Robust and Secure Sum-Rate Maximization for Multiuser MISO Downlink Systems with Self-sustainable IRS
Abstract
This paper investigates robust and secure multiuser multiple-input single-output (MISO) downlink communications assisted by a self-sustainable intelligent reflection surface (IRS), which can simultaneously reflect and harvest energy from the received signals. We study the joint design of beamformers at an access point (AP) and the phase shifts as well as the energy harvesting schedule at the IRS for maximizing the system sum-rate. The design is formulated as a non-convex optimization problem taking into account the wireless energy harvesting capability of IRS elements, secure communications, and the robustness against the impact of channel state information (CSI) imperfection. Subsequently, we propose a computationally-efficient iterative algorithm to obtain a suboptimal solution to the design problem. In each iteration, -procedure and the successive convex approximation are adopted to handle the intermediate optimization problem. Our simulation results unveil that: 1) there is a non-trivial trade-off between the system sum-rate and the self-sustainability of the IRS; 2) the performance gain achieved by the proposed scheme is saturated with a large number of energy harvesting IRS elements; 3) an IRS equipped with small bit-resolution discrete phase shifters is sufficient to achieve a considerable system sum-rate of the ideal case with continuous phase shifts.
I Introduction
The sixth-generation (6G) networks are expected to serve as a key enabler for realizing the future intelligent digital society in 2030, offering superior communication services compared with the current fifth-generation (5G) networks, such as ultra-high data rate, high energy efficiency, large global coverage, and highly secure communications [2]. To satisfy these requirements, various technologies have been proposed in recent years. In particular, massive multiple-input multiple-output (MIMO), millimeter wave (mmWave) communications, and ultra-dense networks (UDNs) are prominent candidates. Although these technologies are able to enhance the wireless network coverage and capacity to a certain extent, they generally incur increased hardware costs, energy consumption, and signal processing complexity, due to the aggressive deployment of large-scale antennas and active nodes in the systems [3, 4]. As such, it is still a fundamental challenge to achieve a sustainable capacity growth of future wireless networks in terms of the communication cost and energy efficiency.
To fulfill the stringent requirements of 6G networks[2], the emerging intelligent reflecting surface (IRS)-assisted wireless communications [5] have received an unprecedented upsurge of attentions recently. Specifically, an IRS consists of a large number of low-cost passive reflection elements which can independently reflect the incident electromagnetic wave with controlled phase shifts. By intelligently adapting the phase shift of each IRS element to the conditions of communication channels, the reflected signals can be coherently combined at the desired receivers. As such, IRSs are able to reshape the signal propagation and to establish a favorable communication environment for achieving various purposes, such as enhancing the physical layer security, harnessing multiple access interference, and improving the quality of communication in terms of both spectral efficiency and energy efficiency[6]. For example, [5] confirmed that IRS-assisted communication systems can extend the signal coverage compared with conventional systems where the IRS is absent. Furthermore, the results in [7] showed that the introduction of an IRS can significantly improve both the achievable system data rate and the total harvested power in simultaneous wireless information and power transfer (SWIPT) systems.
Despite the fruitful results in the literature, e.g. [8, 9, 10, 5, 6, 11, 12, 13], most of the works idealistically assumed that the energy consumption of the IRS is negligible. However, typical power consumption values of each phase shifter are , , , and mW for -, -, -, and -bit resolution phase shifters, respectively [14, 15, 16, 17]. Considering a hundred of IRS elements, the operational power of IRS with -bit phase shifters becomes W which is comparable to the radiated communication power. In fact, IRSs are expected to be battery- or grid- powered [18]. However, powering IRSs via conventional powerline networks would not only increase the implementation cost, but would also decrease the flexibility of IRS deployment. On the other hand, battery-powered IRS are usually equipped with a limited energy storage leading to restrictive operational lifetime that creates a bottleneck in communication networks. Moreover, manually replacing batteries of IRS may be costly or even impossible due to environmental hazards. As a result, the amalgamation of energy harvesting with IRSs is a promising alternative for providing self-sustainable and uninterrupted communication services. In practice, the availability of major conventional energy harvesting resources, such as wind, geothermal, and solar, are usually limited by the weather and energy source locations. As a result, harvesting energy from radio frequency (RF) in wireless communication systems is more reliable and suitable than that from natural sources, due to the controllability of wireless power transfer (WPT)[19]. To enable uninterrupted communication services, a self-sustainable IRS enabled by WPT was considered in [20, 21] for improving the system sum-rate and capacity, respectively. However, [20] focused on the resource allocation design of a single-antenna AP and the obtained results cannot be directly extended to the case adopting a multi-antenna transmitter. On the other hand, although a multi-antenna AP system was considered in [21], the obtained results were developed for the case of a single receiver system, which are not applicable to systems serving with multiple receivers. Moreover, all IRS elements in [20, 21] are forced to adopt the same operating mode in every time instant, which is a strictly suboptimal setting decreasing the flexibility in resource allocation. Furthermore, both [20, 21] ideally assumed a linear energy harvesting model for the conversion of the scavenged RF energy to the direct current (DC) power for simplicity. Yet, the conventional linear energy harvesting model fails to capture the non-linear features of practical energy harvesting circuits [22, 23] and resource allocation designs based on the simplified linear model can lead to severe resource allocation mismatches and performance degradation. Additionally, [20, 21] assumed the availability of continuous phase shifters at IRS which can hardly implemented in particle due to high hardware implementation cost. On the other hand, to facilitate effective energy harvesting, transmitters in SWIPT systems usually increase the power of the information-carrying signals, which may also increase the susceptibility to eavesdropping due to the higher potential of information leakage, which is not considered in [20, 21]. Thus, communication security is a fundamental issue in wireless-powered IRS-assisted systems.
Conventionally, security provisioning methods rely on cryptographic techniques applied at the upper layers of wireless networks, which require high computational complexity leading to a large amount of energy consumption. Fortunately, different from cryptographic techniques, physical layer security is computationally-efficient and effective to safe guard communications by exploiting the inherent randomness of wireless channels [24]. In particular, there are several methods to enhance the physical layer security in wireless networks, e.g. cooperative jamming[25] and artificial-noise (AN)-aided beamforming [26]. Indeed, exploiting AN or jamming signals in wireless networks is a double-edged sword. On the one hand, it can facilitate secure communications by degrading the quality of eavesdroppers’ channels. On the other hand, it may also cause inevitable interference to legitimate users. As a remedy, the application of IRS and AN has been investigated to guarantee secure communications, e.g. [27, 28]. In practice, the degrees of freedom (DoF) offered by the IRS can provide a better interference management which alleviates the negative impacts caused by AN transmission. Indeed, to unleash the potential gain brought by the IRS, accurate channel state information (CSI) is needed for effective beamforming design. However, numerous literature, e.g. [27, 28], over optimistically assumed that perfect CSI of eavesdropper channels is available at the AP which can hardly be obtained in practice. Especially, potential eavesdroppers may not interact with the AP and acquiring perfect CSI of the eavesdropping channel at the AP is challenging. In other words, adopting the results from [27, 28] for robust beamforming design may increase the risk of security breach even if an IRS is deployed. To this end, considering imperfect CSI of eavesdroppers, a secure IRS-assisted wireless network for maximizing the system sum-rate in the presence of multiple users and eavesdroppers was presented in [29]. Nevertheless, the design in [20, 21, 29] still required the availability of perfect CSI of IRS communication channels. Unfortunately, due to the nearly passive implementation of the IRS, obtaining perfect CSI for the IRS related links is challenging, if not impossible. Also, the authors in [30] showed that when the joint transmitter precoder and IRS phase shifts design ignores the existence of possible CSI errors, existing non-robust designs, e.g. [27, 28], cannot always guarantee the required target rate which jeopardizes the system performance significantly. As a result, an efficient robust beamforming design to strike a balance between the system sum-rate and the IRS self-sustainability for secure communication is desired which has not been reported in the literature, yet.
