Movatterモバイル変換


[0]ホーム

URL:


Next Article in Journal
An Underwater Acoustic Target Recognition Method Based on Restricted Boltzmann Machine
Previous Article in Journal
Analysis of the Antenna Array Orientation Performance of the Interferometric Microwave Radiometer (IMR) Onboard the Chinese Ocean Salinity Satellite
 
 
Search for Articles:
Title / Keyword
Author / Affiliation / Email
Journal
Article Type
 
 
Section
Special Issue
Volume
Issue
Number
Page
 
Logical OperatorOperator
Search Text
Search Type
 
add_circle_outline
remove_circle_outline
 
 
Journals
Sensors
Volume 20
Issue 18
10.3390/s20185395
Font Type:
ArialGeorgiaVerdana
Font Size:
AaAaAa
Line Spacing:
Column Width:
Background:
Article

Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI

College of Computer Science and Engineering, Northeastern University, Shenyang 116026, China
*
Author to whom correspondence should be addressed.
Sensors2020,20(18), 5395;https://doi.org/10.3390/s20185395
Submission received: 27 August 2020 /Revised: 13 September 2020 /Accepted: 14 September 2020 /Published: 21 September 2020
(This article belongs to the SectionSensor Networks)

Abstract

:
The secure full-duplex (FD) simultaneous wireless information and power transfer (SWIPT) system and non-orthogonal multiple access (NOMA) have been deemed two promising technologies for the next generation of wireless communication. In this paper, the network is combined with device-to-device (D2D) and a practical bounded channel state information (CSI) estimation scheme. A system total transmit power minimization problem is studied and formulated as a multi-objective optimization (MOO) problem via the weighted Tchebycheff approach. A set of linear matrix inequalities (LMI) is used to transform the non-convex form of constraints into the convex form. Considering the imperfect CSI of the potential eavesdropper for robust power allocation, a bounded transmission beamforming vector design along with artificial noise (AN) is used, while satisfying the requirements from the secrecy rates as well as the energy harvesting (EH) task. Numerical simulation results validate the convergence performance and the trade-off between the uplink (UL) and downlink (DL) data transmit power. It is also shown that by FD and NOMA, the performance of the proposed algorithm is higher than that of half-duplex (HD) and orthogonal multiple access (OMA).

    1. Introduction

    Next-generation communication systems require self-sustainability wireless nodes to maintain a high data rates network and guarantee quality of service (QoS) [1]. Radio frequency (RF) signal-based simultaneous wireless information and power transfer (SWIPT) is a promising technique for prolonging the lifetime of continuous network operation [2,3]. SWIPT can jointly extract information and replenish energy from the same signal by performing two circuits to separate the information processing and power transfer alternatively [4,5]. Non-orthogonal multiple access (NOMA) has also become a key issue of the novel energy and spectrum efficient technologies due to a higher network capacity compared with orthogonal multiple access (OMA) in the next-generation communication networks [6]. NOMA can provide the same resource (e.g., time/frequency/code) for multiple users by using different a power level in one subcarrier [7,8]. The combination of NOMA and device-to-device (D2D) communication is essential for alleviating the traffic burden on future networks. In contrast to the traditional concept of “D2D pair”, the concept of “D2D group” involves several D2D receivers that are capable of receiving information from a single D2D transmitter. To further improve the system spectrum efficiency (SE), the full-duplex (FD) transceiver is considered as it can be adopted in simultaneous downlink (DL) and uplink (UL) transmission in the same frequency band [9]. However, FD NOMA communication is more susceptible to eavesdropping compared to conventional half-duplex (HD) OMA. Further, this situation also causes extra energy consumption in SWIPT.
    In practical systems, secrecy is a critical concern for the design of wireless communication protocols due to the broadcast nature of the wireless medium [10]. Physical security techniques can improve secure wireless information transmission by generating more interference to potential eavesdroppers [11]. By adding artificial noise (AN) and projecting it onto the null space of information user channels in information transmit beamforming, the potential eavesdroppers would experience a higher noise floor and thus obtain less information about the messages transmitted to the legitimate receivers [12]. In SWIPT systems, the secure communication problem is severer because of larger power consumption in the energy harvesting (EH) task [13]. Besides, taking into account that the base station (BS) may not perfectly know the channel state information (CSI) of the roaming users (RU) also creates a potential vulnerability of ensuring secure communications [10].
    Most of the studies mentioned above rely on one case that the BS can get the perfect knowledge of CSI. However, in practice, the BS always has imperfect CSI. To deal with it, we assume a channel estimation error model where the BS only knows the estimated channel gain and a prior knowledge of the variance of the estimation error [14]. In this paper, we consider D2D-aided FD NOMA-enhanced secure SWIPT communications with imperfect CSI, in which D2D receivers can reuse the same subcarrier occupied by the information transmit user to improve the spectrum utilization in the power domain NOMA. To the best of our knowledge, the existing works cannot use a power efficiency algorithm in secure NOMA- and D2D-enhanced FD SWIPT systems with channel estimation and energy constraints. To study the problem, we propose an algorithm that involves constraints from EH and secure information transmission tasks to jointly extract information and replenish energy. Hence, the proposed algorithm needs to transform the probabilistic non-convex optimization problem into a bounded convex optimization problem. Besides, the existence of a trade-off between UL and DL co-channel interference (CCI) in the FD system needs to be solved by a multi-objective optimization method. Considering all the sub-problems above, a Pareto optimal policy is able to be defined with semidefinite programming (SDP) relaxation [15]. After that, we can iteratively minimize the bounded power allocation coefficients for the objective function of the optimization problem by CVX and guarantee security and QoS, simultaneously.
    The rest of the article is organized as follows. The channel model and problem formulation are introduced inSection 2. Then, the proposed algorithm is elaborated inSection 3. InSection 4, we talk about the simulation results, whileSection 5 finally draws the conclusions of this work.
    Notation:A1,AH,Tr(A),Rank(A) anddet(A) denote the inverse, Hermitian transpose, trace, rank and determinant of matrixA, respectively;diag(x1,...,xM) is a diagonal matrix with the diagonal elements given by{x1,...,xM}, anddiag(A) returns a diagonal matrix having the main diagonal elements ofA on its main diagonal;[x]+ stands formax{0,x} [16]. In addition, the abbreviations in this work are summarized inTable 1.

