power-efficient and secure wpcns with hardware impairments and non-linear eh...

16
2642 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018 Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit Elena Boshkovska , Student Member, IEEE, Derrick Wing Kwan Ng , Senior Member, IEEE, Linglong Dai , Senior Member, IEEE , and Robert Schober, Fellow, IEEE Abstract— In this paper, we design a robust resource allocation algorithm for a wireless-powered communication network (WPCN) taking into account residual hardware impair- ments (HWIs) at the transceivers, the imperfectness of the channel state information, and the non-linearity of practical radio frequency energy harvesting circuits. In order to ensure power-efficient secure communication, physical layer security techniques are exploited to deliberately degrade the channel qual- ity of a multiple-antenna eavesdropper. The resource allocation algorithm design is formulated as a non-convex optimization problem for minimization of the total power consumption in the network, while guaranteeing the quality of service of the information receivers in terms of secrecy rate. The globally optimal solution of the optimization problem is obtained via a 2-D search and semidefinite programming relaxation. To strike a balance between computational complexity and system performance, a low-complexity iterative suboptimal resource allocation algorithm is also proposed. Numerical results demon- strate that both the proposed optimal and suboptimal schemes can significantly reduce the total system power consumption required for guaranteeing secure communication, and unveil the impact of HWIs on the system performance: 1) residual HWIs create a system performance bottleneck in WPCN in the high transmit/receive power regimes; 2) increasing the number of transmit antennas can effectively reduce the power consumption of wireless power transfer and alleviate the performance degrada- tion due to residual HWIs; and 3) imperfect CSI exacerbates the impact of residual HWIs, which increases the power consumption of both wireless power and wireless information transfer. Index Terms— Hardware impairments, wireless-powered com- munication, non-linear energy harvesting model, energy beamforming, physical layer security. Manuscript received September 13, 2017; revised November 20, 2017; accepted December 5, 2017. Date of publication December 14, 2017; date of current version June 14, 2018. D. W. K. Ng is supported under Australian Research Council’s Discovery Early Career Researcher Award funding scheme (DE170100137). L. Dai is supported by the National Natural Science Foun- dation of China for Outstanding Young Scholars (Grant No. 61722109). R. Schober is supported by the AvH Professorship Program of the Alexander von Humboldt Foundation. This paper was presented in part at the IEEE Globecom 2017 [1]. The associate editor coordinating the review of this paper and approving it for publication was Z. Zhang. (Corresponding author: Derrick Wing Kwan Ng.) E. Boshkovska and R. Schober are with Friedrich-Alexander-Universität Erlangen-Nürnberg, 91054 Erlangen, Germany. D. W. K. Ng is with the University of New South Wales, Sydney, NSW 2052, Australia (e-mail: [email protected]). L. Dai is with the Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China. Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCOMM.2017.2783628 I. I NTRODUCTION W IRELESS charging of battery-powered devices in wireless communication networks via wireless power transfer (WPT) technology could prolong the lifetime of the networks. In fact, the concept of wireless-powered com- munication networks (WPCNs), where wireless devices are powered via radio frequency (RF) electromagnetic waves, has gained considerable attention recently in the context of enabling sustainability via WPT [2]. In particular, it is expected that the number of interconnected wireless devices will increase to up to 50 billion by 2020 [3], due to the roll-out of the Internet-of-Things (IoT). A large portion of these wireless devices, some of which may be inaccessible for frequent battery replacement, could be powered wirelessly by dedicated power stations via RF-based WPT technology to facilitate their information transmissions [4]–[6]. Specifi- cally, RF-based WPT offers a more stable and controllable source of energy compared to natural energy sources, such as solar, wind, and tidal, etc., which are usually climate and location dependent [7]–[9]. More importantly, RF-based WPT exploits the broadcast nature of the wireless medium which enables one-to-many simultaneous long-range wireless charging. On the other hand, the large number of wireless devices in future networks encourages the use of low-quality and low-cost hardware components in order to reduce deploy- ment costs. However, RF transceivers equipped with cheap hardware components suffer from various kinds of hardware impairments (HWIs) resulting potentially in a performance degradation for communications. These HWIs are caused by non-linear power amplifiers, frequency and phase offsets, in-phase and quadrature (I/Q) imbalance, and quantization noise. Although the negative impact of HWIs on the sys- tem performance can be reduced by calibration and com- pensation algorithms, residual distortions at the transceivers that depend on the power of the transmitted/received signal are inevitable [10]–[15]. Hence, existing resource allocation algorithms for multiuser WPCNs, e.g. [4]–[6], designed based on the assumption of ideal hardware, may lead to substantial performance losses in practical systems. The increasing number of wireless devices also poses a threat to communication security in future wireless net- works due to the enormous amount of data transmitted over wireless channels [16]–[18]. Nowadays, wireless com- munication security is ensured by cryptographic encryption algorithms operating in the application layer. Unfortunately, 0090-6778 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 29-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2642 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

Power-Efficient and Secure WPCNs With HardwareImpairments and Non-Linear EH Circuit

Elena Boshkovska , Student Member, IEEE, Derrick Wing Kwan Ng , Senior Member, IEEE,

Linglong Dai , Senior Member, IEEE, and Robert Schober, Fellow, IEEE

Abstract— In this paper, we design a robust resourceallocation algorithm for a wireless-powered communicationnetwork (WPCN) taking into account residual hardware impair-ments (HWIs) at the transceivers, the imperfectness of thechannel state information, and the non-linearity of practicalradio frequency energy harvesting circuits. In order to ensurepower-efficient secure communication, physical layer securitytechniques are exploited to deliberately degrade the channel qual-ity of a multiple-antenna eavesdropper. The resource allocationalgorithm design is formulated as a non-convex optimizationproblem for minimization of the total power consumption inthe network, while guaranteeing the quality of service of theinformation receivers in terms of secrecy rate. The globallyoptimal solution of the optimization problem is obtained viaa 2-D search and semidefinite programming relaxation. Tostrike a balance between computational complexity and systemperformance, a low-complexity iterative suboptimal resourceallocation algorithm is also proposed. Numerical results demon-strate that both the proposed optimal and suboptimal schemescan significantly reduce the total system power consumptionrequired for guaranteeing secure communication, and unveil theimpact of HWIs on the system performance: 1) residual HWIscreate a system performance bottleneck in WPCN in the hightransmit/receive power regimes; 2) increasing the number oftransmit antennas can effectively reduce the power consumptionof wireless power transfer and alleviate the performance degrada-tion due to residual HWIs; and 3) imperfect CSI exacerbates theimpact of residual HWIs, which increases the power consumptionof both wireless power and wireless information transfer.

Index Terms— Hardware impairments, wireless-powered com-munication, non-linear energy harvesting model, energybeamforming, physical layer security.

Manuscript received September 13, 2017; revised November 20, 2017;accepted December 5, 2017. Date of publication December 14, 2017; dateof current version June 14, 2018. D. W. K. Ng is supported under AustralianResearch Council’s Discovery Early Career Researcher Award funding scheme(DE170100137). L. Dai is supported by the National Natural Science Foun-dation of China for Outstanding Young Scholars (Grant No. 61722109).R. Schober is supported by the AvH Professorship Program of the Alexandervon Humboldt Foundation. This paper was presented in part at the IEEEGlobecom 2017 [1]. The associate editor coordinating the review of thispaper and approving it for publication was Z. Zhang. (Corresponding author:Derrick Wing Kwan Ng.)

E. Boshkovska and R. Schober are with Friedrich-Alexander-UniversitätErlangen-Nürnberg, 91054 Erlangen, Germany.

D. W. K. Ng is with the University of New South Wales, Sydney,NSW 2052, Australia (e-mail: [email protected]).

L. Dai is with the Tsinghua National Laboratory for Information Scienceand Technology, Tsinghua University, Beijing 100084, China.

Color versions of one or more of the figures in this paper are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TCOMM.2017.2783628

I. INTRODUCTION

W IRELESS charging of battery-powered devices inwireless communication networks via wireless power

transfer (WPT) technology could prolong the lifetime ofthe networks. In fact, the concept of wireless-powered com-munication networks (WPCNs), where wireless devices arepowered via radio frequency (RF) electromagnetic waves,has gained considerable attention recently in the contextof enabling sustainability via WPT [2]. In particular, it isexpected that the number of interconnected wireless deviceswill increase to up to 50 billion by 2020 [3], due to theroll-out of the Internet-of-Things (IoT). A large portion ofthese wireless devices, some of which may be inaccessiblefor frequent battery replacement, could be powered wirelesslyby dedicated power stations via RF-based WPT technologyto facilitate their information transmissions [4]–[6]. Specifi-cally, RF-based WPT offers a more stable and controllablesource of energy compared to natural energy sources, suchas solar, wind, and tidal, etc., which are usually climateand location dependent [7]–[9]. More importantly, RF-basedWPT exploits the broadcast nature of the wireless mediumwhich enables one-to-many simultaneous long-range wirelesscharging. On the other hand, the large number of wirelessdevices in future networks encourages the use of low-qualityand low-cost hardware components in order to reduce deploy-ment costs. However, RF transceivers equipped with cheaphardware components suffer from various kinds of hardwareimpairments (HWIs) resulting potentially in a performancedegradation for communications. These HWIs are causedby non-linear power amplifiers, frequency and phase offsets,in-phase and quadrature (I/Q) imbalance, and quantizationnoise. Although the negative impact of HWIs on the sys-tem performance can be reduced by calibration and com-pensation algorithms, residual distortions at the transceiversthat depend on the power of the transmitted/received signalare inevitable [10]–[15]. Hence, existing resource allocationalgorithms for multiuser WPCNs, e.g. [4]–[6], designed basedon the assumption of ideal hardware, may lead to substantialperformance losses in practical systems.