Motivated by the aforementioned observations, we consider a robust and secure IRS-assisted multiuser MISO downlink wireless system in the presence of multiple single-antenna potential eavesdroppers. In particular, by exploiting the large number of IRS elements, our design allows a portion of the IRS elements to reflect signals from the AP and the remaining to harvest energy for supporting the energy consumption of the IRS elements. To maximize the system sum-rate, we jointly optimize the beamforming for information signal and AN, the discrete phase shifts of the IRS, and the harvesting schedule at the IRS. The resource allocation design is formulated as a non-convex mixed-integer optimization problem takes into account the imperfect CSI of all wireless channels, the non-linearity of energy harvesting, and the communication security quality of service (QoS) requirement. To address the design problem at hand, this paper proposes a computationally-efficient iterative suboptimal algorithm. In particular, we first propose a series of transformations to resolve the coupling between the optimization variables which paves the way for the development of a computationally efficient iterative algorithm based on the successive convex approximation (SCA) and semi-definite relaxation (SDR). Unlike the conventional alternation optimization (AO) method [20, 21, 11, 5], which can be easily trapped in inefficient stationary points over iterations in practice, our proposed algorithm is able to jointly optimize all these optimization variables in each iteration enjoying a higher system sum-rate. Our results not only show the non-trivial trade-off between the system sum-rate and the self-sustainability of IRS, but also unveil the impact of limited bit resolution of the IRS phase shifters on the system performance. In addition, our results reveal that deploying self-sustainable IRS can significantly enhance the physical layer security in wireless communication systems.
Notations: The scalars, vectors, and matrices are represented by lowercase letter , boldface lowercase letter , and boldface uppercase letter , respectively. , , and denote the space of matrices with binary, real, and complex entries, respectively. denotes the set of all Hermitian matrices. The modulus of a complex-valued scalar is denoted by . The Euclidean norm, spectral norm, nuclear norm, and Frobenius norm of a matrix are denoted by , , , and , respectively. The transpose, conjugate transpose, conjugate, expectation, rank, and trace of a matrix are denoted as , , , , , and , respectively. The maximum eigenvalue of a matrix is denoted by and the eigenvector associated with the maximum eigenvalue is denoted by . represents . and mean that matrix is positive semi-definite and negative semi-definite, respectively. stands for the real part of a complex number. denotes a diagonal matrix with its diagonal elements given by vector and results in a column vector obtained by sequentially stacking of the columns of matrix . Operator returns the element at the -th row and the -th column of the matrix . denotes the imaginary unit. For a continuous function , represents the gradient of with respect to matrix . The distribution of a circularly symmetric complex Gaussian (CSCG) random variable with mean and variance is denoted by and stands for “distributed as”. denotes an identity matrix. stands for the Kronecker product.
II System Model
II-A Signal Model

As shown in Fig. 1, this paper considers a downlink MISO system assisted by a wireless-powered IRS. An AP equipping with antennas transmits independent data streams to single-antenna users simultaneously, denoted by a set . There are potential eavesdroppers equipped with a single-antenna each, denoted by a set . We assume that all the eavesdroppers work independently and holds to guarantee communication security, as commonly adopted in the literature[31, 32, 33]. Besides, the IRS panel consists of IRS elements, denoted by a set . The reflection matrix of the IRS is denoted as and its details will be discussed in Section II-B.
This paper assumes a quasi-static flat fading channel model. The baseband equivalent channels from the AP to the IRS (AP-IRS), from the IRS to the -th user (IRS-user), from the AP to the -th user (AP-user), from the IRS to the -th potential eavesdropper (IRS-Eve), and from the AP to the -th potential eavesdropper (AP-Eve) are denoted by , , , and , respectively. The transmitted signal from the AP is given by
(1) |
where is the precoding vector for the -th user, , , with , is the modulated data symbol for the -th user, and denotes the AN vector generated by the AP to deliberately combat the eavesdroppers. Specifically, is a CSCG vector with , where is the covariance matrix of the AN vector. Note that the AN is assumed to be unknown to both the legitimate users and the potential eavesdroppers, which is to be optimized by the proposed algorithm to facilicate communication security provisioning and energy harvesting. We assume that the AP has a total transmit power , i.e., . In the system, each user receives signals via two links, i.e., from the indirect path via the IRS (AP-IRS-user) and the direct AP-user channel. Similarly, each potential eavesdropper also receives signals via two links, i.e., from the indirect path via the IRS (AP-IRS-Eve) and the direct AP-Eve channel. Thus, the signals received at the -th user and at the -th eavesdropper are given by111For a small-cell network with a cell radius of meters, the delay between the propagation path reflected by the IRS and the direct path is typically around , which is much shorter than a symbol duration, e.g. in Long-Term Evolution systems[34]. Thus, the potential inter-symbol interference caused by the two paths is not considered in (2).
(2) | |||
respectively. Variables and denote the background noise at the -th user with noise power and at the -th eavesdropper with noise power , respectively. Accordingly, the received signal-to-interference-plus-noise ratio (SINR) at the -th user, , is given by
(3) |
The achievable rate (bits/s/Hz) of the -th user is given by For security provisioning, we adopt the worst-case assumption on the eavesdropping capabilities of potential eavesdroppers. Specifically, the potential eavesdroppers are assumed to have unlimited computational resources such that they can cancel all the multiuser interference before decoding the desired information[29]. Therefore, the channel capacity between the AP and the -th potential eavesdropper for decoding the signal of the -th legitimate user is given by
(4) |
Hence, the achievable secrecy rate between the AP and the -th legitimate user is , and the system sum secrecy rate is given by [29, 35].
II-B IRS Model
In this paper, we consider a realistic model of the IRS to achieve self-sustainability, which contains discrete phase shifters and a non-linear energy222In this paper, the unit of energy consumption is Joule-per-second. Therefore, the terms “power” and “energy” are interchangeable. harvesting circuit.

II-B1 Phase Shift Model
The reflection matrix is defined as , where is an IRS mode selection matrix and is a diagonal matrix. Matrix , , and is an IRS mode selection variable which is defined as:
(7) |
A simplified equivalent circuit of a self-sustainable IRS is shown in Fig. 2. Specifically, several positive-intrinsic-negative (PIN) diodes are embedded in each IRS element such that the IRS elements can be switched to different modes [18], i.e., energy harvesting mode or reflection modes333Note that the IRS is equipped with a controller which switches the operation mode of the IRS elements between the reflection mode and power harvesting mode[6].. In particular, IRS elements in reflection mode reflect all impinging signal waveforms, while the elements in energy harvesting mode harvest all the received energy carried by the signals. Once an IRS element is in reflection mode, all the received signals at that element are reflected and it cannot harvest any energy. Likewise, the elements operating in power harvesting mode do not reflect any received signal. Note that the mode selection policy will be optimized by the proposed algorithm to balance the number of energy harvesting and reflection IRS elements. The diagonal matrix is defined as with a phase shift and an amplitude coefficient . We assume that a discrete phase shifter is adopted in each IRS element and the phase shift interval is uniformly quantized, i.e., where is a set of phase shifts, , is the total number of realizable phase shift levels, and is the given constant bit resolution. For practical implementation of the IRS, the reflection coefficient is fixed to be in this paper, as commonly adopted in the literature, e.g. [5, 7, 36, 17]. For the reflection mode, by varying the biasing voltage of each phase shifter via a direct current feeding line, the imping signals at each IRS element are reflected with some controlled phase shifts [18]. In particular, the power consumption of each IRS reflection element is related to its bit resolution [14, 15, 16, 17]. Thus, we denote as the amount of power consumed by each -bit resolution IRS reflection element.
