries of the low-power wireless devices, such as sensor nodes operating in extreme environments [15]. On the other hand, the deployment of small cells makes the mobile devices harvest energy more efficiently from its serving BS due to short-range communications. Most recently, Sheng et al. [16] considered the intrinsic relationship of information transmission efficiency and energy harvesting efficiency in a two-tier HCN. In the context of SWIPT-enabled HCNs, related works were also presented in [17]–[19]. For the SWIPT system, the energy receivers (ERs) may have better channel conditions than the information receivers (IRs) due to different power sensitivity levels for ERs and IRs (e.g., −10 dBm versus −60 dBm) [20], which gives rise to the fact that ERs may retrieve the information intended for IRs [21], [22]. Therefore, it is of paramount importance to study the security problem in SWIPT systems. To address it, PLS has been applied to SWIPT and a host of related efforts have been developed in [23]–[26]. It is worth noting that most of the existing works assumed that perfect channel state information (CSI) was available at the BS; however, this is very difficult to be obtained perfectly in practical systems due to the lack of cooperation with hostile eavesdroppers (Eves), as well as quantization and feedback errors [27]–[30]. To this end, the authors of[28] and [29] designed the robust secure beamforming for SWIPT systems, where the external helper and cooperative jamming were considered. Khandaker et al. [30] discussed the probabilistic secrecy beamformer design for a more general SWIPT system in the presence of multiple multiantenna Eves. The authors of [31] addressed the secure transmission problem for the SWIPT multicasting scenario with imperfect CSI, where a low-complexity intelligent algorithm was proposed. The multicasting scenario of robust secure SWIPT was also presented in [32], where Eves form multiple eavesdropping-collusion parties to collaboratively intercept the transmission signals. A common of previous related works is to address the secure issue separately in HCNs and SWIPT systems. Nevertheless, there is still not a comprehensive solution for SWIPT-enabled HCNs. Motivated by this, in this paper, we focus on the secure beamforming design for SWIPT in a two-tier HCN, in which one macrocell consisting of multiple macrocell users (MUs) and one femtocell consisting of one IR with multiple ERs. Meanwhile, each ER is also seen as a potential Eve to wiretap confidential messages intended for IR. Our objective is to maximize the secrecy rate at IR while guaranteeing the signal-to-interferenceplus-noise ratio (SINR) requirement recorded at each MU, concerning the energy harvesting constraint recorded at each ER and the transmit power constraint. For the sake of clarification, the main contributions of this paper are summarized as follows. 1) We propose an SWIPT system model for a two-tier HCN. In particular, the femtocell base station (FBS) broadcasts wireless information to IR and transfers energy to ERs simultaneously. Then, we investigate the secure transmission issue for the proposed system model; such work has not been reported so far. To enhance secure transmission,

IEEE SYSTEMS JOURNAL

the artificial noise (AN) is embedded at the intended signal to deteriorate the reception of ERs. 2) For perfect CSI, the secrecy rate maximization problem is nonconvex due to the coupling between optimization variables, and thus, it is hard to optimally solve. To tackle this challenge, we transform it into a series of semidefinite programs (SDPs) by employing successive convex approximation (SCA) and semidefinite relaxation (SDR) techniques. Then, an iterative algorithm is proposed to arrive at provably convergent solution. Furthermore, the convergence and computational complexity of the proposed algorithm are analyzed. 3) We further extend our work to the imperfect CSI case. Considering the deterministic channel estimation uncertainty model and following the worst-case robustness philosophy, we propose a robust secure beamforming design. Particularly, we reformulate the worst-case secrecy rate maximization problem into a quadratic matrix inequality (QMI) problem in light of the Schur complement framework, and then rely on the linear matrix inequality (LMI) reformulation for the semi-infinite QMI constraints to construct solvable SDPs. The remaining part of this paper is organized as follows. In Section II, we introduce the system model and formulate the optimization problem. In Section III, we investigate the secure beamforming design with perfect CSI. In Section IV, we investigate the robust secure beamforming design for the imperfect CSI case. Finally, in Section V, we present simulation results to validate the effectiveness of the proposed schemes, followed by our conclusions in Section VI. Notations: Boldface lowercase and uppercase letters denote vectors and matrices, respectively. The transpose, conjugate transpose, rank, and trace of the matrix A are denoted as AT AH , rank(A), and Tr(A), respectively. A  0 means A is a positive-semidefinite (PSD) matrix. E[·] represents the expectation of a random variable, and  ·  denotes the vector Euclidean norm. Random vector x ∼ CN (µ, Φ) with a mean vector µ and covariance matrix Φ follows a complex circularly symmetric Gaussian distribution. II. SYSTEM MODEL AND PROBLEM FORMULATION We consider a wireless-powered two-tier HCN, where an FBS can be deployed with a macrocell base station (MBS), as depicted in Fig. 1. The FBS serves K + 1 femtocell users (FUs) and shares certain spectral resources as MBS serving M > 1 MUs to improve the spectrum efficiency. The MBS and FBS are equipped with NM ≥ M and NF ≥ K + 1 transmit antennas, respectively, whereas each MU and FU are equipped with a single receive antenna. We assume that the FBS is capable of performing wireless power transfer, and two types of FUs exist in the femtocell, i.e., one IR1 and K > 1 ERs. It is assumed that ERs are also active users of the network and can only harvest energy from the ambient RF signals to extend their battery life. Note that ERs may be malicious for intercepting the information signal transmitted by the FBS to IR without 1 In this paper, we assume that only one IR exists in the femtocell; the extension to multiple IRs network as in [31] and [32] is straightforward.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. LI et al.: SECURE TRANSMISSION FOR HETEROGENEOUS CELLULAR NETWORKS WITH WIRELESS INFORMATION AND POWER TRANSFER

3

2 ) denotes the additive white Gaussian where nm ∼ CN (0, σm noise (AWGN) at MUm . Note that the first term is the intended signal for MUm , the second term is the interference from other MUs in the macrocell, and the last two terms are the intertier interference and background noise. To facilitate analysis, the single-user detection is employed at each MU, which means the interference from intertier and intratier is simply treated as a part of the background noise. Therefore, the SINR at MUm can be represented as 2 |hH m wm |

SINRm = M i=1,i= m

Fig. 1. System model of a two-tier HCN supporting SWIPT, where ERs refer to as Eves.

any attacks. Thus, ERs are seen as potential Eves, which should be considered for providing secure transmission, which was commonly assumed [23]. Let M = {1, . . . , M } denote the set of MUs and K = {1, . . . , K} denote the set of ERs. For the sake of notational simplicity, we assume that the mth MU in the macrocell and the kth ER in the femtocell are denoted by MUm and ERk , respectively. The channel coefficients from the MBS to MUm , from the MBS to IR, and from the MBS to ERk are denoted by hm ∈ C N M ×1 , hI,0 ∈ C N M ×1 , and gk ,0 ∈ C N M ×1 , respectively. Likewise, the channel coefficients from the FBS to IR, from the FBS to ERk , and from the FBS to MUm are denoted by hI ∈ C N F ×1 , gk ∈ C N F ×1 , and lm ∈ C N F ×1 , respectively. These channel coefficients are independent, and the elements are independent and identically distributed (i.i.d.) complex Gaussian random variables. To support secure communication and facilitate energy harvesting at ERs, the AN-aided beamforming scheme is performed at the FBS to prevent ERs from eavesdropping. Therefore, the transmitted signal vector is denoted by x = wI sI + vE

