Professional Documents
Culture Documents
5.1 Introduction
Wireless-Powered Communication Networks: Architecture, Protocols, and Applications, ed. Dusit Niyato,
Ekram Hossain, Dong In Kim, Vijay Bhargava, and Lotfollah Shafai. Published by Cambridge University
Press. © Cambridge University Press 2017.
170
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 171
available in indoor environments. Thus, a new form of controllable energy source for
portable wireless devices is needed in order to extend the lifetime of communication
networks.
5.1.1 Background
In 1899, Nikola Tesla proposed the wireless transmission of electrical power via a
magnifying transmitter, an advanced version of the Tesla coil transmitter. The use of
wireless power transfer (WPT) avoids the potentially high costs of planning, installing,
displacing, and maintaining power cables in buildings and infrastructure. Despite its
convenience, one of the major challenges in realizing WPT is its low power transfer effi-
ciency. In practice, wireless power has to be transferred via a carrier signal with a high
carrier frequency such that antennas of reasonable size can be used for harvesting power.
The associated path loss severely attenuates the signal, leading to only a small amount
of power being harvested at the receiver. Besides, the initial efforts on WPT focused on
high-power-consumption applications. This raised serious public health concerns about
strong electromagnetic radiation which prevented the further development of WPT in
the late twentieth century. As a result, this area developed slowly until recent advances
in silicon technology and multiple-antenna technology made WPT attractive once again.
In particular, the breakthrough in silicon technology has significantly reduced the energy
demand of simple wireless devices. Thus, harvesting energy1 from background radio-
frequency (RF) signals originating from ambient transmitters can support the power
needs of low-power-consumption receivers. Besides, multiple-antenna technology has
revolutionized the design of traditional communication systems for a better utilization
of limited system resources. For example, a multiple-antenna transmitter can focus its
transmitted signal into certain locations to improve the signal reception at the receivers.
It has been shown that the use of multiple antennas in communication systems can
significantly reduce the total transmit power and improve the system energy efficiency
for given QoS requirements. Thus, it is envisioned that multiple-antenna technology is
also the key to unlock the potential of WPT.
1 In this chapter, a normalized energy unit, i.e., Joule-per-second, is considered. Therefore, the terms “power”
and “energy” are used interchangeably.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
172 Derrick Wing Kwan Ng et al.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 173
In Sections 5.3 and 5.4, we formulate and solve single-objective and multi-objective
optimization problems arising in the design of SWIPT systems, respectively. Section 5.5
studies beamforming design for guaranteeing secure communications in SWIPT
systems. In Section 5.6, we discuss some research challenges in multiple-antenna
SWIPT systems and paths to potential solutions. Section 5.7 concludes this chapter with
a brief summary. Now, we first introduce the main notations adopted in this chapter.
5.1.3 Notation
The key mathematical notations are summarized in Table 5.1. We use boldface capital
and lower-case letters to denote matrices and vectors, respectively. AH , Tr(A), and
Rank(A) represent the Hermitian transpose, the trace, and the rank of matrix A, respec-
tively; A
0 and A 0 indicate that A is a positive definite and a positive semidef-
inite matrix, respectively; vec(A) denotes the vectorization of matrix A by stacking its
columns from left to right to form a column vector; λmax A denotes the maximum
eigenvalue of Hermitian matrix A; IN is the N × N identity matrix; CN×M and RN×M
denote the set of all N × M matrices with complex and real entries, respectively; HN
denotes the set of all N × N Hermitian matrices; diag(x1 , . . . , xK ) denotes a diagonal
matrix with the diagonal elements given by {x1 , . . . , xK }; |·| and · denote the absolute
value of a complex scalar and the l2 -norm of a vector, respectively; the circularly
symmetric complex Gaussian (CSCG) distribution is denoted by CN (μ, σ 2 ) with mean
μ and variance σ 2 ; ∼ stands
for “distributed as”; 1 denotes a column vector with all
elements equal to one. · a,b returns the (a, b)th element of the input matrix, θ n is the
nth unit column vector, i.e., θ n t,1 = 1, if t = n, and θ n t,1 = 0, ∀t = n.
Notation Description
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
174 Derrick Wing Kwan Ng et al.
Figure 5.1 A multiuser SWIPT downlink model with an information receiver (IR) and J = 2 idle
receivers. The idle receivers work as energy harvesting receivers (ERs) to harvest energy from
the received radio-frequency (RF) signals for extending their lifetimes.
y = hH x + za , (5.1)
yER
j = j x + zj ,
gH ∀j ∈ {1, . . . , J}, (5.2)
where x ∈ CNT ×1 denotes the transmitted symbol vector. hH ∈ C1×NT is the channel
vector between the transmitter and the desired receiver and gH j ∈ C
1×NT is the channel
vector between the transmitter and idle receiver j. We note that both variables, h and gj ,
include the effects of the multi-path fading and path loss of the associated channels. za
and zj are additive white Gaussian noises (AWGNs) resulting from the receive antenna
2 and σ 2 , respectively.
at the IR and ER j, respectively, with zero mean and variance σant antj
This simple system model is adopted for illustration of the beamforming design in
multiple-antenna SWIPT systems in Sections 5.3 and 5.4 in this chapter.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 175
allocation algorithm designs have been studied in the literature for different wire-
less communication systems [19–24]. Specifically, the use of limited physical layer
resources such as bandwidth, energy, time, and space is optimized for achieving
different system design goals such as maximum spectral efficiency and power efficiency.
In practice, by exploiting the extra degrees of freedom offered by multiple antennas,
information/energy beamforming can be effectively performed when the channel
state information (CSI) of the receivers is available at the transmitter. There are
two main approaches for downlink CSI acquisition. In frequency division duplex
(FDD) systems, the CSI can be acquired by feeding back the CSI from the receivers
to the transmitter. On the other hand, in time division duplex (TDD) systems, the
CSI can be obtained by exploiting the channel reciprocity between the uplink and
downlink channels. In particular, the downlink CSI of the transmitter to the receivers
can be estimated by measuring the uplink training sequences embedded in handshaking
signals.
In addition to the conventional QoS requirements such as throughput, energy effi-
ciency, fairness, and delay, the efficient transfer of energy plays an important role as a
new QoS requirement in SWIPT systems. It is expected that new resource allocation
algorithm designs will be needed to satisfy this requirement. For instance, one possible
design goal is the optimization of the covariance matrix of the transmit signal for
achievable rate maximization of an IR subject with respect to a minimum required
amount of energy transferred to the ERs. In the following, we first study different
beamformer designs for achieving different system objectives by assuming that perfect
CSI is available at the transmitter.
x= ws
!"# , (5.3)
random signal
where s ∈ C1×1 and w ∈ CNT ×1 are the pseudo-random transmit signal and the corre-
sponding beamforming vector. We assume without loss of generality that E{|s|2 } = 1.