II-B2 Non-linear Energy Harvesting Model
As for the energy harvesting mode, the signals go through the radio frequency (RF)-to-direct current (DC) power conversion circuit, which consists of three parts, i.e., a matching network, a voltage multiplier, and an energy storage. In particular, the matching network enables the maximum power transmission from the antenna to a voltage multiplier. Also, the voltage multiplier converts the incident RF power into DC power and an energy storage guarantees the smoothed DC power delivery to the load444Note that other advanced hardware circuit implementations of IRS are beyond the scope of the paper and interested readers may refer to [37, 38] for more details. [39]. The power consumed by the RF to DC power conversion circuit is denoted by , which is a constant value depending on the detailed circuit specifications, e.g. resistance, capacitance, and inductance. The total received RF power at the IRS is given by
(8) |
where is the energy harvesting binary-valued matrix. Vector is the thermal noise at the IRS with per IRS element noise power . In general, there are two tractable models for characterizing the property of RF-based energy harvesting in the literature, i.e., the linear model and the non-linear model[19]. However, the linear model fails to capture the characteristics of the inherent non-linearity of practical energy harvesting circuits[40]. Motivated by this, we adopt a more realistic non-linear energy harvesting model proposed in [40] at the IRS and it is given by
(9) |
where and is a sigmoidal function whose input is the received RF power, . Parameter is a nonnegative constant which determines the maximum harvestable power. Also, constants and capture the joint effects of resistance, capacitance, and circuit sensitivity of the energy harvesting circuit. Note that parameters , , and can be obtained easily via some standard curve fitting approach once the schematic of the adopted energy harvesting circuit is fixed.
II-C Channel State Information
In the literature, vaious approaches have been proposed for CSI estimation of individual links and/or cascaded links, e.g. [41, 42]. To isolate the robust resource allocation design from any specific channel estimation design details, e.g. [41, 43], we consider the bounded CSI error model555This model guarantees the performance even for the worst case of channel estimation error, as long as . [42] for the cascaded AP-IRS-user channels, the AP-IRS channel, and the direct AP-user channels. Specifically, we denote the cascaded AP-IRS-user channel for the -th user as
(10) | ||||
where is the estimation of the corresponding channel . The channel estimation error of , is denoted by . The continuous set collects all possible channel estimation errors, while constant denotes the maximum value of the norm of the CSI estimation error .
Since the positions of AP and IRS are usually fixed, the AP-IRS channel, , is generally quasi-static[43]. Therefore, the channel matrix, , can be estimated in a large timescale via existing algorithms, e.g. a dual-link pilot transmission scheme and a coordinate descent-based AP-IRS channel estimation algorithm[43]. As a result, to capture the CSI imperfectness of , we express the AP-IRS channel as
(11) |
where is the estimation of channel , represents the estimation error of , is a continuous set which collects all the possible channel estimation errors, and is the maximum value of norm of the the estimation error . Generally, we have .
Moreover, the direct AP-user channel can be estimated by exploiting conventional uplink pilot transmission [43]. Similarly, we denote the direct AP-user channel for the -th user as
(12) | ||||
where is the estimate of corresponding channel and the corresponding channel estimation error is . The continuous set , collects all the possible channel estimation errors, while constant , is the maximum value of the norm of the CSI estimation error. Similarly, the -th cascaded AP-IRS-Eve channel666Note that the CSI of active eavesdroppers can be estimated by their transmissions, while the CSI for passive eavesdroppers can be estimated through the local oscillator power leaked from the eavesdroppers’ receiver RF front end[44]. and the -th direct AP-Eve channel are denoted as with , and with respectively. , , and are defined in the similar manner as the AP-IRS-user link, , and the AP-user link, . Generally, we have .
III Problem Formulation
In this paper, we aim to maximize the system sum-rate while maintaining the self-sustainability of the IRS by jointly designing the precoding vector , the AN covariance matrix , the mode selection indicators , and the discrete phase shifters . The joint design can be formulated as the following optimization problem777The considered problem formulation serves as a generalized optimization framework that subsumes various existing designs as subcases, e.g. robust precoding [30], secure precoding [28], or energy-harvesting IRS [20], etc.:
(13) | |||
The objective function in (13) maximizes the minimum value of all the possible sum-rate due to CSI errors. Constraint ensures that the transmit power at the AP does not exceed its maximum transmit power budget . Constraint specifies that the phase shift of a -bit resolution IRS reflecting element can only be selected from a discrete set . Constraint indicates that the total power consumed at the IRS should not exceed its total harvested power888If the harvested energy by the IRS is not even enough to supply one IRS reflection element, the proposed problem (13) can be solved by ignoring constraint C3 and the related IRS cascaded links, which is essentially the case of beamforming design without the IRS. from the AP, , while taking into account the imperfect CSI knowledge. Constraint is imposed to guarantee that each IRS element can only operate in either reflection mode or energy harvesting mode. Constant in is the maximum tolerable information leakage to the -th potential eavesdropper for wiretapping the signal transmitted to the -th legitimate user considering the CSI error in the AP-Eve channel and the cascaded AP-IRS-Eve link. In particular, can guarantee that the system secrecy rate is bounded from below, i.e. .
Remark 1.
The proposed formulation in (13) for maximizing the system sum-rate taking into account the information leakage constraints offers a higher flexibility in resources allocation than that of directly maximizing the system secrecy rate as in e.g. [45, 35]. In particular, the proposed problem formulation can control the levels of secrecy performance of individual eavesdropper via adjusting parameters , which is a more flexible formulation for determining the levels of communication securities for heterogeneous practical applications and has been commonly adopted in the literature[29, 46, 42, 47].
IV Solution Of The Optimization Problem

The formulated problem is non-convex due to the coupling between variables , , , and in constraints , , and the objective function in (13), the discrete phase shift in constraint , and the binary variable in constraint . Besides, there are infinitely many possibilities in the objective function, constraint , and constraint , due to the CSI uncertainties in continuous variable sets. In general, solving such a problem optimally requires the use of the exhaustive search method which is computationally intractable even for a moderate size system. As a compromise approach, we aim to design a computationally-efficient suboptimal algorithm to obtain an effective solution. Fig. 3 summarizes the procedure of the proposed problem solving methodology. In order to address the optimization problem without using the AO method, we firstly introduce a set of slack variables and reformulate the problem in (13) to problem in (24), which paves the way for decomposing the coupling variables , . Secondly, we adopt the big-M reformulation to decouple the coupling between the discrete variables, i.e., the mode selection matrix, , and the continuous variables, i.e., precoder, , and AN matrix, , in and . Besides, decomposing the coupling between the continuous variables in the objective function and constraints , and requires exploiting the properties of logarithm and Frobenius norm, respectively. Thirdly, after decomposing all these coupling variables, the -procedure is adopted to tackle the infinite number of constraints caused by imperfect CSI in , , , and . Fourthly, we exploit the successive convex approximation (SCA) to deal with all functions in difference of convex (D.C.) form, i.e.,, , , , and . Lastly, we apply the semi-definite relaxation (SDR) method to tackle the rank-one constraint, i.e., , for the precoder design. As such, a computationally efficient suboptimal solution can be obtained.
IV-A Problem Transformation
To facilitate the design of discrete IRS phase shifts, we first handle the coupling of model selection variables and phase shifts matrix, , in the objective function, constraint , and constraint . To this end, we define an augmented mode selection matrix to replace . , where is the new mode selection optimization variable for the -th IRS element and is the generalized mode selection set with modes. When , the -th IRS element is in the energy harvesting mode, otherwise it is in the reflection mode. Then, we can express the received desired signal at the -th user as
(14) |
where , , , and . Then, by defining , , and , in the objective function, in constraints C5, constraints C3, and constraints C4 in (13) can be equivalently rewritten as
(15) | |||
respectively, where is the -th element of vector .
Next, to handle the discrete optimization variable in C3 and C4, we further introduce a binary mode selection optimization variable . , where is a mode selection binary matrix. In particular, indicates that the -th mode is selected for the -th element. Otherwise, . Thus, constraint C4 can be equivalently represented as:
(16) | |||
where is the -th element of the generalized mode selection set defined in (16). Furthermore, to tackle the binary constraint on in (16), we equivalently transform constraint into the following two continuous constraints:
(17) |
Meanwhile, the first row of mode selection binary matrix , i.e., , represents the activity statuses of all the IRS elements on energy harvesting mode. Therefore, the total received RF power at the IRS in (8) can be equivalently rewritten as follows:
(18) |
where is a matrix, is a vector with one on the -th element and zeros elsewhere, i.e., . As a result, constraint can be equivalently rewritten as
(19) |
(20) |
where is an auxiliary optimization variable to replace .