The increasing number of wireless devices also posesa threat to communication security in future wireless net-works due to the enormous amount of data transmittedover wireless channels [16]–[18]. Nowadays, wireless com-munication security is ensured by cryptographic encryptionalgorithms operating in the application layer. Unfortunately,

0090-6778 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2643

these traditional security methods may not be applicable infuture wireless networks with large numbers of transceivers,since encryption algorithms usually require secure secret keydistribution and management via an authenticated third party.Recently, physical layer (PHY) security has been proposed asan effective complementary technology to the existing encryp-tion algorithms for providing secure communication [16]–[21].Specifically, PHY security exploits the unique characteris-tics of wireless channels, such as fading, noise, and inter-ference, to protect the communication between legitimatedevices from eavesdropping. In this context, Wu et al. [18]designed a resource allocation algorithm that jointly optimizesthe transmit power, the duration of WPT, and the directionof spatial beams to facilitate security in WPCNs. In [19],beamforming design was studied for secrecy provisioningin distributed antenna systems with WPT. Chen et al. [20]investigated the design of secure transmission in wireless-powered relaying systems. In [21], the use of a wireless-powered friendly jammer was proposed to enable securecommunication in a point-to-point communication system.Niu et al. [22] proposed a suboptimal resource allocationalgorithm for energy efficiency maximization in a securemultiple-input multiple-output (MIMO) simultaneous wirelessinformation and power transfer (SWIPT) system taking intoaccount the impact of non-linear energy harvesting circuits.Niu et al. [23] studied the joint design of a precodingmatrix and power splitting ratios for maximization of thetotal harvested energy in a MIMO-SWIPT system. In [24],beamforming was designed to ensure communication secu-rity in SWIPT-based amplify-and-forward relaying networks.Bi and Chen [25] studied the secrecy outage probabilityof a wireless-powered communication system with a full-duplex jammer. In [26], the resource allocation was optimizedto enable secure wireless powered communication networksemploying an energy harvesting jammer. However, most ofthe existing works on secure WPT systems are based onthe assumption of ideal hardware [18]–[26] and are notapplicable to practical systems suffering from HWIs. Recently,the notion of secure communication under the considerationof HWIs has been pursued. For instance, the work in [27]considered the analysis and design of secure massive MIMOsystems in the presence of a passive eavesdropper and HWIsat the transceivers. Besides, Nguyen et al. [28] studied theimpact of residual HWIs on the performance of a two-wayWPT-based cognitive relay network, where the relay is pow-ered by harvesting energy from the signals transmitted by thesource in the RF. Zhu et al. [29] analyzed the impact of phasenoise on downlink WPT in secure multiple antennas systems.However, Nguyen and Matthaiou [28] and Zhu et al. [29]assumed an overly simplified linear energy harvesting (EH)model for the end-to-end WPT characteristic. Yet, measure-ments of practical RF-based EH circuits demonstrate a highlynon-linear end-to-end WPT characteristic [30], which impliesthat transmission schemes and algorithms designed based onthe conventional linear EH model may cause performancedegradation in practical implementations. Moreover, the trans-mission strategies in [27]–[29] were not optimized. Hence,the design of resource allocation for secure communication in

WPCNs with the non-linear EH circuits suffering from HWIsis an important open problem.

To address the above issues, we propose a resource allo-cation algorithm design, which aims at providing power-efficient and secure communication in WPCNs in the presenceof a multiple-antenna eavesdropper. The resource allocationalgorithm design is formulated as a non-convex optimizationproblem taking into account the non-linearity of the EHcircuits, the existence of residual HWIs at the transceivers, andthe imperfectness of the channel state information (CSI) of theeavesdropper. We minimize the total consumed power whileguaranteeing the quality of service (QoS) at the informationreceivers (IRs) in the WPCN. In general, there is no stan-dard approach for solving non-convex optimization problems.In the extreme case, an exhaustive search with respect to alloptimization variables is needed to obtain the global optimalsolution which is computationally infeasible for a moder-ate problem size. Nevertheless, by exploiting the particularstructure of the problem at hand, the optimal solution of theproposed problem is obtained via a two-dimensional searchand semidefinite programming (SDP) relaxation. The proposedsolution unveils that information beamforming from the accesspoint in the direction of the IRs is optimal and that the SDPrelaxation is tight. In addition, an iterative suboptimal schemeis proposed to reduce computational complexity. Numericalresults demonstrate that the proposed schemes can signifi-cantly reduce the power consumption in the considered WPCNcompared to two baseline schemes.

The remainder of this paper is organized as follows.In Section II, we introduce the adopted WPCN, HWI, and non-linear energy harvesting models. In Section III, we formulatethe resource allocation algorithm design as a non-convexoptimization problem, which is solved by an iterative resourceallocation algorithm in Section IV. Section V presents simu-lation results for the system performance, and in Section VI,we conclude with a brief summary of our results.

II. SYSTEM MODEL

In this section, we first present some notations and the con-sidered system model. Then, we discuss the energy harvestingand hardware impairment models adopted for power-efficientresource allocation algorithm design.

A. Notation

We use boldface capital and lower case letters to denotematrices and vectors, respectively. AH , Tr(A), det(A), A−1,Rank(A), and λmax(A) represent the Hermitian transpose,trace, determinant, inverse, rank, and maximum eigenvalue ofmatrix A, respectively; A � 0 indicates that A is a positivesemidefinite matrix; IN denotes the N × N identity matrix.CN×M denotes the space of all N × M matrices with complexentries. HN represents the set of all N-by-N complex Her-mitian matrices. |·| and ‖·‖F represent the absolute value of acomplex scalar and the Frobenius norm, respectively. The dis-tribution of a circularly symmetric complex Gaussian (CSCG)vector with mean vector x and covariance matrix � is denotedby CN (x,�), and ∼ means “distributed as". E{·} denotes

Page 3: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2644 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

Fig. 1. A WPCN employing two transmission phases with K = 2 informationreceivers (IRs) and one multiple-antenna eavesdropper.

statistical expectation. [x]+ stands for max{0, x}. ∇x f (x)represents the partial derivative of function f (x) with respectto the elements of vector x. Furthermore, diag[x] is a diagonalmatrix with the elements of x on the main diagonal. [A]n,n

returns the element in the n-th row and n-th column of squarematrix A. Sm is a square matrix with all entries equal to 0except for the m-th diagonal element which is equal to 1.

B. System Model

We focus on a WPCN which consists of a power sta-tion1 (PS), an access point (AP), K IRs, and one eavesdrop-per (Eve), cf. Figure 1. We assume that the PS, the AP, and Eveare equipped with NPS ≥ 1, NAP ≥ 1, and NEV ≥ 1 antennas,2

respectively. The IRs are single-antenna devices for hardwaresimplicity. The communication in the WPCN comprises twotransmission phases as shown in Figure 1. We assume that thefading channels in both phases are frequency flat and slowlytime-varying. In particular, Phase I, with a time duration of τI,is reserved for wireless charging, where the PS transmits adedicated energy beam to the energy-constrained AP. Theinstantaneous received signal at the AP during Phase I is givenby

yAP = LH(

v + ξ (t))

+ ξ (r) + nAP, (1)

where v ∈ CNPS×1 is the energy signal vector adopted inPhase I for wireless charging with covariance matrix V =E{vvH }. The channel matrix between the PS and the AP isdenoted by L ∈ CNPS×NAP and captures the joint effect ofpath loss and multipath fading. Vector nAP ∼ C N(0, σ 2

n INAP )represents the additive white Gaussian noise (AWGN) at theAP where σ 2

n denotes the noise variance at each antenna ofthe AP. In (1), ξ (t) ∈ CNPS×1 and ξ (r) ∈ CNAP×1 representthe random residual HWIs after compensation introduced atthe transmitter and receiver during Phase I, respectively. The

1In this work, we assume that the PS is connected to the main grid with acontinuous and stable energy supply.

2We note that an eavesdropper equipped with NEV antennas is equivalentto multiple cooperating eavesdroppers with a total of NEV antennas which areconnected to a joint processing unit. Besides, we assume NPS + NAP ≥ NEVto enable secure communication.

model adopted for the residual HWIs will be presented laterin the next section.

In Phase II, for a time duration of τII, the AP transmits Kindependent signals to the K IRs simultaneously. Because ofthe broadcast nature of wireless channels, there is a securitythreat due to potential eavesdropping. To circumvent thisthreat, both the AP and the PS deliberately emit artificialnoise to degrade the channel quality of the eavesdropper [16].Therefore, the instantaneous received signal at IR k in Phase IIis given by

yIRk = hHk

( K∑i=1

wi si + u︸︷︷︸Jamming from AP

+ς (t))

+ f Hk

(z︸︷︷︸

Jamming from PS

+κ(t))

+ ς(r)k + nIRk , (2)

where sk ∈ C and wk ∈ CNAP×1 are the information symbolfor IR k and the corresponding beamforming vector, respec-tively. Without loss of generality, we assume that E{|sk |2} =1,∀k. hk ∈ CNAP×1 is the channel vector between the APand IR k, while fk ∈ CNPS×1 denotes the channel vectorbetween the PS and IR k. Furthermore, u ∼ C N(0,U) andz ∼ C N(0,Z) are the Gaussian pseudo-random energy signalsequences, i.e., the artificial noise, broadcasted by the APand the PS, respectively, where U ∈ HNAP ,U � 0, andZ ∈ HNPS ,Z � 0, denote the corresponding covariancematrices, respectively. These two noise processes are exploitedby the AP and the PS to degrade the channel quality ofthe eavesdropper via jamming. ς (t) ∈ CNAP×1 and κ(t) ∈CNPS×1 represent the random residual transmitter HWIs aftercompensation introduced by the AP and the PS in Phase II,respectively, while ς(r)k ∈ C represents the residual receiverHWIs introduced by IR k. nIRk ∼ C N(0, σ 2

IRk) is the AWGN

at IR k with noise power σ 2IRk.

The instantaneous received signal at Eve in Phase II isgiven by

yE = GH( K∑

i=1

wi si + u︸︷︷︸Jamming from AP

+ς (t))

+ EH(

z︸︷︷︸Jamming from PS

+κ(t))

+ nE, (3)

where G ∈ CNAP×NE and E ∈ C

NPS×NE denote the channelmatrices of the AP-to-Eve links and the PS-to-Eve links,respectively. nE ∼ C N(0, σ 2

EINEV ) is the AWGN vector at theeavesdropper with noise power σ 2

E . In this work, we assumethat ideal hardware is available at the eavesdropper, i.e., thereare no HWIs at the eavesdropper, which constitutes the worstcase for communication security.

C. Hardware Impairment Model

In this paper, we adopt the general HWI model proposed in[15, Ch. 4] and [31, Ch. 7]. In particular, the residual distortioncaused by the aggregate effect of different HWIs, such as I/Qimbalance, phase noise, and power amplifier non-linearities ismodeled as a Gaussian random variable whose variance scales

Page 4: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2645

Fig. 2. A comparison between the convex distortion model in (6) andmeasurement data for a long term evolution (LTE) transmitter power ampli-fier [32]. In this example, parameters k1 = 2.258 × 105 and k2 = 7.687 in(6) are calculated by a standard curve fitting tool.

with the power of the signals transmitted and received by thetransmitter and the receiver, respectively. This model has beenwidely used in the literature to study the impact of transceiverHWIs on the performance of communication systems [11],[13], [28]. Besides, Studer et al. [13] showed that this modelaccurately captures the residual distortions caused by the jointeffect of various HWIs in practical multiple-antenna systems.