    2. Network Model and Problem Formulation

    In this section, the considered FD NOMA and D2D network in SWIPT along with the channel models is presented. Further, in the formulation of this problem, we first define the secure transmission problem in SWIPT employing a resource allocation scheme and give the imperfect CSI channel model. Then, a non-convex optimization problem is presented with the resource allocation design.

    2.1. Network Model

    We focus on a secure NOMA-based SWIPT UL and DL scenario in a heterogeneous network, as shown inFigure 1, which requires a D2D group communication including one D2D transmitter (DT) and two D2D receivers (DR). InFigure 1, the FD BS is assumed to be equipped withM antennas to facilitate secure transmission. UL cellular users (CU) and three D2D users (DU) are trusted users. Among them, DT in the D2D group is assumed to work in full-duplex mode and is equipped with three antennas. The other trusted users are assumed to have a single antenna for low hardware complexity. All antennas in the user devices are assumed to work in half-duplex (HD) mode. The D2D communication has two missions to accomplish. On each subcarrier, the FD BS transmits a signal to DT and receives a signal from CU. In the same scheduling time slot, two DRs in the D2D group receive two independent signal streams simultaneously from DT in the NOMA way. Each DR uses a successive interference canceller to detect its own signal. Since the network model has an untrusted user with the energy harvesting task, it is treated as a potential eavesdropper withN antennas(N<M). Thus, in the power allocation scheme, we take the untrusted user into account to guarantee secure information transmission of the wireless network.
    According to the system model inFigure 1, the signals received by the network devices can be written as follows. The received signal at the FD BS can be written as
    yBS=PULgULxUL+HSIwDTxDTself-interference+HSIzartificialnoise+nBS
    wherePUL is the data transmission power from the uplink CU to the FD BS;gULM×1 is the uplink channel vector of the CU; represents the complex matrix;xUL is the information bearing signal for CU. It is assumed thatE[|x|2]=1;HSIM×M is the self-interference (SI) channel matrix of the FD BS;wDTM×1 is the corresponding beamforming vector;xDT is the data from the FD BS to DT;z is distributed as a complex Gaussian random vectorNC(0,Z) with mean0, and represents the AN sent by the FD BS to degrade the signal to noise ratio (SNR) of the eavesdropper or the RU;Z0 is the covariance matrix ofz andZM, whereM is anM×M Hermitian matrix; andnBSNC(0,σ2IM) is the additive white Gaussian Noise (AWGN) from the uplink channel to the FD BS, whereIM denotes theM×M identity matrix [14].
    The received signal at the DT can be written as
    yDT=hDTHwDTxDT+HDT(wDR1xDR1+wDR2xDR2)self-interference+hDTHzartificialnoise+PULfDTxULUL-to-DLco-channelinterference+nDT
    wherehDTM×3 is the downlink channel between DT and the FD BS;HDT3×3 is the SI channel matrix of DT;{wDR1,wDR2}3×1 denote the corresponding beamforming vectors of D2D receivers;xDR1 andxDR2 are the data from DT to DR;fDT is the channel between DT and the UL CU; andnDTNC(0,σ2I3) is the AWGN from the FD BS to DT, whereI3 denotes the3×3 identity matrix.
    To study the signals of D2D receivers, we assume that the channel state of DR1 is better than DR2 as DR1 is located far away from the CU and the eavesdropper inFigure 1, andwDR12<wDR22. In NOMA, DR1 first decodes the signal of DR2 by successive interference cancellation (SIC). The received information signal at DR1 is derived as
    yDR1=hDR1H(wDR1xDR1+wDR2xDR2)+hBS1H(wDTxDT+z)multi-userinterference+PULfDTxULUL-to-DLco-channelinterference+nDR1
    wherehDR13×1 is the downlink channel between DT and DR1;hBS1M×1 is the downlink channel between FD BS and DR1;fDR1 is the channel between DR1 and the UL CU; andnDR1NC(0,σ2) is the AWGN of DR1.
    Similarly, the received signal at DR2 can be written as
    yDR2=hDR2H(wDR1xDR1+wDR2xDR2)+hBS2H(wDTxDT+z)multi-userinterference+PULfDTxULUL-to-DLco-channelinterference+nDR2
    wherehDR23×1 is the downlink channel between DT and DR2;hBS2M×1 is the downlink channel between FD BS and DR2;fDR2 is the channel between DR2 and the UL CU; andnDR2NC(0,σ2) is the AWGN of DR2.
    As for the potential eavesdropper, here we use RU for convenience, with multiple antennas, and the received signal can be written as
    yE=LEHwDTxDT+LDTH(wDR1xDR1+wDR2xDR2)multi-userinterference+PULeExULUL-to-DLco-channelinterference+LEHzartificialnoise+nE
    whereLEM×N is the channel between the RU and the FD BS;LDT3×N is the channel between RU and DT;eDTN×1 is the channel between RU and the uplink CU; andnENC(0,σ2IN) is the AWGN of RU, whereIN denotes theN×N identity matrix.