Since is an increasing function, we can establish a lower bound of the objective function in (13) by applying the following commonly adopted inequality[48, 49]:
(21) | ||||
By replacing the objective function in (13) with its lower bound (21), a performance lower bound of problem (13) can be obtained by solving the following optimization problem:
(22) | ||||
where and are two slack variables. Moreover, the non-convex constraint in in (22) can be replaced by the following two constraints [50]:
(23) |
Therefore, the optimization problem in (22) is equivalent to the following problem:
(24) | |||
IV-B Optimization Variables Decoupling
For the optimization problem in (24), the non-convexity arises from constraints , , , , , and the objective function due to severely coupled variables. In particular, there are three types of variable couplings, i.e., the fractional form of two continuous variables in SINR, the multiplication between a binary and a continuous variable, and the multiplication between , , and , e.g. and . To address the first type of coupling, we rewrite the in (24) in its equivalent form of D.C. form[29]:
(25) |
where are two functions which are both concave with respect to and , respectively.
Then, by introducing two auxiliary optimization variables , , we adopt the big-M reformulation[26] to convert the logical constraints and to a set of equivalent constraints as follows:
(26) | |||
where is a sufficiently large constant number and denotes the channel estimation error for the channel between the AP and the -th IRS element.
Note that according to the definition of in (18), the term in (20) only depends on the -th row of the channel matrix , which corresponds to the channel vector between the AP and the -th IRS element. Since the channel uncertainty of the AP to IRS elements links are assumed independent with each other, we have .
Lastly, we adopt the transformation method in [51] to decompose the coupled variables between and in the objective function and constraints , , and in (24). For illustration, we take constraint in (24) as an example. The coupled terms on the left hand side of constraint can be rewritten to two separated variables as follows:
(27) | |||
Therefore, constraint can be rewritten as the following equivalent form without couplings:
(28) |
By using the same method, constraints and can be rewritten as
(29) |
(30) |
respectively.
IV-C -Procedure
On the other hand, due to the CSI uncertainty, there are infinity possibilities for constraints , , , and . As a result, we adopt the -procedure[52, 53] to tackle these issues. Firstly, to handle the challenge in constraints , we apply the following lemma to convert into a finite number of linear matrix inequalities (LMIs).
Lemma 1.
(-Procedure[52]): Let a function , be defined as
(31) |
where , and . Then, the implication holds if and only if there exists an such that
(32) |
provided that there exists a point such that .
To apply Lemma 1 to constraint , we rewrite the channel uncertainty (11) and reformulate constraint . In particular,
(33) | |||
holds if and only if there exist , such that the following LMI constraints hold:
(34) | |||
(35) |
where , , and .
Then, for constraints , , and , there are an infinitely number of quadratic matrix inequalities (QMIs)[31, 53] due to the CSI uncertainty set. To overcome the problem, we first introduce slack optimization variables , , and to replace the term in constraints and and the term in constraint . Hence, constraints , , and can be equivalently rewritten as:
(36) | |||
respectively. Note that constraints , and still involve an infinite number of inequality constraints. To circumvent this difficulty, we convert the infinity number of constraints , and to an equivalent form with only a finite number of constraints by applying Lemma 2.
Lemma 2.
(Generalized S-procedure[53]): Let and . For some , is equivalent to
(37) |
IV-D SCA- and SDR-based Iterative Algorithm
Next, to tackle the non-convexity of constraints , , , , , and the objective function in (24), we first transform them into a D.C. form such that SCA can be applied to obtain a suboptimal solution. Firstly, the rank-one constraint is rewritten using lemma 3:
Lemma 3.
The rank-one constraint is equivalent to the following D.C. form constraint:
(41) |
Proof.
Now, we aim to propose an iterative algorithm based on SCA to tackle the D.C. form constraint . To this end, for any feasible point , where denotes the iteration index for the proposed algorithm summarized in Algorithm 1 (to be discussed in detail later), a lower bound of is given by its first-order Taylor approximation:
(42) |
By applying SCA, a subset of constraint can be obtained which is given by
(43) | ||||
Since , replacing with can ensure that the former is satisfied when the proposed algorithm converges. On the other hand, it can be observed that the non-convex objective function in (25), non-convex constraint in (26), and non-convex constraint in (17) are also in D.C. form that are differentiable. Similarly, by deriving the first-order Taylor expansions corresponding to the non-convex component, for any feasible point , , and , we have the following inequalities
(44) | |||
respectively, where . As such, a lower bound of the objective function (25) and subsets of constraints and are given by
(45) | |||
respectively.
Similarly, to overcome the non-convexity of , , and in (36), we construct their corresponding global underestimators by their first-order Taylor approximations, respectively. In particular, for any feasible point , a lower bound of is given by
(46) |
Following the same method, the lower bound of , , , , and can be found. Therefore, the subsets of , , and in (36) are given by
(47) | |||
(48) | |||
(49) | |||
respectively, where , , , , and are the solutions obtained in the -th iteration. For notational simplicity, we define , , and . A lower bound of (24) can be obtained via solving the following optimization problem:
(50) | ||||
Since rank-one constraint is the only non-convex part in optimization problem (50), we apply the SDR technique to drop the rank constraint in , i.e., , such that the rank constraint relaxed version of (50) can be solved by using standard numerical solver for convex programming. In the following theorem, the tightness of the adopted SDR is revealed.
Due to the use of SCA, solving the problem in (50) provides a lower bound for the problem in (13). To tighten the obtained performance lower bound, we iteratively update the feasible solution by solving the optimization problem in (50) in the -th iteration. The proposed SCA-based algorithm is shown in Algorithm 1 and the proof of its convergence to a suboptimal solution can be found in [54] which is omitted here for brevity.
Algorithm | Computational Complexity[55] |
---|---|
Exhaustive search | (51) |
AO algorithm | (52) |
The proposed algorithm | (53) |
In practice, several methods [52] can be used to solve the convex problem in (13). Table I shows the computational complexity and performance comparison of the exhaustive search method, the AO approach, and the proposed algorithm of the optimization problem in (13). Since the precoder adopted at the AP, , and artificial noise vector at the AP, , are continuous variables, to solve the problem in (13), the exhaustive search is performed by a grid search with a grid resolution of . In particular, the exhaustive search enumerates all the variable combinations within the feasible set of problem in (13) and then returns the variable combination with the maximum system sum-rate. As such, the computational complexity of the exhaustive search method for the problem in (13) is given by (51) in Table I, where is the big-O notation.
Although the exhaustive search can obtain an optimal solution of the problem in (13), it is computationally intractable even for a moderate size system. In the following, we analyze the computational complexity of the AO algorithm and the proposed algorithm in details.
On the other hand, the computational complexity of each iteration of the conventional AO algorithm to solve problem (13) is given by (52) in Table I [55], where
(54) | ||||
are the number of inequalities and the number of variables (dominated terms) of subproblem 1 of the AO algorithm, respectively. Besides,
(55) | ||||
are the number of inequalities and the number of variables of subproblem 2 of (51) the AO algorithm, respectively. Note that and is the threshold of convergence tolerance of the subproblems and of the AO algorithm, respectively. Besides, and are the maximum iteration times of the subproblems and of the AO algorithm, respectively. Moreover, the computational complexity of each iteration of the proposed algorithm is given by (53) in Table I [55], where and are the number of inequalities and the number of variables of the proposed scheme, respectively. Besides, is the threshold of convergence tolerance of the proposed algorithm. Note that the computational complexity of the proposed algorithm and the AO method both enjoy a polynomial time computational complexity which is known as fast algorithms for implementation [56] and the conclusion of their complexity comparison depends on the adopted parameters. It is worth to mention that the performance of the proposed algorithm outperforms that of the AO algorithm, which will be shown in the following simulations. Indeed, rather than separately and alternatively optimizing variables in each subproblem, the proposed algorithm can jointly optimize all optimization variables in every iteration for a better exploitation of the problem structure.