Hence, the distortion noises caused by the transmitter HWIsat the PS in Phase I and Phase II are modeled as ξ (t) ∼C N(0,�) and κ (t) ∼ C N(0,�), respectively. � ∈ CNPS×NPS

and � ∈ CNPS×NPS are diagonal covariance matrices whichcontain on their main diagonal the distortion noise variancesof each antenna of the PS in Phase I and Phase II, respectively,and are given by

� = diag

[η1

(PPS−I

av,1

), . . . , ηNPS

(PPS−I

av,NPS

)](4)

and

� = diag

[η1

(PPS−II

av,1

), . . . , ηNPS

(PPS−II

av,NPS

)]. (5)

In (4) and (5), PPS−Iav,m = E{‖Smv‖2

F} = [V]m,m and PPS−IIav,m =

E{‖Smz‖2F} = [Z]m,m , m ∈ {1, . . . , NPS}, respectively, are the

average powers of the transmit signal at the m-th antenna of thePS in Phase I and Phase II, respectively. Also, ηm(·),∀m, is aconvex, continuous, and monotonically increasing distortionfunction which quantifies the impact of the HWIs for a givenaverage power of the transmit signal at the m-th antenna,3

i.e., the function maps the average power of the signal to a spe-cific distortion value. For example, the transmitter distortionfunction can be modeled by the following convex increasingfunction:

ηm(xm) = k1xk2m [Watt], (6)

where xm [Watt] is the average transmit power at antenna m.Constants k1 ≥ 0 and k2 ≥ 1 are model parameters which arechosen such that they fit the measurements of the associatedpractical systems.4 In Figure 2, we illustrate that the proposed

3Note that the model considered here directly maps the signal power tothe distortion power while the one proposed in [15, Ch. 4] maps the signalmagnitude to the distortion magnitude.

4In practice, the value of the distortion function of the transmitter HWIsusually grows at least linearly with respect to the transmit power which leadsto k2 ≥ 1.

model for the transmitter distortion function in (6) closelymatches the experimental results in [32].

Similarly, the transmitter HWIs at the AP in Phase II aremodeled as ς (t) ∼ C N (0,�) with covariance matrix

� = diag

[η1

(PAP

av,1

), . . . , ηNAP

(PAP

av,NAP

)], (7)

where PAPav,n = E

{‖Sn(

∑Kk=1 wksk + u)‖2

F

}=[ ∑K

k=1 wkwHk + U

]n,n

, ∀n ∈ {1, . . . , NAP}. On the

other hand, the received signal is affected mostlyby phase noises and I/Q imbalances [31, Ch. 7].In the considered WPCN, these residual HWIs aremodeled by the receiver distortion noise at the AP,ξ (r) ∈ CNAP×1, cf. (1), where ξ (r) ∼ C N (0, σ 2

dAPINAP ).

Moreover, σ 2dAP

= ν(

E{‖LH v‖2F}

)= ν

(Tr(VLLH )

),

where ν(·) is a convex, continuous, and monotonicallyincreasing function that models the receiver impairmentcharacteristic. Additionally, the receiver HWIs at eachIR during Phase II are given by ς

(r)k ∼ C N (0, σ 2

dIRk),

with σ 2dIRk

= ν(

E{‖hHk (

∑Ki=1 wi si + u)+ f H

k z‖2F}

)=

ν(

Tr(Hk(U + ∑Ki=1 wi wH

i ) + FkZ))

, where Fk = fkf Hk

and Hk = hkhHk are introduced for notational simplicity.

According to [11], a suitable choice of the receiver distortionfunction is ν(x) = ( k3

100 )2x [Watt], where x is the average

power of the received signal and k3 is a constant modelparameter with a typical range of k3 ∈ [0, 15].

D. Energy Harvesting Model

In the considered WPCN, we exploit the energy and artifi-cial noise signals transmitted by the PS in Phase I and Phase IIto charge the AP and to facilitate secure information transfer,respectively. In this paper, we adopt the practical non-linearRF-based EH model proposed in [33] to characterize the end-to-end WPT at the AP. The total energy harvested by the APin Phase I is given by

�tot(ω) =M

1+exp(−a(ω−b)) − M

1 −, = 1

1 + exp(ab),

ω = Tr(

LH (V + �)L), (8)

where ω represents the received RF power at the AP. Theparameters M , a, and b in (8) capture the joint effects ofvarious non-linear phenomena caused by hardware limitationsin practical EH circuits. More specifically, M represents themaximum power that can be harvested by the EH circuit,as the circuit becomes saturated for exceedingly large receivedRF powers. Moreover, a and b depend on several physicalhardware phenomena, such as circuit sensitivity and potentialcurrent leakage. In fact, the adopted non-linear EH modelwas shown to accurately characterize the behavior of var-ious practical EH circuits [33]–[35]. In contrast, the con-ventional linear EH model, which is widely used in theliterature [18]–[21], [28], may lead to performance degrada-tion due to a severe model mismatch for resource allocationalgorithm design.

Page 5: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2646 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

Remark 1: In practice, the EH hardware circuit of the APis fixed and parameters a, b, and M of the non-linear modelin (8) can be determined by a standard curve fitting tool.

E. Channel State Information

In practice, handshaking is performed between the legiti-mate PS, the AP, and the K IRs. As a result, accurate CSIcan be obtained by exploiting the pilot sequences embeddedin the handshaking signals. In this paper, we assume thatthe CSI of L, hk , and fk is available for resource allocationalgorithm design. In contrast, the potential eavesdropper maynot directly interact with the transmitters and it is difficultto obtain perfect CSI for the corresponding links. To capturethe impact of imperfect CSI knowledge of the eavesdropper’schannels on the system performance, we adopt the determinis-tic model from [34]–[38]. To this end, the CSI of the relevantcommunication links is modeled as

G = G +�G,

APE �

{�G ∈ C

NAP×NE : ‖�G‖F ≤ υAP→E

}, (9)

E = E +�E,

PSE �

{�E ∈ C

NPS×NE : ‖�E‖F ≤ υPS→E

}, (10)

respectively, where G and E are the estimates of chan-nel matrices G and E, respectively, for resource allocation.Matrices �G and �E represent the channel uncertainty whichcaptures the joint effects of channel estimation errors and thetime varying nature of the associated channels. In particular,the continuous sets AP

E and PSE in (9) and (10), respectively,

define the continuous spaces spanned by all possible channeluncertainties with respect to the associated channels. ConstantsυAP→E and υPS→E, denote the maximum values of the normsof the CSI estimation error matrices �G and �E, respectively.In practice, the values of υAP→E and υPS→E depend onthe adopted channel estimation algorithms and the coherencetimes of the associated channels.

Remark 2: Although the eavesdropper may be passive andremain silent, its CSI can be estimated based on the powerleakage of the local oscillator of its receiver RF front-end [39].

III. RESOURCE ALLOCATION PROBLEM FORMULATION

In this section, we first define the system performance met-rics and then we formulate the resource allocation algorithmdesign as an optimization problem.

A. Achievable Data Rate and Secrecy Rate

Given perfect CSI at the receiver, the achievable data rateof IR k in Phase II is given by

Rk = τII log2(1 + k

), where (11)

k = wHk Hkwk∑

j �=k w j HkwHj + Ik + σ 2

dIRk+ σ 2

n

(12)

and

Ik = Tr(Fk�)+ Tr(�Hk)︸ ︷︷ ︸Interference due to transmitter HWIs

. (13)

Variable k is the received signal-to-interference-plus-noiseratio (SINR) at IR k. We note that since the pseudo-randomartificial noise signals are known to all legitimate transceivers,the impact of the artificial noise signals on the desired sig-nal can be removed at IR k via interference cancellation,i.e., Tr(HkU) and Tr(FkZ) have been removed5 in (11).

On the other hand, as the computational capability ofthe eavesdropper is not known, we focus on the worst-casescenario for facilitating secrecy provisioning. In particular,we assume that the eavesdropper is equipped with a noiselessreceiver and is able to remove all multiuser interferencevia successive interference cancellation before attempting todecode the information of IR k. As a result, the maximumrate at which the eavesdropper can decode the informationintended for IR k is given by

Ck = τII log2 det

(INE + Q−1GH wkwH

k G), (14)

where

Q = GH ( U︸︷︷︸Jamming from the AP

+�)G

+ EH ( Z︸︷︷︸Jamming from the PS

+�)E (15)

is the interference covariance matrix of the eavesdropper. Theachievable secrecy rate between the AP and IR k is given by

Rseck = [

Rk − Ck]+. (16)

As can be seen from (14) and (16), in principle, both theartificial noise signals and the transmitter HWI signals canenhance communication secrecy by degrading the capacity ofthe channel of the eavesdropper.

B. Total Power Consumption

In this section, we study the power consumption in bothtransmission phases. Due to the residual HWIs at the trans-mitter of the PS, a portion of the transmitted power is wastedduring Phase I. More specifically, the total power consumptionin Phase I is given by

PPS−I = ρPS

(Tr(V)︸ ︷︷ ︸

Power for charging

+ Tr(�)︸ ︷︷ ︸Power waste

)+ PcPS , (17)

where PcPS accounts for the constant circuit power consump-tion at the PS. Besides, to capture the power inefficiency ofpractical power amplifiers, we introduce a linear multiplicativeconstant ρPS > 1 for the power radiated by the PS [19], [40].For example, if ρPS = 5, then for every 1 Watt of power radi-ated in the RF, the PS consumes 5 Watt of power which leadsto a power amplifier efficiency of 20%. In Phase II, the PStransmits artificial noise signals to degrade the channel qualityof the eavesdropper and the associated power consumption is

PPS−II = ρPS

(Tr(Z)︸ ︷︷ ︸

Power for jamming

+ Tr(�)︸ ︷︷ ︸Power waste

)+ PcPS . (18)

5We note that the interference caused by the transmitter HWIs cannot beremoved at IR k as it is an unknown random process.

Page 6: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2647

On the other hand, in Phase II, the AP transmits K indepen-dent information signals to the K IRs concurrently. Besides,artificial noise is also emitted by the AP to degrade the channelquality of the eavesdropper. Because of the residual transmitterHWIs, a portion of the power is also wasted at the AP. Hence,the total power consumption at the AP is given by

PAP−II = ρAP

( K∑k=1

‖wk‖2

︸ ︷︷ ︸Power for information transmission

+ Tr(U)︸ ︷︷ ︸Power for jamming

+ Tr(�)︸ ︷︷ ︸Power waste

)+ PcAP . (19)

Here, PcAP is the constant circuit power consumption andρAP > 1 denotes the power amplifier inefficiency at the AP.