In practice, random energy signals may be preferable insofar as they spread the sig-
nal power evenly over the operating bandwidth and avoid the power spikes typical of
deterministic sinusoidal carrier signals.
Different hardware circuitries [25, 26] are available for harvesting energy from the
RF. The associated system models and the corresponding energy harvesting efficiencies
can be significantly different. Therefore, we do not assume a particular type of energy
harvesting circuit, and hence the following discussion of beamformer design is isolated
from the specific hardware implementation details. The total harvested RF power at ER
j is modeled as
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
176 Derrick Wing Kwan Ng et al.
Qj = ηj E{|gH
j x| }
2
= ηj |gH
j w|
2
= ηj Tr(gH H
j ww gj ), (5.4)
where 0 ≤ ηj ≤ 1 is a constant that accounts for the RF-to-electrical energy conversion
efficiency.
Now, we examine the optimal transmit covariance matrix, W = wwH , for maximiza-
tion of the total power transfer. The optimal transmit covariance matrix design can be
formulated as the following optimization problem.
where Pmax is the maximum transmit power budget for the transmitter and G =
J
j=1 ηj gj gj is the equivalent channel between the transmitter and the J ERs. Let R =
H
In other words, the maximum total harvested power can be achieved by beamforming.
In particular, the energy beam, w, aligns with the direction of the strongest eigenmode
of the matrix GGH . This transmission strategy is known as energy beamforming in the
literature [27].
Up to now, we have studied only WPT to the receivers without considering the
possibility of concurrent wireless information transfer. In fact, practical receivers for
information decoding cannot be used to harvest energy from the same RF signals due
to the different nature of the signal processing and receiver sensitivities required [26].
In other words, the received RF signal exploited for energy harvesting cannot be reused
for information decoding, and vice versa. As a result, a special receiver structure is
required in order to enable SWIPT. In the next section, we focus on two commonly used
receiver architectures, namely, “separated receivers” and “power splitting receivers,”
both of which facilitate SWIPT. Also, we develop corresponding beamforming designs
for better utilization of the limited system resources.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 177
x= ws
!"# , (5.6)
beamformed information signal
where H = hhH , Pmin in constraint C1 is the minimum required total system power
transfer, and σs2 is the signal processing noise at the receiver, which is modeled as
AWGN.
The optimal transmit covariance matrix is given by [27]
1 2 + σ2
σant
∗ −1
W =B h − s
hH B−1 , (5.8)
B−1 h2 B−1 h4
where B = μ∗ IT − λ∗ G. Here, λ∗ and μ∗ are the optimal dual variables which can be
found by the gradient method or the ellipsoid method for satisfying constraints C1 and
C2 , respectively. It can be observed from (5.8) that the optimal covariance is a rank-
one matrix, i.e., Rank(W) = 1. In other words, beamforming is the optimal strategy
to maximize the achievable rate while guaranteeing a minimum required total system
power transfer. Specifically, the transmit beamforming direction should align with the
vector B−1 h which represents the equivalent channel spanned jointly by the channels of
the IR and the ERs.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
178 Derrick Wing Kwan Ng et al.
Parameter Value
6.6
Harvested power gain
Average achievable rate (bit/s/Hz)
6.2
5.8 N T = 4, J = 2
N T = 4, J = 4
5.6 N T = 8, J = 2
N T = 8, J = 4
5.4
200 300 400 500 600 700 800 800
Average total harvested power (mW)
Figure 5.2 Average achievable rate (bit/s/Hz) versus the average total harvested power (μW) for
one IR, different numbers of ERs, J, and different numbers of transmit antennas, NT .
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 179
Figure 5.3 The block diagram of the transceiver model for wireless information and power
transfer with a power-splitting receiver.
ρ|hH w|2
subject to C1 : 2 + σ2
≥ req ,
ρσant s
C2 : (1 − ρ)η|gH
j w| + (1 − ρ)ησant ≥ Pmin ,
2 2
C3 : ηj |gH
j w| + ηj σant ≥ Pminj , ∀j ∈ {1, . . . , J},
2 2
$ %
C4 : wwH ≤ Pmaxn , ∀n ∈ {1, . . . , NT },
n,n
C5 : 0 ≤ ρ ≤ 1, (5.9)
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
180 Derrick Wing Kwan Ng et al.
where the variable req in C1 specifies the minimum requirement on the signal-
to-noise ratio (SNR) of the receiver for information decoding. η in C2 denotes the
RF-to-electrical energy conversion efficiency for IR. Pmin and Pminj in C2 and C3 are
the minimum required power transfer to the power-splitting IR and ER j, respectively.
In C4 , Pmaxn denotes the maximum transmit power from antenna n, since each antenna
is powered by an individual power amplifier. C5 is the boundary constraint for the
power-splitting variable ρ.
The problem in (5.9) is a non-convex optimization problem. In particular, constraints
C1 –C3 are non-convex, which does not facilitate the design of a computationally effi-
cient beamformer. In order to design a tractable beamfomer, we first rewrite (5.9) in an
equivalent2 form:
minimize Tr(W)
W∈HNT ,ρ
σ 2
subject to C1 : Tr(HW) ≥ req σant 2
+ s ,
ρ
Pmin
C2 : Tr(HW) + σant
2
≥ ,
(1 − ρ)η
Pminj
C3 : Tr(Gj W) + σant
2
≥ , ∀j ∈ {1, . . . , J},
ηj
C4 : Tr n W ≤ Pmaxn , ∀n ∈ {1, . . . , NT },
C5 : 0 ≤ ρ ≤ 1,
C6 : W 0,
C7 : Rank(W) ≤ 1, (5.10)
2 In this chapter, “equivalent” means that two problem formulations share the same optimal solution.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 181
L(W, ρ, α, β, φ, γ , δ, θ , Y)
σ2
= Tr(W) − Tr(YW) + α − Tr(HW) + req σant
2
+ s
ρ
Pmin
+ β − Tr(HW) − σant
2
+
(1 − ρ)η
J
Pminj
+ φj − Tr(Gj W) − σant +
2
ηj
j=1
NT
+ γn Tr n W − Pmaxn − δρ + θ (ρ − 1). (5.12)
n=1
Now, we reveal the tightness of the SDP relaxation adopted in (5.11) in the following
theorem.
theorem 5.1. Assuming that the channel vectors of the IR, h, and the ERs, gj , j ∈
{1, . . . , J}, can be modeled as statistically independent random variables, the solution
of (5.11) is rank-one, i.e., Rank(W) = 1, with probability one.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
182 Derrick Wing Kwan Ng et al.
In other words, the SDP relaxation is tight whenever the channels satisfy the condition
stated in Theorem 5.1. Besides, the optimal beamformer for (5.9), w∗ , can be obtained
with probability one by performing an eigenvalue decomposition of the solution W of
(5.11) and selecting the principal eigenvector as the beamformer.
