In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. Specifically, by considering the energy receiver which may act as potential eavesdropper and assuming that only imperfect channel state information can be attained, we propose a joint robust beamforming and artificial noise scheme. We formulate the relay power minimization problem under both the secrecy rate constraint and the energy harvesting constraints, which is non-convex and hard to tackle. By studying the hidden convexity of the problem, we propose an iterative algorithm combining semi-definite relaxation and a gradient-based method. In addition, a suboptimal rank-one reconstruction method is presented. Simulation results show that the proposed robust scheme achieves better performance than other schemes.
Wireless sensor network (WSN) is envisioned as one of the most important research areas with numerous applications such as vehicular tracking, environmental monitoring,1 and other fields.2 A WSN is typically composed of energy-constrained, cost-constrained, and lightweight computing sensor nodes, which can perform sensing, simple computations, and short-range wireless communications.3
Energy harvesting (EH) is considered as one of the effective approaches for improving the energy efficiency of WSN since in many WSN applications, the lifetime of network is limited due to the constraints in energy resources.4 EH-enabled sensors can harvest energy from either radio frequency (RF) signals or ambient energy sources which enable them to operate continuously.5 Simultaneous wireless information and power transfer (SWIPT) is a promising EH technique to solve the energy scarcity problem in energy-constrained wireless system such as WSN.6
However, the secure transmission has been recognized as an important issue for WSN due to the broadcast characteristics of wireless channel and the security requirement of the sensing information.7 To address the issue, the physical layer security (PLS) technique,8 which exploits the characteristics of wireless channels such as fading to fulfill secure communication, has been proved to be an effective way to improve security in WSN9 as well as SWIPT system.10–12 Specifically, Curiac9 investigated the utility of directional antennas to improve security in WSN, while Xing et al.,10 Liu et al.,11 and Shi et al.12 investigated the secrecy SWIPT scheme for single-input single-output (SISO) channel, multiple-input single-output (MISO) channel, and multiple-input multiple-output (MIMO) channel, respectively. Among these literatures, beamforming (BF) and artificial noise (AN) are two key techniques to improve security and enhance EH.13
One of the most important problems in PLS is the acquirement of the channel state information (CSI). The robust design has been widely applied to handle the CSI’s uncertainties.14–20 Specifically, Feng et al.,14 Chu et al.,15 and Zhang et al.16 investigated the robust secrecy rate maximization (SRM) problems for an MISO SWIPT system without AN, with AN, and with a friendly jammer, respectively. Khandaker and Wong17 investigated the robust power minimization and the robust SRM problem in MISO SWIPT by considering that the EH receiver may be potential eavesdropper (Eve), while Wang and Wang18 investigated the robust SRM problem in MIMO wiretap channels. Recently, Chu et al.19 and Zhang et al.20 investigated the robust secrecy design for MISO SWIPT system by considering that all receivers have EH constraints.
Relaying is considered as a popular approach to extend network coverage and provide spatial degrees of freedom (DoF), which is beneficial to PLS21 and SWIPT;22 thus, several literatures investigated the secure SWIPT in relay system.23–27 Specifically, Li et al.23 investigated the SRM problem in multi-antenna amplify-and-forward (AF) relay SWIPT system subject to the EH constraints, while Li et al.24 considered unavailable Eve’s CSI and proposed a suboptimal null space–based BF and AN scheme in two-way AF SWIPT relay networks. Zhang et al.25 proposed a joint design of the signal BF and AN at the source and the BF at the relay to maximize the secrecy rate, while Xing et al.26 proposed a novel harvest-and-jamming method, where the friendly jammer used the harvested energy to confuse the Eve. Recently, Feng et al.27 proposed a joint BF and energy signal scheme for providing both secure communication and energy transfer in AF relay networks.
Relay node can make the WSN transmission more reliable to satisfy the strict requirements in industrial applications.28 Recently, relay WSN has aroused great attentions.29–35 Specifically, Dong et al.29 investigated the diversity performance of high-altitude platform (HAP)-based relay WSN, while Dong et al.30 investigated the energy-efficient transmission for remote WSN, where an integrated architecture based on HAP was proposed. Djenouri and Bagaa31 investigated the relay node deployment for sustainable WSN with EH constraint. For the issue of PLS in relay WSN, Liau et al.32 proposed a two-path successive relaying scheme to improve the security, while Gong et al.33 utilized joint BF and AN to further improve the secrecy performance. For more complicated network structure, Zhang et al.34 investigated the PLS scheme for orthogonal frequency division multiple access (OFDMA)-based two-way relay WSN, while Deng et al.35 proposed a PLS scheme for three-tier WSN using decode-and-forward (DF) relay.