    2.2. Problem Formulation

    In this part, we first analyze the achievable rate and secrecy rate for the considered heterogeneous network. Then, we talk about the CSI knowledge in the communication system for the FD BS to control the power resource. In the end, a joint multi-objective UL and DL power minimization problem is formulated for resource allocation.
    The achievable rate of CU can be written as
    rCU=log2(1+γUL),
    With
    γUL=PUL|gULHvUL|2Tr(ρVULdiag(HSI(wDTwDTH+z)HSIH))+σ2vUL2
    whereγUL denotes the receiving signal-to-interference-plus-noise ratio (SINR) for CU at the FD BS;vULM×1 denotes the receiving beamforming vector of FD BS to decode the information from the CU; andVUL=vULvULH. The CSI on the uplink channel of CU is estimated by zero-force beamforming (ZF-BF). It is adopted because of the computationally efficient performance for resource allocation. Further, its performance is close to the minimum mean square error beamforming (MMSE-BF) when the receiving SINR at the BS is high. Hence, in ZF-BF,vUL=gUL/gUL andvUL represents the Euclidean vector norm ofvUL. The residual SI coefficientρ represents the ratio of the power received at an antenna that reflects the performance of the SI cancellation, here0<ρ1 [15].
    The achievable rate of DT can be written as
    rDT=log2(1+γDT),
    With
    γDT=hDTHwDT2/(Tr(HDT(wDR1wDR1H+wDR2wDR2H)HDTH)+PUL|fDT|2+Tr(hDThDTHZ)+σ2).
    whereγDT denotes the receiving SINR from the FD BS to DT.
    After SIC, the achievable data rate of DR1 is
    rDR1=log2(1+γDR1),
    with
    γDR1=|hDR1HwDR1|2|hBS1HwDT|2+PUL|fDR1|2+Tr(hBS1hBS1HZ)+σ2
    whereγDR1 is the receiving SINR from the DT to DR1.
    The achievable rate of DR2 can be written as
    rDR2=log2(1+γDR2),
    with
    γDR2=|hDR2HwDR2|2/(|hDR2HwDR1|2+|hBS2HwDT|2+PUL|fDR2|2+Tr(hBS2hBS2HZ)+σ2).
    whereγDR2 is the receive SINR from the DT to DR2.
    As outlined before, the RU who has the EH task can be treated as a potential eavesdropper to eavesdrop the information signals of UL and DL trusted CU. Hence, to guarantee communication security, the system is designed to have the ability to deal with the circumstance that RU is able to cancel all multiuser interference. Further, to study the system security, we define the channel capacity for the RU. The channel capacity for RU to eavesdrop information of the UL CU can be written as
    CCUE=log2det(IN+PULXE1eEeEH)
    whereXE=LEHZLE+σ2IN is the interference-plus-noise covariance matrix of RU.
    The channel capacity for RU to eavesdrop information of the DL DT can be written as
    CDTE=log2det(IN+XE1LEHwDTwDTHLE)
    The channel capacity for RU to eavesdrop information of the DL DRs can be written as
    CDRE=log2det(IN+XE1LDTH(wDR1wDR1H+wDR2wDR2H)LDT).
    The achievable secrecy rates of the trusted links in the network are given by
    rCUSec=[rCUCCUE]+
    rDTSec=[rDTCDTE]+
    rDRSec=[rDR1+rDR2CCUE]+
    respectively.
    Considering the EH task, the total amount of energy harvested by RU can be written as
    ERU=μ(Tr(LELEHZ)+LEHwDT2).
    where0μ<1 is the energy conversion coefficient of RU.
    Assuming all channels vary slowly in each scheduled time slot, the BS can perfectly get the CSI from the trusted users via handshaking. However, the RU only exchanges the pilot information with the BS in the beginning of the working phase for the EH task. When the location of the wireless network users is changing, the FD BS needs to estimate the CSI of RU to guarantee communication security because the RU can become a potential eavesdropper with channel uncertainty [16]. The channel between FD BS and RULE and the channel between DT and RULDT, along with the channel between RU and CUeE, can be modeled as
    LE=L^E+ΔLE
    ΩE{LE:ΔLEFεE}
    LDT=L^DT+ΔLDT
    ΩDT{LDT:ΔLDTFεDT}
    eE=e^E+ΔeE
    Ωe{eE:ΔeEεe}
    whereL^E,L^DT ande^E are defined to represent the estimated CSI;ΔLE,ΔLDT andΔeE represent the respective channel uncertainties. The continuous setsΩE,ΩDT andΩe are defined to contain all the possible channel uncertainties with bounded magnitudesεE,εDT andεe.·F, here, represents the Frobenius matrix norm ofΔLE andΔLDT.
    Having the CSI, we focus on the transmit power minimization for the system which is an essential issue for green communication.
    Problem 1 (Transmit Power Minimization for the FD BS):
    minimizeZ,wDT,wDR1,wDR2,PULwDT2+Tr(Z), s.t.C1:γULΓreqUL,C2:γDTΓreqDT,C3:γDR1ΓreqDR1,γDR2ΓreqDR2,C4:maxΔLEΩEΔeEΩeCCUERtolCU,C5:maxΔLEΩECDTERtolDT,C6:maxΔLEΩEΔLDTΩDTCDRERtolDR,C7:ERUPmin,C8:PUL0,C9:Rank(wDT)=1,Rank(wDR1)=1,Rank(wDR2)=1,C10:Z0,wDT0,wDR10,wDR20
    Formula (27) depicts the power allocation optimization problem of minimizing the transmit energy for DT and AN.C1C3 are the minimum SINR thresholds of the trusted users of the system withΓreq(·)>0. ConstraintsC4C6 are proposed to guarantee network security.Rtol(·) is the maximum tolerable or the minimum achievable data rate for RU to decode information from the signals of the trusted users in the wireless network.C7 ensures RU gets the minimum required amount of energy. ConstraintC8 denotes thatPUL is the non-negative power.C9 is a rank-one constraint ofwDT,wDR1 andwDR2 to obtain rank-one beamforming.C10 is the constraint of the Hermitian positive semidefinite matrixZ,wDT,wDR1 andwDR2.
    Note that the objective function in Problem 1 minimizes the transmit energy from the BS without considering the transmit power from DT and UL CU. Thus, the second network objective function is proposed to minimize the transmit power from DT to DR and total transmit power of UL CU.
    Problem 2 (Transmit Power Minimization for DT and CU):
    minimizeZ,wDT,wDR1,wDR2,PULwDR12+wDR22+PUL,s.t.C1C10.
    Problem 2 targets the transmit power minimization of DT and CU underC1C10 without considering the power consumed by the FD BS.
    From the two sub-problems, we find a trade-off between the two target functions and the existence of the multiple-antennas RU in the constraints also increases the complexity of solving the optimization problem. The objectives in Problem 1 affect the DL transmit power of the FD BS and the receiving signals of DT, while the objectives in Problem 2 affect the UL transmit power of the UL CU and the receiving signals of the DR. Further discussion is proposed in the next section.