V Simulation Results
V-A Simulation Setup

This section evaluates the system performance of the proposed self-sustainable IRS scheme via simulation. The system setup is shown in Fig. 4. The users and the potential eavesdroppers are randomly distributed on the circumference of two concentric circles with radii of m and m, respectively. The other potential eavesdropper is located on the circumference of a circle centered at the AP with a radii of m. The AP and the center point of the circle formed by users are located m apart. Also, the IRS lies on a horizontal line that is in parallel to the one that connects the AP and the centre point of the users formed concentric circle. The vertical distance between these two lines is m and the horizontal distance between the AP and the IRS is denoted by . The distance-dependent path loss model[57] is adopted with m reference distance. For ease of presentation, we define , and as the maximum normalized estimation error for the channel , and , i.e., , and , respectively. Unless further specified, we fix and , which is the normalized mean square error based on channel estimation method in [43]. The maximum of tolerable channel capacity of potential eavesdroppers is bits/s/Hz. Other important parameters are summarized in Table II.
Antenna gains at the AP, the IRS and receivers | dBi, dBi, and dBi | ||||
---|---|---|---|---|---|
Systen carrier centre frequency | GHz | ||||
Number of antennas at AP | |||||
Number of the IRS elements | |||||
Number of users and the number of eavesdroppers | and | ||||
|
|
||||
|
|
||||
Non-linear energy harvesting circuit parameters |
|
||||
Maximum power budget at the AP | dBm | ||||
Noise power at users and eavesdroppers | dBm | ||||
Power consumption consumed by power conversion circuit | [59] | ||||
Phase shifter bit resolution of IRS elements | bits | ||||
Power consumption of each IRS reflection element | mW for [17] | ||||
The maximum of tolerable channel capacity of eavesdroppers | bits/s/Hz |
For comparison, we evaluate the system performance of five baseline schemes: 1) “Upper bound ” has the same setting as the considered model expect that all IRS elements in this scheme adopt continuous phase shifters but without consuming any energy; 2) “Upper bound ” is achieved by the IRS-assisted system with an energy harvesting IRS but without potential eavesdroppers; 3) “Baseline scheme ” is a non-robust design for the case when the IRS is not deployed and the maximum ratio transmission (MRT) with respect to users is adopted as the precoder at the AP. In particular, this scheme treats the imperfect CSI as the perfect one and the direction of the precoder for the -th user is fixed to . Then, we optimize the power allocation for each user subject to constraint C1 in problem (13) for the maximization of system sum-rate; 4) “Baseline scheme ” is the system with a self-sustainable IRS adopting the same MRT precoder at the AP as in baseline scheme for non-robust transmission. Yet, its phase shifts of the IRS and the power allocation at the AP are jointly optimized by applying the method developed by the proposed scheme; 5) “Baseline scheme ” is the same as the proposed scheme expect that it treats the estimated channel information as perfect channel information; 6) “Baseline scheme ” focuses on the same setting as the proposed scheme except that all IRS elements in the former adopt random phase shifts but without consuming any energy; 7) “Baseline scheme 5” is the same as the proposed scheme expect that it does not take the existence of eavesdroppers into account. In other words, there is no communication security guaranteed; 8) “AO scheme” is the conventional algorithm which has been widely used in the literature [20, 21, 11, 5]. It has the same setting as the considered model except that AO is applied which splits the original problem into two sub-problems and optimizes the grouped variables , and in the subproblems, respectively, via an alternating manner. The resource allocation for the eight baselines scheme can be obtained by modifying the proposed scheme accordingly. Note that for all the schemes, if the joint design of precoder and phase shifts of IRS are unable to meet the requirements of constraints in (13), we set the system sum-rate for that channel realization to zero to account the penalty for the corresponding failure.
V-B Average System Sum-Rate versus the Distance Between AP and IRS


Fig. 5 depicts the average system sum-rate versus the horizontal distance between the AP and the IRS for different schemes.
It can be observed that the proposed scheme can achieve a substantially higher sum-rate than that of baseline scheme , which the IRS is not available. Indeed, the IRS provides an additional path gain, , which can be exploited and optimized by the proposed scheme to improve the system performance. Besides, due to the joint optimization of the transmit beamforming and phase shifts, the proposed scheme can achieve a considerable performance gain compared with baseline scheme adopting a fixed beamforming direction.
In addition, we note that baseline scheme has unsatisfactory performance compared with the proposed scheme. Indeed, since baseline scheme adopts random phase shifts, the information beams reflected by the IRS do not always align with the direction of the desired channels such that the additional path gain cannot be fully exploited. Furthermore, since baseline scheme 5 does not take the existence of eavesdroppers into account while optimizing the precoder and IRS phase shifts, there is no power allocated to the artificial noise vector, , which generally results in a high channel capacity at the potential eavesdroppers. Therefore, the resulting joint design of baseline scheme 5 is unable to fulfill the security QoS requirement, i.e., constraint C5 of the problem in (13), which leads to an unsatisfactory performance. Moreover, the proposed scheme outperforms the AO scheme. Indeed, AO splits the original problem in (13) into two subproblems and optimizes the grouped variables , and in the two subproblems, respectively, via an alternating manner. In particular, it is well-known that the AO method can be easily trapped in inefficient stationary points over iterations in practice, which leads to possible severe performance degradation. In contrast, our proposed algorithm is able to jointly optimize all these optimization variables in each iteration, which can better exploit the structure of the design problem resulting in a higher sum-rate than the conventional AO approach. Furthermore, since introducing more users to the system offers more multi-user diversity [60, 61] for the proposed resource allocation design to exploit, the system sum-rate of the case and is higher than that of and .
On the other hand, for all schemes with IRS deployed except baseline scheme 5, the average system sum-rate is at its lowest when the IRS is close to the middle between the AP and the center point of users. In fact, when the IRS is neither close to the AP nor the users, both the AP-IRS path and the IRS-users paths would experience significant attenuations that decrease the capability of the IRS in focusing the reflected signals to the desired users. Besides, we can also observe from Fig. 5 that when the IRS is in close proximity to the AP, the performance of the proposed scheme approaches that of the upper bound. In contrast, as the distance further increases, the sum-rate gap between the proposed scheme and the upper bound is slightly enlarged. This is because as increases, each IRS element would harvest less power on average. As can be expected from constraint in (13), more IRS elements are switched to the power harvesting mode to maintain the sustainability of the IRS resulting in a less number of IRS elements for improving the system sum-rate via signal reflection.
V-C Average System Sum-Rate versus the Number of IRS Elements


Fig. 6 shows the variation of average system sum-rate with different numbers of IRS elements at m. It can be observed that with an increasing number of IRS elements , the average system sum-rate of the proposed scheme increases. Indeed, the extra spatial degrees of freedom offered by the increased number of reflecting IRS elements provides a high flexibility in beamforming to enhance the channel quality of the end-to-end AP-IRS-user link for improving the system sum-rate. More interestingly, the system sum-rate is gradually saturated as the number of IRS elements increases. In practice, the number of activated IRS elements for reflection is constrained by both the total amount of energy harvested from the AP and the hardware limitation of the energy harvesting circuit. Although the increase of IRS elements can collect more energy at the input of the energy harvesting circuit, an exceeding large power can saturate the circuit due to its non-linearity. As such, the harvestable energy reaches its maximum which is unable to further support more activated IRS reflection elements. Also, Fig. 6 compares the performance of the proposed scheme with different bit resolutions, , of each IRS phase shifter. Note that the upper bound in Fig. 6 is the previously mentioned upper bound scheme but with . It can be observed that the performance of the IRS phase shifts with a bit resolution of bits can approach that of the upper bound. In particular, increasing the bit resolution above bits would only provide a marginal improvement in system sum-rate. In fact, the IRS-user links are dominated by LoS components in Rician fading channels. Thus, a small bit resolution of phase shifts is sufficient to facilitate the beamformer aligning the desired signals with the dominant channels.