34 N T = 8, baseline scheme
N T = 10, optimal scheme
32 N T = 10, baseline scheme
N T = 12, optimal scheme
30
N T = 12, baseline scheme
28
26
24 Opitmal scheme
22
20
18
6 8 10 12 14 16 18 20 22 24
Minimum requried SNR (dB)
Figure 5.4 Average total transmit power (dBm) versus the minimum required SNR of the
power-splitting receiver, req (dB), for different resource allocation schemes and different
numbers of transmit antennas, NT .
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 183
0.9 NT = 8
NT = 10
Average power-splitting ratio r
0.8 NT = 12
0.7
0.6
0.5
0.4
0.5
0.2
0.1
0
6 9 12 15 18 21 24
Minimum requried SNR (dB)
Figure 5.5 Average power-splitting ratio versus the minimum required SNR of the
power-splitting receiver, req (dB), for the proposed optimal resource allocation scheme.
The groups of bars from left to right represent NT = 8, 10, 12, respectively.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
184 Derrick Wing Kwan Ng et al.
600
harvested power (mW)
Optimal scheme, NT = 8
Average total
Baseline scheme, NT = 8
400
Minimum required power transfer
200
0
6 9 12 15 18 21 24
Minimum requried SNR (dB)
800
Optimal scheme, NT = 8
Average total
Baseline scheme, NT = 8
600
Minimum required power transfer
400
200
0
6 9 12 15 18 21 24
Minimum requried SNR (dB)
Figure 5.6 Average total harvested power at the power-splitting receiver and per ER, versus the
minimum required SNR of req (dB). Each group of bars from left to right represents the
proposed optimal resource allocation scheme and the baseline scheme, respectively.
exploited to reduce the transmit power, but not to increase the receive SNR at the power-
splitting receiver.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 185
34
Average total transmit power (dBm)
32
30
28
26
24 NT = 8, optimal scheme
NT = 8, baseline scheme
22 NT = 10, optimal scheme
NT = 10, baseline scheme
20
NT = 12, optimal scheme
NT = 12, baseline scheme
18
50 100 150 200 250 300
Minimum required power transfer Pmin (mW)
Figure 5.7 Average total transmit power (dBm) versus the minimum required power transfer per
receiver, Pmin (μW), for different resource allocation schemes and different numbers of transmit
antennas, NT .
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
186 Derrick Wing Kwan Ng et al.
However, the ERs are idle and there is no interaction between them and the transmitter
after handshaking. As a result, the CSI of the ERs becomes outdated during transmis-
sion, which should be taken into account for the design of beamformers.
To capture the impact of the CSI imperfection for the beamformer design, we adopt
a deterministic model [43–46] for modeling the CSI uncertainty. In particular, the CSI
of the link between the transmitter and ER j is modeled as
where ĝj ∈ CNT ×1 is the CSI estimate available at the transmitter at the beginning
of a scheduling slot and gj represents the unknown channel uncertainty due to the
time-varying nature of the channel during transmission. The continuous set j in (5.15)
defines a Euclidean sphere and contains all possible channel uncertainties. Specifically,
the radius εj represents the size of the sphere and defines the uncertainty region of the
CSI of ER j.
remark 1. In practice, the value of εj2 depends on the coherence time of the
associated channel, the channel estimation method adopted, and the duration of
transmission.
This problem formulation aims at minimizing the transmit power while guaranteeing
a minimum required power transfer to ER j, assuming that the estimation error gj is
in the set j . Problem 5 is a non-convex optimization problem. In particular, constraint
C1 and constraint C3 span a non-convex feasible solution set, which is an obstacle in
designing computationally efficient beamformers. In order to obtain a tractable result,
we re-write Problem 5 in equivalent form as
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 187
minimize Tr(W)
W∈HNT
Tr(HW)
subject to C1 : 2 + σ2
≥ req ,
σant s
C2 : Tr n W ≤ Pmaxn , ∀n ∈ {1, . . . , NT },
C3 : min ηj Tr(WGj ) ≥ Pminj , ∀j ∈ {1, . . . , J},
gj ∈j
C4: Rank(W) ≤ 1. (5.17)
lemma 1 (S-Procedure [47]). Let a function fm (x), m ∈ {1, 2}, x ∈ CN×1 , be defined
as
fm (x) = xH Am x + 2 Re{bH
m x} + cm , (5.18)
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
188 Derrick Wing Kwan Ng et al.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 189
Robust scheme, NT = 6
30
Average total transmit power (dBm)
Benchmark scheme, NT = 6
Naive scheme, NT = 6 Robust scheme
28 Robust scheme, NT = 8
Benchmark scheme, NT = 8
26 Naive scheme, NT = 8
24
22
20
18
16
5 10 15 20 25 30 35
Minimum required power transfer Pmin (mW)
Figure 5.8 Average total transmit power (dBm) versus the minimum required power transfer
per receiver, Pmin (μW), for different beamforming schemes and different numbers of
transmit antennas, NT .
0.9
0.8
0.7
QoS outage probability
0.6
0.5
0.4
0
5 10 15 20 25 30 35
Minimum required power transfer Pmin (mW)
Figure 5.9 QoS outage probability versus the minimum required power transfer per receiver,
Pmin (μW), for different beamforming schemes and different numbers of transmit antennas, NT .
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
190 Derrick Wing Kwan Ng et al.
probability. In other words, the proposed robust scheme is able to guarantee the mini-
mum required power transfer in the scenarios considered, despite the imperfectness of
the CSI. However, the outage probability of the naive scheme increases dramatically as
Pmin increases, due to the non-robust beamformer design.
In the above sections, we studied optimization for SWIPT systems by solving different
conventional single-objective optimization problems. However, in practice, multiple
conflicting system design, objectives arise naturally in system design, and applying
the solutions of single-objective optimization to multi-objective optimization problems
(MOOPs) may not lead to satisfactory system performance. Therefore, the concept of
multi-objective optimization (MOO) or vector optimization is discussed in this section
to provide a systematic procedure for handling conflicting objective functions.3 First,
we introduce the MOOP in its standard form as follows.
where K, L, and N are the numbers of objective functions, inequality constraints, and
equality constraints, respectively. x is the vector of optimization variables, fk (x), ∀k ∈
{1, . . . , K}, is the kth objective function,4 gl (x) is the lth inequality constraint, and hn (x)
is the nth equality constraint.
3 MOO has been applied extensively in the fields of engineering and economics for handling conflicting
design objectives [17, 32, 49, 50].