C. Optimization Problem Formulation

In the following, we formulate an optimization problemfor the minimization of the total power consumption in bothtransmission phases of the considered WPCN while guarantee-ing secure communication in the presence of residual HWIs,imperfect CSI, and a non-linear EH model. The consideredoptimization problem is given by equation (20) at the bottomof this page. The objective function in (20) takes into accountthe total power consumption in Phases I and II at the PS andthe AP,6 cf. (17)–(19). Constraint C1 is imposed such that theachievable data rate of IR k in Phase II satisfies a minimumrequired data rate Rreqk

. On the other hand, taking into accountthe impact of CSI imperfectness, i.e., sets AP

E and PSE ,

constant Rtol in C2 limits the maximum tolerable capacityachieved by Eve in attempting to decode the message of IR k.In practice, Rreqk

� Rtol > 0 is set by the system operator to

6The power consumptions are optimized in both phases, even though theAP is wirelessly charged by the PS only in Phase I. In fact, besides the energyharvested in Phase I, the AP can also use residual energy, Eres, remainingfrom previous transmission phases for transmission in the current Phase II,cf. constraint C4. Hence, the power consumption of Phase II should also beminimized as well.

ensure secure communication.7 Tmax in constraint C3 specifiesthe total time available for both phases. C4 is a constraint onthe overall energy consumption at the AP during Phase II. Thetotal available energy at the AP comprises the energy harvestedfrom the dedicated energy signal transmitted by the PS inPhase I and a constant energy Eres ≥ 0. In practice, Eres mayrepresent the residual energy at the AP from previous trans-missions or energy obtained from other sources. Furthermore,� in C5 is an auxiliary optimization variable which representsthe received RF power at the AP. In particular, C5 ensures that� is always smaller or equal to the minimum harvested power.C6 is a non-negativity constraint on the durations of Phase Iand Phase II, respectively. PPS

max in constraints C7 and C8limits the maximum transmit power of the PS in Phase Iand Phase II, respectively. Similarly, PAP

max in constraint C9specifics the maximum transmit power allowance of the AP inPhase II. Constraint C10, V ∈ HNPS ,Z ∈ HNPS , and U ∈ HNAP

constrain matrices V,Z, and U to be positive semidefinite Her-mitian matrices such that they are valid covariance matrices.

IV. RESOURCE ALLOCATION ALGORITHM DESIGN

The resource allocation problem in (20) is a non-convexoptimization problem. In fact, the right-hand side of con-straint C4 is a quasi-concave function with respect to τI and �.Besides, the optimization variables are coupled in the objectivefunction and in constraint C4. Also, constraint C2 involvesinfinitely many possibilities due to the uncertainties of thechannel estimation errors. Furthermore, the log-det functionin constraint C2 is generally intractable. In this section,we first study the design of a globally optimal resource allo-cation scheme.8 The performance of this scheme serves as a

7We note that the adopted problem formulation constraining the receivedSINR of the potential eavesdropper provides a higher flexibility for providingcommunication secrecy for different applications, e.g. video clips, images,etc., compared to a problem formulation which directly constrains the secrecyrate. Besides, the solution of (20) guarantees a minimum secrecy rate of

Rseck =

[Rreqk − Rtol

]+for IR k.

8For resource allocation algorithm design, we assume that the problem in(20) is feasible. We note that the feasibility of (20) can be ensured by asuitable scheduling of the IRs in the media access control layer.

minimizeτI,τII,�,V∈H

NPS ,Z∈HNPS ,

U∈HNAP ,wk

τI PPS−I + τII

(PAP−II + PPS−II

)

s.t. C1 : τII log2(1 + k

) ≥ Rreqk, ∀k,

C2 : max�G∈AP

E ,�E∈PSE

τII log2 det

(INE + Q−1GH wkwH

k G)

≤ Rtol, ∀k,

C3 : τI + τII ≤ Tmax,

C4 : τII

(PcAP + ρAP

( K∑k=1

‖wk‖2 + Tr(U)+ Tr(�)

))≤ τI�tot(�)+ Eres,

C5 : � ≤ Tr(LH (V + �)L), C6 : τI, τII ≥ 0,

C7 : Tr(V)+ Tr(�) ≤ PPSmax, C8 : Tr(Z)+ Tr(�) ≤ PPS

max,

C9 :K∑

k=1

‖wk‖2 + Tr(U)+ Tr(�) ≤ PAPmax, C10 : Z,V,U � 0 . (20)

Page 7: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2648 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

performance upper bound for any suboptimal scheme. Then,we derive a computationally efficient suboptimal resourceallocation algorithm.

A. Optimal Resource Allocation

To obtain a globally optimal resource allocation scheme,we first perform the following transformation steps. In partic-ular, we introduce auxiliary optimization matrices, BPS−I ∈CNPS×NPS , BPS−II ∈ CNPS×NPS , and BAP ∈ CNAP×NAP ,which account for the HWIs at the PS and the AP, respec-tively. Additionally, we introduce auxiliary optimization vari-ables, rIR,k,∀k, which represent the distortion noise termscaused by the receiver HWIs at the IRs. Then, we transformproblem (20) into the equivalent rank-constrained SDP opti-mization problem9 with optimization variable set P = {�,V ∈CNPS ,Z ∈ CNPS ,U ∈ CNAP ,BPS−I,BPS−II,BAP, rIR,k} givenby equation (21) at the bottom of this page, where reqk

=2Rreqk /τII − 1,∀k, and tol = 2Rtol/τII − 1 are the equivalentrequired and maximum tolerable SINRs at IR k and theeavesdropper, respectively. The power consumption in Phase Iand Phase II in the objective function can be rewritten as

PPS−I = ρPS

(Tr(V)+

NPS∑m=1

Tr(SmBPS−I)

)+ PcPS , (22)

PPS−II = ρPS

(Tr(Z)+

NPS∑m=1

Tr(SmBPS−II)

)+ PcPS , (23)

9In this paper, equivalent means that the transformed problem and theoriginal problem share the same optimal solution.

PAP−II = ρAP

( K∑k=1

Tr(wkwHk )+ Tr(U)+

NAP∑n=1

Tr(SnBAP)

)

+ PcAP . (24)

Furthermore, constraint C2 in (20) is replaced by constraint C2in (21). These two constraints are equivalent when Rtol > 0and Rank(wkwH

k ) ≤ 1, cf. [36]. Constraints C4, C5, andC7− C9 are equivalent to the original constraints C4, C5, andC7−C9, respectively, as the new convex constraints C12−C15are satisfied with equality at the optimal solution.

Next, we handle the coupling of the optimization variablesin the objective function and constraint C4. When both τI andτII are fixed, we can solve (21) for the remaining optimizationvariables. In fact, for a fixed τI, the quasi-concavity of theright-hand side of constraint C4 is also resolved. Besides,the right-hand side of constraint C4 is concave with respectto �. As a result, we study the optimal resource allocationby assuming that the optimal values of τI and τII satisfyingconstraints C3 and C6 are found by a two-dimensional gridsearch.

Hence, we recast the original problem as an equivalent rank-constrained SDP optimization problem. To this end, we defineWk = wkwH

k and rewrite the problem in (21) as equation (25)at the top of next page, where = {an, bm , cd , dk,∀k}is a set of auxiliary optimization variables. We note thatthe new sets of constraint pairs {C12a,C12b}, {C13a,C13b},{C14a,C14b}, and {C15a,C15b} are equivalent to the originalconstraints C12, C13, C14, and C15, respectively, as the newconstraint pairs are satisfied with equality for the optimalsolution. Besides, constraints C16 and C17 are imposed toguarantee that Wk = wkwH

k holds for the optimal solution.

minimizeτI,τII,P ,wk

τI PPS−I + τII(PAP−II + PPS−II)

s.t. C1 : wHk Hkwk

reqk

≥∑j �=k

wHj Hkw j +

NAP∑n=1

Tr(SnBAPHk)+NPS∑n=1

Tr(SnBPS−IIFk)+ rIR,k + σ 2n , ∀k,

C2 : max�G∈AP

E ,�E∈PSE

GH wkwHk G

tol GH (U + BPS)G + EH (Z + BPS−II)E, ∀k,

C4 : τII PAP−II ≤ τI�tot(�)+ Eres, C3, C6, C10,

C5 : � ≤ Tr(LH (V + BPS−I)L),

C7 : Tr(V)+NPS∑

m=1

Tr(SmBPS−I) ≤ PPSmax, C8 : Tr(Z)+

NPS∑m=1

Tr(SmBPS−II) ≤ PPSmax,

C9 :K∑

k=1

‖wk‖2 + Tr(U)+NAP∑n=1

Tr(SnBAP) ≤ PAPmax, C11 : BPS−I,BPS−II,BAP � 0,

C12 : ηn

( K∑k=1

[wkwHk ]n,n + [U]n,n

)≤ [BAP]n,n, ∀n,

C13 : ηm

([V]m,m

)≤ [BPS−I]m,m, ∀m, C14 : ηm

([Z]m,m

)≤ [BPS−II]m,m, ∀m,

C15 : ν(

Tr(Hk(U +K∑

i=1

wi wHi )+ FkZ)

)≤ rIR,k, ∀k. (21)

Page 8: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2649

minimizeP ,Wk∈H

NAP ,τI PPS−I + τII(PAP−II + PPS−II)

s.t. C1 : Tr(HkWk)

reqk

≥∑j �=k

Tr(HkW j )+NAP∑n=1

Tr(SnBAPHk)+NAP∑n=1

Tr(SnBPS−IIFk)+ r2IR,k + σ 2

n , ∀k,

C2 : max�G∈AP

E ,�E∈PSE

GH WkG tol

GH (U + BAP)G + EH (ZH + BPS−II)E, ∀k,

C4 : τII PAP−II ≤ τI�tot(�)+ Eres, C5 : � ≤ Tr(LH (V + BPS−I)L), C7, C8, C10, C11,

C9 :K∑

k=1

Tr(Wk)+ Tr(U)+NAP∑n=1

Tr(SnBAP) ≤ PAPmax,

C12a : ηn(an

) ≤ [BAP]n,n, ∀n, C12b :K∑

k=1

Tr(SnWk)+ Tr(SnU) ≤ an, ∀n,

C13a : ηm(bm

) ≤ [BPS−I]m,m, ∀m, C13b : Tr(SmV) ≤ bm, ∀m,

C14a : ηm(cm

) ≤ [BPS−II]m,m, ∀m, C14b : Tr(SmZ) ≤ cm , ∀m,

C15a : ν(dk) ≤ rIR,k, ∀k, C15b : Tr(Hk(U +

K∑i=1

Wi )+ FkZ)) ≤ dk, ∀k,

C16 : Rank(Wk) ≤ 1, ∀k, C17 : Wk � 0, ∀k. (25)

Next, we handle the infinitely many possibilities in C2.First, by introducing an auxiliary optimization matrix N ∈CNEV×NEV , constraint C2 can be equivalently written as:

C2a : max�G∈AP

E

GH WkG tol

GH (U + BAP)G + N, ∀k,

(26)

C2b : min�E∈PS

E

N � EH (Z + BPS−II)E. (27)

Then, we introduce a lemma to overcome the infinitely manyinequalities in C2a and C2b.

