Abstract
This work considers a secure multiple-input multiple-output (MIMO) channel where the energy receiver (ER) is a potential eavesdropper (Eve). Specifically, we aim to maximize the secrecy energy efficiency (SEE) via jointly designing the transmit precoding matrix and the artificial noise (AN) covariance at the base station (BS), as well as the power splitting (PS) ratio at the desired receiver (DR), subject to the constraints of the transmit power budget and harvested energy threshold. To handle the formulated highly nonconvex fractional problem, we apply the successive convex approximation (SCA) method to transform the objective and constraint into a tractable form. Then, a penalty-based iterative algorithm is proposed. Finally, simulation results validate the performance of the proposed design.
1. Introduction
Simultaneous wireless information and power transfer (SWIPT) and energy efficiency (EE) transmission are considered two prominent approaches to the ever increasing demand for energy in the context of next-generation communication [1]. More specifically, in SWIPT-based communications, the receivers are able to salvage electromagnetic energy from radiofrequency (RF) signals. On the other hand, energy-efficient communication is aimed at achieving a certain rate-energy balance by maximizing the EE, defined as the number of delivered bits per unit energy [2].
Traditionally, SWIPT and EE are often independently investigated. Recently, there is growing interest in combining these two concepts together to maximize the EE in the SWIPT system in [3]. Several authors characterized the capacity and energy tradeoffs for SWIPT under different system setups, such as the multiple-input multiple-output (MIMO) channel in [4] and the amplify-and-forward (AF) relay networks [5].
It is a fundamental requirement for the next-generation wireless communication systems to provide secure communication. As a complement to traditional cryptographic encryption, a large amount of literature has been devoted to the physical-layer security (PLS), especially in multiantenna systems [6]. Taking full advantage of the spatial degrees of freedom (DoF) offered by multiple transmit antennas, the transmitter could enhance the overall security by the means of transmit beamforming (BF) and artificial noise (AN) [7]. The effectiveness of transmit BF and AN has also been verified in the secure SWIPT system [8].
Since the goal of secrecy throughput maximization may conflict with the aim of harvested energy maximization, secure EE (SEE) can be considered a performance metric for studying the tradeoff between these two goals. Specifically, for the SEE design, in [9], the authors investigated an artificial noise-aided energy efficiency optimization in the MIMO channel with SWIPT, while in [10], the authors investigated the secure and energy-efficient BF design for multiuser downlink multiple-input single-output (MISO) channel with SWIPT.
From a more practical view, the channel state information (CSI) of the eavesdropper (Eve) may not be perfect obtained by the transmitter due to the existence of channel estimation, quantization, or feedback errors; thus, robust secrecy design has been widely investigated. Specifically, in [11, 12], the authors studied the robust secrecy design in the MISO channel, based on the probabilistic constrained robust model and the worst case robust model, respectively, while in [13], the authors investigated the robust harvested energy efficiency optimization for secure MIMO SWIPT systems. In [14], the authors investigated the robust BF designs for secrecy MIMO SWIPT systems, while in [15, 16], the authors investigated the outage constrained robust secrecy rate maximization and secrecy energy efficiency maximization design with SWIPT, respectively. The above works were focused on the linear RF energy harvesting (EH) model. Furthermore, by considering a practical nonlinear EH model, in [17], the authors studied the robust BF design in a nonorthogonal multiple access (NOMA) network relying on SWIPT. In [18], the authors studied the computation efficiency maximization in wireless-powered mobile edge computing networks. Moreover, in [19], the authors investigated the AN-aided secure cognitive BF for cooperative MISO-NOMA using SWIPT, while in [20], the authors studied the EE optimization in secure MISO SWIPT systems with a nonlinear EH model. However, these works mainly focus on the MISO channel, and the SEE in the MIMO SWIPT channel has not been investigated yet.