4 We note that, in contrast to conventional heuristic approaches where some objectives are converted into
constraints, MOO enables a more rigorous and more flexible system design.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 191
The Pareto optimal set consists of the attainable operating points that cannot be
neglected if the system designer has no preference for a particular system objective. In
particular, none of the objectives can be improved without degrading other objectives.
Evidently, any point that is not in the Pareto optimal set is strictly suboptimal because
there exist other operating points that are better or at least as good with respect to every
objective. The Pareto optimal set is an analogy to global optimality that can be achieved
in multi-objective optimization. We note that single-objective optimization problems
are special cases of MOOPs with K = 1. In other words, if an algorithm can solve
the MOOP, then it can be used to solve the corresponding single-objective optimization
problem.
where fk∗ (x) is the optimal value of the kth objective function and 0 ≤ wk ≤ 1 is a
constant weight factor on objective function k such that K k=1 wk = 1. In fact, the
multi-objective problem in (5.24) can provide the complete Pareto optimal set [17] on
varying the weights, even if the MOOP is non-convex.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
192 Derrick Wing Kwan Ng et al.
x= ws
!"# + wE . (5.25)
!"#
desired information signal energy signal
Here, wE is a deterministic pseudo-random sequence that is used to facilitate efficient
energy transfer and is known to the receivers. Since the energy signal is known at the
legitimate receiver, it can be cancelled at the IR via successive interference cancellation
before attempting to decode the desired information.
As a result, the achievable rate (bit/s) in the SWIPT system is given by
wH Hw
C = B log2 1 +
Tr(HWE ) + σant2 + σ2
s
(a) wH Hw
≤ B log2 1 + 2 , (5.26)
σant + σs2
where B is the system bandwidth, WE is the covariance matrix of the random energy
signals, and (a) is due to the fact that interference cancellation can be performed at the
IR to remove hH wE before attempting to decode the desired information.
On the other hand, the energy harvested at the ERs is given by
J
HP(w, WE ) = j w| + |gj wE | )
ηj (|gH 2 H 2
j=1
= Tr G(wwH + WE ) , (5.27)
where G = Jj=1 ηj gj gH j is the equivalent channel of the J ERs introduced in Section
5.3.1. We note that the contribution of thermal noise to the total harvested power is neg-
ligible compared with the information and energy signals and thus is neglected in (5.27).
On the other hand, we incorporate the total power dissipation of the system as an
optimization objective function. To this end, we model the power dissipation (in Joules
per second) of the system as
w2 + Tr(WE )
TP(w, WE ) = + NT Pant
ξ !" #
!" # Antenna power consumption
Amplifier power consumption
+ Pc , (5.28)
!"#
Constant circuit power consumption
where ξ is the power amplifier efficiency,5 and the first term in (5.28) is the power
consumption of the power amplifiers. NT Pant accounts for the dynamic circuit power
consumption, which is proportional to the number of transmitting antennas NT . Pant
includes the power dissipation of the transmit filter, mixer, frequency synthesizer,
digital-to-analog converter (DAC), etc. Pc denotes the fixed power consumption due to
the baseband signal processing.
5 We assume that Class A power amplifiers with a linear characteristic are implemented in the transceivers.
In practice, the maximum power efficiency of Class A amplifiers is 25%.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 193
and
HP(w, WE ) wH Gw + Tr(GWE )
ηEH = = , (5.30)
TP(w, WE ) w2 + Tr(WE ) /ξ + NT Pant + Pc
The second system design objective is the maximization of the energy transfer effi-
ciency in the SWIPT network and can be mathematically formulated as follows.
The third system design objective concerns the minimization of the total transmit
power. The problem formulation is given as follows.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
194 Derrick Wing Kwan Ng et al.
where Fp∗ is the optimal objective value with respect to Problem p. ωp is a preference
weight imposed on objective function p subject to 0 ≤ ωp ≤ 1 and p ωp = 1, which
reflects the preference of the decision maker for the pth objective function over the
others. In the extreme case, when ωp = 1 and ωt = 0, ∀t = p, Problem 11 is equivalent
to single-objective optimization problem p.
1
W = wwH , θ = , W = θW, and WE = θ WE . (5.35)
TP(w, WE )
Then, the original problems can be reformulated in terms of the new optimization
variables, i.e., W, WE , and θ , as follows.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 195
subject to C1 –C5 ,
C6 : ωp (Fp∗ − Fp ) ≤ τ , ∀p ∈ {8, 9, 10}, (5.39)
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
196 Derrick Wing Kwan Ng et al.
We note that, if Problem 15 can be solved optimally by an algorithm, then the algo-
rithm can also be used to solve Problems 10–12, since Problem 15 is a generalization
of Problems 10–12. Thus, we focus on solving Problem 15 in the following. It can be
verified that Problem 15 is non-convex due to the rank-one beamforming matrix con-
straint in C3 . Now, we apply SDP relaxation by removing constraint C3 : Rank(W) = 1
from Problem 15 in the following. As a result, the SDP relaxed version of Problem 15
is given by the following.
subject to C1 , C2 , C4 –C6 ,
(
C3 : ( ((((
Rank(W) = 1, (5.40)
which is a convex SDP problem and can be solved by numerical convex program solvers
such as CVX [48]. Next, we study the tightness of the adopted SDP relaxation in the
following theorem.
∗
theorem 5.2. The optimal solution of Problem 16 satisfies Rank(W ) ≤ 1. Besides,
this solution can be obtained by construction with a similar approach to that in [49].
Proof. The proof of Theorem 5.2 closely follows the proof of [49, Proposition 1] and is
omitted here for brevity.
Thus, the adopted SDP relaxation is tight. Besides, similarly to Problem 16, Problems
12–14 can be solved using the SDP relaxation.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 197
Figure 5.10 Three-dimensional system objective tradeoff regions achieved by the proposed
optimal beamforming scheme.
15, where the values of 0 ≤ wp ≤ 1, ∀p ∈ {8, 9, 10}, are uniformly varied for a step size
of 0.05 such that p wp = 1. The average system performance is obtained by averaging
the obtained results over different channel realizations. Besides, for a better illustration,
we have also provided different side-views of the three-dimensional tradeoff region in
Figures 5.11–5.13 to reveal the tradeoffs between different pairs of objective functions,
namely (1) IR-EE and ET-EE; (2) IR-EE and total transmit power; and (3) total transmit
power and ET-EE.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
198 Derrick Wing Kwan Ng et al.
Figure 5.12 Tradeoff region between IR-EE and the total transmit power.
Figure 5.13 Tradeoff region between total transmit power and ET-EE.