Motivated by these works, in this article, we investigate the PLS for SWIPT in relay WSN. Specifically, we investigate the BF and AN design to minimize the relay transmit power based on the following settings: (1) one multi-antenna relay forward the information from the source to the information sensor node, denoted as information receiver (IR), in the presence of multiple energy sensor nodes, denoted as energy receivers (ERs), which may be potential Eve; (2) relay employs BF and AN to improve security and enhance energy transfer simultaneously; (3) relay has perfect CSI of the IR, but imperfect CSI of the ERs and the ERs colluding to eavesdrop the confidential information.
Our main contributions can be summarized as follows: first, we propose a framework for secrecy SWIPT in AF relay WSN with different service requirements at different wireless sensor nodes which gives rise to new BF and AN task. Second, the power minimization problem subject to the non-convex secrecy rate constraint is hard to handle directly. Our gradient-based algorithm solves this problem efficiently and can be applied to similar scenarios. Third, by analyzing the Karush–Kuhn–Tucker (KKT) optimality conditions, we discuss the structure of the obtained BF matrix and propose a suboptimal rank-one reconstruction algorithm when the rank of the matrix is higher than one. To the best of our knowledge, such a joint robust design for secure SWIPT in AF relay WSN has not been investigated in related literatures.
One of the most relevant works is Li et al.’s study,21 in which the authors investigated the robust secrecy scheme in multi-antenna relay networks, but the main differences of our article are summarized as follows: first, Li et al.21 did not consider SWIPT, while our article considers the combination of PLS and SWIPT; thus, the BF and AN in our system have dual functions, for example, enhance the received signals at the IR and the ERs while degrade the received signals at the Eves simultaneously. Second, Li et al.21 considered the SRM problem, while our article investigates the power minimization problem; although the one-dimensional search method in the work by Li et al.21 can solve our problem with some necessary modifications, we propose a more efficient gradient-based algorithm by analyzing the hidden convexity of the power minimization problem. Third, the algorithm in the work by Li et al.21 can always obtain a rank-one optimal BF matrix, while in the case of SWIPT, the structure of the obtained matrix is more complicated and we cannot always attain a rank-one BF matrix, so we propose an effective way to obtain a suboptimal solution when we obtain a high-rank solution.
The rest of this article is organized as follows. A system model description and problem statement is given in section “System model and problem statement.” Section “Joint robust BF and AN design for equation (8)” considers the joint robust BF and AN design problem, wherein a gradient-based optimization approach is established. Simulation results are illustrated in section “Simulation result.” Section “Conclusion” concludes the article.
Notation
Throughout the article, we use the upper case boldface letters for matrices and lower case boldface letters for vectors. The superscripts , , and represent the transpose, conjugate, and conjugate transpose, respectively. The trace and rank of matrix are denoted as and , respectively. denotes to stack the columns of matrix into a vector . is the inverse operation of . indicates that is a positive semi-definite matrix. |·| and represent the absolute value and the Frobenius norm, respectively. denotes the null space of . ⊗ denotes Kronecker product. represents a diagonal matrix with on the main diagonal, while represents a block diagonal matrix with its main diagonal blocks being . denotes an identity matrix with appropriate size. denotes the real part of a complex variable . denotes a circularly symmetric complex Gaussian random vector with mean and covariance matrix . stands for the statistical expectation.
System model and problem statement
We consider a relay WSN system for SWIPT as shown in Figure 1, in which a transmitter transmits information and wireless energy to a cluster of sensor nodes simultaneously with the help of one multi-antenna AF relay. One of these sensor nodes is IR, while the other sensor nodes are ERs. The relay is equipped with antennas, while the other nodes are equipped with single antenna. Let , , and denote the channel responses from the transmitter to the relay, the relay to the IR, and the relay to the mth ER, respectively. We assume that the channels between the transmitter and the relay are perfectly known and there is no direct link between the transmitter to the IR or the ERs, which is a common assumption.23,25 Since the relay operates in a half-duplex mode, one transmission round is composed of two phases.