    3. Solution of the Optimization Problem

    In this part, we first solve the two sub-problems with the Pareto optimality. Then, we analyze the network computational complexity.
    Assume that for minimizing total energy consumption, the transmit power of the UL CU first decreases which impairs the objects in Problem 1. The transmit power objects of Problem 1,wDT2 andTr(Z), which result in significant SI should decrease to satisfy the SINR requirementΓreqUL. Besides, as for the links between DUs, the low power of AN causes a higher risk on the information leakage to the RU. Thus, the DT lowers the transmit power to DRs to meet the security requirementCDRE. It seems to converge to a reasonable circumstance that each of the allocated user powers approximately achieves the minimum SINR requirements. However, in practice, the user QoS is dynamically changing all the time. For example,ΓreqDT increases when DT needs a higher bandwidth for a live high-quality video. A higherΓreqDT directs to a higherwDT2, which puts higher SI on the UL channel. This meansPUL also needs to increase to compensate this interference for satisfying the minimum required QoSΓreqUL. As for security, the increment in the BS emission power also causes a higher risk on the information leakage which leads to another power increment of AN. This further impacts the RUs as they need more power to ensure QoS. Therefore, the objectives in the two sub-problems conflict with each other. When we pursue an object to minimize the system consumed power, the result tends to become higher.
    To overcome the shortcomings, the multi-objective optimization (MOO) problem is adopted with the concept of Pareto optimality. We first denote sub-problem i asQi(Z,wDT,wDR1,wDR2,PUL). A resource allocation policy that can be set as{Z,wDT,wDR1,wDR2,PUL} can achieve the Pareto optimal if and only if all the set members satisfyQi(Z,wDT,wDR1,wDR2,PUL)Qi*,i{1,2}, whereQi* represents the optimal objective value of Problem i. To capture the complete Pareto optimal set, we resort to the weighted Tchebycheff scheme that can jointly solve the trade-off between the two sub-problems in MOO as shown in Problem 3 [10].
    Problem 3:
    minimizeZ,wDT,wDR1,wDR2,PUL,ττ, s.t.C1C10,  C11:λi(QiQi*)τ,i{1,2},
    where
    Q1(Z,wDT,wDR1,wDR2,PUL)=wDT2+Tr(Z)
    and
    Q2(Z,wDT,wDR1,wDR2,PUL)=wDR12+wDR22+PUL
    τ denotes an auxiliary optimization variable that targets the total transmit power minimization of the trusted UL and DL users. Variableλi0,iλi=1, specifies the priority of thei-th objective compared to the other objectives and reflects the preference of the system operator [15].
    AsC4C6 are non-convex constraints andC4C7 have uncertain CSI, we consider using a linear relaxation approach to transformC4C6 into a set of linear matrix inequalities (LMI) and the generalized S-procedure approach to solve the infinite number of inequality constraintsC4C7 produced by CSI uncertainty.
    First, to handle the non-convex constraintsC4C6, we note the implications in the following equivalent transformation:
    C4C˜4:PULeEeEHξtolCUXE,eEΩe,LEΩE,
    C5C˜5:LEHwDTwDTHLEξtolDTXE1,LEΩE,
    and
    C6C˜6:LDTH(wDR1wDR1H+wDR2wDR2H)LDTξtolDRXE,LDTΩDT,LEΩE,
    where:RtolCU=log2(1+ξtolCU),RtolDT=log2(1+ξtolDT), andRtolDR=log2(1+ξtolDR).
    Next, note thatC˜4C˜6 andC7 still involve an infinite number of inequality constraints [17], and we consider introducing the generalized S-procedure to solve it.
    Letf(X)=XHAX+XHB+BHX+C, and D⪰0. Fort0,f(X)⪰0,X{X|Tr(DXXH)1} is equivalent to
    [CBHBA]t[I00D]0.
    SinceC˜4 involves two coupled estimation error variables, a slack matrix variableMCUM first needs to be introduced to handle it. In particular,C˜4 is equivalently represented by
    C˜4a:PULeEeEHMCU,eEΩe,
    C˜4b:MCU(ξtolCU1)XE,LEΩE.
    Then, we apply (35) toC˜4a andC˜4b to getC¯4a andC¯4b.
    C¯4a:RC¯4a(MCU,PUL,αCU)=[PULe^Ee^EH+MCUαCUINPULe^EPULe^EHPUL+αCUεe2]0
    forαCU0, and
    C¯4b:RC¯4b(Z,MCU,βCU)=[ξtolCUL^EHZL^E+(ξtolCUσ2βCU)INMCUξtolCUL^EHZξtolCUZL^EξtolCUZ+βCUεe2IM]0
    forβCU0.
    By substitutingLE=L^E+ΔLE into (33), we have
    ΔLEH(ξtolDTZWDT)ΔLE+ΔLEH(ξtolDTZWDT)L^E+LEH(ξtolDTZWDT)ΔLE+L^EH(ξtolDTZWDT)L^E+ξtolDTσ2IN0
    whereΔLE{ΔLE|Tr(εE2ΔLEΔLEH)1} andWDT=wDTwDTH. Then, constraintC˜5 is equivalently written as
    C¯5:RC¯5(WDT,Z,t)=[ξtolDTL^EHZL^E+(ξtolDTσ2t)INξtolDTL^EHZξtolDTZL^EξtolDTZ+tεE2IM]BLEHWDTBLE0
    whereBLE=[L^EIM].
    Similar toC˜4,C˜6 is equivalently represented by
    C˜6a:LDTHWDRLDTMDR,LDTΩDT
    C˜6b:MDR(ξtolDR1)XE,LEΩE,
    whereMDRN andWDR=wDR1wDR1H+wDR2wDR2H.
    Then, we apply (35) toC˜6a andC˜6b to getC¯6a andC¯6b.
    C¯6a:RC¯6a(MDR,WDR,αDR)
    [L^DTHWDRL^DT+MDRαDRINWDRL^DTL^DTHWDRWDR+αDRεDT2IN]0
    forαDR0, and
    C¯6b:RC¯6b(Z,MDR,βDR)=[ξtolDRL^EHZL^E+(ξtolDRσ2βDR)INMDRξtolDRL^EHZξtolDRZL^EξtolDRZ+βDRεDT2IM]0
    forβDR0. Similarly, constraintC7 is equivalently written as
    C¯7:RC¯7(WDT,Z,tRU)=[L^EHZL^EtRUεE2INERUμL^EHZZL^EZ+tRUIM]BLEHWDTBLE0
    fortRU0.
    Now, the MOO problem (29) becomes a convex semidefinite programming (SDP) and can be written as
    minimizeZ,wDT,wDR1,wDR2,PUL,ττ, s.t.C1C3,C8C11,C¯4a:RC¯4a(MCU,PUL,αCU)0C¯4b:RC¯4b(Z,MCU,βCU)0C¯5:RC¯5(WDT,Z,t)0C¯6a:RC¯6a(MDR,WDR,αDR)0C¯6b:RC¯6b(Z,MDR,βDR)0C¯7:RC¯7(WDT,Z,tRU)0.
    The convex problem (47) is efficiently optimized by the standard convex programming software named CVX [18]. Note that once we find a rank-one matrix to be the solution of the relaxed SDP problem, the matrix can also be used as a solution of the original problem of (47). Next, we proof the existence of an optimal solution of (47).
    Proof. 
    The proof of the existence of an optimal solution of (47) is given in theAppendix A. □
    In the proposed secure FD-SWIPT network, the CSI received by a device is assumed to be bounded. This circumstance directs the infinite number of CSI values for a user to compute the accurate CSI of another one. Besides, considering the constraints, we treat the optimization problem as a non-convex problem. To directly apply theS-procedure method to the power minimization problem, we introduce several leverage parameters into the non-convex constraints with bounded CSI values. Then, the constraints can be written as equivalent matrices with linear form elements. At last, the non-convex problem is transformed into a convex form, which can be classified as the relaxed SDP problem.