It can be observed from Figures 5.10 and 5.11 that the system design objectives of
average ET-EE maximization and average IR-EE maximization are partially aligned
with each other for small transmit powers. In particular, both objective functions
increase rapidly when the transmit power increases from zero. However, the IR-EE
decreases dramatically in the high-transmit-power regime. This is because there is
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 199
a diminishing return in the system achievable rate with respect to the increment in
transmit power. Also, we observe similar increasing and then decreasing trends of
IR-EE from Figures 5.10 and 5.12 for the tradeoff between IR-EE and the total transmit
power, due to the diminishing return in data rate gain achieved by the increment in
transmit power. In contrast, ET-EE increases monotonically with respect to the transmit
power with increasing slope, see Figures 5.10 and 5.13. Thus, a high transmit power
is preferable to maximize the energy transfer efficiency. Furthermore, the tradeoff
region in Figure 5.12 is non-convex. In other words, the proposed optimal beamforming
scheme is able to attain the non-convex tradeoff region, despite the non-convexity
of the MOOP. In fact, the two extremes points in Figure 5.12 correspond to the
maximum/minimum of two of the objective functions considered. Zero transmit power
represents the minimum total transmit power. It is the optimal value of Problem 10,
and it can be obtained by solving Problem 11 with w10 = 1. The second extreme
point occurs in the middle of Figure 5.12, which is the maximum IR-EE, i.e., the
optimal value for Problem 9. Similarly, the maximum ET can be obtained by solving
Problem 11 with w9 = 1.
On the other hand, it can be seen from Figures 5.10, 5.12, and 5.13 that the objective
of total transmit power minimization conflicts with the other two objectives. In particu-
lar, in order to maximize ET-EE, the transmitter has to transmit with almost full power
over each antenna at every time instant. The associated beamformers correspond to the
single point at the right tail in the curve of Figure 5.10 and the rightmost corner point
in Figures 5.12 and 5.13. However, if the transmitter employs a large transmit power, a
low IR-EE will result, see Figure 5.12.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
200 Derrick Wing Kwan Ng et al.
al Information receiver
sign
ation
orm
Inf
Energy signal
Ar
tifi
cia
ln Energy harvesting receiver 2
ois
e (potential eavesdropper)
Transmitter
Energy harvesting receiver 1
(potential eavesdropper)
Figure 5.14 A multiuser SWIPT downlink model with an active IR and J = 2 ERs. The idle
receivers harvest energy from the received RF signal and are treated as potential eavesdroppers
by the transmitter in terms of providing secure SWIPT services.
where v ∈ CNT ×1 is the artificial noise vector generated by the transmitter to combat
potential eavesdroppers. v is modeled as a complex Gaussian random vector with
v ∼ CN (0, V), (5.42)
6 We note that, in practice, the malicious ERs do not have to decode the eavesdropped information in real time.
They can act as information collectors to sample the received signals and store them for future decoding by
other energy-unlimited and powerful computational devices.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 201
where V ∈ HNT , V 0, denotes the covariance matrix of the artificial noise. The
artificial noise signal interferes with the legitimate receiver and potential eavesdroppers
since v is unknown to both types of receivers. Hence, artificial noise transmission has to
be carefully designed to degrade the channels of potential eavesdroppers while having
a minimal effect on the desired receiver.
On the other hand, wE is a Gaussian pseudo-random sequence7 that is used to facili-
tate efficient energy transfer and is known to the legitimate receiver. wE is modeled as a
complex Gaussian pseudo-random vector with
wE ∼ CN (0, WE ), (5.43)
where WE ∈ HNT , WE 0, denotes the covariance matrix of the pseudo-random energy
signal. Since the energy signal is known at the legitimate receiver it can be cancelled
at the legitimate receiver via successive interference cancellation. Besides, the energy
signal is not known to potential eavesdroppers and can be exploited by the transmitter
to provide communication security.
The above system model advocates the dual use of both artificial noise and energy sig-
nals in providing secure communication and facilitating efficient WPT. In fact, whether
artificial noise or an energy signal is preferable depends on the scenario considered.
In order to exploit the energy signal efficiently, a short secret key is needed at the
desired receiver as seed information for the pseudo-random sequence generator used for
generating the energy signal sequences. Besides, the transmitter is required to regularly
change the seed to prevent the sequence from being cracked by potential eavesdroppers.
The seed information used at the transmitter can be delivered securely to the desired
receivers by exploiting, e.g., the reciprocity of the channels between the transmitter and
the legitimate receiver [63]. However, if the seed information is for some reason also
available to the potential eavesdroppers, allocating all the energy of the energy signal to
the artificial noise may be a better choice for guaranteeing communication security, i.e.,
WE = 0.
7 For energy transfer, the energy sequence is not required to be generated by a Gaussian pseudo-
random source. However, a Gaussian pseudo-random energy sequence can be exploited to provide secure
communication.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
202 Derrick Wing Kwan Ng et al.
where (a) is due to the fact that interference cancellation can be performed at the IR to
remove hH wE before attempting to decode the desired information.
On the other hand, we focus on the worst-case scenario for the decoding capability
of the ERs for providing communication security to the IR. We assume that energy
harvesting receiver j performs interference cancellation to remove all multiuser
interference and eavesdrops on the message intended for the IR. Therefore, the
achievable rate between the transmitter and ER j for decoding the signal of the IR
can be expressed as
where
Qj = GH
j WE + V Gj + (σant + σs )INR
0 .
2 2
(5.48)
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 203
where the maximum tolerable data rate RTol ER > 0 in C2 is imposed to restrict the
achievable rate of ER j if it attempts to decode the message of the IR. Constraint C4 and
WE , V ∈ HNT ensure that the covariance matrices V and WE are positive semidefinite
Hermitian matrices.
C2 ⇒ C2 : GH
j WGj αER Qj , ∀j, (5.51)
Tol
where αER = 2RER − 1 is an auxiliary constant and C2 is an LMI constraint. We note
that constraints C2 and C2 are equivalent, i.e., C2 ⇔ C2 , if Rank(W) ≤ 1.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
204 Derrick Wing Kwan Ng et al.
After the transformation, the problem is non-convex due to the rank constraint
in C6 . As in the cases studied in the previous sections, we adopt SDP relaxation
to obtain a tractable solution. The SDP relaxation of Problem 18 is given by the
following.
subject to C1 , C2 , C3 –C5 ,
((
C6 : ( ((( ≤ 1 .
Rank(W) (5.53)
Proof. The proof of Theorem 5.3 closely follows the proof of [18, Proposition 4.1] and
is omitted here for brevity.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 205
always two ERs and one IR in the system. They are all located 10 m away from the
transmitter. The minimum required SNR of the desired IR and the maximum tolerable
SINR of the ERs are set to req = 3 dB and −10 dB, respectively. In other words, the
maximum tolerable data rate at each ER is RTol ER = 0.1375 bit/s/Hz and the minimum
achievable secrecy rate is log2 (1 + req ) − 0.1 = 1.4475 bit/s/Hz.