(1)

where sI and wI denote the data symbol and beamforming vector, respectively. Hence, wI sI carries the confidential information intended for IR. Without loss of generality, we assume that E[sI sTI ] = 1. vE ∼ CN (0, VE ) denotes the energy-carrying AN vector invoked by the FBS, which is independent of the information-carrying signal sI , where VE represents the transmit covariance matrix of vE . The AN vector vE interferes IR and ERs simultaneously since vE is unknown to both types of receivers. Hence, AN transmission has to be carefully designed to deteriorate the reception of ERs while having a minimal impact on IR. Suppose sm ∼ CN (0, 1) is the data symbol transmitted by MBS intended for MUm in the macrocell and wm is the corresponding beamforming vector; the signal received at MUm by considering the cochannel interference can be expressed as ym = hH m wm sm +

M  i=1,i= m

H hH m wi si + lm x + nm

(2)

. 2 H 2 H 2 |hH m wi | + |lm wI | + lm VE lm + σm (3)

Since the FBS desires to send the confidential signal x to IR while ERs overhears, the signals received by IR and ERk can be expressed as yI = hH I x+

M 

hH I,0 wm sm + nI

(4)

gkH,0 wm sm + nE,k

(5)

m =1

yE,k = gkH x +

M  m =1

2 respectively, where σI2 and σe,k denote the variances of AWGN at IR and ERk , respectively. As seen from (4) and (5), the IR and ERs suffer from the MUs’ interference in addition to the background noise. Then, the total transmit power of the whole system is given by

Ptot =

M 

wm 2 + wI 2 + Tr(VE ).

(6)

m =1

On the other hand, the harvested energy at ERk is written as   M  H 2 H H 2 |gk wm | Ek = ξ |gk wI | + gk VE gk + (7) m =1

where ξ ∈ (0, 1] is the energy conversion efficiency that accounts for the loss converting the harvested energy to the electrical energy. The harvested energy is preserved to extend the battery life of ER.2 Note that the contribution of the noise power to the total harvested energy is neglected in (7), since it is negligibly small compared to the received signals. In the following, we assume ξ = 1 for convenience. According to the received signal in (4) and (5), given {wm }, wI , and VE , the achievable instantaneous secrecy rate is formulated as [33]  + Rs = CI ({wm }, wI , VE ) − max CE,k ({wm }, wI , VE ) k

(8) where the notation [x]+ = max{x, 0} is used, since the secrecy rate is defined as a nonnegative quantity. CI ({wm }, wI , VE ) 2 In this paper, we mainly focus on the secrecy rate optimization. The energy harvesting performance of ERs is exploited, whereas how to use the harvested power is outside the scope of this paper.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 4

IEEE SYSTEMS JOURNAL

and CE,k ({wm }, wI , VE ) are the achievable rates of the IR and ERk , respectively, i.e.,

convex form. Furthermore, an SCA-based iterative algorithm is developed to obtain a provably convergent solution.

CI ({wm }, wI , VE ) = log2 (1 + SINRI )  = log2

1 + M m =1

2 |hH I wI |

A. Optimal Beamforming With Perfect CSI

 (9)

H 2 2 |hH I,0 wm | + hI VE hI + σI

CE,k ({wm }, wI , VE ) = log2 (1 + SINRE,k )  = log2

1 + M m =1

|gkH wI |2



max

From (9) and (10), we can see that the interference from the MBS invokes a negative impact on the quality of wireless transmission of both IR and ERs; meanwhile, it is beneficial for energy harvesting at ERs. As a result, it is not trivial to design secure beamforming for degrading ERs’ channels while having a minimal effect on IR. Under such a scenario, we focus on the joint design of beamforming vectors wm , wI , and AN covariance matrix VE to maximize the secrecy rate at IR, while satisfying the SINR requirement for each MU, the transmit power constraint, and the energy harvesting constraint. Hence, the optimization problem is formulated as  max CI ({Wm }, WI , VE ) − max CE,k ({Wm }, WI , VE ) k

s.t. SINRm ≥ Γm ∀m ∈ M

γ I ,γ e , k ,{W m },W I ,V E

.

2 |gkH,0 wm |2 + gkH VE gk + σe,k

(10)

{w m },w I ,V E

H and To proceed, we first define new matrices Wm = wm wm H WI = wI wI with rank(Wm ) = 1 and rank(WI ) = 1. Then, we introduce real-valued slack variables γI and γE ; Problem (11) can be equivalently rewritten as

γI − γE

(12a)

hH I WI hI

s.t. M

H m =1 hI,0 Wm hI,0

hH I VE hI

+1

gkH WI gk H H m =1 gk ,0 Wm gk ,0 + gk VE gk

+1

+

M

≥ 2γ I − 1

≤ 2γ E − 1 (12c)

hH m Wm hm

M i=1,i= m

H hH m Wi hm + lm (WI + VE )lm + 1

≥ Γm (12d)

gkH WI gk

+

gkH VE gk

+

M 

gkH,0 Wm gk ,0 ≥ Qk (12e)

m =1

Tr(WI ) + Tr(VE ) +

M 

Tr(Wm ) ≤ Pth

(12f)

m =1

Wm  0, WI  0, VE  0 (11a)

(12b)

(12g)

rank(Wm ) = 1, rank(WI ) = 1 ∀ m ∈ M; k ∈ K. (12h)

(11b)

Ptot ≤ Pth

(11c)

Ek ≥ Qk ∀k ∈ K

(11d)

VE  0

(11e)

where Γm is the prescribed SINR requirement of MUm . Pth denotes the maximum transmit power threshold, and Qk denotes the prescribed energy harvesting threshold at ERk , respectively. It is clear that Problem (11) is nonconvex, since the objective function constitutes a difference of convex functions programming (DCP), which is, in general, hard to optimally solve due to prohibitively high computational complexity. To simplify the 2 2 = σm = 1 in the following. notations, we assume σI2 = σe,k

The equivalence between Problems (11) and (12) follows from the fact that the constraints in (12b) and (12c) hold with equality at optimality. It can be observed that Problem (12) is nonconvex, since the constraints in (12b) and (12c) involve the coupled optimization variables {Wm }, 2γ I , 2γ E , and the rank-1 constraint (12h), which are intractable. To make the problem tractable, we introduce the auxiliary variables v1 , v2 , u1k , and u2k and define new matrices Hm = H H H hm hH m , HI = hI hI , HI,0 = hI,0 hI,0 , Gk = gk gk , Gk ,0 = H H gk ,0 gk ,0 , and Lm = lm lm . By applying the SDR technique [33], [34] to drop the rank-1 constraint (12h), Problem (12) can be relaxed as

III. SECURE BEAMFORMING DESIGN WITH PERFECT CSI In this section, we assumed that the CSI of all receivers is perfectly known at the MBS and the FBS such that the secure transmission is designed, which is a common assumption broadly used in the open literature. To tackle Problem (11), we apply first-order Taylor expansion and SCA techniques to approximate and then transform the original problem into a

max

{W m },W I ,V E γ I ,γ E ,v 1 ,v 2 ,u 1 k ,u 2 k

s.t.