V-D Sum-Rate Versus the Maximum Tolerable Channel Capacity of the Eavesdroppers
Fig. 7(a) depicts the average system sum-rate versus the maximum tolerable channel capacity of the potential eavesdroppers, . As can be observed, thanks to the optimization of the transmit beanformer at the AP and the phase shifts at the IRS, the average system sum-rate of the proposed scheme outperforms that of the both baseline schemes and . Moreover, the performance gap between the proposed scheme and upper bound is generally small for , which confirms the effectiveness of the proposed scheme to strike a balance between system sum-rate and security provisioning. Furthermore, the system sum-rate grows as increases. Indeed, as shown in Fig. 7(b), when is small, a large portion of the transmit power is allocated to transmitting AN to deteriorate the capacity of the potential eavesdroppers. As a result, less power is allocated to maximize the system sum-rate. As for large , the information leakage constraints are less stringent, thus more power can be assigned to the precoder , which can effectively exploit the DoF brought by the AP antennas and IRS elements to create powerful and sharp beamforming for improving the system sum-rate.
V-E CSI Uncertainties

Fig. 8 shows the average system sum-rate against different maximum normalized channel estimation error variance when m and dBm. As can be observed, for all the schemes, the average sum-rates decline as the quality of CSI is degraded. This is because with the deteriorated CSI quality, both the AP and the IRS become less capable in creating energy-focused information carrying beams and more power is allocated to AN jamming to satisfy the secrecy constraint. On the other hand, since the proposed scheme can jointly optimize the IRS phase shifters and precoders, which exploits the spatial DoF more efficiently than that of baseline schemes and , the performance of the proposed scheme significantly outperforms all baseline schemes over the entire range of the different channel error estimation variances, which confirms the robustness against the CSI imperfectness. Moreover, although the performance of baseline scheme 3 is as good as the proposed scheme at , its sum-rate decreases rapidly as the value of increases. Since baseline 3 treats imperfect CSI as the prefect one for beamforming design, the resource allocation mismatches are magnified and it is unable to fulfill the QoS requirement leading to unsatisfactory performance.
VI Conclusion
In this paper, we formulated the resource allocation algorithm design for robust and secure multiuser MISO downlink systems with self-sustainable IRS as a non-convex optimization problem. To maximize the system sum-rate, the transmit beamformers, AN covariance matrix, IRS phase shifts, and the power harvesting schedule were jointly optimized while satisfying secrecy constraints for the potential eavesdroppers and taking into account the imperfection of CSI of all channels. The proposed algorithm can achieve an effective solution to the formulated non-convex design problem. Simulation results demonstrated that the proposed scheme offers significant performance gain compared with the conventional MISO systems without IRS. Moreover, our results also unveiled the non-trivial trade-off between achieving IRS self-sustainability and the system sum-rate. In particular, the system sum-rate of a IRS-assisted system is gradually saturated as the number of energy harvesting IRS elements increased. Additionally, we confirmed that a small bit resolution of the IRS phase shifters can achieve a considerable average system sum-rate of the ideal case with continuous phase shifters. Lastly, our results verified the potential of IRSs to improve the physical layer security and confirmed that the robustness of the proposed scheme against the CSI imperfectness.
Appendix A Proof of Theorem 1
To facilicate the proof, we first introduce three slack optimization variables, i.e. , , and , and three constraints, i.e. , , and . Then, the rank constraint relaxed version of problem (50) can be transformed into its equivalent form, as shown in (56) at the top of next page.
(56) | |||
Since (56) is jointly convex with respect to the optimization variables and satisfies Slater’s constraint qualification, its strong duality holds. The Lagrangian function of problem (56) in terms of is given in (57).
(57) | ||||
in (57) denotes the collection of terms that are irrelevant to . In (57), , and are the Lagrange multiplier for the constraints , and , respectively. , , , , and are the Lagrange multiplier matrices corresponding to constraints , , , , and respectively. Then, examining the Karush-Kuhn-Tucker (KKT) conditions for problem (56) yields
(58) | ||||
(59) | ||||
(60) |
For ease of presentation, the K3 in (60) can be recast as:
(61) |
where and .
From (59), we know that matrix lies in the null space of . To reveal the rank of , we first investigate the structure of . When , which leads to the dual problem of problem (56) unbounded. Thus holds. According to (61), if , then , which contradicts in (58). If , is a positive definite matrix with full rank, which yields the solution and . If holds at the optimal solution, in order to have a bounded optimal dual solution, the null space of is spanned by vector , which is a unit-norm eigenvector of associated with eigenvalue . As a result, there exists the optimal beamforming matrix given by , where is a parameter which makes the power consumption of transmitter satisfies constraint C1.
References
- [1] S. Hu, Z. Wei, Y. Cai, D. W. K. Ng, and J. Yuan, “Sum-rate maximization for multiuser MISO downlink systems with self-sustainable IRS,” in GLOBECOM 2020 - 2020 IEEE Global Commun. Conf., pp. 1–7, Dec. 2020.
- [2] Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and P. Fan, “6G wireless networks: Vision, requirements, architecture, and key technologies,” IEEE Veh. Technol. Mag., vol. 14, pp. 28–41, Sep. 2019.
- [3] Q. Wu, G. Y. Li, W. Chen, D. W. K. Ng, and R. Schober, “An overview of sustainable green 5G networks,” IEEE Wirel. Commun., vol. 24, pp. 72–80, Aug. 2017.
- [4] M. Shafi, A. F. Molisch, P. J. Smith, T. Haustein, P. Zhu, P. De Silva, F. Tufvesson, A. Benjebbour, and G. Wunder, “5G: A tutorial overview of standards, trials, challenges, deployment, and practice,” IEEE J. Select. Areas Commun., vol. 35, pp. 1201–1221, Apr. 2017.
- [5] Q. Wu and R. Zhang, “Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming,” IEEE Trans. Wireless Commun., vol. 18, pp. 5394–5409, Aug. 2019.
- [6] Q. Wu, S. Zhang, B. Zheng, C. You, and R. Zhang, “Intelligent reflecting surface aided wireless communications: A tutorial,” arXiv preprint arXiv:2007.02759, 2020.
- [7] Q. Wu and R. Zhang, “Weighted sum power maximization for intelligent reflecting surface aided SWIPT,” IEEE Wireless Commun. Lett., pp. 1–1, Dec. 2019.
- [8] C. Liu, X. Liu, Z. Wei, S. Hu, D. W. K. Ng, and J. Yuan, “Deep learning-empowered predictive beamforming for IRS-assisted multi-user communications,” arXiv preprint arXiv:2104.12309, 2021.
- [9] X. Yu, V. Jamali, D. Xu, D. W. K. Ng, and R. Schober, “Smart and reconfigurable wireless communications: From IRS modeling to algorithm design,” arXiv preprint arXiv:2103.07046, 2021.
- [10] Y. Cai, Z. Wei, S. Hu, D. W. K. Ng, and J. Yuan, “Resource allocation for power-efficient IRS-assisted UAV communications,” in Proc. IEEE Intern. Commun. Conf. Workshops (ICC Workshops), pp. 1–7, Jun. 2020.
- [11] S. Abeywickrama, R. Zhang, Q. Wu, and C. Yuen, “Intelligent reflecting surface: Practical phase shift model and beamforming optimization,” IEEE Trans. Commun., vol. 68, no. 9, pp. 5849–5863, Jun. 2020.
- [12] C. Pan, H. Ren, K. Wang, W. Xu, M. Elkashlan, A. Nallanathan, and L. Hanzo, “Multicell MIMO communications relying on intelligent reflecting surfaces,” IEEE Trans. Wireless Commun., vol. 19, no. 8, pp. 5218–5233, May 2020.
- [13] Z. Zhang and L. Dai, “A joint precoding framework for wideband reconfigurable intelligent surface-aided cell-free network,” arXiv preprint arXiv:2002.03744, 2020.
- [14] R. Méndez-Rial, C. Rusu, N. González-Prelcic, A. Alkhateeb, and R. W. Heath, “Hybrid MIMO architectures for millimeter wave communications: Phase shifters or switches?,” IEEE Access, vol. 4, pp. 247–267, Jan. 2016.
- [15] L. N. Ribeiro, S. Schwarz, M. Rupp, and A. L. de Almeida, “Energy efficiency of mmwave massive MIMO precoding with low-resolution DACs,” IEEE J. Sel. Topics Signal Process., vol. 12, no. 2, pp. 298–312, May 2018.