800
NT = 8, NR = 1
NT = 8, NR = 2
700
NT = 8, NR = 3
Average minimum harvested power
NT = 10, NR = 1
600
NT = 10, NR = 2
NT = 10
NT = 10, NR = 3
500
per ER (mW)
400 NT = 8
300
200
100
0
13 14 15 16 17 18 19 20
Maximum transmit power per antenna (dBm)
Figure 5.15 Average transmit power allocation (dBm) versus the maximum transmit power
per antenna, Pmaxn for different numbers of transmit antennas, NT , and receive antennas, NR ,
installed at each ER.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
206 Derrick Wing Kwan Ng et al.
30
Tr(W) Tr(WE)
20
10
0
13 14 15 16 17 18 19 20
Maximum transmit power per antenna (dBm)
30
Tr(W) Tr(WE)
20
10
0
13 14 15 16 17 18 19 20
Maximum transmit power per antenna (dBm)
Figure 5.16 Average transmit power allocation (dBm) versus the maximum transmit power
per antenna, Pmaxn , for different numbers of transmit antennas, NT , and receive antennas, NR ,
installed at each ER.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 207
1.51
NT = 8, NR = 1
NT = 8, NR = 2
NT = 10
1.5 NT = 8, NR = 3
Average achivable secrecy rate (bit/s/Hz)
NT = 10, NR = 1
1.49 NT = 10, NR = 2
NT = 10, NR = 3
Minimum required
1.48 secrecy rate
1.47
NT = 8
1.46
1.45
13 14 15 16 17 18 18 20
Maximum transmit power per antenna (dBm)
Figure 5.17 Average achievable secrecy rate (bit/s/Hz) versus the maximum transmit power
per antenna, Pmaxn for different numbers of transmit antennas, NT , and receive antennas, NR ,
installed at each ER.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
208 Derrick Wing Kwan Ng et al.
5.7 Summary
5.8 Appendix
and
*
σs2 α ∗ req
ρ∗ = * √ , (5.57)
σs2 α ∗ req + β ∗ Pmin /η
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
210 Derrick Wing Kwan Ng et al.
T J ∗ ∗ ∗ ∗ ∗ ∗ ∗
where A = INT + N n=1 γn n − j=1 φj Gj and Y , α , β , φj , γn , δ , and θ are the
optimal Lagrange multipliers for (5.13). Equation (5.55) is the complementary slack-
ness condition and is satisfied when the columns of W∗ lie in the null space of Y∗ .
Therefore, if Rank(Y∗ ) = NT − 1, then the optimal W∗ = 0 must be a rank-one matrix
and the optimal w∗ can be obtained by performing eigenvalue decomposition of W∗ . On
the other hand, it can be observed from (5.57) that α ∗ > 0 and β ∗ > 0 at the optimal
solution for req > 0 and Pmin > 0. In other words, constraints C1 and C2 are satisfied
with equality simultaneously at the optimum point.
Now, we prove by contradiction that A is a full-rank matrix with rank NT whenever
the condition stated in Theorem 5.1 is satisfied. Let us focus on the dual problem in
(5.13). For a given set of optimal dual variables, D = {α ∗ , β ∗ , φ ∗ , γ ∗ , δ ∗ , θ ∗ , Y∗ } and
the optimal power-splitting ratio, ρ ∗ , the dual problem in (5.13) can be written as
minimize L W, ρ ∗ , α ∗ , β ∗ , φ ∗ , γ ∗ , δ ∗ , θ ∗ , Y∗ . (5.58)
W∈HNT
Here denotes a collection of the variables that are independent of W. On the other
hand, since channel vectors gj and h are assumed to be statistically independent, it
∗ ∗ ∗
follows that, on setting t → ∞, the term −t Tr ww Y + (α + β )H → −∞ and
H
the dual optimal value becomes unbounded from below. However, the optimal value
of the primal problem is strictly positive for req > 0. Thus, strong duality does not
hold, which leads to a contradiction. Therefore, A∗ is a positive definite matrix with
probability one, i.e., Rank(A∗ ) = NT .
By exploiting (5.56) and a basic inequality for the rank of matrices, we have
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 211
θ B log2 (1 + Tr(HW)/(θ σ 2 ))
maximize F8 =
W,WE ∈HNT ,θ Tr(W + WE )/ρ + θ (NT Pant + Pc )
subject to C1 , C2 , C3 , C5 : θ > 0. (5.61)
Now, we show that the above problem is equivalent to Problem 12. First, it can
be observed that in problem (5.61) θ = 0 is not an optimal solution. Thus, without
loss of generality, the constraint θ > 0 can be replaced by θ ≥ 0. Second, we
prove by contradiction that C4 in Problem 12 is satisfied by equality for the optimal
solution, i.e.,
∗ ∗
Tr(W + WE )
+ θ ∗ (NT Pant + Pc ) = 1. (5.62)
ρ
∗ ∗
We denote the optimal solution of Problem 12 by (W , WE , θ ∗ ). Suppose that C4 is
∗ ∗
satisfied by strict inequality at the optimal solution, i.e., Tr(W + WE )/ρ +θ ∗ (NT Pant +
Pc ) < 1. Then, we construct a new feasible solution by applying a positive scaling to
∗ ∗
W and θ. The new solution is given by (W , WE , θ ) = (cW , WE , cθ ∗ ), where
c > 1, such that Tr(W + WE )/ρ + θ (NT Pant + Pc ) = 1. It can be verified that
∗ ∗
(W , WE , θ ) achieves a larger objective value in Problem 12 than does (W , WE , θ ∗ ).
∗ ∗ ∗
Thus, (W , WE , θ ) cannot be the optimal solution, which leads to a contradiction.
Thus, constraint C4 must hold with equality at the optimal solution. The equivalence
of (5.61) and Problem 12 is proved, which implies that Problem 12 is equivalent to
Problem 8. In particular, the solution of the original problem can be recovered from
(5.35). Similarly, the equivalence of Problems 13–15 and Problems 9–11 can be proved
by following the same approach.
Then, we propose a lower bound on the left-hand side of (5.64) by introducing the
following lemma.
lemma 2. For any positive semidefinite square matrix A 0, the following inequality
holds [67]:
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
212 Derrick Wing Kwan Ng et al.
Subsequently, by combining equations (5.63), (5.64), and (5.66), we have the follow-
ing implications:
−1/2 −1/2
(5.63) ⇐⇒ (5.64) ⇒ Tr(Qj GH
j WGj Qj ) ≤ αER (5.67a)
−1/2 −1/2
⇒ λmax (Qj GH
j WGj Qj ) ≤ αER (5.67b)
−1/2 −1/2
⇐⇒ Qj GH
j WGj Qj αER INR (5.67c)
⇐⇒ GH
j WGj αER Qj . (5.67d)
We note that equations (5.63) and (5.67d) are equivalent, i.e., C2 ⇔ C2 , when
Rank(W) = 1.