    4. Simulation Results

    The performance of the proposed MOO resource allocation algorithm is investigated in this section.Table 2 specifies the most important simulation parameters. The RU is equipped withN = 2 antennas. The cell BS is on the center of the cellular withM = 3 antennas with a radius of 1000 m. The small-scale fading is modeled by Rayleith distribution and the large-scale fading can be calculated by (d/d0)η, whered is the distance between two network devices andd0 is the reference distance, which is set to be 100 m. Besides, the path loss exponentη is set to be 3. We set the communication radius of the D2D group as 300 m.

    4.1. Convergence of the Proposed Algorithm

    The minimum transmit power of the users versus the number of iterations is shown inFigure 2. We set the initial transmit power of the network as 20 dBm. The results inFigure 2 are averaged over 1000 independent adaptation processes which have different locations of the users in the cellular. It can be observed that, with an iteration interval ofΔ¯=0.01, the proposed algorithm has a fast convergence rate within 10 iterations. It is shown inFigure 2 that the proposed power minimization approach is capable of saving more power when the number of antennas on the FD BS become larger. This is because the inherent spatial diversity comes up with more antennas which creates a benefit for power efficiency. With that, the system can indeed combat the path loss with a smaller portion of radiated power.
    InFigure 3, the cumulative distribution function (CDF) of the proposed algorithm is displayed using the bounded CSI error model to deal with the imperfect CSI. It can be observed that, with more antennas at the FD BS, the proposed algorithm has a faster convergence rate within 10 iterations because of the full accomplishment of the available degrees of freedom (DoF) in globally optimal resource allocation. Summarizing the results obtained fromFigure 2 andFigure 3, we can observe the convergence of the power minimization algorithm with the same parameters.

    4.2. Transmit PowerTrade-off Region

    The trade-off between the average transmit power of each device in sub-problem 1 and sub-problem 2 with imperfect CSI and different antenna numbers on the FD BS is shown inFigure 4. It can be observed that the average transmit power consumption of each user in sub-problem 1 is monotonically decreased with respect to the higher average transmit power of the users in sub-problem 2, which means that maximizing the power consumption of one sub-problem leads to lower power consumption of the other and vice versa. In other words, the results inFigure 4 confirm that minimizing the transmit power of UL and DL in FD devices creates conflicting design objectives. For instance, whenM = 4, 3 dBm transmit power of sub-problem 2 can be saved by a 3.5 dBm increment in the total transmit power of sub-problem 1. In addition, it can be indicated in the figure that a significant amount of total transmit power is saved with the increment in the number of FD BS antennas. This is because additional antennas offer extra (DoF) to facilitate more power efficiency. Under this circumstance, the FD BS does not need to transmit extra power for neutralizing the increasing potential of information leakage anymore. With advanced interference management technologies in the next-generation wireless network, the increment in the FD BS antennas number has a good prospect in providing higher power efficiency for the wireless communication system.
    Considering the baseline scheme, ZF-BF is adopted as the power emission approach for comparison. It is shown inFigure 4 that the resource allocation approach in this paper is capable of saving more power because the curves are below the trade-off regions from the baseline scheme. It can also be indicated from the depiction that whenM = 4, only 0.6 dBm power from sub-problem 2 can be saved by around a 1.5 dBm increment in the power from sub-problem 1. In fact, because the baseline scheme cannot exploit the full benefits of having available DoF from more antennas, the proposed approach is more energy-efficient.

    4.3. Average Power Consumption versus Transmit SNR

    Figure 5 depicts the relationships between average power consumption of the users in the FD system and the transmit signal to noise ratio (SNR)ρBS for different antenna numbers at the FD BS, hereρBS=wDT2/σ2. FromFigure 5, it is observed that the average power consumption of the users is getting smaller whileρBS at the FD BS keeps getting bigger when M increases. In terms ofM, more antennas create the condition that the direction of the beamforming vector can be more accurately steered towards the users. This situation reduces the power consumption and the leakage of the AN power in the system. As we can also see fromFigure 5, the average power consumption decreases gradually with the transmit SNR at the FD BS. However, the transmission power cannot be infinitely small because of the existence of constraints for guaranteeing the EH task of the RU. Furthermore, we compare the performance between two methods: the exhausted search method (ESA) with perfect CSI and our proposed method with the same parameters. The ESA can give optimal search results after infinite times of iterations but costs a lot of time. Within a lower computing resource cost, the results of our proposed method indicate that multiple antennas (M > 3) in this network can effectively improve the performance of the proposed algorithm to find the optimal solution. In fact, more antennas provide a more stringent QoS in this situation, and this reduces the average power consumption of SWIPT and interference management.