System model for secure AF relay WSN with SWIPT.
In the first phase, the transmitter broadcasts its information satisfying to the relay. The received signal at the relay is given by
where is the transmit power at the transmitter and is the additive noise at the relay with variance .
In the second phase, the relay employs the BF matrix to forward and emit AN vector which follows to help secure communication as well as energy transmission. Thus, the signal transmitted by the relay is given by
The received signals at the IR and the mth ER are given, respectively, by
where and are additive noises at IR and the mth ER, with variances and , respectively.
In this article, we consider the worst-case secrecy design. Specifically, we assume that all these single antenna ERs perform joint processing to eavesdrop the confidential information; thus, they can be seen as a virtual multi-antenna ER17,27 and the relay only has imperfect ER’s CSI. We use the deterministic spherical model26,27 to characterize the CSI uncertainties such that
where denotes the estimate of the colluding eavesdrop channel with , denotes the channel uncertainties, and determines the quality of the respective CSI and assumed to be known. In addition, we define , , and for the convenient of the following statement.
Thus, the information rates at the IR and the colluding ERs are given, respectively, by
where
and the scaling factor 1/2 is due to the half-duplex operation of relay (See Feng et al.27 for more details).
However, by neglecting the noise power, the harvest energy of the mth ER can be expressed as
where stands for the EH efficiency for the mth ER and is the unit vector with the mth entry being equal to one.
Our problem of interest is to design the BF matrix and AN covariance such that minimize the relay transmit power while meeting the secrecy rate at the IR and the EH constraint at the ERs. Mathematically, our problem can be expressed as
where denotes the relay amplify matrix, denotes the target secrecy rate, and denotes the EH threshold for the mth ER.
Joint robust BF and AN design for equation (8)
Equivalent reformulation of equation (8)
We start by reformulating equation (8) into
Then, by introducing an auxiliary variable , equation (9) can be further rewritten as
which can be re-organized as
The equivalence of equations (8) and (11) can be shortly demonstrated as follows. Let be a feasible solution to equation (8); if we set , then is a feasible solution to equation (11). However, let denote a feasible solution to equation (11); it is easy to see that is also a feasible for equation (8). Therefore, equations (8) and (11) are equivalent.
Notably, the objective and constraints in equation (11) are highly non-convex; thus, it is hard to obtain the solution directly. In the following, we first solve it for fixed and then optimize by studying its hidden convexity. Then, we propose an efficient iterative algorithm combining gradient-based method and semi-definite relaxation (SDR).
Optimization of the SDR of equation (11) for fixed
Let us denote and , which means that and . As a standard routine of SDR, we drop the non-convex constraint ; then, we have the following proposition.
Proposition 1
The SDR reformation of equation (11) can be defined as
where
and , denote the related auxiliary variables.
In addition, , , , , and are defined as follows
with and is a zero matrix, except for the columns ranging from to which form an identity matrix . The proof of proposition 1 is detailed in Appendix 1.
The main advantage of equation (12) is that for fixed , it is an SDR problem and can be efficiently solved by available convex programming toolbox CVX.36 It should be noted that the obtained matrix might not be rank one; therefore, equation (12) is a relaxation of equation (11) for fixed . For the rank of , we have the following proposition.
Proposition 2
The optimal solution to equation (12) can be expressed as
where , , , (c.f. equation (37)), and is a unit-norm vector orthogonal to , which consists of the orthonormal basis for . The proof of proposition 2 is detailed in Appendix 1.
According to equation (15), if , that is, there exists at least one , we reconstruct a solution to equation (12) using
while are obtained by solving the following feasible problem provided that is given by equation (16)
Optimization over
In the above subsection, we have converted equation (11) to the SDR (equation (12)) for fixed . Denote the objective value of equation (12) as a function of by . It can be seen that solving the original problem (equation (11)) is equivalent to minimizing with respect to where the optimization of has been embedded in evaluating .
Next, we focus on finding the optimal to minimize . We have the following proposition.
Proposition 3
is a convex function of .
