跳到主要导航 跳到搜索 跳到主要内容

Secrecy energy efficiency in wireless powered heterogeneous networks: A distributed ADMM approach

  • Xin Hu
  • , Bin Li
  • , Kaizhi Huang*
  • , Zesong Fei
  • , Kai Kit Wong
  • *此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

This paper investigates the physical layer security in heterogeneous networks (HetNets) supported by simultaneous wireless information and power transfer (SWIPT). We first consider a two-tier HetNet composed of a macrocell and several femtocells, where the macrocell base station (BS) serves multiple users in the presence of a malicious eavesdropper, while each femtocell BS serves a couple of Internet-of-Things (IoT) users. With regard to the energy constraint of IoT users, SWIPT is performed at the femtocell BSs, and IoT users accomplish the reception of information and energy in a time-switching manner, where information secrecy is to be protected. To enhance the secrecy performance, we inject artificial noise (AN) into the transmit beam at both macrocell and femtocell BSs, and for the sake of achieving green communications, we formulate the problem of maximizing secrecy energy efficiency while considering the fairness in a cross-tier multi-cell coordinated beamforming (MCBF) design. To handle this resulting nonconvex max-min fractional program problem, we propose an iterative algorithm by applying successive convex approximation method. Then, we further develop a decentralized solution based on alternative direction multiplier method (ADMM), which reduces the overhead of information exchange among coordinated BSs and achieves good approximation performance. Finally, simulation results demonstrate the performance of the proposed AN-aided cross-tier MCBF design and verify the validity of distributed ADMM-based approach.

源语言英语
页(从-至)20609-20624
页数16
期刊IEEE Access
6
DOI
出版状态已出版 - 9 4月 2018

联合国可持续发展目标

此成果有助于实现下列可持续发展目标:

  1. 可持续发展目标 7 - 经济适用的清洁能源
    可持续发展目标 7 经济适用的清洁能源

指纹

探究 'Secrecy energy efficiency in wireless powered heterogeneous networks: A distributed ADMM approach' 的科研主题。它们共同构成独一无二的指纹。

引用此