Motivated by these observations, in this work, we focus on the robust SEE design for a SWIPT-based MIMO wiretap channel, where the desired receiver (DR) employs the power splitting (PS) scheme to facilitate the SWIPT and AN is emitted by the transmitter to improve the security. Specifically, we aim to maximize the ratio of the secrecy rate with the total power consumption, by jointly designing the precoding matrix, AN covariance, and the PS ratios. Different from the commonly used Dinkelbach method, we apply the successive convex approximation (SCA) method to transform the constraints into tractable forms, where the fractional objective is turned into exponential functions. Then, to reduce the performance loss introduced by the rank relaxation, a penalty-based iterative algorithm is proposed. Finally, numerical results indicate the performance of the proposed design and provide some meaningful insights.
Our contributions are summarized as follows: (1)To the best of our knowledge, this is the first work to study the SEE optimization in a MIMO SWIPT network. The formulated problem is nonconvex due to the nonconvex objective, the nonconvex constraints, the coupled variables, and the infinite constraints arising from the CSI uncertainty(2)Different from the Dinkelbach algorithm, we do not transform the fractional programming into a subtractive form. However, we directly handle the fractional objective, which is no need of the one-dimensional search procedure, thus reducing the computational complexity. Specifically, a SCA method is utilized to decompose and reformulate the original nonconvex problem, while the CSI error is tackled by the S-procedure. Then, a penalty-based iterative algorithm is proposed to optimize the BF, the AN covariance, and the PS ratio(3)The computational complexity of the proposed algorithm is analyzed, which suggests that the proposed algorithm has lower complexity. Simulation results show that the proposed design achieves better SEE than other benchmarks. Besides, some meaningful insights are given by the results: (1) AN can improve the SEE in the wiretap channel evidently, (2) the dynamic PS scheme can attain higher SEE than the fixed PS scheme, and (3) the linear EH model is more beneficial to improve the SEE than the nonlinear EH model
The rest of this work is organized as follows. The system model and problem statement are given in Section 2. Section 3 investigates the joint precoding, AN, and PS design, where a SCA-based algorithm is proposed. Simulation results are provided in Section 4. Section 5 concludes this work.
1.1. Notations
Throughout this work, boldface lowercase and uppercase letters denote vectors and matrices, respectively. The conjugate, transpose, conjugate transpose, and trace of matrix are denoted as , , , and , respectively. denotes stacking the columns of matrix into a vector . indicates that is a positive semidefinite matrix. denotes the Euclidean norm of vector . denotes the element-wise product. is an identity matrix with proper dimension. denotes a circularly symmetric complex Gaussian random vector with mean and covariance . indicates .
2. System Model and Problem Statement
2.1. System Model
Let us consider a MIMO downlink system as shown in Figure 1, which consists of one transmitter, one DR, and energy receivers (ERs). In the network, the DR employs a PS scheme to extract information and power simultaneously while the ER is potential Eve. It is assumed that the transmitter, the DR, and each ER are equipped with , , and antennas, respectively. The channel coefficients between the transmitter and the DR, as well as the -th ER, , are denoted as and , respectively.

In this work, we assume that only imperfect ERs’ CSI can be attained. Similar to [13], the imperfect CSI can be modeled as
where denotes the estimate of the true , denotes their respective error, and represents the respective size of the bounded error region.
The information bearing the signal vector () is precoded by the precoding matrix , and AN is used to help energy transfer and improve security. Thus, the transmit signal vector can be expressed as where is the AN vector with . Without loss of generality (W.l.o.g.), we assume that .
The total transmit power is where is the transmitter power amplifier efficiencies, respectively. In addition, is the total circuit power consumption for the network.
Then, the received signals at the DR and the -th ER can be expressed as
where and are the noise vectors at the DR and the -th ER with and , respectively.
The received signals at the DR are divided into two streams. One is used to information decoding (ID), and the other is for EH. Specifically, by denoting as the PS ratio at the DR, the signal received for ID and EH at the DR can be expressed as
where is the additional processing noise at the DR with . It should be noted that, when the harvested power is relatively small, the nonlinear EH model can be approximated as a linear EH model [20]. Thus, in this work, we adapt the linear EH model due to the simplicity. Furthermore, in the simulation part, we will compare the SEE performance in linear and nonlinear EH models, respectively.
