logo

SCIENTIA SINICA Informationis, Volume 49 , Issue 10 : 1353-1368(2019) https://doi.org/10.1360/N112018-00330

An online power-control algorithm for energy harvesting and secure transmission systems

More info
  • ReceivedDec 19, 2018
  • AcceptedApr 15, 2019
  • PublishedOct 15, 2019

Abstract


Funded by

国家自然科学基金(61471076)

重庆市基础研究与前沿探索项目(cstc2018jcyjAX0432,cstc2017jcyjAX0204)


References

[1] He Y, Cheng X, Peng W. A survey of energy harvesting communications: models and offline optimal policies. IEEE Commun Mag, 2015, 53: 79-85 CrossRef Google Scholar

[2] Ku M L, Li W, Chen Y. Advances in Energy Harvesting Communications: Past, Present, and Future Challenges. IEEE Commun Surv Tutorials, 2016, 18: 1384-1412 CrossRef Google Scholar

[3] Zordan D, Miozzo M, Dini P. When telecommunications networks meet energy grids: cellular networks with energy harvesting and trading capabilities. IEEE Commun Mag, 2015, 53: 117-123 CrossRef Google Scholar

[4] Tutuncuoglu K, Yener A. Optimum Transmission Policies for Battery Limited Energy Harvesting Nodes. IEEE Trans Wireless Commun, 2012, 11: 1180-1189 CrossRef Google Scholar

[5] Wu Y, Qian L, Huang L. Optimal Relay Selection and Power Control for Energy-Harvesting Wireless Relay Networks. IEEE Trans Green Commun Netw, 2018, 2: 471-481 CrossRef Google Scholar

[6] Ozel O, Tutuncuoglu K, Yang J. Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal Policies. IEEE J Sel Areas Commun, 2011, 29: 1732-1743 CrossRef Google Scholar

[7] Sinha A, Chaporkar P. Optimal power allocation for a renewable energy source. In: Preceeding of National Conference on Communications (NCC), Kharagpur, 2012. Google Scholar

[8] Neely M J. Stochastic Network Optimization with Application to Communication and Queueing Systems. San Rafael: Morgan Claypool, 2010. Google Scholar

[9] Qiu C, Hu Y, Chen Y. Lyapunov Optimization for Energy Harvesting Wireless Sensor Communications. IEEE Internet Things J, 2018, 5: 1947-1956 CrossRef Google Scholar

[10] Amirnavaei F, Dong M. Online power control strategy for wireless transmission with energy harvesting. In: Preceeding of the 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Stockholm, 2015. Google Scholar

[11] Dong M, Li W, Amirnavaei F. Online Joint Power Control for Two-Hop Wireless Relay Networks With Energy Harvesting. IEEE Trans Signal Process, 2018, 66: 463-478 CrossRef ADS Google Scholar

[12] Wyner A D. The Wire-Tap Channel. Bell Syst Technical J, 1975, 54: 1355-1387 CrossRef Google Scholar

[13] Liu Y, Chen H H, Wang L. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Commun Surv Tutorials, 2017, 19: 347-376 CrossRef Google Scholar

[14] Chen X, Ng D W K, Gerstacker W H. A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE Commun Surv Tutorials, 2017, 19: 1027-1053 CrossRef Google Scholar

[15] Wang H M, Xia X G. Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun Mag, 2015, 53: 47-53 CrossRef Google Scholar

  • Figure 1

    System model

  • Figure 2

    (Color online) Algorithm performance comparison

  • Figure 3

    (Color online) Battery power time track

  • Figure 4

    (Color online) Data queue backlog difference time track

  • Figure 5

    (Color online) Relationship between system performance and energy arrival rate. (a) Average security rate vs. energy arrival rate; (b) average battery power vs. energy arrival rate; (c) RMS value of data queue difference vs. energy arrival rate

  • Figure 6

    (Color online) The effect of $\delta~$ on system performance. (a) Average battery power vs. $\delta~$; (b) average security rate vs. $\delta~$; (c) RMS value of data queue difference vs. $\delta~$

  • Figure 7

    (Color online) Relationship between system performance and weight $U$ and $V$. (a) Average security rate vs. $U$ and $V$; (b) RMS value of data queue difference vs. $U$ and $V$

  • Figure 8

    (Color online) The influence of the upper and lower limits of weight on system performance. (a) Average security rate vs. ${{V}_{\max~}}$ and ${{V}_{\min~}}$; (b) RMS value of data queue difference vs. ${{V}_{\max~}}$ and ${{V}_{\min~}}$

  •   

    Algorithm 1 Online power control algorithm based on Lyapunov

    Set weights $V$ $(V\!\ge\!~0)$, $U$ $(U\!\ge\!~0)$, weight limits ${{V}_{\max~}}$, ${{V}_{\min~}}$, initial battery energy ${{E}_{\text{b}}}(0)$, and time-independent constant $\delta~$.

    At time slot $t$:

    1: Observe system status ${{E}_{\text{a}}}(t)$, ${{h}_{1}}(t)$, ${{h}_{2}}(t)$, ${{Q}_{1}}(t)$, ${{Q}_{2}}(t)$, and $X(t)$.

    2: Observe channel states of two users:

    (1) if $|~{{h}_{1}}(t)~|>|~{{h}_{2}}(t)~|$, send confidential information to destination node 1.

    (i) if $X(t)\le~-\frac{\Delta~\gamma~(t)\tilde{V}(t)}{\ln~2\cdot~\Delta~t}$, the optimal transmission power is ${{P}^{\text{opt}}}(t)=0$.

    (ii) if $-\frac{\Delta~\gamma~(t)\widetilde{V}(t)}{\ln~2\cdot~\Delta~t}<X(t)<0$, the optimal transmission power is text ${{P}^{\text{opt}}}(t)=\min~({{P}^{*}}(t),{{P}_{\max~}},\frac{{{E}_{\text{b}}}(t)}{\Delta~t})$, ${{P}^{\text{*}}}(t)$ in it can be obtained by Eq. (37).

    (iii) if $X(t)\ge~0$, the optimal transmission power is ${{P}^{\text{opt}}}(t)=\min~({{P}_{\max~}},\frac{{{E}_{\text{b}}}(t)}{\Delta~t})$.

    (2) if $|~{{h}_{1}}(t)~|<|~{{h}_{2}}(t)~|$, send confidential information to destination node 2.

    (i) if $X(t)\le~-\frac{\Delta~\gamma~(t)\tilde{V}(t)}{\ln~2\cdot~\Delta~t}$, the optimal transmission power is ${{P}^{\text{opt}}}(t)=0$.

    (ii) if $-\frac{\Delta~\gamma~(t)\tilde{V}(t)}{\ln~2\cdot~\Delta~t}<X(t)<0$, the optimal transmission power is text ${{P}^{\text{opt}}}(t)=\min~({{P}^{*}}(t),{{P}_{\max~}},\frac{{{E}_{\text{b}}}(t)}{\Delta~t})$, ${{P}^{\text{*}}}(t)$ in it can obtain by Eq. (39).

    (iii) if $X(t)\ge~0$, the optimal transmission power is ${{P}^{\text{opt}}}(t)=\min~({{P}_{\max~}},\frac{{{E}_{\text{b}}}(t)}{\Delta~t})$. $\text{~}$3: Calculate the secrecy rate ${{R}_{\text{s}}}(t)$ according to Eq. (7)

    3: Calculate the secrecy rate ${{R}_{\text{s}}}(t)$ according to Eq. (7)

qqqq

Contact and support