- [16] C. Huang, G. C. Alexandropoulos, A. Zappone, M. Debbah, and C. Yuen, “Energy efficient multi-user MISO communication using low resolution large intelligent surfaces,” in 2018 IEEE Globe. Commun. Workshops, pp. 1–6, Dec. 2018.
- [17] C. Huang, A. Zappone, G. C. Alexandropoulos, M. Debbah, and C. Yuen, “Reconfigurable intelligent surfaces for energy efficiency in wireless communication,” IEEE Trans. Wireless Commun., vol. 18, pp. 4157–4170, Jun. 2019.
- [18] Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network,” IEEE Commun. Mag., vol. 58, pp. 106–112, Nov. 2019.
- [19] B. Clerckx, R. Zhang, R. Schober, D. W. K. Ng, D. I. Kim, and H. V. Poor, “Fundamentals of wireless information and power transfer: From RF energy harvester models to signal and system designs,” IEEE J. Select. Areas Commun., vol. 37, pp. 4–33, Sep. 2018.
- [20] B. Lyu, P. Ramezani, D. T. Hoang, S. Gong, Z. Yang, and A. Jamalipour, “Optimized energy and information relaying in self-sustainable IRS-empowered WPCN,” arXiv preprint arXiv:2004.03108, Apr. 2020.
- [21] Y. Zou, S. Gong, J. Xu, W. Cheng, D. T. Hoang, and D. Niyato, “Wireless powered intelligent reflecting surfaces for enhancing wireless communications,” IEEE Trans. Veh. Technol, vol. 69, no. 10, pp. 12369–12373, Jul. 2020.
- [22] T. Le, K. Mayaram, and T. Fiez, “Efficient far-field radio frequency energy harvesting for passively powered sensor networks,” IEEE J. Solid-State Circuits, vol. 43, pp. 1287–1302, Apr. 2008.
- [23] J. Guo and X. Zhu, “An improved analytical model for RF-DC conversion efficiency in microwave rectifiers,” in 2012 IEEE/MTT-S International Microwave Symposium Digest, pp. 1–3, IEEE, Aug. 2012.
- [24] X. Sun, D. W. K. Ng, Z. Ding, Y. Xu, and Z. Zhong, “Physical layer security in UAV systems: Challenges and opportunities,” IEEE Wirel. Commun., vol. 26, pp. 40–47, Oct. 2019.
- [25] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Cooperative jamming for wireless physical layer security,” in 2009 IEEE/SP 15th Workshop Statistical Signal Process., pp. 417–420, IEEE, Aug. 2009.
- [26] Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, “Robust and secure resource allocation for full-duplex MISO multicarrier NOMA systems,” IEEE Trans. Commun., vol. 66, pp. 4119–4137, Sep. 2018.
- [27] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy rate maximization for intelligent reflecting surface assisted multi-antenna communications,” IEEE Wireless Commun. Lett., vol. 23, pp. 1488–1492, Jun. 2019.
- [28] M. Cui, G. Zhang, and R. Zhang, “Secure wireless communication via intelligent reflecting surface,” IEEE Wireless Commun. Lett., vol. 8, pp. 1410–1414, May 2019.
- [29] X. Yu, D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, “Robust and secure wireless communications via intelligent reflecting surfaces,” IEEE J. Select. Areas Commun., vol. 38, pp. 2637–2652, Jul. 2020.
- [30] G. Zhou, C. Pan, H. Ren, K. Wang, M. Di Renzo, and A. Nallanathan, “Robust beamforming design for intelligent reflecting surface aided MISO communication systems,” IEEE Commun. Lett., vol. 9, pp. 1658–1662, Jun. 2020.
- [31] Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, “Multi-objective optimization for robust power efficient and secure full-duplex wireless communication systems,” IEEE Trans. Wireless Commun., vol. 15, Apr. 2016.
- [32] X. Zhao, J. Xiao, Q. Li, Q. Zhang, and J. Qin, “Joint optimization of AN-aided transmission and power splitting for MISO secure communications with SWIPT,” IEEE Commun. Lett., vol. 19, pp. 1969–1972, Sep. 2015.
- [33] H. Zhang, Y. Huang, C. Li, and L. Yang, “Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers,” IEEE Trans. Wireless Commun., vol. 15, pp. 7807–7819, Sep. 2016.
- [34] G. Arunabha, J. Zhang, J. G. Andrews, and R. Muhamed, “Fundamentals of LTE,” The Prentice Hall communications engineering and emerging technologies series, 2010.
- [35] R. Li, Z. Wei, L. Yang, D. W. K. Ng, J. Yuan, and J. An, “Resource allocation for secure Multi-UAV communication systems with multi-eavesdropper,” IEEE Trans. Commun., vol. 68, pp. 4490–4506, Mar. 2020.
- [36] Q. Wu and R. Zhang, “Beamforming optimization for intelligent reflecting surface with discrete phase shifts,” in Proc. IEEE Intern. Conf. on Acoustics, Speech and Signal Process., pp. 7830–7833, May 2019.
- [37] S. H. Abdelhalem, P. S. Gudem, and L. E. Larson, “An RF-DC converter with wide-dynamic-range input matching for power recovery applications,” IEEE Trans. Circuits Syst. II Express Briefs IEEE T CIRCUITS-II, vol. 60, pp. 336–340, Apr. 2013.
- [38] Z. Hameed and K. Moez, “Hybrid forward and backward threshold-compensated RF-DC power converter for RF energy harvesting,” IEEE Trans. Emerg. Sel. Topics Circuits Syst., vol. 4, no. 3, pp. 335–343, Jul. 2014.
- [39] P. Nintanavongsa, U. Muncuk, D. R. Lewis, and K. R. Chowdhury, “Design optimization and implementation for RF energy harvesting circuits,” IEEE Trans. Emerg. Sel. Topics Circuits Syst., vol. 2, no. 1, pp. 24–33, Feb. 2012.
- [40] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical non-linear energy harvesting model and resource allocation for SWIPT systems,” IEEE Commun. Lett., vol. 19, pp. 2082–2085, Sep. 2015.
- [41] J. Chen, Y.-C. Liang, H. V. Cheng, and W. Yu, “Channel estimation for reconfigurable intelligent surface aided multi-user MIMO systems,” arXiv preprint arXiv:1912.03619, 2019.
- [42] D. W. K. Ng and R. Schober, “Secure and green SWIPT in distributed antenna networks with limited backhaul capacity,” IEEE Trans. Wireless Commun., vol. 14, pp. 5082–5097, May 2015.
- [43] C. Hu, L. Dai, S. Han, and X. Wang, “Two-timescale channel estimation for reconfigurable intelligent surface aided wireless communications,” IEEE Trans. Commun., pp. 1–1, Apr. 2021.
- [44] A. Mukherjee and A. L. Swindlehurst, “Detecting passive eavesdroppers in the MIMO wiretap channel,” in 2012 IEEE Int. Conf. Acoustics, Speech and Signal Process. (ICASSP), pp. 2809–2812, IEEE, Mar. 2012.
- [45] P. Zhao, M. Zhang, H. Yu, H. Luo, and W. Chen, “Robust beamforming design for sum secrecy rate optimization in MU-MISO networks,” IEEE Trans. Inf. Forensics Secur., vol. 10, pp. 1812–1823, Apr. 2015.
- [46] F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, “Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT,” IEEE J. Select. Areas Commun., vol. 36, Apr. 2018.
- [47] H. Qin, X. Chen, Y. Sun, M. Zhao, and J. Wang, “Optimal power allocation for joint beamforming and artificial noise design in secure wireless communications,” in 2011 IEEE Int. Conf. Commun. Workshops (ICC), Jul. 2011.
- [48] D. Li, C. Shen, and Z. Qiu, “Sum rate maximization and energy harvesting for two-way af relay systems with imperfect CSI,” in 2013 IEEE Int. Conf. Acoustics, Speech and Signal Process., pp. 4958–4962, May 2013.