Proof
The Lagrangian of equation (12) is
where denotes the collection of the primal and dual variables. Specifically, , , , , and are the Lagrangian multipliers associated with equation (12b)–(12d) and the primary variables , respectively.
The dual problem can be written as
Based on the operation of matrix differential37 and using the fact , we obtain
where .
Similarly, we attain the following relationships
where are the block submatrices of matrix , which can be expressed specifically as
Due to the strong duality between the primary problem (12) and the dual problem (19), the objective value of equation (19) is also . Observe that for given , the objective function of equation (19) is linear and convex about ; therefore, is convex about . This completes the proof. The proof is necessary since only when is convex about , the gradient-based algorithm can obtain the minimum value for the power minimization problem. Since it is hard to proove is convex about directly from equation (12), we resort to the dual problem (19) and from the convexity of equation (19), we obtain Proposition 3.
Proposition 3 shows that any local search algorithm can find the global optimal value of , therefore greatly reduces the complexity. We have the following derivative information to design a gradient-based algorithm. (Since are nonnegative variables with lower bound (due to (11c)) and is a convex function about , the optimal solution can be found by one-dimensional search; however, in practice, the one-dimensional search usually executes unidirectional search within the entire feasible domain, while the search direction of the gradient-based algorithm always points to the optimal point and the search area is usually near the optimal point. This makes the gradient-based algorithm more efficient, which will be further confirmed by the simulation result.)
The derivative of is given by
The overall iterative algorithm to solve equation (11) is given in Algorithm 1. (The initial value of can be set slightly larger than 1 to get the simulation result in relative less time since the optimal value is often obtained for relative small . In fact, we set in our simulations; for the convergence behavior of the iterative procedure, the convergence behavior can be confirmed since the proposed algorithm generated a decreasing objective at each iteration and it is lower bounded, for example, the optimal value is the lower bound, thus convergence is guaranteed; for the terminate criterion of Algorithm 1, we set a parameter k that denotes the gap of the objective (19) in successive iteration. When the gap is smaller than a given threshold , the algorithm will be terminated.)
Algorithm 1 Proposed algorithm to solve equation (11).
1: Initialization: set .2: begin 1. Solve the primary problem (12) and the dual problem (19) using the CVX solver to get , , , and . 2. Using the derivative information given in equation (23) to update . 3. Repeat Step 2.1 and Step 2.2 until the terminate criterion has been arrived and obtain . 4. If , the optimal can be obtained by , where is a rank-one decomposition of , otherwise goto Step 2.5. 5. Using equation (16), solve equation (17) to attain the suboptimal .3: End4: Output.
Simulation result
In this section, we evaluate the performance of our scheme through Monte Carlo simulations. The following parameters , , , , and are set for the simulation examples unless specified. In addition, we assume that all the entries of channel responses , , and are independent and identically distributed (i.i.d.) complex Gaussian random variables generated by . Regarding the CSI uncertainty model in equation (4), we use a similar way as Xing et al.,26 for example, we introduce the uncertainty ratio associated with which is defined as . In addition, the CSI uncertainty regions are assumed to be norm-bound, that is, , and we set .
To highlight the superiority of our proposed scheme, we compare our algorithm with several other methods: (1) robust BF and AN with one-dimensional search; (2) BF with null space AN, which is a modified version of the null space AN method in the work by Li et al.,24 for example, the AN is transmitted in the null space of the ; (3) null space BF with AN, which is a modified version of the null space BF method in the work by Liu et al.11 Specifically, we project the BF matrix into the null space of the Eve’s channel, for example, the BF matrix can be written as , where is the null space of the transmitter to the colluding Eve’s channel , for example, . Then, we substitute this into equations (12) and (19) to obtain the optimal and using the gradient-based algorithm. It should be noted that the null space BF scheme can only be valid when the number of relay antennas is not smaller than the number of ERs. Our design and the other designs are labeled as “gradient-based BFAN,”“null space AN,”24“null space BF,”11 and “one-dimensional search BFAN,” respectively.
The relay power versus the secrecy rate RS
Figure 2 illustrates the relay transmit power of these schemes versus the secrecy rate . It is observed from Figure 2 that the relay power increases with the growth of for all the schemes, while our gradient-based BFAN design outperforms the other schemes and the null space AN is the worst design. In addition, we can see from the figure that when is small, the relay power increases slowly, whereas when is large, the power relay increases faster.