Lemma 1 (Robust Quadratic Matrix Inequalities [41]): Leta quadratic matrix function f (X) be defined as

f (X) = XH AX + XH B + BH X + C, (28)

where X,A,B, and C are arbitrary matrices with appropriatedimensions. Then, the following two statements are equivalent:

f (X) � 0, ∀X ∈{

X | Tr(DXXH ) ≤ 1}

⇐⇒[

C BH

B A

]− t

[I 00 −D

]� 0, if ∃t ≥ 0, (29)

for matrix D � 0 and t is an auxiliary constant.Then, constraint C2a can be equivalently transformed into:

C2a : SC2ak

(BAP,U,Wk,N, tk

)

=⎡⎣

N − tkINEV 0

0tkIAP

υ2AP→E

⎤⎦ + RH

G MkRG � 0, ∀k, (30)

where

Mk = U + BAP − Wk

toland RG = [G IAP].

Similarly, we can transform constraint C2b into its equiva-lent form:

C2b : SC2b

(BPS−II,Z,N, γ

)

=⎡⎣

−N − γ IPS 0

0γ IPS

υ2PS→E

⎤⎦ + RH

E KRE � 0, ∀k, (31)

where

K = Z + BPS−II and RE = [E IPS].Next, we relax the non-convex constraint in C16 by remov-

ing it from the problem formulation. Therefore, for a givenτI and τII, the equivalent SDP relaxed formulation of (21) isgiven by:

minimizeP ,Wk∈HNAP ,,N∈HNEV ,tk,γ

τI PPS−I + τII(PAP−II + PPS−II)

s.t. C1, C2a, C2b, C4, C5, C7 − C9,

C10,C11,C12a,C12b,C13a,C13b,C14a,C14b,

C15a,C15b,C17,C18 : tk, γ ≥ 0, (32)

where constraint C18 is due to the use of Lemma 1 forhandling the infinitely many constraints associated with thechannel estimation errors.

The optimization problem in (32) is a standard convexoptimization problem and can be solved efficiently by numer-ical convex program solvers such as CVX [42]. However,by solving (32) numerically, in general, there is no guaranteethat the optimal solution of (32) satisfies C16 of the originalproblem formulation in (20), i.e., Rank(Wk) ≤ 1. Hence,in the following, we study the structure of the solution ofthe SDP relaxed problem in (25).

Page 9: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2650 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

TABLE I

ITERATIVE RESOURCE ALLOCATION ALGORITHM

Theorem 1: Suppose that the optimization problem in (32)is feasible. Then, for reqk

> 0 and tol > 0, the rank-oneconstraint relaxation of Wk , of the SDP relaxed optimizationproblem in (32) is tight, i.e., Rank(Wk) = 1,∀k. Besides,Rank(U) ≤ 1, Rank(Z) ≤ 1, Rank(V) ≤ 1.

Proof: Please refer to the Appendix.Theorem 1 states that the globally optimal solution of (32)

can be obtained by information beamforming for each IR,despite the HWIs at the transceivers. Moreover, beamformingis also optimal for wireless charging and jamming in Phase Iand Phase II, respectively, even when the non-linearity ofthe EH circuits, the residual HWIs, and the imperfect CSIare taken into account. In summary, we first discretize thecontinuous optimization variables τI, τII. Then, we solve (32)for each pair of τI, τII satisfying τI + τII ∈ [0, Tmax]. Finally,we obtain the globally optimal solution10 of (20) by employinga two-dimensional search over all combinations of τI, τII tofind the minimum objective value.

B. Suboptimal Solution

Although the method proposed in the last sectionachieves the globally optimal solution of (20), it requiresa two-dimensional search with respect to optimizationvariables τI, τII and the number of SDPs to be solved increasequadratically with the resolution of the search grid. To reducethe computational complexity, we propose in the followinga suboptimal resource allocation algorithm. In fact, (20) isjointly convex with respect to τI and τII when the otheroptimization variables are fixed. As a result, an iterative alter-nating optimization method [43] is proposed to obtain a locallyoptimal solution of (20) and the algorithm is summarized inTable I. The algorithm is implemented by a repeated loop.In line 2, we first set the iteration index l to zero and initializethe resource allocation policy.11 Variables τI(l) and τII(l)

10Note that the optimality of this method depends on the resolution of thediscretization.

11We randomly select a pair of {τI, τII} satisfying constraint C3 and solve(25) for {P ,Wk ,,N, tk , γ }. The obtained solution is adopted as the initialpoint for the proposed alternating optimization algorithm.

denote the time allocation policy in the l-th iteration. Then,in each iteration, for a given intermediate beamforming policy{P ′,W′

k ,′,N′, t ′k, γ ′}, we solve

minimize{τI,τII}τI PPS−I + τII(PAP−II + PPS−II)

s.t. C1, C2a, C2b,C3, C4,C6, (33)

c.f., line 4 of Table I. Since (33) is a linear programming (LP)problem, we can solve (33) via the simplex method or anystandard numerical solver for solving LPs [44]. The timeallocation obtained from (33), i.e., τ ′

I and τ ′II, is used as

an input to (25) for solving for {P ′,W′k ,

′,N′, t ′k, γ ′} viaSDP relaxation. Then, we repeat the procedure iterativelyuntil the maximum number of iterations is reached or conver-gence is achieved. Convergence to a locally optimal solutionof (20) is guaranteed for a sufficiently large number ofiterations [43], since the considered problem in (25) is convexwith respect to the optimization variable sets {τI, τII} and{P ′,W′

k ,′,N′, t ′k, γ ′} individually.

Remark 3: The computational complexity per iterationusing a numerical convex program solver for solving an SDPis given by [45]

O(

mn3 + m2n2 + m3), (34)

where O(·) is the big-O notation, m denotes the number ofsemidefinite cone constraints and n denotes the dimension ofthe semidefinite cone. In particular, for the problem at hand,m is equivalent to the number of constraints with respectto the semidefinite optimization matrices and n is the totalnumber of antennas in the system. For simplicity, we analyzethe computational complexity of the proposed optimal andsuboptimal algorithms by assuming NAP = NPS = N .Hence, the computational complexity of the proposed optimaland suboptimal algorithms with respect to the number ofinformation receivers K is given by12 [45]

O(

N2Grid

(√N log

( 1

))

×((6N + 3K )N3 + N2(6N + 3K )2 + (6N + 3K )3

))

(35)

and

O(

NIter

(√N log

( 1

))

×((6N + 3K )N3 + N2(6N + 3K )2 + (6N + 3K )3

)),

(36)

respectively, for a given solution accuracy � > 0 of theadopted numerical solver, where N2

Grid is the number ofgrids required for the two-dimensional search for the optimalvalues of τI and τII, and NIter is the maximum numberof iterations set for the suboptimal algorithm. Note that ingeneral, N2

Grid � NIter holds in practice, and the proposedsuboptimal algorithm provides a low-complexity solution forthe considered problem [45].

12We note that the computational complexity of the proposed suboptimalalgorithm is dominated by the complexity required for solving (25).

Page 10: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2651

TABLE II

SIMULATION PARAMETERS

V. SIMULATION

In this section, we evaluate the performance of the pro-posed optimal and suboptimal resource allocation schemes forthe considered WPCN architecture. The relevant simulationparameters are provided in Table II. For conducting thetwo-dimensional search for the optimal resource allocation,we quantize the possible ranges of τI, τII, 0.0001 ≤ τI, τII ≤Tmax, into 20×20 equally spaced intervals, and for simplicity,we normalize the duration of the communication slot toTmax = 1. Unless specified otherwise, we assume for thetransmitter HWI parameters k1 = 2.258×105 and k2 = 7.687,and for the receiver distortion parameter k3 = 0. The IRsare randomly distributed at a distance of 50 meters aroundthe AP and the data rate requirements of all IRs are equal,i.e., Rreqk

= Rreq bit/s, ∀k, while the maximum tolerable rateof Eve is Rtol = 0.1 bit/s. Besides, we assume NPS = 6,NAP = 6, and NEV = 2 antennas at the PS, AP, and Eve,respectively, unless specified otherwise. For calculating thesystem power consumption, to avoid counting the same powertwice, we consider only the power consumption of Phase Iand the power consumed from Eres (if any) in Phase II. In thesequel, we define the normalized maximum channel estimation

error of the eavesdropper as σ 2EVE = 1% ≥ υ2

AP→E‖G‖2

F,υ2

PS→E‖E‖2

F.

Besides, the results shown in this section were averaged over10, 000 fading channel realizations.

A. Convergence of Iterative Suboptimal Algorithm

Figure 3 illustrates the convergence behavior of the pro-posed iterative suboptimal algorithm for different numbers ofantennas equipped at the PS and the AP. We set the minimumrequired data rate per IR to Rreq = 8 bits/s/Hz. As can beobserved, the proposed iterative suboptimal algorithm con-verges within 10 iterations on average for all consideredscenarios. In particular, the performance of the suboptimalscheme closely approaches that of the optimal scheme. On theother hand, the numbers of antennas equipped at the APand the PS have only a small impact on the speed ofconvergence.

In the sequel, for studying the system performance, we setthe number of iterations for the proposed suboptimal algorithmto 10.

Fig. 3. Average total power consumption (dBm) versus the number ofiterations for different numbers of antennas equipped at the PS and the AP.

Fig. 4. Average total power consumption (dBm) versus minimum requireddata rate per IR, Rreq, for different values of receiver HWI parameter, k3.The double-sided arrows indicate the power saving due to the proposedoptimization.

B. Average Total Transmit Power VersusMinimum Required Rate

In Figure 4, we show the total average power consumptionversus the minimum required data rate per IR, Rreq, for differ-ent values of receiver HWI parameter, k3. Zero residual energyis assumed, i.e., Eres = 0. As can be seen from Figure 4,

Page 11: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2652 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

the total average power consumption of the proposed optimaland suboptimal schemes increases monotonically with Rreq.The reasons behind this are twofold. First, a higher transmitpower for the information signals, wksk , ' is necessary inorder to meet more stringent requirements on the minimumdata rate. Second, more power has to be allocated to theartificial noise, z, for neutralizing the increased informationleakage due to the higher power of wksk . Hence, the PS hasto increase the transmit power for wireless charging in Phase Ito ensure that a sufficient amount of energy is available forwireless information transfer and artificial noise generationin Phase II. Besides, it can be observed that the averagetotal power consumption increases for increasing receiver HWIparameter, k3. In fact, for the same amount of received power,the received SINR deteriorates if the receiver HWI parameter,k3, is increased. Hence, the AP has to sacrifice some spatialdegrees of freedom used for mitigation of the multiuserinterference received at each IR to alleviate the impact ofthe receiver HWIs. As a result, it becomes more challengingfor the AP to focus the energy of the information signals onthe IRs which results in a higher transmit power in Phase Iand Phase II. On the other hand, although only 10 iterationsare used, the proposed suboptimal scheme performs close tothe optimal scheme employing the two-dimensional exhaustivesearch.