γI − γE

1 Tr(Hm Wm ) − Γm

M 

(13a)

Tr(Hm Wi )

i=1,i= m

− Tr(Lm (WI + VE )) ≥ 1

(13b)

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. LI et al.: SECURE TRANSMISSION FOR HETEROGENEOUS CELLULAR NETWORKS WITH WIRELESS INFORMATION AND POWER TRANSFER

Tr(HI WI ) ≥ v1 M 

Tr(HI,0 Wm ) + Tr(HI VE ) + 1 ≤ v2

(13c)

Algorithm 1: Proposed Iterative Algorithm for Solving Problem (20).

(13d)

Input: Initialize x ¯2 , x ¯3 , x ¯4k , γ¯E as the values which are feasible to the problem (20), set n = 0. [n ] [n ] ¯3 , Step 1: Solve the convex Problem (20) with (¯ x2 , x [n ] [n ] x ¯4k , γ¯E ) and obtain the optimal values (x∗2 , x∗3 , x∗4k , γE∗ ). [n +1] [n +1] [n +1] [n +1] Step 2: Update (¯ x2 ,x ¯3 ,x ¯4k , γ¯E )= ∗ ∗ ∗ ∗ (x2 , x3 , x4k , γE ). n = n + 1;

m =1

v1 ≥ 2γ I − 1 v2

(13e)

Tr(Gk WI ) ≤ u1k

(13f)

M 

Tr(Gk ,0 Wm ) + Tr(Gk VE ) + 1 ≥ u2k

(13g)

m =1

u1k ≤ 2γ E − 1 u2k

(13h)

Tr(Gk WI ) + Tr(Gk VE ) +

M 

Tr(Gk ,0 Wm ) ≥ Qk (13i)

m =1

Tr(WI ) + Tr(VE ) +

M 

Tr(Wm ) ≤ Pth

(13j)

m =1

Wm  0, WI  0, VE  0 ∀ m ∈ M; k ∈ K.

(13k)

While Problem (13) is still nonconvex in its current form due to the nonconvex constraints in (13e) and (13h), no algorithm can be directly applied to it. In what follows, we will develop an iterative algorithm to find the optimal solution based on the spirit of the SCA technique [21], [35]. B. Successive Convex Approximation To obtain a tractable convex formulation and design an efficient solution of Problem (13), following the idea of [21] and [35], we employ the SCA technique to deal with Problem (13) in this section. 1) Transformation of Constraint (13e): To begin with, introducing slack variables x1 , x2 , and x3 , (13e) can be reformulated as v1 ≥ ex 1

x1 − x2 ≥ x3

(14a)

v2 ≤ e

2 −1≤e .

(14b)

x2

γI

x3

5

It is easily seen that the constraints in (14a) are convex now. However, the constraints in (14b) are still nonconvex due to the fact that if a constraint is such that a convex function is smaller than or equal to a concave function, then the constraint is a convex constraint [36]. Fortunately, the functions ex 2 and ex 3 on the right-hand sides of (14b) are convex, which makes [n ] (14b) easier to handle than (13e). To this end, let us define x ¯2 [n ] and x ¯3 as the variables x2 and x3 at the [n − 1]th iteration for an iterative algorithm given below. By applying first-order [n ] [n ] Taylor series expansions on ex 2 and ex 3 , i.e., ex¯ 2 (x2 − x ¯2 + [n ] ¯3 + 1) ≤ ex 3 , the linearization of 1) ≤ ex 2 and ex¯ 3 [n ] (x3 − x nonconvex constraints in (14b) are given by

[n ] [n ] v2 ≤ ex¯ 2 x2 − x ¯2 + 1 (15)

[n ] 2γ I − 1 ≤ ex¯ 3 [n ] x3 − x ¯3 + 1 . (16)

[n ]

Output: Until |

[n ]

(n + 1)

(γ I

[n ]

(n + 1)

−γ E

(n + 1)

γI

[n ]

(n )

)−(γ I

(n )

−γ E

(n + 1)

−γ E

)

|≤  is met,

where  represents the convergence tolerance.

2) Transformation of Constraint (13h): Similar to constraint (13e), introducing slack variables x4k , x5k , and x6k , (13h) can be reformulated as u1k ≤ ex 4 k

2γ E − 1 ≥ ex 6 k

(17a)

u2k ≥ e

x4k − x5k ≤ x6k .

(17b)

x5 k

Note that constraint (17a) is still nonconvex; we then apply the first-order Taylor series expansions on ex 4 k and 2γ E , i.e., [n ] [n ] [n ] [n ] ex¯ 4 k (x4k − x ¯4k + 1) ≤ ex 4 k and 2γ¯ E [(γE − γ¯E ) ln 2 + 1] ≤ γE 2 ; thus, the linearization of nonconvex constraints in (17a) is given by

[n ] [n ] u1k ≤ ex¯ 4 k x4k − x ¯4k + 1 (18)



[n ] [n ] γE − γ¯E ln 2 + 1 − ≥ ex 6 k . (19) 2γ¯ E Up till now, replacing (13e) and (13h) by (14a), (15), (16), (17b), (18), and (19), the original Problem (13) can be recast as max

W m ,W I ,V E ,γ I ,γ E ,v 1 ,v 2 u 1 k ,u 2 k ,x 1 ,x 2 ,x 3 ,x 4 k ,x 5 k ,x 6 k

γI − γE

s.t. (13b), (13c), (13d), (13f), (13g), (13i), (13j), (13k), (14a), (15), (16), (17b), (18), and (19).

(20)

It can be observed that Problem (20) is a convex SDP problem, which can be efficiently solved by using interior-point-based solvers, e.g., CVX [36]. The detailed procedure of the proposed SCA-based algorithm is listed in Algorithm 1.3 If the optimal ∗ } and WI∗ for Problem (20) satisfy rank-1 consolutions {Wm straints, then the optimal beamforming vectors for Problem (11) can be obtained via employing the eigenvalue decomposition. Alternatively, the Gaussian randomization technique [8], [37] can be applied to generate the approximate solutions. To obtain further insight into Problem (20), we find from the simulations that the optimal solution WI∗ of Problem (20) is always rank-1, which implies that the rank relaxation about WI is tight. 3 The initial values of the variables in Algorithm 1 are generated randomly by extensive experiments until the feasible conditions are all met.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 6

IEEE SYSTEMS JOURNAL

TABLE I COMPUTATIONAL COMPLEXITY ANALYSIS FOR THE PROPOSED ALGORITHM 1

gk ,0 , and lm are given by ˆ m , Δhm 2 ≤ m } Hm = {Δhm |Δhm = hm − h

Variables design variables (size, number)

slack variables (size, number)

PSD constraints

Slack constraints

ˆ I,0 , ΔhI,0 2 ≤ I,0 } HI,0 = {ΔhI,0 |ΔhI,0 = hI,0 − h

(size, number)

(N M × N M , M ) (1 × 1, 5K + 3M + (N M × N M , M ) 2K M + 5) (N F × N F , 2) (N F × N F , 2)

ˆ I , ΔhI 2 ≤ I } HI = {ΔhI |ΔhI = hI − h

2M + 2K + KM

ˆk , Δgk 2 ≤ k } Gk = {Δgk |Δgk = gk − g ˆk ,0 , Δgk ,0 2 ≤ k ,0 } Gk ,0 = {Δgk ,0 |Δgk ,0 = gk ,0 − g Lm = {Δlm |Δlm = lm − ˆlm , Δlm 2 ≤ m }

3) Convergence Analysis: From Algorithm 1, the approximation with the current optimal solution can be updated iteratively until constraints (15), (16), (18), and (19) hold with equality, which implies that Problem (13) is optimally solved. We can observe from (15), (16), (18), and (19) that the nth iteration admits a larger feasible region than the [n − 1]th iteration, since the nth iterative solutions can at least achieve the [n − 1]th iterative solutions. Furthermore, the transmit power constraint is a finite value; we conclude that Algorithm 1 will converge, which is later shown by the numerical results. Remark 1: The computational complexity for solving Problem (20) based on Algorithm 1 is briefly discussed here. Since the proposed Algorithm 1 is based on SDP, the computational complexity is determined significantly by the number and size of variables (i.e., design variables and slack variables) and constraints (i.e., PSD constraints and slack constraints). Especially, the major computational complexity for Problem (20) is summarized in Table I.