The relay power versus the worst-case secrecy rate.
The relay power versus the ERs’ CSI uncertainty level
Figure 3 shows the relay transmit power of these schemes versus the ERs’ CSI uncertainty level . It is observed from the figure that the relay power increases with an increase in for all the schemes, while our gradient-based BFAN scheme achieves the best performance. In addition, the relay transmit power shows an approximately linear relationship with , which is different with the phenomenon in Figure 2.
The relay power versus the ERs’ CSI uncertainty level.
The relay power versus the EH threshold
Figure 4 investigates the relay transmit power of these schemes versus the EH threshold . It is seen that the relay power budget increases with an increase in for all the schemes, while our gradient-based BFAN scheme achieves better performance than the other schemes. In addition, the relay transmit power shows an approximately linear relationship with , which is different with the phenomenon in Figure 2 but similar with the result in Figure 3. The result suggests that when the secrecy rate is small, the ERs’ CSI uncertainty level and the EH threshold are more prominent to the relay power consumption. However, when the secrecy rate is high, the secrecy rate becomes the major factor for the relay power consumption.
The relay power versus the EH threshold.
The relay power versus the number of relay antennas Nr
Figure 5 plots the relay power consumption of these schemes versus the number of relay antennas . It is seen that the power budget decreases with an increase in for all the methods due to the increased spatial DoF, while our scheme outperforms other schemes. In addition, we can see that the relay power decreases very quickly when is small, whereas when is large, the relay power decreases slowly.
The relay power versus the number of relay antennas.
The relay power versus the number of ERs M
Figure 6 depicts the relay transmit power of these schemes versus the number of ERs . As expected, the relay power consumption increases with an increase in for all the methods due to the decreased spatial DoF and more EH constraints to be satisfied, while our scheme has a significant performance gain over the other schemes. It should be noted that the null space BF scheme is invalid when in this example since there is no enough DoF left for the IR after nulling the ER’s channel.
The relay power versus the number of ERs.
The secrecy rate and EH performance versus the relay power Pr
Finally, Figures 7 and 8 depict the secrecy rate performance and the EH performance with relay transmit power, respectively. In both of the examples, we use the one-dimensional search method in the works by Li et al.21 and Feng et al.27 with several necessary modifications, and the joint design is labeled as “robust BFAN.” From Figures 7 and 8, we can find the joint design achieves higher secrecy rate and EH performance than the null space BF and null space AN design, which further demonstrates the superiority of the joint robust BF and AN design.
The secrecy rate versus the relay power.
The total harvested energy versus the relay power.
Conclusion
In this article, we investigated a joint robust BF and AN scheme for secure SWIPT in AF relay WSN. Specifically, we formulated the robust relay power minimization problem subject to both secrecy rate and EH constraints. To obtain the optimal BF matrix and AN covariance, an iterative algorithm combining gradient-based method and SDR has been proposed to find the optimal solution by analyzing its convexity. In addition, a suboptimal rank-one reconstruction algorithm was presented. Simulation results demonstrated the effectiveness of the proposed design.
Footnotes
The authors thank the anonymous reviewers for their helpful comments and suggestions.
Academic Editor: Bo Liu
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research,authorship,and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research,authorship,and/or publication of this article: This work was supported by the Jiangsu Provincial Natural Science Foundation of China under grant no. BK20141069.
References
1.
BendaryNFouadMMMRamadanRA. Smart environmental monitoring using wireless sensor networks. In: El EmaryIMMRamakrishnanS (eds) Wireless sensor networks: from theory to applications. Boca Raton, FL: CRC Press, 2013, pp.731–755.
2.
GholamiMBrennanRW. A comparison of alternative distributed dynamic cluster formation techniques for industrial wireless sensor networks. Sensors2016; 16: 65.
3.
BorgesLVelezFLebresA. Survey on the characterization and classification of wireless sensor network applications. IEEE Commun Surv Tutor2014; 16(4): 1860–1890.
4.
ChoiKWGintingLRosyadyPA. Wireless-powered sensor networks: how to realize. IEEE T Wirel Commun2017; 16: 221–234.
5.