Accordingly, the achievable secrecy rate can be expressed as
where and denote the mutual information at the DR and the -th ER, respectively, and are given by
On the other hand, the received RF power at the DR and the -th ER can be expressed as
where and denote the energy transform efficiency at the DR and the -th ER, respectively.
Therefore, the SEE for the MIMO network is defined as
2.2. Problem Statement
In this work, we aim to maximize the SEE via jointly designing the transmit precoding matrix and the AN covariance at the transmitter, as well as the PS ratio at the DR, subject to the constraints of the transmit power budget and harvested energy threshold. Specifically, the SEE maximization problem subject to the worst case secrecy rate and minimum EH threshold constraint can be formulated as
where and are the minimum harvested energy threshold at the DR and the -th ER, respectively. In addition, is the minimum secrecy rate and is the maximum transmit power.
In fact, there exists another commonly used robust design, e.g., the probabilistic constrained robust design [21], where the authors studied the robust trajectory and transmit power optimization for secure unmanned aerial vehicle- (UAV-) enabled networks and proposed a fair comparison between the performance of the worst case design and the outage case design by setting the radii of the bounded uncertainty regions to a certain value, which is given by , where denotes the inverse cumulative distribution function of a chi-square random variable with degrees of freedom, denotes the outage probability, and is the region for the probabilistic CSI uncertainty; e.g., we assume that .
Thus, in this work, we mainly focus on the bounded CSI uncertainty, since the proposed method can be extended to the probabilistic constrained case.
3. A SCA-Based Method for the SEE Design
P1 is a typical fractional programming, different from the commonly used Dinkelbach algorithm in [22]; we will propose an effective method to handle this obstacle.
Firstly, we need to turn into a solvable reformation. Via denoting and , we obtain the following problem:
where and are given as
and and are the auxiliary variables.
The main difficulty of (11) is that (11b) and (11c) are the difference of convex functions; thus, P2 is still nonconvex. To overcome this difficulty, we will approximate these terms via the first-order Taylor expansion at a fixed point.
Specifically, around given point , we have
where and , respectively.
Thus, we have the following approximated problem:
Nextly, we will focus on the CSI uncertainties in . By introducing slack variables , the constraint can be rewritten as
To transform (15a) and (15b) into deterministic reformations, we introduce the following lemma.
Lemma 1 [13]. For any positive semidefinite matrix , the inequality holds and the equality holds if and only if .
According to Lemma 1, we obtain the following relationship:
Then, we vectorized the equation ; e.g., we denote , , ; it is easy to know that .
By using the identity , we transform (16) to
Nextly, we introduce the following lemma to handle the channel uncertainty.
Lemma 2 [23]. Define the function where , , and . The implication holds if and only if there exists such that provided that there exists a point such that .
By using Lemma 2 with respect to , (17) can be transformed to the following linear matrix inequality (LMI):
where is the auxiliary variable.
Following a similar way, (15b) can be transformed as where and is the auxiliary variable.
Besides, the ER’s harvested energy constraint (11e) can be turned into where is the auxiliary variable.
By combining these steps, we obtain the following problem:
The remaining task is to handle the fractional objective (23a). Different from the commonly used Dinkelbach method, which turns the fractional objective into a subtractive form, we will change (23a) into exponential functions. Then, the monotonicity of exponential functions will be utilized to simplify the objective [24]. Specifically, via introducing slack variables and , (23) can be turned into where denotes the set of all optimization variables.
The only nonconvex part in (24) is (24d). Via the first-order Taylor expansion, around given point , (24d) can be approximated as
To this end, we turn (10) into the following problem:
Then, the remaining task is to handle the rank relaxation introduced by Lemma 1. In the following, we will propose a penalty-based method. Firstly, by invoking Lemma 1, we have
is a concave function w.r.t . To handle the concavity, the penalty-based method is utilized by putting the constraint into the objective function. Then, (26) can be recast as where is a penalty factor penalizing the violation of constraint . In addition, the upper bound of can be obtained by using the first-order Taylor approximation as
Based on (29), (28) can be approximated as
(30) is convex w.r.t , which can be efficiently solved by the convex programming toolbox CVX [25]. The entail iterative algorithm for (30) is summarized in Algorithm 1, in which is the obtained optimal solution in the -th iteration, respectively. In addition, is the optimal value of (30) in the -th iteration; denotes the stopping criterion, namely, the tolerance .