ˆm , h ˆI , h ˆ I,0 , g ˆk , g ˆk ,0 , and ˆlm are the estirespectively, where h mated channel vectors, which are available to the MBS and the FBS. Δhm , ΔhI , ΔhI,0 , Δgk , Δgk ,0 , and Δlm denote the corresponding channel-error vectors. And m , I , I,0 , k , I , and m denote the nonnegative channel error bounds, respectively. To enhance the robustness against the CSI errors, the original optimization problem is modified to maximize the worst-case secrecy rate based on the spherical uncertainty model in (21) under predefined constraints. As a result, the robust version of Problem (11) is formulated as  CI ({Wm }, WI , VE ) max {W m },W I ,V E Δ h I ∈HI ,Δ h I , 0 ∈HI , 0

In the previous section, we have investigated the secrecy rate maximization problem when all the CSI is known at the MBS and the FBS, but in practical communication systems, perfect CSI is very difficult to be obtained at the MBS and the FBS due to imperfect channel estimation, quantization, and feedback errors. It is more reasonable to study the robust secure beamforming scheme under imperfect CSI. In this section, the deterministic uncertainty model is adopted to develop the robust algorithm, which is widely used in the published works [5], [27], [31] and is very useful in practical applications. A. Channel Estimation Uncertainty Model We characterize the imperfect CSI associated with the receivers using the worst-case constrained model4 [5], [27], [31]. Assuming that the channel estimation uncertainty is bounded, the regions of the exact wireless channels hm , hI , hI,0 , gk ,



max

k ,Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

CE,k ({Wm }, WI , VE ) (22a)

s.t. IV. SECURE ROBUST BEAMFORMING DESIGN WITH IMPERFECT CSI

(21)

min

Δ h m ∈Hm Δ l m ∈Lm

hH m Wm hm M H H i= m hm Wi hm + lm (WI

+ VE )lm + 1

≥ Γm (22b)

min

Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

gkH WI gk + gkH VE gk +

M 

gkH,0 Wm gk ,0 ≥ Qk

m =1

(22c) Tr(WI ) + Tr(VE ) +

M 

Tr(Wm ) ≤ Pth

(22d)

m =1

WI  0, VE  0, Wm  0

(22e)

rank(Wm ) = 1, rank(WI ) = 1 ∀ m ∈ M; k ∈ K. (22f) It is worth highlighting that Problem (22) is costly to solve globally than Problem (11) owing to the nonconvex secrecy rate expression and the infinite number of constraints caused by the norm-bounded CSI errors. Instead of directly solving Problem (22), we resort to obtaining a tractable form and reformulating it into a semifinite optimization problem in the following. B. Optimal Beamforming With Imperfect CSI

4 The worst-case constrained model exploits a bounded model, in which the CSI lies in the boundary of a predefined uncertainty region, and the final objective is the optimization of the worst system performance for any error in this region. In this paper, we consider the simple spherical uncertainty model, and this assumption is advisable.

In general, the objective function in the form of DCP is nonconvex. It has been shown in [38] that maximizing such an objective function of Problem (22) is equivalent to maximizing CI ({Wm }, WI , VE ) subject to an alternative upper bound on

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. LI et al.: SECURE TRANSMISSION FOR HETEROGENEOUS CELLULAR NETWORKS WITH WIRELESS INFORMATION AND POWER TRANSFER

CE,k ({Wm }, WI , VE ). By properly adjusting the upper bound on CE,k ({Wm }, WI , VE ), it is possible to attain the optimal solutions of the original robust Problem (22). To tackle the robust security problem, we first introduce a slack variable τ and drop the rank-1 constraint (22f) by means of the SDR technique [33], [34]; then, Problem (22) can be calculated as max

{W m },W I ,V E ,τ , Δ h I ∈HI ,Δ h I , 0 ∈HI , 0

max

s.t.

Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

Problem (26) and discuss how to handle it for the case of channel uncertainties. We note that the objective function of (26) is a linear fractional function; thus, it is quasi-convex. To further proceed, we introduce a slack variable γ and then equivalently rewrite Problem (26) as

CI ({Wm }, WI , VE ) − log2 (1 + τ )

γ

max

{W m },W I ,V E ,γ

(23a) CE,k ({Wm }, WI , VE ) ≤ log2 (1 + τ )

s.t.

min

Δ h I ∈HI Δ h I , 0 ∈HI , 0

(27a) hH I WI hI

M m =1

H hH I,0 Wm hI,0 + hI VE hI + 1

(22b)–(22e).

(23c)

From the construction of Problem (23), we can easily see that (23) can be divided into a two-stage optimization problem. The first stage is a single-variable optimization problem in terms of τ , i.e.,   1 + f (τ ) max log2 (24a) τ 1+τ s.t. 0 ≤ τ ≤ τm ax

(24b)

where the function f (τ ) is defined by the second-stage optimization problem as described below. The lower bound of τ is recognized by noting that the constraint in (23b) CE,k ({Wm }, WI , VE ) ≥ 0. And the upper bound τm ax follows the fact that hH I WI hI

τ ≤ M m =1

 τmax .

(25)

(τ ) For a fixed τ , it can be easily seen that 1+f is maximized 1+τ when f (τ ) is maximized. Therefore, we cast the second-stage optimization problem as follows:

{W m },W I ,V E

M

Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

max

M m =1

hH I WI hI

H m =1 hI,0 Wm hI,0

gkH,0 Wm gk ,0 + gkH VE gk + 1

≤τ

(22b)–(22e).