RuanTChewZZhuM. Energy-aware approaches for energy harvesting powered wireless sensor nodes. IEEE Sens J2017; 17: 2165–2173.
6.
KrikidisITimotheouSNikolaouS. Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun Mag2014; 52(11): 104–110.
7.
WuJOtaKDongM. A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access2016; 4: 416–424.
8.
LiuYChenHHWangL. Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutor2016; 19: 347–376.
9.
CuriacDI. Wireless sensor network security enhancement using directional antennas: state of the art and research challenges. Sensors2016; 16: 4.
10.
XingHLiuLZhangR. Secrecy wireless information and power transfer in fading wiretap channel. IEEE T Veh Technol2016; 65(1): 180–190.
11.
LiuLZhangRChuaK. Secrecy wireless information and power transfer with MISO beamforming. IEEE T Signal Proces2014; 62(7): 1850–1863.
12.
ShiQJXuWQWuJS. Secure beamforming for MIMO broadcasting with wireless information and power transfer. IEEE T Wirel Commun2015; 14(5): 2841–2853.
13.
ChenXMNgDWKChenHH. Secrecy wireless information and power transfer: challenges and opportunities. IEEE Commun Mag2016; 23(2): 51–61.
14.
FengRLiQZhangQ. Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE T Veh Technol2015; 64(1): 400–405.
15.
ChuZZhuZJohnstonM. Simultaneous wireless information power transfer for MISO secrecy channel. IEEE T Veh Technol2016; 65(9): 6913–6925.
16.
ZhangQHuangXLiQ. Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE T Commun2015; 63(3): 906–915.
17.
KhandakerMRAWongKK. Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE T Inf Foren Sec2015; 10(1): 40–54.
18.
WangSHWangBY. Robust secure transmit design in MIMO channels with simultaneous wireless and information power. IEEE Signal Proc Let2015; 22(11): 2147–2151.
19.
ChuZZhuZHusseinJ. Robust optimization for AN-Aided transmission and power splitting for secure MISO SWIPT system. IEEE Commun Lett2016; 20: 1571–1574.
20.
ZhangMCumananKBurrA. Secrecy rate maximization for MISO multicasting SWIPT system with power splitting scheme. In: Proceedings of IEEE signal processing advances wireless communications, Edinburgh, 3–6 July 2016, pp.1–5. New York: IEEE.
21.
LiQYangYMaWK. Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE T Signal Proces2015; 63(1): 206–220.
22.
ChenXMZhongCJYuenC. Enhancing wireless information and power transfer by exploiting multi-antenna techniques. IEEE Commun Mag2015; 53(4): 133–141.
23.
LiQZZhangQQinJY. Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE T Veh Technol2014; 63(5): 2462–2467.
24.
LiQZZhangQQinJY. Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks. IEEE T Veh Technol2016; 65: 9006–9019.
25.
ZhangGCLiXYCuiM. Signal and artificial noise beamforming for secure simultaneous wireless information and power transfer multiple-input multiple-output relaying systems. IET Commun2016; 10(7): 796–804.
26.
XingHWongKKChuZ. To harvest and jam: a paradigm of self-sustaining friendly jammers for secure AF relaying. IEEE T Signal Proces2015; 63(24): 6616–6631.
27.
FengYHZhenYZhuWP. Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE T Veh Technol2016; 66: 2354–2366.
28.
MarchenkoNAndreTBrandnerG. An experimental study of selective cooperative relaying in industrial wireless sensor networks. IEEE T Indust Inform2014; 10(3): 1806–1816.
GongXLongHDongF. Cooperative security communications design with imperfect channel state information in wireless sensor networks. IET Wirel Sens Syst2016; 6(2): 35–41.
34.
ZhangHXingHChengJ. Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE T Indust Inform2016; 12: 1714–1725.
35.
DengYWangLElkashlanM. Physical layer security in three-tier wireless sensor networks: a stochastic geometry approach. IEEE T Inf Foren Sec2016; 11(6): 1128–1138.
36.
GrantMBoydS. CVX: Matlab software for disciplined convex programming, http://cvxr.com/cvx
37.
ZhangX. Matrix analysis and applications. Beijing, China: Tsinghua University Press, 2004.
38.
BoydSVandenbergheL. Convex optimization. Cambridge: Cambridge University Press, 2004.