|
Here, we analyze the computational complexity of the proposed method. Since (26) involves the LMI constraints and the second-order cone (SOC) constraints, we can estimate the complexity based on the framework in [26]. Specifically, the complexity for a -optimal solution to (26) is on the order of , where , , and , respectively. On the other hand, when the Dinkelbach algorithm is used, the computational complexity is , where denoted the numbers of one-dimensional search, , , and , respectively. From this comparison, we can conclude that the proposed method can achieve lower complexity than the Dinkelbach algorithm, mainly due to the fact that the proposed method does not conduct the one-dimensional search procedure.
4. Simulation Results
In this section, we provide some numerical results to testify the availability of our proposed scheme. Unless specified, the simulation setting is assumed as follows: , , , , , , , , , , and . In addition, each entry of and is randomly generated by , and the channel uncertainties are . In addition, we also compare our design with several other methods: (1) the proposed method in the case of perfect CSI, which can be seen as the benchmark of the robust design; (2) the no AN design, e.g., setting while only optimizing and ; (3) the fixed PS ratio design, e.g., setting PS ratio while only optimizing and ; (4) the nonlinear EH model, e.g., the relationship between the input power and output power of the EH circuit is modeled as , where is a constant denoting the maximum harvested power at the receiver when the EH circuit is saturated, reflects the nonlinear charging rate with respect to the input power, is related to the minimum turn-on voltage of an EH circuit, and , where we set , , and [13]; and (5) the Dinkelbach method. These methods are labeled as “proposed design,” “perfect CSI,” “no AN,” “fixed PS,” “nonlinear EH,” and “Dinkelbach,” respectively.
Firstly, we investigate the convergency of the proposed design. Figure 2 shows several examples of the convergence behavior with random channel realizations. From this figure, we can see that the proposed method can always converge to the optimal solution within limited iterative numbers.

Nextly, Figure 3 plots the SEE versus the transmit power . From Figure 3, we can see that the efficiency firstly increases and then decreases with for all these methods while the proposed design outperforms the other designs; this is because when is relatively small compared to , the SEE metric is mainly determined by the information rate in the numerator. By contrast, when becomes large, the SEE metric is also determined by the transmit power in the denominator. As a result, the SEE reaches a saturated point. In addition, the proposed method can obtain better performance than several other benchmarks, and the performance gap between the proposed method and the Dinkelbach method is negligible. Besides, the linear EH model can achieve higher SEE than the nonlinear EH model, which is mainly due to that more output power can be obtained for the linear EH circuit when given the same input power.

Then, Figure 4 shows the SEE versus the harvested power threshold . From Figure 4, we find that with the increase in , the SEE decreases for all the methods. However, the proposed design always achieves a higher efficiency than the other designs. While the no AN method suffers obvious performance loss. This is mainly due to AN’s dual role: AN is able to degrade Eve’s reception and act as ER’s energy source at the same time, which compensates for the loss of secrecy incurred by the SWIPT scheme. Besides, dynamic PS is beneficial to coordinate ID and EH; thus, higher SEE can be obtained than the fixed PS scheme.

Lastly, Figure 5 shows the SEE versus the CSI uncertainty level . From Figure 5, we find that with the increase in , the SEE decreases for all the methods. Since with the increase in , the robust secrecy rate tends to decrease in the condition of the same transmit power, the SEE decreases. This result suggests that the CSI uncertainty level has a huge impact on the SEE performance.

5. Conclusion
In this work, we have investigated the secrecy design in the MIMO SWIPT channel. Specifically, we formulated the SEE problem by jointly optimizing the precoding matrix, the AN covariance, and the PS ratio with multiple constraints. We utilized the SCA and penalty method to solve the formulated highly nonconvex problem. Simulation results validated that significant SEE improvement can be obtained with the proposed method.
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Nos. 61771486 and 62001515) and Jiangsu Planned Projects for Postdoctoral Research Funds (No. 2019K090).