(27d)

Although the objective function of Problem (26) has a simple form compared with that of Problem (27), it is still intractable since the variables γ, Wm , and VE from constraint (27b) are coupled and the infinitely many constraints in (27b)–(27d). To solve Problem (27), we further introduce a slack variable κ, i.e., 1

κ = M

H m =1 gk ,0 Wm gk ,0

+ gkH VE gk + 1

>0

(28)

and make the following change of variables:

+

max

˜ m }, W ˜ I ,V ˜ E ,γ ,κ {W

˜ I = κWI W

˜ E = κVE . V

+1 (26a)

gkH WI gk gkH,0 Wm gk ,0 + gkH VE gk + 1

≤τ

(26c)

As can be observed from (24) and (26), the original Problem (23) of interest can be solved through the above-mentioned two stages. First, for given τ , we solve to obtain f (τ ); then, we solve to obtain the optimal τ ∗ . The upshot of the reformulation (24) is that it is a single-variable optimization problem, which can be solved via performing a 1-D line search over the interval [0, Pth Tr(HI )]. In the subsequent, we will focus on solving

γ

(29)

(30a)

˜ s.t. min hH I WI hI ≥ γ

(30b)

Δ h I ∈HI

max

hH I VE hI

(26b) (22b)–(22e).

m =1

(27c)

M 

Δ h I ∈HI Δ h I , 0 ∈HI , 0 m =1

max

Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

gkH WI gk

M

We now handle Problem (27) by following the idea of Charnes– Cooper transformation [8], [33]. Specifically, Problem (27) can be equivalently transformed into

≤ Pth Tr(HI )

max

max

˜ m = κWm W

H hH I,0 Wm hI,0 + hI VE hI + 1

≤ Tr(HI WI )

s.t.

≥γ (27b)

(23b)

f (τ ) 

7

Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

H ˜ ˜ hH I,0 Wm hI,0 + hI VE hI + κ = 1

˜ I gk gkH W

M m =1

˜ m gk ,0 + gH V ˜ E gk + 1 gkH,0 W k

(30c)

≤τ (30d)

min M

Δ h m ∈Hm Δ l m ∈Lm

i= m

˜ hH m Wm hm ≥ Γm H ˜ ˜ ˜ hH m Wi hm + lm (WI + VE )lm + 1 (30e)

˜ I gk +gH V ˜ E gk + min gkH W k

Δ g k ∈Gk Δ g k , 0 ∈Gk , 0

M 

˜ m gk ,0 ≥ Qk gkH,0 W

m =1

(30f) (22d) and (22e).

(30g)

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 8

IEEE SYSTEMS JOURNAL

Although Problem (30) is still nonconvex due to nonconvex constraints in (30b)–(30f), Problem (30) has a more tractable form than Problem (27). Remark 2: It is worth pointing out that the constraint in (30c) can be replaced by maxΔ h I ∈HI ,Δ h I , 0 ∈HI , 0 M H ˜ H ˜ m =1 hI,0 Wm hI,0 + hI VE hI + κ ≤ 1. When Problem (30) obtains its optimum value, the inequality is active. The interested readers can refer to [28] and the references therein for more details. In what follows, we convert the worst-case constraints in (30b)–(30f) into LMIs by using the S-Procedure and the generalized S-Procedure given in the following lemmas, respectively. Lemma 1: (S-Procedure [36]): Let fk (x) = xH Ak x + 2Re{bH k x} + ck , k = 1, 2

(31)

where Ak ∈ C n ×n , bk ∈ C n ×1 , x ∈ C n ×1 , and ck ∈ R. Then, the implication f1 (x) ≤ 0 =⇒ f2 (x) ≤ 0 holds if and only if there exists a μ ≥ 0 such that     A b1 A2 b2 μ H1 − 0 (32) b1 c1 bH c2 2 ˆ such that f1 (ˆ x) < 0. provided that there exists a point x Since the channel uncertainty with respect to hI is constrained, we commence rewrite the constraint in (30b) as follows:  ˆ I + ΔhI )H W ˆ I + ΔhI ) − γ ≥ 0 ˜ I (h (h (33) ∀ΔhI : ΔhI 2 ≤ I . Applying Lemma 1 and introducing a slack variable λI ≥ 0, we convert (30b) into an LMI given by   ˆI ˜I ˜ Ih λI I + W W (34) ˆH W ˆH W ˆ I − λI 2 − γ  0. ˜I ˜ Ih h h I I I Since the channel uncertainties with respect to hI and hI,0 are constrained separately, we then rewrite the constraint in (30c) as follows: ⎧ ˆ I + ΔhI )H B1 (h ˆ I + ΔhI ) ⎨ (h ˆ ˆ I,0 + ΔhI,0 ) + d1 ≥ 0 (35) + (hI,0 + ΔhI,0 )H C1 (h ⎩ ∀ΔhI , ΔhI,0 : ΔhI 2 ≤ I , ΔhI,0 2 ≤ I,0 ˜ m , and d1 = 1 − κ. ˜ E , C1 = − M W where B1 = −V m =1 Then, (35) is equivalent to the following form: ⎧ ˆH ˆH ˆ ⎨ ΔhH I B1 ΔhI + 2Re{hI B1 ΔhI } + hI B1 hI H ˆ I,0 + ΔhI,0 ) C1 (h ˆ I,0 + ΔhI,0 ) + d1 ≥ 0 (36) + (h ⎩ ∀ΔhI , ΔhI,0 : ΔhI 2 ≤ I , ΔhI,0 2 ≤ I,0 . By performing the Lemma 1 with respect to the uncertainty sets HI , (36) can be equivalently transformed into the following QMI by the Schur complement [28]:   ˆI λI I + B1 B1 h ˆ I,0 + ΔhI,0 )H C1 (h ˆ I,0 + ΔhI,0 )  0 ˆ H B1 Y1 + (h h I (37) ˆ H B1 h ˆI − ¯ I ≥ 0 is the introduced slack variable, Y1 = h where λ I 2 ¯ λI I + d1 .

To further solve the semidefiniteness of HI,0 , we have the following lemma. Lemma 2 (see [39, Th. 4.2]): If D  0, the data matrices Hj , j ∈ {1, . . . , 6}, satisfy 

H1 (H2 + H3 X)H

 H2 + H3 X 0 H H4 + XH H5 + HH 5 X + X H6 X ∀X : I − XH DX  0 (38)

is equivalent to the LMI system, ∃λ ≥ 0, such that ⎡ ⎤ ⎡ ⎤ H1 H2 H3 0 0 0 ⎣ HH H4 H5 ⎦ − λ⎣ 0 I 0 ⎦0 2 H 0 0 −D HH H H 6 3 5

(39)

where I denotes the identity matrix of an appropriate dimension. Consider the channel uncertainty with respect to HI,0 and perform the Lemma 2; we finally transform (37) into a single convex constraint given by ⎡

ˆI B1 h H ˆ ˆ I,0 − λI,0 Y1 + hI,0 C1 h ˆ I,0 C1 h

¯ I I + B1 λ ⎢ h ˆH ⎣ I B1 0

⎤ 0 ˆ H C1 ⎥  0 h ⎦ I,0 λ C1 +  2I , 0 I I, 0

(40) where λI,0 ≥ 0 is the introduced slack variable. The upshot of the implication in (40) is that it is finite and, in fact, it is an LMI. Following similar arguments, let us define B2 = ˜ I , C2 = M τ W ˜ m , d2 = τ , B3 = W ˜m− ˜E −W τV m =1 M ˜ ˜ ˜ Γ , C = Γ ( W + V ), d = Γ , W m 3 m I E 3 m B4 = i=1,i= m m  M ˜ E , C4 = ˜ ˜ I +V W m =1 Wm , and d4 = Qk . Similar to the constraint in (30c), the constraints in (30d)–(30f) can also be converted into the following LMIs: ⎡ ⎤ ˆk λk I + B 2 B2 g 0 H ⎢ g ˆk ,0 − λk ,0 ˆkH,0 C2 ⎥ ˆkH,0 C2 g g Y2 + g ⎣ ˆ k B2 ⎦0 λ ˆk ,0 0 C2 g C2 + k2, 0 I I, 0