For comparison, Figure 4 also contains the performanceof one benchmark scheme and three baseline schemes. Forthe benchmark scheme, we assume that perfect hardware isavailable at all transceivers of the considered WPCN, i.e., thereare no HWIs, and the corresponding performance serves asan upper bound for the proposed schemes. For baseline 1,we set PPS

max = PAPmax = 40 dBm. Then, we solve (20) with

the proposed optimal resource allocation algorithm but adopt afixed isotropic radiation pattern for V. For baseline 2, resourceallocation is performed subject to the same constraint set asin (20), except that the linear energy harvesting model [5]assuming a constant energy conversion efficiency η = 0.5 isconsidered. The performance of baseline 2 is then evaluatedfor the considered WPCN with non-linear energy harvestingcircuits. We also considered a baseline 3 where resourceallocation was performed subject to the same constraint setas in (20), except that the residual HWIs at the transceiverswere not taken into account. The performance of baseline 3was then evaluated in the presence of the residual HWIs.However, for the adopted simulation settings, baseline 3 couldnot satisfy the QoS requirements specified by constraintsC1 and C2 as the residual HWIs were ignored in the designphase. Therefore, performance results for baseline 3 are notshown in Figure 4. This underlines the importance of takingresidual HWIs into account for resource allocation design. Onthe other hand, as expected, the performance gap between thescheme with the perfect hardware and the proposed schemesis slightly enlarged as Rreq increases. In fact, the interferencecaused by the transmitter and receiver HWIs increases with thetransmit power and the received power, respectively. Hence,a higher data rate requirement, Rreq, magnifies the impact ofthe HWIs on system performance. Furthermore, as can beobserved from Figure 4, baseline 1 consumes a significantly

Fig. 5. Average power allocation (dBm) versus minimum required data rateper IR, Rreq, for k3 = 0.

higher power compared to the proposed schemes. This isbecause baseline 1 is less efficient in wireless charging com-pared to the proposed schemes. In particular, the PS and theAP cannot fully utilize the available degrees of freedom sincethe direction of the transmit energy signal at the PS in Phase Iis fixed. The resulting performance gap reveals the importanceof optimizing all beamforming matrices for the minimizationof the total power consumption of the considered WPCN.Besides, it can be observed that the proposed optimal andsuboptimal algorithms provide substantial power consumptionsavings compared to baseline 2, particularly when the HWIsare severe. In fact, baseline 2 causes a mismatch in resourceallocation since it does not account for the non-linearity of theenergy harvesting circuits.

In Figures 5 and 6, we depict the time allocation andpower allocation of the proposed schemes and baseline 1 forthe scenario with k3 = 0 studied in Figure 4. In particular,Figure 6 shows the average transmit powers allocatedto the three components13 of the transmitted signals,i.e.,

∑Kk=1 Tr(Wk), Tr(V), and Tr(Z). First, it can be observed

from Figure 5 that the time allocated14 to Phase I for wirelesscharging in the considered WPCN is monotonically increasingwith respect to the minimum data rate requirement per IR.In fact, the system increases both the transmit power andthe time duration allocated to the PS in Phase I to enablea more effective wireless charging of the AP as the datarate requirement becomes more stringent. Besides, for allconsidered values of Rreq, it can be seen that a small portion oftime is allocated for wireless charging while a large portion oftime is reserved for wireless information transfer. Recall thatthe equivalent minimum required SINR at IR k is defined as reqk

= 2Rreqk /τII − 1. Hence, increasing the value of τII caneffectively lower the required equivalent SINR so as to reducethe total system power consumption. On the other hand, asexpected, the amounts of power allocated to the informationsignals and the energy/artificial noise signals, v, z, increasefor the proposed schemes as the minimum required data rateper IR Rreq increases. In particular, the power allocated to

13Since Tr(U) = 0 in all the considered cases, it is not shown in Figure 6.14Note that the time allocation for the proposed suboptimal scheme is

similar to that of the optimal scheme, and hence, is omitted for brevity.

Page 12: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2653

Fig. 6. Average power allocation (dBm) versus minimum required data rateper IR, Rreq, for k3 = 0.

the energy/artificial noise signals, v, z, increases as fast asthe power allocated to the information signals when Rreqincreases. This is because for a more stringent data raterequirement, a higher transmit power is needed for informa-tion transmission, and thus, the considered WPCN system ismore vulnerable to eavesdropping. Hence, also more energyhas to be allocated to the energy/artificial noise signals formore effective wireless charging and jamming. Interestingly,Tr(U) = 0 holds for all considered values of the required datarate which suggests that generating artificial noise at the AP forjamming is not beneficial. In fact, transmitting artificial noisefrom the AP for ensuring communication security is less powerefficient than transmitting the artificial noise directly fromthe PS. The reasons for this are twofold. First, the non-linearityof the energy harvesting circuits limits the maximum amountof harvestable energy for generating a strong jamming signalat the AP. Second, since Eres = 0, all energy consumed at theAP has to be harvested first from the RF signals transmitted bythe PS. As a result, if the AP utilizes the energy harvested inPhase I to generate a jamming signal in Phase II, the energyof the jamming signal is subject to the attenuation of boththe PS-to-AP link and the AP-to-Eve link before reaching thepotential eavesdropper. Such a “double energy attenuation"severely decreases the efficiency of communication securityprovisioning, and thus is avoided by the optimal resourceallocation scheme.

In Figure 7, we show the average total power consumptionversus the number of antennas equipped at the PS and theAP for different resource allocation schemes. The minimumrequired data rate of the IRs is set to Rreq = 8 bits/s/Hz. Forsimplicity, we assume that NAP = NPS. As can be seen fromFigure 7, the total transmit power decreases with increasingnumbers of antennas. In fact, the extra degrees of freedomoffered by increasing numbers of antennas can be exploitedfor more efficient resource allocation. Specifically, with moreantennas, the direction of beamforming matrices V and Wk

can be more accurately steered towards the AP and IR k,respectively, which substantially reduces the transmit powerrequired in Phase I and Phase II, respectively, for satisfying

Fig. 7. Average total power consumption (dBm) versus the numbers ofantennas equipped at the PS and the AP, NAP and NPS, for different amountsof available residual energy Eres.

Fig. 8. Average total power consumption (dBm) versus the transmitter HWIparameter, k1, for different values of k2.

the data rate requirement. Besides, the additional antennasat the AP serve as additional wireless energy collectors forenergy harvesting which substantially improves the efficiencyof energy harvesting at the AP. Also, the proposed schemesprovide substantial power savings compared to baseline 1 dueto the proposed optimization. Furthermore, the performancegap between the case of perfect hardware and the proposedschemes diminishes as the numbers of antennas equipped atthe AP and PS increase, since a lower transmit power andmore accurate beamforming alleviate the impact of transmitand receive HWIs, respectively. On the other hand, a higheramount of residual energy Eres reduces the total power con-sumption of the system. Indeed, less PS transmit power isrequired for wireless charging in Phase I when the AP isequipped with a certain amount of residual energy Eres. Thisalso substantially reduces the power waste due to the highsignal propagation loss in wireless charging in Phase I.

Figure 8 depicts the average total power consumption versusthe transmitter HWI parameter k1 for the proposed optimal andsuboptimal resource allocation schemes for different valuesof k2. The residual energy and the minimum required datarate are set to Eres = 0 and Rmin = 8 bit/s/Hz, respectively.

Page 13: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2654 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

Fig. 9. Average total power consumption (dBm) versus the normalizedmaximum channel estimation error for different numbers of antennas equippedat the eavesdropper, NE.

As can be observed, the power consumption of the systemincreases with the transmitter HWI parameter k1. This isbecause the power waste in (17)-(19) increases when the trans-mitter HWIs become more severe leading to a less efficientresource allocation. Besides, the system power consumptionof the proposed optimal and suboptimal schemes decreaseswith increasing k2. As a matter of fact, when the transmitpower is properly controlled below 1 watt, cf. (6), increasingk2 decreases the power waste caused by HWIs. On the otherhand, the system power consumption of the proposed schemesis significantly lower than that of baseline 1. Besides, for thescheme with perfect hardware, the performance is independentof the HWI levels, of course, and serves as an upper boundfor the proposed schemes.

In Figure 9, we show the average total power consumptionof the system versus the normalized maximum channel esti-mation error. The minimum required data rate of the IRs isset to Rreq = 4 bits/s/Hz. As can be observed, the averagetotal power consumption increases with increasing maximumchannel estimation error for all considered schemes. In fact,as the imperfectness of the CSI increases, both the AP andthe PS become less capable of exploiting the available spatialdegrees of freedom efficiently for resource allocation. As aresult, the PS has to allocate more power to the artificialnoise, z, to prevent interception by the eavesdropper so as tofulfill constraint C2. Besides, the proposed schemes providea substantial system power saving compared to baseline 1,despite the imperfect CSI. Furthermore, the performance gapbetween the proposed schemes and the scheme with perfecthardware increases as the CSI knowledge becomes less accu-rate. In fact, the higher transmit power needed in the presenceof imperfect CSI at both the PS and AP to fulfill the QoSrequirement worsens the impact of the HWIs. On the otherhand, more power is consumed if the eavesdropper is equippedwith more antennas. This is attributed to the fact that theeavesdropping capability of the eavesdropper improves withNE. To still guarantee communication security, the PS has toallocate more power to the artificial noise which leads to ahigher system power consumption.

VI. CONCLUSIONS

In this paper, we studied the power-efficient resource alloca-tion algorithm design for providing communication secrecy inWPCNs, where we took into account a practical non-linearEH model and the residual HWIs at the transceivers. Theresource allocation algorithm design was formulated as a non-convex optimization problem for the minimization of the totalconsumed power subject to QoS constraints at the IRs. Theoptimal solution of the design problem was obtained via atwo-dimensional search and SDP relaxation. Besides, a lowcomputational complexity suboptimal solution was also pro-vided. Numerical results demonstrated the detrimental effectsof residual HWIs on performance in WPCNs. Furthermore,although residual HWIs limit the system performance in thehigh transmit/receive power regimes, the resulting perfor-mance degradation can be effectively alleviated by increasingthe number of antennas in the system and by acquiring moreaccurate CSI of the eavesdropper.