    4.4. The Minimum Transmit Power in Different Situations

    InFigure 6, the impact of the residual SIρ of each FD antenna on the achievable average DL and UL security rate of the users is presented with bounded CSI. It can be observed from the figure that the security rate performance in FD communication degrades asρ increases, while that in the HD situation remains the same. Moreover, the UL security rate is always lower than the DL security rate under the sameρ. This is because, as compared with the UL, RU exerts a negligible impact on the DL due to the strong interference cancellation ability of the FD BS along with the DT. Nevertheless, with more SI, the FD BS needs to transmit higher power to satisfy the network data rate which brings information leakage to the RU. Thus, the proposed scheme has to be devoted to allocate more power to the AN injection for wireless transmission secrecy. When the total energy of the system is limited, the UL network security data rate of FD becomes lower than HD.
    In the above simulations, we make efforts on minimizing the network transmit power while jointly guaranteeing the QoS and the secrecy limits. However, the transmission power cannot become infinitely small because of another existence of constraints for guaranteeing the EH task of the RU. In this paragraph, we pay attention to satisfying the EH constraint with perfect and imperfect CSI under NOMA and OMA, respectively.
    Figure 7 depicts the minimum transmit power versus the minimum EH value of the RU in the system with perfect and imperfect CSI. It can be seen from the result by the proposed algorithm that the transmit power consumption by adopting NOMA is lower than that of adopting OMA in the scenarios of perfect and imperfect CSI. As a matter of fact, NOMA outperforms OMA in the network secrecy rate. This situation leads to a relatively low power requirement for guaranteeing the network secrecy rate and the energy consumption of AN. It is also seen that the scenario with imperfect CSI causes a significant impact on the minimum transmit power because of the estimation errors. Moreover, as the EH requirement of RU increases, a higher level of the minimum transmit power is needed to fulfill the secrecy of the information transfer and the QoS requirement for the EH task.

    5. Conclusions

    In this paper, a novel secure FD SWIPT scheme was proposed using NOMA and D2D, where a practical bounded CSI estimation method was applied. The secrecy rate was defined to guarantee the secure transmission and a linear EH model was built to evaluate the energy saving of the system. The proposed network transmit power minimization problem was divided into two sub-problems and formulated as an MOO problem via the weighted Tchebycheff approach. A method with LMI was used to transform the non-convex constraints into convex form. Taking into account the potential eavesdropper RU with imperfect CSI for the robust power-efficient resource allocation, a bounded transmission beamforming vector design along with an AN vector was used. Through this method, the system could satisfy the requirements of the secrecy rates as well as the EH task. Numerical simulation results not only validated the convergence performance but also showed a trade-off between the UL and DL transmit power of the MOO algorithm. Furthermore, we noted that by FD and NOMA, the utility of the proposed iterative algorithm is higher than that with HD and OMA with the same parameter. Moreover, our proposed SWIPT optimization scheme is efficient to satisfy the EH requirement.

    Author Contributions

    Conceptualization, J.W. and Z.X.; methodology, J.W.; software, J.W.; validation, X.S., Y.M. and Z.X.; formal analysis, J.W.; investigation, Y.M.; resources, X.S. data curation, Y.M.; writing—original draft preparation, J.W.; writing—review and editing, Z.X.; visualization, J.W.; supervision, Y.M.; project administration, X.S.; funding acquisition, X.S. All authors have read and agreed to the published version of the manuscript.

    Funding

    This research was funded by the National Nature Science Foundation of China grant number 61601109. And the APC was funded by the Fundamental Research Funds for the Central Universities grant number N152305001.

    Acknowledgments

    The authors thank the anonymous reviewers for their insightful comments that helped improve the quality of this study.

    Conflicts of Interest

    The authors declare no conflict of interest.

    Appendix A

    The Lagrange function of problem (47) is as follows (takewDT as an example):
    WDT2tr(ΦDTR¯C¯5(WDT,Z,t))tr(ΦER¯C¯7(WDT,Z,tRU))ADTWDT
    whereΦDT andΦE are dual variables, andADT is the adjoint variable ofWDT.
    R¯C¯5(WDT,Z,t)=ΛDT+BLEH(WDTξtolDTZ)BLE
    R¯C¯7(WDT,Z,tRU)=ΛEBLEH(ZWDT)BLE
    whereΛDT=[(ξtolDTσ2t)IN00tεE2IM] andΛE=[tRUεE2IN+ERUμ00tRUIM]. With Karush–Kuhn–Tucker (KKT) conditions, we have
    WDTL=0
    ΦDTRC¯5(WDT,Z,t)=0
    ΦERC¯7(WDT,Z,tRU)=0
    ADTWDT=0
    ADT0,ΦDT0,ΦE0.
    whereADT=INBLE(ΦDTΦE)BLEH. Further, we define thatGIN+BLEΦEBLEH andrG=rank(G) Thus,
    ADTGBLEΦDTBLEH
    Next, we proofrank(BLEΦDTBLEH)1. Substituting part of (A5) with (A2), we have
    ΛDTΦDT+BLEH(WDTξtolDTZ)BLEΦDT=0
    By post-multiplyingBLEH, we get
    ΛDTΦDTBLEH+BLEH(WDTξtolDTZ)BLEΦDTBLEH=0
    Note that[IM0]BLEH=IM and defineμDT=ξtolDTσ2t, we can get
    [0 IM]ΛDT=μDT[IM0]=μDT(BLE[LDT0M])
    After both sides of (A6) are multiplied by[0 IDT], we can get
    (μDTIM+WDTξtolDTZ)BLEΦDTBLEH=μDT[LDT0M]ΦDTBLEH
    Lemma A1.
    If the Hermitian matrixM=[M11M12M21M22]⪰0, then it immediately follows thatM11 andM22 must be the positive semi-definite (PSD) matrix [20].
    Here, we can claim thatμDTIM+WDTξtolDTZ⪰0 and the left side of this formula is nonsingular. We post-multiply a nonsingular matrix without changing the matrix rank and get
    rank(BLEΦDTBLEH)=rank((μDTIM+WDTξtolDTZ)BLEΦDTBLEH)=rank(μDT[LDT0M]ΦDTBLEH)rank([LDT0M])1.
    Lemma A2.
    LetX1 andX2 be two matrixes of the same size. Then, it holds true that rank (X1X2) rank (X1) - rank (X2) [21].
    Through Lemma A2, we can deriverank(ADT)rG1. IfG is a positive definite,rG=M andrank(ADT)M1. However, if rank (ADT) = M, i.e.,ADT becomes a full-rank matrix. Following 54, we note thatWDT=0 cannot be the optimal solution to (47). Therefore, we have rank (ADT) = M−1, and with 54, we can conclude rank (WDT) = 1. Hence,WDT can be substituted byνφφH, and here,φ spans the null space ofADT withν>0.
    The next step is to proofG0, which means to show thatG is a positive definite matrix. Since we have the conditions thatADT0 andBLEΦDTBLEH0 forΦDT0 andG0, by contradiction, we can explain thatG0 must always hold. Assume 0 is the minimum eigenvalue ofG. Then, there exists at least a vectory0 such thatyHGy=0. According to (A4), it follows thatyHADTy=yHBLEΦDTBLEHy=|yHBLEΦDT1/2|2<0. This means thatADT is not PSD and violates the KKT conditions in (A7). Hence, we conclude thatG0 must hold.