λm I + B 3 ⎢ ˆH ⎣ hm B3 0 ⎡

μk I + B4 H ⎢ g ⎣ ˆ k B4 0

ˆm B3 h H ˆ Y3 − lm C3ˆlm − μm −C3ˆlm

ˆk B4 g ˆk ,0 − μk ,0 ˆkH,0 C4 g Y4 + g ˆk ,0 C4 g



(41)

0 ⎥ −ˆlH ⎦0 m C3 μm −C3 +  2 I m



(42)

0 ˆkH,0 C4 ⎥ g ⎦0 μ C4 + k2, 0 I k ,0

(43) respectively, where {λk ≥ 0}, {λk ,0 ≥ 0}, {λm ≥ 0}, {μk ≥ 0}, {μk ,0 ≥ 0}, and {μm ≥ 0} are the introduced slack variˆ H B3 h ˆm − ˆkH B2 g ˆk − λk k2 + d2 , Y3 = h ables. And Y2 = g m 2 H 2 ˆ k B4 g ˆk − μk k − d4 . Finally, by reλm m − d3 , and Y4 = g placing (30b)–(30f) with (34) and (40)–(43), Problem (30) can

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. LI et al.: SECURE TRANSMISSION FOR HETEROGENEOUS CELLULAR NETWORKS WITH WIRELESS INFORMATION AND POWER TRANSFER

Algorithm 2: Proposed Two-Stage Algorithm for Solving Problem (23). Input: Initialize {Γm }, {Qk }, Pth and τmax = Pth Tr(HI ). Repeat: For τ = [0, τmax ], performing 1-D search. Step 1: Solve the convex Problem (44) and obtain f (τ ). (τ ) Set: τ ∗ = arg max 1+f 1+τ . ∗ Step 2: For a given τ , solve Problem (44) to obtain ˜ ∗ ,W ˜ ∗, V ˜ E , κ∗ ). (W m I ˜



˜ ∗ W

∗ Step 3: Let Wm = Wκ ∗m , WI∗ = κ ∗I . ∗ ) = 1 and rank(WI∗ ) = 1, we can Output: If rank(Wm ∗ obtain wm and wI∗ by applying eigenvalue decomposition; Otherwise, we resort to Gaussian randomization method to find the rank-1 approximate solutions.

be expressed as max

˜ m }, W ˜ I ,V ˜ E ,γ ,κ,λI , ¯λI {W λI , 0 ,λk ,λk , 0 ,λm ,μ k ,μ k , 0 ,μ m

γ

s.t. (22d), (22e), (34), (40), (41), (42), and (43).

(44a) (44b)

It is worth mentioning that Problem (44) is a convex SDP problem, which can be efficiently solved by using interior-pointbased solvers, e.g., CVX [36]. In this setup, however, the rank-1 ∗ solutions of {Wm } and WI∗ are difficult to prove directly. Toward this end, if the optimal solutions of Problem (44) satisfy ∗ } rank-1 constraints, then the optimal beamforming vectors {wm ∗ and wI can be obtained by utilizing the eigenvalue decomposition. Alternatively, the rank-1 approximation technique, e.g., Gaussian randomization method [37] can be applied to generate the approximate solutions. In general, the eigenvalue decomposition method performs worse than the Gaussian randomization method, provided that the number of randomizations is sufficiently large. Based on the above analysis, a two-stage optimization algorithm is proposed to solve the original Problem (23) of interest. In each outer iteration, we aim to update τ via 1-D search such as uniform sampling method. While in each inner iteration, we focus on solving Problem (44) with a fixed τ . A very brief outline of the proposed algorithm is summarized in Algorithm 2. Remark 3: It is to be noted that the original Problem (23) is a two-stage optimization problem; the computational complexity for solving Problem (23) is dominated by a 1-D search from the first-stage L1 times the second-stage SDP. In particular, the major computational complexity for the second-stage SDP is summarized in Table II . Remark 4: It is easy to extend the proposed schemes to the scenario where the legitimate users in the femtocell are supported by the FBS as well as the MBS, which demonstrates that the MBS is more capable than the FBS [40]. The only difference is that heterogeneous cell association is considered. For this scenario, the process of solving secrecy rate maximization is similar to the proposed algorithms.

9

TABLE II COMPUTATIONAL COMPLEXITY ANALYSIS FOR THE PROPOSED ALGORITHM 2 Variables design variables (size, number) (N M × N M , M )

PSD constraints

slack variables (size, number) (1 × 1, 6 + 4K + 2M )

(N F × N F , 2)

Slack constraints

(size, number) ((N M + N F + 1) × (N M + N F + 1), 2M + 2K M ) ((N F + 1) × (N F + 1), 1) (N M × N M , M ) (N F × N F , 2)

M

V. NUMERICAL RESULTS In this section, we present simulation results to show the performance of the proposed secure beamforming design in a two-tier SWIPT-enabled HCN for both perfect and imperfect CSI cases. Without loss of generality, we assume that the number of antennas equipped at the MBS and the FBS are NM = NF = 4; the number of MUs and ERs are M = 2 and K = 2, respectively, unless otherwise specified. For the sake of simplicity, we assume that the noise powers are identical as 2 2 = σI2 = σE,k = σ 2 = 1 dBm, the EH threshold is set to be σm Qk = Q = 20 dBm, the target SINR of each MU is set to be Γm = Γ = 5 dBm, and the energy transfer efficiency is set to be ξ = 1. As in [21] and [28], we assume the channel models including the large-scale fading and the small-scale channel fading. Especially, the simplified large-scale fading model can be expressed as  −α d (45) D = A0 d0 where A0 is a constant set to be 1, d denotes the propagation distance from the transmitter to receiver, d0 is a reference distance set to be 100, and α is the path loss exponent set to be 3. We assume that the propagation distances in intertier and intratier are set as 500 m and 200 m, respectively. On the other hand, the small-scale fading channel coefficients are assumed to be i.i.d. obeying CN (0, 1). All simulation results are averaged over 1000 randomly generated channel realizations. A. Perfect CSI Case In this section, we evaluate the performance of our proposed secure beamforming in the case of perfect CSI. For comparison, three benchmark schemes are considered, i.e., orthogonal spectrum allocation scheme [8] (denoted as “OSA scheme”), without AN scheme (denoted as “w/o AN scheme”), and nonsecrecy-oriented beamforming scheme (denoted as “Nonsecrecy scheme”), respectively. When the “OSA scheme” is considered, different spectrum resources are allocated to the MBS and the FBS; thus, no cross-tier interference exists in this scheme. The “Non-secrecy scheme” has been considered in the literature [8], [41]. In Fig. 2, we show the convergent behavior of our proposed Algorithm 1 over a few random channel realizations under

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 10

Fig. 2.

IEEE SYSTEMS JOURNAL

Convergence of the proposed Algorithm 1 with P th = 40 dBm.

Fig. 4. Secrecy rate versus the number of FBS transmit antennas N F with P th = 40 dBm.

between the secrecy rate achieved by different schemes and the number of FBS transmit antennas NF when fixing transmit power threshold Pth = 40 dBm. As can be seen from Fig. 4, a higher secrecy rate can be obtained with more transmit antennas NF , with the increased spatial degrees of freedom. Furthermore, it can be found that the proposed Algorithm 1 scheme significantly outperforms the counterparts in terms of the achieved secrecy rate, especially when the number of transmit antennas NF is set relatively large. B. Imperfect CSI Case

Fig. 3. Secrecy rate performance comparison of various schemes for the transmit power threshold P th .