APPENDIX

PROOF OF THEOREM 1

The proof is divided into two parts. In the first part,we study the rank of the information beamforming matrix,Wk,∀k. Then, we investigate the ranks of energy beamformingmatrices V, U, and Z in the second part. Since the SDP relaxedproblem in (32) satisfies Slater’s constraint qualification andis jointly convex with respect to the optimization variables,strong duality holds and we can exploit the dual problem [44]in order to study the structure of the solution of the primalproblem. To this end, we write the Lagrangian functionof (32) as:

L = (ρAPτII + ϑ)( K∑

k=1

Tr(

Wk

))+ (ψ + ρPSτI)Tr

(V

)

− β(

Tr(LH VL))+

K∑k=1

θk

(Tr(Hk

K∑i=1

Wi ))

− Tr(

DC10 V)

+K∑

k=1

λk

( ∑j �=k

Tr(

HkW j

)−

Tr(

HkWk

)

req

)

−K∑

k=1

Tr(

DC17k Wk

)+

NAP∑n=1

ϕn

( K∑k=1

Tr(SnWk))

−K∑

k=1

Tr(

DC2ak SC2ak

(BAP,U,Wk,N, tk

))

+NPS∑

m=1

χm

(Tr(SmV)− bm

)+�, (37)

where variables λk , β, ψ , ϑ , ϕn , χm , and θk are the non-negative Lagrange multipliers associated with constraints C1,C5, C7, C9, C12b, C13b, and C15b, respectively. Moreover,DC2ak � 0,∀k, DC10 � 0, and DC17k � 0,∀k, are theLagrangian multiplier matrices corresponding to constraintsC2a, C10, and C17, respectively. � denotes the collection

Page 14: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2655

of terms not relevant for the proof. The Karush-Kuhn-Tucker(KKT) conditions needed for the proof are given by15:

D∗C2ak

� 0, ∀k, D∗C10 � 0, D∗

C17k� 0, ∀k, (38)

β∗, λ∗k , ϑ

∗, ψ∗, ϕ∗n , θ

∗k , χ

∗m ≥ 0, (39)

D∗C17k

W∗k = 0, ∀k, D∗

C10V∗ = 0, (40)

∇W∗kL = 0, ∀k, ∇V∗L = 0. (41)

Now, we investigate the rank of W∗k . From the complemen-

tary slackness conditions in (40), we know that the columnsof W∗

k lie in the null space of D∗C17k

. Hence, we focus onstudying the range space of D∗

C17kfor revealing the structure

of W∗k . By exploiting the KKT conditions in (41), after some

mathematical manipulations, we obtain:

D∗C17k

= �k − λ∗k

Hk

reqk

, (42)

where

�k = ρAPτIIIk +∑j �=k

λ∗j H j + RGD∗

C2akRH

G

tol

+NAP∑n=1

ϕnSn +K∑

k=1

θkHk � 0 .

Then, we study the rank of D∗C17k

for τII > 0 by exploiting (42)which yields:

Rank(

D∗C17k

+ λ∗k

Hk

reqk

)

= Rank(�k) = NAP (43)

⇒ Rank(

D∗C17k

)+ Rank

(λ∗

kHk

reqk

)(44)

(a)≥ Rank(

D∗C17k

+ λ∗k

Hk

reqk

)= NAP (45)

(b)⇒ Rank(

D∗C17k

)≥ NAP − 1, (46)

where (a) is due to a basic rank inequality and (b) is dueto λ∗

k > 0 at the optimal solution. Since Rank(

D∗C17k

)≥

NAP − 1, in order to satisfy (40), it is required thatRank

(W∗

k

)≤ 1. In other words, either W∗

k =0 or Rank(W∗

k ) = 1. On the other hand, reqk> 0,∀k,

and hence W∗k �= 0. As a result, Rank(W∗

k ) = 1 holds at theoptimal solution of the SDP relaxed problem in (25). Thiscompletes the proof of the first part.

In the second part, we show Rank(V∗) ≤ 1. Byexploiting (41), we have the following equation:

D∗C10 = ρPSτIIIPS +

NAP∑m=1

χ∗mSm − β∗LLH . (47)

Since matrix D∗C10 is positive semidefinite, the following

inequalities must hold

λmax

(ρPSτIIIPS + ∑NAPm=1 χ

∗mSm

β∗)

≥ λmaxLLH ≥ 0, (48)

15We denote the optimal solution for optimization variable x by x∗.

where λmaxLLH is the real-valued maximum eigenvalue of

matrix LLH and β∗ > 0 at the optimal solution.

If λmax

(ρPSτIIIPS+∑NAP

m=1 χ∗mSm

β∗)> λmax

LLH , D∗C10 will become

positive definite and a full rank matrix, i.e., Rank(D∗C10) =

NPS. Thus, to satisfy the complementary slackness conditionin (40), V∗ = 0 or Rank(V∗) ≤ 1 holds at the optimalsolution.16

On the other hand, if λmax

(ρPSτIIIPS+∑NAP

m=1 χ∗mSm

β∗)

= λmaxLLH ,

in order to have a bounded optimal dual solution, it followsthat the null space of D∗

C10 is spanned by a vector umaxLLH ,

which is the unit norm eigenvector of LLH associated witheigenvalue λmax

LLH . Hence, Rank(D∗C10) ≥ NPS − 1. By using a

similar approach as in the first part of this proof for provingRank(W∗

k ) = 1, we can show that Rank(V∗) ≤ 1.As for proving Rank(U∗) ≤ 1 and Rank(Z∗) ≤ 1, we can

follow the same approach as in the second part of this proof.The details are omitted here due to page limitation. �

REFERENCES

[1] E. Boshkovska, D. W. K. Ng, and R. Schober, “Power-efficient andsecure WPCNs with residual hardware impairments and a non-linearEH model,” in Proc. IEEE Global Telecommun. Conf., 2017, pp. 1–7.

[2] S. Bi, Y. Zeng, and R. Zhang, “Wireless powered communicationnetworks: An overview,” IEEE Wireless Commun., vol. 23, no. 2,pp. 10–18, Apr. 2016.

[3] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From today’s Intranet ofThings to a future Internet of Things: A wireless- and mobility-relatedview,” IEEE Wireless Commun., vol. 17, no. 6, pp. 44–51, Dec. 2010.

[4] Q. Wu, M. Tao, D. W. K. Ng, W. Chen, and R. Schober, “Energy-efficient resource allocation for wireless powered communication net-works,” IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2312–2327,Mar. 2016.

[5] H. Ju and R. Zhang, “Throughput maximization in wireless poweredcommunication networks,” IEEE Trans. Wireless Commun., vol. 13,no. 1, pp. 418–428, Jan. 2014.

[6] H. Chen, Y. Li, J. L. Rebelatto, B. F. Uchôa-Filho, and B. Vucetic,“Harvest-then-cooperate: Wireless-powered cooperative communica-tions,” IEEE Trans. Signal Process., vol. 63, no. 7, pp. 1700–1711,Apr. 2015.

[7] I. Krikidis, S. Timotheou, S. Nikolaou, G. Zheng, D. W. K. Ng, andR. Schober, “Simultaneous wireless information and power transfer inmodern communication systems,” IEEE Commun. Mag., vol. 52, no. 11,pp. 104–110, Nov. 2014.

[8] X. Chen, Z. Zhang, H.-H. Chen, and H. Zhang, “Enhancing wirelessinformation and power transfer by exploiting multi-antenna techniques,”IEEE Commun. Mag., vol. 53, no. 4, pp. 133–141, Apr. 2015.

[9] Z. Ding et al., “Application of smart antenna technologies in simulta-neous wireless information and power transfer,” IEEE Commun. Mag.,vol. 53, no. 4, pp. 86–93, Apr. 2015.

[10] J. Zhang, L. Dai, S. Sun, and Z. Wang, “On the spectral efficiency ofmassive MIMO systems with low-resolution ADCs,” IEEE Commun.Lett., vol. 20, no. 5, pp. 842–845, May 2016.

[11] E. Björnson, P. Zetterberg, and M. Bengtsson, “Optimal coordinatedbeamforming in the multicell downlink with transceiver impairments,”in Proc. IEEE Global Telecommun. Conf., Dec. 2012, pp. 4775–4780.

[12] J. Zhang, L. Dai, X. Zhang, E. Björnson, and Z. Wang, “Achiev-able rate of Rician large-scale MIMO channels with transceiver hard-ware impairments,” IEEE Trans. Veh. Technol., vol. 65, no. 10,pp. 8800–8806, Oct. 2016.

[13] C. Studer, M. Wenk, and A. Burg, “MIMO transmission with residualtransmit-RF impairments,” in Proc. Int. ITG Workshop Smart Antennas(WSA), Feb. 2010, pp. 189–196.

[14] J. Zhang, X. Xue, E. Björnson, B. Ai, and S. Jin, “Spectral efficiency ofmultipair massive MIMO two-way relaying with hardware impairments,”IEEE Wireless Commun. Lett., to be published.

16In practice, the solution of V∗ = 0 corresponds to the case when Eres issufficiently large and hence Phase I for wireless charging is not necessary.

Page 15: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

2656 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 66, NO. 6, JUNE 2018

[15] E. Björnson and E. Jorswieck, “Optimal resource allocation in coordi-nated multi-cell systems,” Found. Trends Commun. Inf. Theory, vol. 9,nos. 2–3, pp. 113–381, 2013.

[16] X. Chen, D. W. K. Ng, and H.-H. Chen, “Secrecy wireless informa-tion and power transfer: Challenges and opportunities,” IEEE WirelessCommun., vol. 23, no. 2, pp. 54–61, Apr. 2016.

[17] M. Liu and Y. Liu, “Power allocation for secure SWIPT systems withwireless-powered cooperative jamming,” IEEE Commun. Lett., vol. 21,no. 6, pp. 1353–1356, Jun. 2017.

[18] Y. Wu, X. Chen, C. Yuen, and C. Zhong, “Robust resource allocationfor secrecy wireless powered communication networks,” IEEE Commun.Lett., vol. 20, no. 12, pp. 2430–2433, Dec. 2016.

[19] D. W. K. Ng and R. Schober, “Secure and green SWIPT in distributedantenna networks with limited backhaul capacity,” IEEE Trans. WirelessCommun., vol. 14, no. 9, pp. 5082–5097, Sep. 2015.

[20] X. Chen, J. Chen, and T. Liu, “Secure transmission in wireless poweredmassive MIMO relaying systems: Performance analysis and optimiza-tion,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8025–8035,Oct. 2016.

[21] W. Liu, X. Zhou, S. Durrani, and P. Popovski, “Secure communica-tion with a wireless-powered friendly jammer,” IEEE Trans. WirelessCommun., vol. 15, no. 1, pp. 401–415, Jan. 2016.

[22] H. Niu, D. Guo, Y. Huang, and B. Zhang, “Robust energy efficiencyoptimization for secure MIMO SWIPT systems with non-linear EHmodel,” IEEE Commun. Lett., vol. 21, no. 12, pp. 2610–2613, Dec. 2017.

[23] H. Niu, D. Guo, Y. Huang, B. Zhang, and B. Gao, “Outage constrainedrobust energy harvesting maximization for secure MIMO SWIPT sys-tems,” IEEE Wireless Commun. Lett., vol. 6, no. 5, pp. 614–617,Oct. 2017.

[24] H. Niu, B. Zhang, D. Guo, and Y. Huang, “Joint robust design for secureAF relay networks with SWIPT,” IEEE Access, vol. 5, pp. 9369–9377,Apr. 2017.

[25] Y. Bi and H. Chen, “Accumulate and jam: Towards secure communi-cation via a wireless-powered full-duplex jammer,” IEEE J. Sel. TopicsSignal Process., vol. 10, no. 8, pp. 1538–1550, Dec. 2016.