Acknowledgements
This work was supported in part by the AvH Professorship Program of the Alexander
von Humboldt Foundation and by the Qatar National Research Fund (QNRF) under
project NPRP 5-401-2-161.
References
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 213
[10] L. Liu, R. Zhang, and K.-C. Chua, “Wireless information transfer with opportunistic energy
harvesting,” IEEE Transactions of Wireless Communications, vol. 12, no. 1, pp. 288–300,
January 2013.
[11] X. Zhou, R. Zhang, and C. K. Ho, “Wireless information and power transfer: Architecture
design and rate–energy tradeoff,” IEEE Transaction on Communication, vol. 61, pp. 4754–
4767, November 2013.
[12] D. W. K. Ng, E. S. Lo, and R. Schober, “Wireless information and power transfer: Energy
efficiency optimization in OFDMA systems,” IEEE Transaction on Wireless Communica-
tions, vol. 12, pp. 6352–6370, December 2013.
[13] D. W. K. Ng and R. Schober, “Resource allocation for secure communication in systems
with wireless information and power transfer,” in Proc. IEEE Global Telecommunications
Conference, December 2013.
[14] D. W. K. Ng and R. Schober, “Spectral efficient optimization in OFDM systems with
wireless information and power transfer,” in 21st European Signal Processing Conference
(EUSIPCO), September 2013, pp. 1–5.
[15] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient power allocation in OFDM systems
with wireless information and power transfer,” in Proc. IEEE International Communications
Conference, June 2013, pp. 4125–4130.
[16] D. W. K. Ng, E. S. Lo, and R. Schober, “Robust beamforming for secure communication
in systems with wireless information and power transfer,” IEEE Transactions on Wireless
Communications, vol. 13, pp. 4599–4615, August 2014.
[17] R. T. Marler and J. S. Arora, “Survey of multi-objective optimization methods for
engineering,” Structural and Multidisciplinary Optimization, vol. 26, pp. 369–395, April
2004.
[18] L. Liu, R. Zhang, and K.-C. Chua, “Secrecy wireless information and power transfer with
MISO beamforming,” IEEE Transactions on Signal Processing, vol. 62, pp. 1850–1863,
April 2014.
[19] C. Y. Wong, R. S. Cheng, K. B. Letaief, and R. D. Murch, “Multiuser OFDM with adaptive
subcarrier, bit, and power allocation,” IEEE Journal on Selected Areas in Communications,
vol. 17, pp. 1747–1758, October 1999.
[20] V. K. N. Lau and Y. K. Kwok, Channel Adaptation Technologies and Cross Layer Design
for Wireless Systems with Multiple Antennas – Theory and Applications, 1st edn. New York:
Wiley, 2005.
[21] W.-L. Li, Y. J. Zhang, A.-C. So, and M. Win, “Slow adaptive OFDMA systems through
chance constrained programming,” IEEE Transactions on Signal Processing, vol. 58, pp.
3858–3869, July 2010.
[22] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resource allocation in multi-
cell OFDMA systems with limited backhaul capacity,” IEEE Transactions on Wireless
Communications, vol. 11, pp. 3618–3631, October 2012.
[23] D. W. K. Ng and R. Schober, “Cross-layer scheduling for OFDMA amplify-and-forward
relay networks,” IEEE Transactions on Vehicular Technology, vol. 59, pp. 1443–1458,
March 2010.
[24] D. W. K. Ng, E. S. Lo, and R. Schober, “Dynamic resource allocation in MIMO-OFDMA
systems with full-duplex and hybrid relaying,” IEEE Transactions on Communication,
vol. 60, May 2012.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
214 Derrick Wing Kwan Ng et al.
[25] H. Jabbar, Y. Song, and T. Jeong, “RF energy harvesting system and circuits for charging
of mobile devices,” IEEE Transactions on Consumer Electronics, vol. 56, pp. 247–253,
February 2010.
[26] X. Zhou, R. Zhang, and C. K. Ho, “Wireless information and power transfer: Architecture
design and rate–energy tradeoff,” in Proc. IEEE Global Telecommunications Conference,
December 2012.
[27] R. Zhang and C. K. Ho, “MIMO broadcasting for simultaneous wireless information and
power transfer,” IEEE Transactions on Wireless Communications, vol. 12, pp. 1989–2001,
May 2013.
[28] E. Boshkovska, D. Ng, N. Zlatanov, and R. Schober, “Practical non-linear energy har-
vesting model and resource allocation for SWIPT systems,” IEEE Communication Letters,
arXiv:1509.02956v1, 2015.
[29] S. Leng, D. W. K. Ng, N. Zlatanov, and R. Schober, “Multi-objective beamforming
for energy-efficient SWIPT systems,” in Proc. International Conference on Computing,
Networking and Communications, February 2016.
[30] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resource allocation in multiuser
OFDM systems with wireless information and power transfer,” in Proc. IEEE Wireless
Communications and Networking Conference, 2013.
[31] S. Leng, D. W. K. Ng, and R. Schober, “Power efficient and secure multiuser communication
systems with wireless information and power transfer,” in Proc. IEEE International
Communications Conference, June 2014.
[32] D. W. K. Ng, L. Xiang, and R. Schober, “Multi-objective beamforming for secure
communication in systems with wireless information and power transfer,” in Proc. IEEE
Personal, Indoor and Mobile Radio Communication Symposium, September 2013.
[33] D. W. K. Ng, R. Schober, and H. Alnuweiri, “Secure layered transmission in multicast
systems with wireless information and power transfer,” in Proc. IEEE International
Communications Conference, June 2014, pp. 5389–5395.
[34] D. W. K. Ng and R. Schober, “Resource allocation for coordinated multipoint networks
with wireless information and power transfer,” in Proc. IEEE Global Telecommunications
Conference, December 2014, pp. 4281–4287.
[35] M. Chynonova, R. Morsi, D. W. K. Ng, and R. Schober, “Optimal multiuser scheduling
schemes for simultaneous wireless information and power transfer,” in 23rd European
Signal Processing Conference (EUSIPCO), August 2015.
[36] Q. Wu, M. Tao, D. W. K. Ng, W. Chen, and R. Schober, “Energy-efficient transmission
for wireless powered multiuser communication networks,” in Proc. IEEE International
Communications Conference, June 2015.