Pth = 40 dBm. It can be observed that the proposed Algorithm 1 can efficiently converge to a stable point after only four steps, which illustrates that the proposed Algorithm 1 has a fast convergence behavior and hence has a low computational complexity. Fig. 3 compares the achieved secrecy rate performance of our proposed Algorithm 1 scheme, “OSA scheme,” “w/o AN scheme,” and “Non-secrecy scheme.” As expected, the proposed Algorithm 1 always outperforms the three benchmark schemes under perfect CSI. This is because the introduced interference is capable of improving the secrecy rate performance of IR. At the same time, this demonstrated that AN-aided is an effective approach in enhancing security for wiretap channels. From Fig. 3, we can also observe that the achieved secrecy rate increases as the transmit power threshold Pth increases. To further observe the superior performance of the proposed scheme in the case of perfect CSI, we examine the relationship

In this section, we evaluate the performance of our proposed robust secure beamforming design and the nonrobust design under the imperfect CSI case. The nonrobust design scheme is obtained for solving Problem (22), where channel-error vectors Δhm = 0, ΔhI = 0, ΔhI,0 = 0, Δgk = 0, Δgk ,0 = 0, and Δlm = 0. Fig. 5 compares the achieved secrecy rate versus transmit power threshold Pth for different channel error . As shown in Fig. 5, the proposed robust algorithm 2 scheme performs better than the nonrobust scheme in the whole transmit power threshold Pth region. Therefore, the proposed robust design scheme has a good anti-Eve ability than the nonrobust design scheme. In addition, we can observe that the performance loss becomes larger as the channel error  increases, even with a slight channel error. This implies that the robust design scheme is very sensitive to the CSI accuracy. Fig. 6 illustrates the secure performance of the proposed robust design scheme in comparison with the nonrobust design scheme for different number of Eves K by fixing Pth = 40 dBm. Intuitively, the secrecy rate of the robust design scheme decreases with the increase of the channel error , which validates the motivation of the worst-case robust optimization. Furthermore, it is clearly seen that the proposed robust design scheme performs considerably better than the nonrobust design scheme in the whole channel-error region. In addition, it can be observed

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. LI et al.: SECURE TRANSMISSION FOR HETEROGENEOUS CELLULAR NETWORKS WITH WIRELESS INFORMATION AND POWER TRANSFER

11

Then, an SCA-based iterative algorithm was proposed to obtain the optimal beamforming solution. For the imperfect CSI case, we investigated the robust beamforming design relying on the worst-case design philosophy. To facilitate the solution, we converted the infinitely many robust constraints into LMIs by using the S-Procedure and the Schur complement, respectively. Numerical results have showed that the proposed beamforming schemes can achieve good system performance in improving the secrecy rate. REFERENCES

Fig. 5. Secrecy rate versus transmit power threshold P th with different channel error .

Fig. 6. Secrecy rate versus channel error  for different number of Eves K under P th = 40 dBm.

from Fig. 6 that the proposed robust design scheme suffers from a serious secrecy rate degradation as the number of Eves K increases. This is because there may have a stronger intercept ability when the number of Eves K becomes large. The curves reveal that the advantage of the proposed robust design scheme holds and shows the superiority in resisting more Eves than the “Non-robust” scheme. VI. CONCLUSION In this paper, we have studied the secure beamforming design in a two-tier HCN supporting SWIPT, where the ERs were powered by RF signals. Both the scenarios of perfect and imperfect CSI were, respectively, considered. We aimed at maximizing the secrecy rate at IR while satisfying the required constraints. For the perfect CSI case, the formulated nonconvex secrecy rate maximization problem was relaxed and reformulated into a series of convex forms by using both SDR and SCA techniques.

[1] A. Ghosh et al., “Heterogeneous cellular networks: From theory to practice,” IEEE Commun. Mag., vol. 50, no. 6, pp. 54–64, Jun. 2012. [2] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and analysis of K -tier downlink heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550–560, Apr. 2012. [3] E. Hossain, M. Rasti, H. Tabassum, and A. Abdelnasser, “Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective,” IEEE Wireless Commun., vol. 21, no. 3, pp. 118–127, Jun. 2014. [4] Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347–376, First Quarter 2017. [5] Z. Chu, H. Xing, M. Johnston, and S. L. Goff, “Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 283–297, Jan. 2016. [6] K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, “Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper,” IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678–1690, May 2014. [7] L. Zhang, L. Wei, D. Huang, K. Zhang, M. Dong, and K. Ota, “MEDAPs: Secure multi-entities delegated authentication protocols for mobile cloud computing,” Security Commun. Netw., vol. 9, no. 16, pp. 3777–3789, May 2016. [8] T. Lv, H. Gao, and S. Yang, “Secrecy transmit beamforming for heterogeneous networks,” IEEE J. Sel. Areas Commun., vol. 33, no. 6, pp. 1154– 1170, Jun. 2015. [9] H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, “Physical layer security in heterogeneous cellular networks,” IEEE Trans. Commun., vol. 64, no. 3, pp. 5804–5818, Mar. 2016. [10] H. Wu, X. Tao, N. Li, and J. Xu, “Secrecy outage probability in multi-RAT heterogeneous networks,” IEEE Commun. Lett., vol. 20, no. 1, pp. 53–56, Jan. 2016. [11] M. Xu, X. Tao, F. Yang, and H. Wu, “Enhancing secured coverage with CoMP transmission in heterogeneous cellular networks,” IEEE Commun. Lett., vol. 20, no. 11, pp. 2272–2275, Nov. 2016. [12] L. Wang, K.-K. Wong, M. Elkashlan, A. Nallanathan, and S. Lambotharan, “Secrecy and energy efficiency in massive MIMO aided heterogeneous CRAN: A new look at interference,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1375–1389, Dec. 2016. [13] S. Bi, C. K. Ho, and R. Zhang, “Wireless powered communication: Opportunities and challenges,” IEEE Commun. Mag., vol. 53, no. 4, pp. 117–125, Apr. 2015. [14] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with RF energy harvesting: A contemporary survey,” IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 757–789, Second Quarter 2015. [15] Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure and trustable routing in wireless sensor networks,” IEEE Trans. Inf. Forens. Security, vol. 11, no. 9, pp. 2013–2027, Sep. 2016. [16] M. Sheng, L. Wang, X. Wang, Y. Zhang, C. Xu, and J. Li, “Energy efficient beamforming in MISO heterogeneous cellular networks with wireless information and power transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 954–968, Apr. 2016. [17] Y. Deng, L. Wang, M. Elkashlan, M. Direnzo, and J. Yuan, “Modeling and analysis of wireless power transfer in heterogeneous cellular networks,” IEEE Trans. Commun., vol. 64, no. 12, pp. 5290–5303, Dec. 2016. [18] S. Akbar, Y. Deng, A. Nallanathan, M. Elkashlan, and A.-H. Aghvami, “Simultaneous wireless information and power transfer in K -tier heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 15, no. 8, pp. 5804–5818, Aug. 2016.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. 12