[26] J. Moon, H. Lee, C. Song, and I. Lee, “Secrecy performance opti-mization for wireless powered communication networks with an energyharvesting jammer,” IEEE Trans. Commun., vol. 65, no. 2, pp. 764–774,Feb. 2017.

[27] J. Zhu, D. W. K. Ng, N. Wang, R. Schober, and V. K. Bhargava,“Analysis and design of secure massive MIMO systems in the presenceof hardware impairments,” IEEE Trans. Wireless Commun., vol. 16,no. 3, pp. 2001–2016, Mar. 2017.

[28] D. K. Nguyen, M. Matthaiou, T. Q. Duong, and H. Ochi, “RF energy har-vesting two-way cognitive DF relaying with transceiver impairments,”in Proc. IEEE Int. Conf. Commun. Workshop (ICCW), Jun. 2015,pp. 1970–1975.

[29] J. Zhu, Y. Li, N. Wang, and W. Xu, “Wireless information and powertransfer in secure massive MIMO downlink with phase noise,” IEEEWireless Commun. Lett., vol. 6, no. 3, pp. 298–301, Jun. 2017.

[30] J. Guo and X. Zhu, “An improved analytical model for RF-DC con-version efficiency in microwave rectifiers,” in IEEE MTT-S Int. Microw.Symp. Dig., Jun. 2012, pp. 1–3.

[31] T. Schenk, RF Imperfections in High-Rate Wireless Systems: Impact andDigital Compensation. New York, NY, USA: Springer, 2010.

[32] “LTE performance vs. output power, model: HXG-122+,”Minicircuits.com, New York, NY, USA, Tech. Note AN-60-050.[Online]. Available: http://www.minicircuits.com/app/AN60-050.pdf

[33] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Prac-tical non-linear energy harvesting model and resource allocation forSWIPT systems,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2082–2085,Dec. 2015.

[34] E. Boshkovska, D. W. K. Ng, N. Zlatanov, A. Koelpin, and R. Schober,“Robust resource allocation for MIMO wireless powered communicationnetworks based on a non-linear EH model,” IEEE Trans. Commun.,vol. 65, no. 5, pp. 1984–1999, May 2017.

[35] E. Boshkovska, X. Chen, L. Dai, D. W. K. Ng, and R. Schober. (2017).Max-min Fair Beamforming for SWIPT Systems With Non-Linear EHModel. [Online]. Available: https://arxiv.org/abs/1705.05029

[36] Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, “Multi-objectiveoptimization for robust power efficient and secure full-duplex wirelesscommunication systems,” IEEE Trans. Wireless Commun., vol. 15, no. 8,pp. 5511–5526, Aug. 2016.

[37] G. Zheng, K.-K. Wong, and T.-S. Ng, “Robust linear MIMO in the down-link: A worst-case optimization with ellipsoidal uncertainty regions,”EURASIP J. Adv. Signal Process., vol. 2008, Jul. 2008, Art. no. 154.

[38] Q. Li and W.-K. Ma, “Spatially selective artificial-noise aided transmitoptimization for MISO multi-eves secrecy rate maximization,” IEEETrans. Signal Process., vol. 61, no. 10, pp. 2704–2717, May 2013.

[39] A. Mukherjee and A. L. Swindlehurst, “Detecting passive eavesdroppersin the MIMO wiretap channel,” in Proc. IEEE Intern. Conf. Acoust.,Speech Signal Process., Mar. 2012, pp. 2809–2812.

[40] S. Zhang, Q. Wu, S. Xu, and G. Y. Li, “Fundamental green tradeoffs:Progresses, challenges, and impacts on 5G networks,” IEEE Commun.Surveys Tuts., vol. 19, no. 1, pp. 33–56, 1st Quart., 2017.

[41] Z.-Q. Luo, J. F. Sturm, and S. Zhang, “Multivariate nonnegativequadratic mappings,” SIAM J. Optim., vol. 14, no. 4, pp. 1140–1162,2004.

[42] M. Grant and S. Boyd. (Mar. 2014). CVX: MATLAB Software forDisciplined Convex Programming, Version 2.1. [Online]. Available:http://cvxr.com/cvx

[43] J. C. Bezdek and R. J. Hathaway, “Convergence of alternating opti-mization,” Neural, Parallel Sci. Comput., vol. 11, no. 4, pp. 351–368,2003.

[44] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:Cambridge Univ. Press, 2004.

[45] I. Pólik and T. Terlaky, Interior Point Methods for Nonlinear Optimiza-tion, G. D. Pillo and F. Schoen, Eds., 1st ed. Berlin, Germany: Springer,2010.

Elena Boshkovska (S’15) was born in Skopje,Macedonia. She received the B.Sc. degreein electrical engineering from Ss. Cyril andMethodius University, Skopje, in 2013, and theM.Sc. degree in communications and multimediaengineering from Friedrich-Alexander-UniversitätErlangen-Nürnberg, Germany, in 2015.

Derrick Wing Kwan Ng (S’06–M’12–SM’17)received the bachelor’s degree (Hons.) and theM.Phil. degree in electronic engineering from theHong Kong University of Science and Technol-ogy in 2006 and 2008, respectively, and thePh.D. degree from The University of BritishColumbia in 2012. From 2011 to 2012, he was aVisiting Scholar with the Centre Tecnològic de Tele-comunicacions de Catalunya-Hong Kong. He wasa Senior Post-Doctoral Fellow with the Institutefor Digital Communications, Friedrich-Alexander-

Universität Erlangen-Nürnberg, Germany. He is currently a Senior Lec-turer and an ARC DECRA Research Fellow with the University ofNew South Wales, Sydney, NSW, Australia. His research interests includeconvex and non-convex optimization, physical layer security, wirelessinformation and power transfer, and green (energy-efficient) wirelesscommunications. He received best paper awards from the IEEE Interna-tional Conference on Computing, Networking and Communications (ICNC)in 2016, the IEEE Wireless Communications and Networking Confer-ence in 2012, the IEEE Global Telecommunication Conference (Globecom)in 2011, and the IEEE Third International Conference on Communicationsand Networking in China in 2008. He was honored as an ExemplaryReviewer of the IEEE TRANSACTIONS ON COMMUNICATIONS in 2015,the top Reviewer of the IEEE TRANSACTIONS ON VEHICULAR TECH-NOLOGY in 2014 and 2016, and an Exemplary Reviewer of the IEEEWIRELESS COMMUNICATIONS LETTERS in 2012, 2014, and 2015. He hasbeen serving as an Editorial Assistant to the Editor-in-Chief of the IEEETRANSACTIONS ON COMMUNICATIONS since 2012. He is currently an Editorof the IEEE COMMUNICATIONS LETTERS, the IEEE TRANSACTIONS ON

WIRELESS COMMUNICATIONS, and the IEEE TRANSACTIONS ON GREEN

COMMUNICATIONS AND NETWORKING.

Page 16: Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH …oa.ee.tsinghua.edu.cn/dailinglong/publications/paper... · 2018-06-28 · BOSHKOVSKA et al.: POWER-EFFICIENT

BOSHKOVSKA et al.: POWER-EFFICIENT AND SECURE WPCNs WITH HWIs AND NON-LINEAR EH CIRCUIT 2657

Linglong Dai (M’11–SM’14) received the B.S.degree from Zhejiang University in 2003, the M.S.degree (Hons.) from the China Academy ofTelecommunications Technology in 2006, and thePh.D. degree (Hons.) from Tsinghua University,Beijing, China, in 2011. From 2011 to 2013, hewas a Post-Doctoral Research Fellow with theDepartment of Electronic Engineering, TsinghuaUniversity, where he was an Assistant Professorfrom 2013 to 2016. He has been an AssociateProfessor with Tsinghua University since 2016.

He co-authored the book mmWave Massive MIMO: A Paradigm for 5G(Elsevier, 2016). He has published over 50 IEEE journal papers and over40 IEEE conference papers. He also holds 13 granted patents. His currentresearch interests include massive MIMO, millimeter-wave communications,NOMA, sparse signal processing, and machine learning. He has received fourconference best paper awards from the the IEEE ICC 2013, the IEEE ICC2014, the IEEE ICC 2017, and the IEEE VTC 2017. He has also received theTsinghua University Outstanding Ph.D. Graduate Award in 2011, the BeijingExcellent Doctoral Dissertation Award in 2012, the China National ExcellentDoctoral Dissertation Nomination Award in 2013, the URSI Young ScientistAward in 2014, the IEEE TRANSACTIONS ON BROADCASTING Best PaperAward in 2015, the Second Prize of Science and Technology Award of ChinaInstitute of Communications in 2016, the IEEE COMMUNICATIONS LETTERSExemplary Editor Award in 2017, the National Natural Science Foundationof China for Outstanding Young Scholars in 2017, and the IEEE ComSocAsia-Pacific Outstanding Young Researcher Award in 2017. He currentlyserves as an Editor of the IEEE TRANSACTIONS ON COMMUNICATIONS,the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, and the IEEECOMMUNICATIONS LETTERS.

Robert Schober (M’01–SM’08–F’10) was bornin Neuendettelsau, Germany, in 1971. He receivedthe Diplom degree (Univ.) and Ph.D. degree inelectrical engineering from Friedrich-Alexander-Universitäyt Erlangen-Nürnberg (FAU), Germany,in 1997 and 2000, respectively. From 2001 to 2002,he was a Post-Doctoral Fellow with the Universityof Toronto, Canada, sponsored by the GermanAcademic Exchange Service. From 2002 to 2011,he was a Professor and the Canada Research Chairat The University of British Columbia (UBC),

Vancouver, BC, Canada. Since 2012, he has been an Alexander vonHumboldt Professor and the Chair for digital communication with FAU. Hisresearch interests fall into the broad areas of communication theory, wirelesscommunications, and statistical signal processing.

Dr. Schober is a fellow of the Canadian Academy of Engineeringand a fellow of the Engineering Institute of Canada. He is aMember-at-Large of the Board of Governors and a DistinguishedLecturer of the IEEE Communications Society. He received several awardsfor his work, including the 2002 Heinz Maier-Leibnitz Award of the GermanScience Foundation, the 2004 Innovations Award of the Vodafone Foundationfor Research in Mobile Communications, the 2006 UBC Killam ResearchPrize, the 2007 Wilhelm Friedrich Bessel Research Award of the Alexandervon Humboldt Foundation, the 2008 Charles McDowell Award for Excellencein Research from UBC, the 2011 Alexander von Humboldt Professorship,the 2012 NSERC E.W.R. Stacie Fellowship, and the 2017 Wireless Commu-nications Recognition Award. In addition, he has received several best paperawards for his research. He is currently the Chair of the Steering Committeeof the IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL AND MULTI-SCALE COMMUNICATION. He is currently serves on the Editorial Boardof the PROCEEDINGS OF THE IEEE. From 2012 to 2015, he served as theEditor-in-Chief of the IEEE TRANSACTIONS ON COMMUNICATIONS.