    References

    1. Leng, S.; Ng, D.W.K.; Zlatanov, N.; Schober, R. Multi-objective resource allocation in full-duplex SWIPT systems. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; pp. 1–7. [Google Scholar]
    2. Hu, J.; Zhao, Y.; Yang, K. Modulation and Coding Design for Simultaneous Wireless Information and Power Transfer.IEEE Commun. Mag.2019,57, 124–130. [Google Scholar] [CrossRef] [Green Version]
    3. Zhang, J.; Tao, X.; Wu, H.; Zhang, X. Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks.IEEE Access2018,6, 10508–10519. [Google Scholar] [CrossRef]
    4. Xia, M.; Aissa, S. On the efficiency of far-field wireless power transfer.IEEE Trans. Signal Process.2015,63, 2835–2847. [Google Scholar] [CrossRef] [Green Version]
    5. Tran, H.; Kaddoum, G.; Abou-Rjeily, C. Collaborative RF and Lightwave Power Transfer for Next-Generation Wireless Networks.IEEE Commun. Mag.2020,58, 27–33. [Google Scholar] [CrossRef]
    6. Haci, H.; Zhu, H.; Wang, J. Performance of Non-orthogonal Multiple Access With a Novel Asynchronous Interference Cancellation Technique.IEEE Trans. Commun.2017,65, 1319–1335. [Google Scholar] [CrossRef]
    7. Dai, Y.; Sheng, M.; Zhao, K.; Liu, L.; Liu, J.; Li, J. Interference-aware resource allocation for D2D underlaid cellular network using SCMA: A hypergraph approach. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
    8. Elshaer, H.; Vlachos, C.; Friderikos, V.; Dohler, M. Interference-Aware Decoupled Cell Association in Device-to-Device Based 5G Networks. In Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5. [Google Scholar]
    9. Chang, T.; Liu, Y.; Lin, S. Max-min-fairness linear transceiver design for full-duplex multiuser systems. In Proceedings of the 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017; pp. 1–5. [Google Scholar]
    10. Sun, Y.; Ng, D.W.K.; Zhu, J.; Schober, R. Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems.IEEE Trans. Commun.2018,66, 4119–4137. [Google Scholar] [CrossRef] [Green Version]
    11. Tiong, T. Robust Secure SWIPT MISO. In Proceedings of the 2019 7th International Conference on Smart Computing & Communications (ICSCC), Sarawak, Malaysia, 28–30 June 2019; pp. 1–5. [Google Scholar]
    12. Li, Q.; Ma, W.-K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization.IEEE Trans. Signal Process.2013,61, 2704–2717. [Google Scholar] [CrossRef] [Green Version]
    13. Zhao, X.; Xiao, J.; Li, Q.; Zhang, Q.; Qin, J. Joint Optimization of AN-Aided Transmission and Power Splitting for MISO Secure Communications With SWIPT.IEEE Commun. Lett.2015,19, 1969–1972. [Google Scholar] [CrossRef]
    14. Roh, W.; Seol, J.Y.; Park, J.; Lee, B.; Lee, J.; Kim, Y.; Cho, J.; Cheun, K.; Aryanfar, F. Millimeter-wave beamforming as an enabling technology for 5G cellular communications: Theoretical feasibility and prototype results.IEEE Commun. Mag.2014,52, 106–113. [Google Scholar] [CrossRef]
    15. Sun, Y.; Ng, D.W.K.; Zhu, J.; Schober, R. Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems.IEEE Trans. Wirel. Commun.2016,15, 5511–5526. [Google Scholar] [CrossRef]
    16. Pi, Z.; Khan, F. An introduction to millimeter-wave mobile broadband systems.IEEE Commun. Mag.2011,49, 101–107. [Google Scholar] [CrossRef]
    17. Zhou, F.; Chu, Z.; Sun, H.; Hu, R.Q.; Hanzo, L. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT.IEEE J. Sel. Areas Commun.2018,36, 918–931. [Google Scholar] [CrossRef]
    18. Ng, D.W.K.; Schober, R. Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity.IEEE Trans. Wirel. Commun.2015,14, 5082–5097. [Google Scholar] [CrossRef] [Green Version]
    19. Bharadia, D.; McMilin, E.; Katti, S. Full duplex radios. In Proceedings of the ACM SIGCOMM, Hongkong, China, 12–16 August 2013; pp. 375–386. [Google Scholar]
    20. Bertsekas, D.P.Nonlinear Programming; Athena scientific Belmont: Belmont, MA, USA, 1999. [Google Scholar]
    21. Lee, B.G.; Park, D.; Seo, H. Mathematical Tools for Resource Management. InWireless Communications Resource Management; IEEE: Piscataway, NJ, USA, 2009; pp. 73–106. [Google Scholar]
    Sensors 20 05395 g001 550
    Figure 1. Full-duplex (FD) non-orthogonal multiple access (NOMA)-based simultaneous wireless information and power transfer (SWIPT) with the device-to-device (D2D) communications network model with one multiple-antennas base station (BS), four half-duplex (HD) single-antenna trusted users and one HD untrusted user.
    Figure 1. Full-duplex (FD) non-orthogonal multiple access (NOMA)-based simultaneous wireless information and power transfer (SWIPT) with the device-to-device (D2D) communications network model with one multiple-antennas base station (BS), four half-duplex (HD) single-antenna trusted users and one HD untrusted user.
    Sensors 20 05395 g001
    Sensors 20 05395 g002 550
    Figure 2. The minimum transmit power versus the number of iterations for the proposed algorithm with an iteration interval ofΔ¯=0.01.
    Figure 2. The minimum transmit power versus the number of iterations for the proposed algorithm with an iteration interval ofΔ¯=0.01.
    Sensors 20 05395 g002
    Sensors 20 05395 g003 550
    Figure 3. The cumulative distribution function (CDF) of the proposed minimum transmission power allocation scheme with imperfect channel state information (CSI) under the parameters of the FD BS antenna numbers withM = 5,M = 4 andM = 3.
    Figure 3. The cumulative distribution function (CDF) of the proposed minimum transmission power allocation scheme with imperfect channel state information (CSI) under the parameters of the FD BS antenna numbers withM = 5,M = 4 andM = 3.
    Sensors 20 05395 g003
    Sensors 20 05395 g004 550
    Figure 4. Average transmit power trade-off region between the two sub-problems of each device achieved by the proposed power minimization resource allocation policy. The baseline is simulated under the parameters of the FD BS antenna numbers withM = 6,M = 5,M = 4 andM = 3.
    Figure 4. Average transmit power trade-off region between the two sub-problems of each device achieved by the proposed power minimization resource allocation policy. The baseline is simulated under the parameters of the FD BS antenna numbers withM = 6,M = 5,M = 4 andM = 3.
    Sensors 20 05395 g004
    Sensors 20 05395 g005 550
    Figure 5. Average transmit power of the users versus the transmit SNR of the FD BS for different total antenna numbers at the FD BS withM = 5,M = 4 andM = 3, in two methods.
    Figure 5. Average transmit power of the users versus the transmit SNR of the FD BS for different total antenna numbers at the FD BS withM = 5,M = 4 andM = 3, in two methods.
    Sensors 20 05395 g005
    Sensors 20 05395 g006 550
    Figure 6. Average user security rate versus the self-interference (SI) coefficient of the antennas for the downlink (DL) and uplink (UL) in different FD and HD schemes.
    Figure 6. Average user security rate versus the self-interference (SI) coefficient of the antennas for the downlink (DL) and uplink (UL) in different FD and HD schemes.
    Sensors 20 05395 g006
    Sensors 20 05395 g007 550
    Figure 7. The minimum transmit power versus the minimum harvested power of the roaming users (RU) in the system with perfect and imperfect CSI.
    Figure 7. The minimum transmit power versus the minimum harvested power of the roaming users (RU) in the system with perfect and imperfect CSI.
    Sensors 20 05395 g007
    Table
    Table 1. Abbreviation index.
    Table 1. Abbreviation index.
    Full NamesAbbreviations
    full-duplexFD
    half-duplexHD
    simultaneous wireless information and power transferSWIPT
    non-orthogonal multiple accessNOMA
    orthogonal multiple accessOMA
    device-to-deviceD2D
    channel state informationCSI
    multi-objective optimizationMOO
    linear matrix inequalityLMI
    artificial noiseAN
    energy harvestingEH
    uplinkUL
    downlinkDL
    quality of serviceQoS
    spectrum efficiencySE
    co-channel interferenceCCI
    self-interferenceSI
    semidefinite programmingSDP
    positive semidefinitePSD
    D2D transmitterDT
    D2D receiversDR
    D2D userDU
    cellular usersCU
    roaming userRU
    signal-to-interference-plus-noise ratioSINR
    signal to noise ratioSNR
    additive white Gaussian noiseAWGN
    zero-force beamformingZF-BF
    minimum mean square error beamformingMMSE-BF
    cumulative distribution functionCDF
    Table
    Table 2. System parameters.
    Table 2. System parameters.
    ParametersValue
    Carrier center frequency and system bandwidth2.3 GHz and 200 kHz
    Maximum estimation error5%
    Path loss exponent and SI cancellation constant,ρ3.3 and −90 dB [19]
    DL and UL user noise power σ2−113 dBm
    Maximum tolerable data rate at RU for CU1 bit/s/Hz
    Maximum tolerable data rate at RU for BS1 bit/s/Hz
    Maximum tolerable data rate at RU for DT1 bit/s/Hz
    Minimum required SINR for CU3 dB
    Minimum required SINR for BS8 dB
    Minimum required SINR for DT10 dB

    © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

    Share and Cite

    MDPI and ACS Style

    Wang, J.; Song, X.; Ma, Y.; Xie, Z. Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI.Sensors2020,20, 5395. https://doi.org/10.3390/s20185395

    AMA Style

    Wang J, Song X, Ma Y, Xie Z. Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI.Sensors. 2020; 20(18):5395. https://doi.org/10.3390/s20185395

    Chicago/Turabian Style

    Wang, Jingpu, Xin Song, Yatao Ma, and Zhigang Xie. 2020. "Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI"Sensors 20, no. 18: 5395. https://doi.org/10.3390/s20185395

    APA Style

    Wang, J., Song, X., Ma, Y., & Xie, Z. (2020). Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI.Sensors,20(18), 5395. https://doi.org/10.3390/s20185395

    Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further detailshere.

    Article Metrics

    No
    No

    Article Access Statistics

    For more information on the journal statistics, clickhere.
    Multiple requests from the same IP address are counted as one view.
    Sensors, EISSN 1424-8220, Published by MDPI
    RSSContent Alert

    Further Information

    Article Processing Charges Pay an Invoice Open Access Policy Contact MDPI Jobs at MDPI

    Guidelines

    For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers

    MDPI Initiatives

    Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series

    Follow MDPI

    LinkedIn Facebook X
    MDPI

    Subscribe to receive issue release notifications and newsletters from MDPI journals

    © 1996-2025 MDPI (Basel, Switzerland) unless otherwise stated
    Terms and Conditions Privacy Policy
    We use cookies on our website to ensure you get the best experience.
    Read more about our cookieshere.
    Accept
    Back to TopTop
    [8]ページ先頭

    ©2009-2025 Movatter.jp