- [49] Y. Tang, J. Xiong, D. Ma, and X. Zhang, “Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty,” IEEE Commun. Lett., vol. 17, pp. 2096–2099, Oct. 2013.
- [50] J. B. Moore and D. Jiang, “A rank preserving flow algorithm for quadratic optimization problems subject to quadratic equality constraints,” in 1997 IEEE Int. Conf. Acoustics, Speech, and Signal Process., vol. 1, pp. 67–70, IEEE, 1997.
- [51] X. Yu, D. Xu, D. W. K. Ng, and R. Schober, “Power-efficient resource allocation for multiuser MISO systems via intelligent reflecting surfaces,” arXiv preprint arXiv:2005.06703, 2020.
- [52] S. Boyd, S. P. Boyd, and L. Vandenberghe, Convex optimization. Cambridge university press, 2004.
- [53] Z.-Q. Luo, J. F. Sturm, and S. Zhang, “Multivariate nonnegative quadratic mappings,” SIAM J. Optim., vol. 14, no. 4, pp. 1140–1162, 2004.
- [54] Z. Opial, “Weak convergence of the sequence of successive approximations for nonexpansive mappings,” Bull. Am. Math. Soc., vol. 73, no. 4, pp. 591–597, 1967.
- [55] I. Pólik and T. Terlaky, “Interior point methods for nonlinear optimization,” in Nonlinear optimization, pp. 215–276, Springer, Jul. 2010.
- [56] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to algorithms. MIT press, Jul. 2009.
- [57] A. Goldsmith, Wireless Communications. Cambridge university press, 2005.
- [58] R. Mardeni and T. S. Priya, “Optimised COST-231 hata models for WiMAX path loss prediction in suburban and open urban environments,” Mod. Appl. Sci., vol. 4, no. 9, p. 75, Sep. 2010.
- [59] Y. Yao, J. Wu, Y. Shi, and F. F. Dai, “A fully integrated 900-MHz passive RFID transponder front end with novel zero-threshold RF-DC rectifier,” IEEE Trans. Ind. Electron., vol. 56, pp. 2317–2325, Nov. 2008.
- [60] D. Tse and P. Viswanath, Fundamentals of wireless communication. Cambridge university press, 2005.
- [61] Z. Wei, D. W. K. Ng, J. Yuan, and H.-M. Wang, “Optimal resource allocation for power-efficient MC-NOMA with imperfect channel state information,” IEEE Trans. Commun., vol. 65, pp. 3944–3961, May 2017.
![]() |
Shaokang Hu (S’20) received the B.S. degree in Engineering and Telecommunication from the University of New South Wales, Australia, Sydney in 2017 and the M.E. degree in Electrical Engineering and Telecommunication from the University of New South Wales, Sydney, Australia, in 2018. She is currently pursuing the Ph.D. degree in Telecommunication at the University of New South Wales, Sydney, Australia. Her current research interests include convex and non-convex optimization, IRS-assisted communication, resource allocation, physical-layer security, and green (energy-efficient) wireless communications. |
![]() |
Zhiqiang Wei (S’16–M’19) received the B.E. degree in information engineering from Northwestern Polytechnical University (NPU), Xi’an, China, in 2012, and the Ph.D. degree in electrical engineering and telecommunications from the University of New South Wales, Sydney, Australia, in 2019. From 2019 to 2020, he was a Postdoctoral Research Fellow with the University of New South Wales. He is currently a Humboldt Postdoctoral Research Fellow with the Friedrich-Alexander University Erlangen-Nuremberg. His current research interests include convex/non-convex optimization, resource allocation design, intelligent reflecting surface, millimeter-wave communications, and orthogonal time-frequency space (OTFS) modulation. He received the Best Paper Award from the IEEE International Conference on Communications (ICC), in 2018. |
![]() |
Yuanxin Cai (S’19) received the B.S. degree in Optical Information Science and Technology from the University of Electronic and Technology of China, Sichuan, China, in 2015 and the M.E. degree in Electrical Engineering and Telecommunication from the University of New South Wales, Sydney, Australia, in 2018. She is currently pursuing the Ph.D. degree in Telecommunication with the University of New South Wales, Sydney, Australia. Her current research interests include convex and non-convex optimization, UAV-assisted communication, resource allocation, physical-layer security, and green (energy-efficient) wireless communications. |
![]() |
Chang Liu (M’19) received the B.E. degree in electronic information engineering from Dalian Maritime University, Dalian, China, in 2012, and the Ph.D. degree in signal and information processing from Dalian University of Technology, China, in 2017. He is currently a Postdoctoral Research Fellow with the University of New South Wales, Sydney, Australia. He was a visiting scholar in department of electrical engineering and computer science at University of Tennessee, Knoxville, USA, and a postdoctoral research fellow with the National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China. His research interests include Machine Learning for Communications, Statistical Signal Processing, IRS-assisted Communications, UAV-assisted Communications, Internet-of-Things, and Spectrum Sensing and Sharing in Cognitive Radio. |
![]() |
Derrick Wing Kwan Ng (S’06-M’12-SM’17-F’21) received the bachelor degree with first-class honors and the Master of Philosophy (M.Phil.) degree in electronic engineering from the Hong Kong University of Science and Technology (HKUST) in 2006 and 2008, respectively. He received his Ph.D. degree from the University of British Columbia (UBC) in 2012. He was a senior postdoctoral fellow at the Institute for Digital Communications, Friedrich-Alexander-University Erlangen-Nürnberg (FAU), Germany. He is now working as a Senior Lecturer and a Scientia Fellow at the University of New South Wales, Sydney, Australia. His research interests include convex and non-convex optimization, physical layer security, IRS-assisted communication, UAV-assisted communication, wireless information and power transfer, and green (energy-efficient) wireless communications. Dr. Ng received the Australian Research Council (ARC) Discovery Early Career Researcher Award 2017, the Best Paper Awards at the WCSP 2020, IEEE TCGCC Best Journal Paper Award 2018, INISCOM 2018, IEEE International Conference on Communications (ICC) 2018, IEEE International Conference on Computing, Networking and Communications (ICNC) 2016, IEEE Wireless Communications and Networking Conference (WCNC) 2012, the IEEE Global Telecommunication Conference (Globecom) 2011, and the IEEE Third International Conference on Communications and Networking in China 2008. He has been serving as an editorial assistant to the Editor-in-Chief of the IEEE Transactions on Communications from Jan. 2012 to Dec. 2019. He is now serving as an editor for the IEEE Transactions on Communications, the IEEE Transactions on Wireless Communications, and an area editor for the IEEE Open Journal of the Communications Society. Also, he has been listed as a Highly Cited Researcher by Clarivate Analytics since 2018. |
![]() |
Jinhong Yuan (M’02–SM’11–F’16) received the B.E. and Ph.D. degrees in electronics engineering from the Beijing Institute of Technology, Beijing, China, in 1991 and 1997, respectively. From 1997 to 1999, he was a Research Fellow with the School of Electrical Engineering, University of Sydney, Sydney, Australia. In 2000, he joined the School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, Australia, where he is currently a Professor and Head of Telecommunication Group with the School. He has published two books, five book chapters, over 300 papers in telecommunications journals and conference proceedings, and 50 industrial reports. He is a co-inventor of one patent on MIMO systems and two patents on low-density-parity-check codes. He has co-authored four Best Paper Awards and one Best Poster Award, including the Best Paper Award from the IEEE International Conference on Communications, Kansas City, USA, in 2018, the Best Paper Award from IEEE Wireless Communications and Networking Conference, Cancun, Mexico, in 2011, and the Best Paper Award from the IEEE International Symposium on Wireless Communications Systems, Trondheim, Norway, in 2007. He is an IEEE Fellow and currently serving as an Associate Editor for the IEEE Transactions on Wireless Communications and IEEE Transactions on Communications. He served as the IEEE NSW Chapter Chair of Joint Communications/Signal Processions/Ocean Engineering Chapter during 2011-2014 and served as an Associate Editor for the IEEE Transactions on Communications during 2012-2017. His current research interests include error control coding and information theory, communication theory, and wireless communications. |