[37] D. Ng and R. Schober, “Max–min fair wireless energy transfer for secure multiuser
communication systems,” in IEEE Information Theory Workshop (ITW), November 2014,
pp. 326–330.
[38] X. Chen, C. Yuen, and Z. Zhang, “Wireless energy and information transfer tradeoff for
limited-feedback multiantenna systems with energy beamforming,” IEEE Transactions on
Vehicular Technology, vol. 63, pp. 407–412, January 2014.
[39] H. Wang, W. Wang, X. Chen, and Z. Zhang, “Wireless information and energy transfer in
interference aware massive MIMO systems,” in Proc. IEEE Global Telecommunications
Conference, December 2014, pp. 2556–2561.
[40] IEEE P802.11 Wireless LANs, “TGn channel models”, IEEE 802.11-03/940r4, technical
report, May 2004.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
Multiple Antennas and Beamforming for SWIPT Systems 215
[41] J. F. Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric
cones,” Optimization Methods and Software, vol. 11–12, pp. 625–653, September 1999.
[42] K. C. Toh, M. J. Todd, and R. H. Tütüncü, “SDPT3 – A Matlab software package for
semidefinite programming, version 1.3,” Optimization Methods and Software, vol. 11, pp.
545–581, January 1999.
[43] G. Zheng, K. K. Wong, and T. S. Ng, “Robust linear MIMO in the downlink: A worst-case
optimization with ellipsoidal uncertainty regions,” EURASIP Journal on Advances in Signal
Processing, article ID 609028, 2008.
[44] C. Shen, T.-H. Chang, K.-Y. Wang, Z. Qiu, and C.-Y. Chi, “Distributed robust multicell
coordinated beamforming with imperfect CSI: An ADMM approach,” IEEE Transactions
on Signal Processing, vol. 60, pp. 2988–3003, June 2012.
[45] N. Vucic and H. Boche, “Robust QoS-constrained optimization of downlink multiuser
MISO systems,” IEEE Transactions on Signal Processing, vol. 57, pp. 714–725, February
2009.
[46] J. Wang and D. Palomar, “Worst-case robust MIMO transmission with imperfect channel
knowledge,” IEEE Transactions on Signal Processing, vol. 57, pp. 3086–3100, August
2009.
[47] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge: Cambridge University
Press, 2004.
[48] M. Grant and S. Boyd, CVX: Matlab Software for Disciplined Convex Programming,
Version 2.0 Beta, September 2013 (available at https://cvxr.com/cvx).
[49] D. W. K. Ng, E. S. Lo, and R. Schober, “Multi-objective resource allocation for secure
communication in cognitive radio networks with wireless information and power transfer,”
IEEE Transactions on Vehicular Technology, arXiv:1403.0054, May 2015.
[50] E. Björnson and E. Jorswieck, Optimal Resource Allocation in Coordinated Multi-Cell
Systems. Boston, MA: Now Publishers Inc., 2013.
[51] Z. Hasan, G. Bansal, E. Hossain, and V. Bhargava, “Energy-efficient power allocation
in OFDM-based cognitive radio systems: A risk–return model,” IEEE Transactions on
Wireless Communications, vol. 8, pp. 6078–6088, December 2009.
[52] D. W. K. Ng, E. Lo, and R. Schober, “Energy-efficient resource allocation in OFDMA
systems with large numbers of base station antennas,” IEEE Transactions on Wireless
Communications, vol. 11, pp. 3292–3304, September 2012.
[53] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resource allocation in OFDMA
systems with hybrid energy harvesting base station,” IEEE Transactions on Wireless
Communications, vol. 12, pp. 3412–3427, July 2013.
[54] X. Chen, X. Wang, and X. Chen, “Energy-efficient optimization for wireless information
and power transfer in large-scale MIMO systems employing energy beamforming,” IEEE
Wireless Communications Letters, vol. 2, pp. 1–4, December 2013.
[55] A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8,
pp. 1355–1387, October 1975.
[56] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on
Wireless Communications, vol. 7, pp. 2180–2189, June 2008.
[57] D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for
OFDMA decode-and-forward relay networks,” IEEE Transications on Wireless Communi-
ations, vol. 10, pp. 3528–3540, August 2011.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006
216 Derrick Wing Kwan Ng et al.
[58] X. Chen and H.-H. Chen, “Physical layer security in multi-cell MISO downlinks with
incomplete CSI – A unified secrecy performance analysis,” IEEE Transactions on Signal
Processing, vol. 62, pp. 6286–6297, December 2014.
[59] D. W. K. Ng, E. S. Lo, and R. Schober, “Efficient resource allocation for secure OFDMA
systems,” IEEE Transactions on Vehicular Technology, vol. 61, pp. 2572–2585, July 2012.
[60] J. Zhu, V. K. Bhargava, and R. Schober, “Secure downlink transmission in massive MIMO
system with zero-forcing precoding,” in Proc. European Wireless Conference, May 2014,
pp. 1–6.
[61] L. Liu, R. Zhang, and K.-C. Chua, “Secrecy wireless information and power transfer with
MISO beamforming,” in Proc. IEEE Global Telecommunications Conference, December
2013.
[62] D. W. K. Ng and R. Schober, “Secure and green SWIPT in distributed antenna networks
with limited backhaul capacity,” IEEE Transactions on Wireless Communications, vol. 14,
no. 9, pp. 5082–5097, September 2015.
[63] Q. Wang, H. Su, K. Ren, and K. Kim, “Fast and scalable secret key generation exploiting
channel phase randomness in wireless networks,” in Proc. IEEE International Conference
on Computer Communications, April 2011, pp. 1422–1430.
[64] J. Zhu, R. Schober, and V. Bhargava, “Secure transmission in multicell massive MIMO
systems,” IEEE Transactions Wireless Communications, vol. 13, pp. 4766–4781, September
2014.
[65] X. Chen, J. Chen, and T. Liu, “Secure wireless information and power transfer in large-scale
MIMO relaying systems with imperfect CSI,” in Proc. IEEE Global Telecommunications
Conference, December 2014, pp. 4131–4136.
[66] A. Charnes and W. W. Cooper, “Programming with linear fractional functions,” Naval
Research Logistics Quarterly, vol. 9, pp. 181–186, April 1962.
[67] Q. Li and W. K. Ma, “Spatially selective artificial-noise aided transmit optimization for
MISO multi-eves secrecy rate maximization,” IEEE Transactions on Signal Processing,
vol. 61, pp. 2704–2717, May 2013.
Downloaded from https:/www.cambridge.org/core. University of Exeter, on 10 Mar 2017 at 08:07:47, subject to the Cambridge Core terms of use, available at
https:/www.cambridge.org/core/terms. https://doi.org/10.1017/9781316471845.006