[19] H. H. Yang, J. Lee, and T. Q. S. Quek, “Heterogeneous cellular network with energy harvesting-based D2D communication,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1406–1419, Feb. 2016. [20] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless information and power transfer,” IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 1989–2001, May 2013. [21] Z. Chu, Z. Zhu, M. Johnston, and S. Y. L. Goff, “Simultaneous wireless information power transfer for MISO secrecy channel,” IEEE Trans. Veh. Technol., vol. 65, no. 9, pp. 6913–6925, Sep. 2016. [22] Z. Zhu, Z. Chu, Z. Wang, and I. Lee, “Outage constrained robust beamforming for secure broadcasting systems with energy harvesting,” IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7610–7620, Nov. 2016. [23] M. R. A. Khandaker and K.-K. Wong, “Masked beamforming in the presence of energy-harvesting eavesdroppers,” IEEE Trans. Inf. Forens. Security, vol. 10, no. 1, pp. 40–54, Jan. 2015. [24] D. W. K. Ng and R. Schober, “Secure and green SWIPT in distributed antenna networks with limited backhaul capacity,” IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5082–5097, Sep. 2015. [25] S. S. Kalamkar and A. Banerjee, “Secure communication via a wireless energy harvesting untrusted relay,” IEEE Trans. Veh. Technol., vol. 66, no. 3, pp. 2199–2213, Mar. 2017. [26] A. A. Nasir, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Secrecy rate beamforming for multicell networks with information and energy harvesting,” IEEE Trans. Signal Process., vol. 65, no. 3, pp. 677–689, Feb. 2017. [27] B. Li, Z. Fei, and H. Chen, “Robust artificial noise-aided secure beamforming in wireless-powered non-regenerative relay,” IEEE Access, vol. 4, pp. 7921–7929, Nov. 2016. [28] H. Xing, K. K. Wong, Z. Chu, and A. Nallanathan, “To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying,” IEEE Trans. Signal Process., vol. 63, no. 24, pp. 6616–6631, Dec. 2015. [29] Q. Zhang, X. Huang, Q. Li, and J. Qin, “Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels,” IEEE Trans. Commun., vol. 63, no. 3, pp. 906–915, Mar. 2015. [30] M. R. A. Khandaker, K.-K. Wong, Y. Zhang, and Z. Zheng, “Probabilistically robust SWIPT for secrecy MISOME systems,” IEEE Trans. Inf. Forens. Security, vol. 12, no. 1, pp. 211–226, Jan. 2017. [31] H. Zhang, Y. Huang, C. Li, and L. Yang, “Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers,” IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7807–7819, Nov. 2016. [32] W. Xu, S. Li, C.-H. Lee, Z. Feng, and J. Lin, “Optimal secure multicast with simultaneous wireless information and power transfer in presence of multiparty eavesdropper collusion,” IEEE Trans. Veh. Technol., vol. 65, no. 11, pp. 9123–9137, Nov. 2016. [33] Q. Li, Y. Yang, W.-K. Ma, M. Lin, J. Ge, and J. Lin, “Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks,” IEEE Trans. Signal Process., vol. 63, no. 1, pp. 206–220, Jan. 2015. [34] B. Li and Z. Fei, “Robust beamforming and cooperative jamming for secure transmission in DF relay systems,” EURASIP J. Wireless Commun., vol. 68, pp. 1–11, Dec. 2016. [35] L. Zhang, L. Jin, W. Luo, Y. Tang, and D. Yu, “Robust joint beamforming and artificial noise design for amplify-and-forward multi-antenna relay systems,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Brisbane, Australia, Apr. 2015, pp. 1732–1736. [36] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004. [37] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20–34, May 2010. [38] Q. Li, M. Hong, H.-T. Wai, Y. F. Liu, W.-K. Ma, and Z.-Q. Luo, “Transmit solutions for MIMO wiretap channels using alternating optimization,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714–1727, Sep. 2013. [39] Y. Huang, D. P. Palomar, and S. Zhang, “Lorentz-positive maps and quadratic matrix inequalities with applications to robust MISO transmit beamforming,” IEEE Trans. Signal Process., vol. 61, no. 5, pp. 1121–1130, Mar. 2013. [40] J. Choi, “On downlink beamforming with small cells in wireless heterogeneous systems,” IEEE Wireless Commun. Lett., vol. 4, no. 4, pp. 425–428, Aug. 2015. [41] S. A. A. Fakoorian and A. L. Swindlehurst, “MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design,” IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 640–649, Sep. 2011.

IEEE SYSTEMS JOURNAL

Bin Li received the M.S. degree in communication and information systems from the Guilin University of Electronic Technology, Guilin, China, in 2013. He is currently working toward the Ph.D. degree at the School of Information and Electronics, Beijing Institute of Technology, Beijing, China. From 2013 to 2014, he was a Research Assistant with the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong. His research interests include wireless cooperative networks, physical layer security, energy harvesting, and multiple-input multiple-output techniques.

Zesong Fei (M’07–SM’16) received the Ph.D. degree in electronic engineering from the Beijing Institute of Technology (BIT), Beijing, China, in 2004. He is currently a Professor with the Research Institute of Communication Technology, BIT, where he is involved in the design of next-generation high-speed wireless communication. His research interests include wireless communications and multimedia signal processing. He is the Chief Investigator of the National Natural Science Foundation of China. Dr. Fei is the Senior Member of the Chinese Institute of Electronics and the China Institute of Communications.

Zheng Chu received the Ph.D. degree in electrical and electronic engineering from Newcastle University, Newcastle upon Tyne, U.K., in 2016. He is currently with the Faculty of Science and Technology, Middlesex University, London, U.K. His research interests include physical layer security, wireless cooperative networks, wireless power transfer, convex optimization techniques, and game theory.

Yan Zhang (M’05–SM’10) received the Ph.D. degree in electrical and electronics engineering from Nanyang Technological University, Singapore. He is a Full Professor with the Department of Informatics, University of Oslo, Oslo, Norway. His current research interests include next-generation wireless networks leading to 5G and green and secure cyber-physical systems (e.g., smart grid, healthcare, and transport). Dr. Zhang is an Associate Technical Editor of IEEE Communications Magazine, an Editor of the IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, an Editor of IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, an Editor of the IEEE INTERNET OF THINGS JOURNAL, and an Associate Editor of IEEE ACCESS. He serves as the Chair in a number of conferences, including the 2017 IEEE Global Communications Conference, IEEE Vehicular Technology Conference-Spring 2017, the 2016 IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, the 2016 IEEE International Conference on Cloud Computing Technology and Science, the 2016 IEEE International Conference on Computer and Communications, the 2016 IEEE Annual Consumer Communications and Networking Conference, the 2015 IEEE International Conference on Smart Grid Communications, and the 2015 IEEE International Conference on Cloud Computing Technology and Science. He serves as a TPC member for numerous international conference including the IEEE Conference on Computer Communications, the IEEE International Conference on Communications, the IEEE Global Communications Conference, and the IEEE Wireless Communications and Networking Conference. He is an IEEE Vehicular Technology Society Distinguished Lecturer. He is also a Senior Member of the IEEE Communications Society, the IEEE Computer Society, the IEEE Power and Energy Society, and the IEEE Vehicular Technology Society. He is a Fellow of the Institution of Engineering and Technology.