• Login
    View Item 
    •   Treasures Home
    • Academic Schools and Programs
    • Erik Jonsson School of Engineering and Computer Science
    • JECS Faculty Research
    • Al-Dhahir, Naofal
    • View Item
    •   Treasures Home
    • Academic Schools and Programs
    • Erik Jonsson School of Engineering and Computer Science
    • JECS Faculty Research
    • Al-Dhahir, Naofal
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Resource Allocation For Secure Wireless Powered Integrated Multicast and Unicast Services with Full Duplex Self-Energy Recycling

    Thumbnail
    View/Open
    Link to Article (184.1Kb)
    Date
    2019-01
    Author
    Chu, Zheng
    Zhou, Fuhui
    Xiao, Pei
    Zhu, Zhengyu
    Mi, De
    Al-Dhahir, Naofal
    Tafazolli, Rahim
    Metadata
    Show full item record
    Abstract
    Abstract
    This paper investigates a secure wireless-powered integrated service system with full-duplex self-energy recycling. Specifically, an energy-constrained information transmitter (IT), powered by a power station (PS) in a wireless fashion, broadcasts two types of services to all users: a multicast service intended for all users and a confidential unicast service subscribed to by only one user while protecting it from any other unsubscribed users and an eavesdropper. Our goal is to jointly design the optimal input covariance matrices for the energy beamforming, the multicast service, the confidential unicast service, and the artificial noises from the PS and the IT, such that the secrecy-multicast rate region (SMRR) is maximized subject to the transmit power constraints. Due to the non-convexity of the SMRR maximization (SMRRM) problem, we employ a semidefinite programming-based two-level approach to solve this problem and find all of its Pareto optimal points. In addition, we extend the SMRRM problem to the imperfect channel-state information case, where a worst-case SMRRM formulation is investigated. Moreover, we exploit the optimized transmission strategies for the confidential service and energy transfer by analyzing their own rank-one profile. Finally, numerical results are provided to validate our proposed schemes.
    Description
    Due to copyright restrictions and/or publisher's policy full text access from Treasures at UT Dallas is limited to current UTD affiliates (use the provided Link to Article).
    URI
    http://dx.doi.org/10.1109/TWC.2018.2883563
    https://hdl.handle.net/10735.1/8289
    Collections
    • Al-Dhahir, Naofal

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of TreasuresCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV