{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:21:59Z","timestamp":1740140519583,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Science and Technology Major Project of China","award":["2018ZX03001026-002"],"award-info":[{"award-number":["2018ZX03001026-002"]}]},{"name":"Doctoral Candidate Innovative Talent Project of CQUPT","award":["BYJS201807"],"award-info":[{"award-number":["BYJS201807"]}]},{"name":"Science Technology Project of Chongqing Education Commission","award":["KJQN201800618"],"award-info":[{"award-number":["KJQN201800618"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The green communication for 5th generation Internet of Things base on the energy collecting and security issues is studied in this paper. The transceiver and power splitting factor are optimized aiming at minimizing the transmitting power at the source node subject to the security performance and energy collection. Since the optimization problem is a nonconvex function, an iteration optimization algorithm is proposed to divide the objective optimization function into two subproblems, namely, a joint transmitter and PS factor optimization subproblem and a minimum mean-square error-based receiving filter optimization subproblem. Furthermore, since the transmitter and PS combining optimization subproblem is still a nonconvex function, the semidefinite relaxation technique is used to transform it into a convex function. The feasibility of the optimization problem and the convergency of the iteration algorithm are proved in theory, and the simulation results show the availability of the proposed scheme.<\/jats:p>","DOI":"10.1186\/s13638-020-01732-2","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T10:05:54Z","timestamp":1591610754000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Green communication for MIMO SWIPT-powered 5G Internet of Things with full-duplex relay base on secure transmission and energy collection constraints"],"prefix":"10.1186","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8748-1008","authenticated-orcid":false,"given":"Meng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianhong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Kadoch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"issue":"5","key":"1732_CR1","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"F. Meneghello, M. Calore, D. Zucchetto, et al., IoT: Internet of Threats ? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Things J. 6(5), 8182\u20138201 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"1732_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MCOM.2014.6957150","volume":"52","author":"I Krikidis","year":"2014","unstructured":"I. Krikidis, S. Timotheou, S.G. Nikolaou, Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 52(11), 104\u2013110 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"1732_CR3","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"YP Wu","year":"2018","unstructured":"Y.P. Wu, A. Khisti, C.S. Xiao, et al., A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE Journal on selected areas in communications. 36(4), 679\u2013695 (2018)","journal-title":"IEEE Journal on selected areas in communications."},{"issue":"2","key":"1732_CR4","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","volume":"21","author":"D Wang","year":"2019","unstructured":"D. Wang, B. Bai, W.B. Zhao, et al., A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Communications Surveys & Tutorials 21(2), 1878\u20131911 (2019)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"1732_CR5","doi-asserted-by":"publisher","first-page":"2734","DOI":"10.1109\/COMST.2018.2865607","volume":"21","author":"F Jameel","year":"2019","unstructured":"F. Jameel, S. Wyne, G. Kaddoum, A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Communications Surveys & Tutorials. 21(3), 2734\u20132771 (2019)","journal-title":"IEEE Communications Surveys & Tutorials."},{"key":"1732_CR6","doi-asserted-by":"publisher","unstructured":"M. Zhang, J.H. Zheng, Y. He, Secure transmission scheme for SWIPT-powered full-duplex relay system with multi-antenna based on energy cooperation and cooperative jamming. Telecommun. Syst. (2019). https:\/\/doi.org\/10.1007\/s11235-019-00642-z","DOI":"10.1007\/s11235-019-00642-z"},{"issue":"2","key":"1732_CR7","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"XM Chen","year":"2017","unstructured":"X.M. Chen, D.W.K. Ng, W.H. Gerstacker, et al., A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE Communications Surveys & Tutorials 19(2), 1027\u20131053 (2017)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1732_CR8","doi-asserted-by":"publisher","first-page":"11862","DOI":"10.1109\/ACCESS.2018.2805818","volume":"6","author":"DC Chen","year":"2018","unstructured":"D.C. Chen, W.W. Yang, J.W. Hu, et al., Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay. IEEE Access. 6, 11862\u201311870 (2018)","journal-title":"IEEE Access."},{"key":"1732_CR9","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1109\/ACCESS.2016.2575863","volume":"4","author":"Q Xu","year":"2016","unstructured":"Q. Xu, P.Y. Ren, H.B. Song, et al., Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations. IEEE Access. 4, 2840\u20132853 (2016)","journal-title":"IEEE Access."},{"issue":"4","key":"1732_CR10","doi-asserted-by":"publisher","first-page":"6453","DOI":"10.1109\/JIOT.2019.2908821","volume":"6","author":"PM Huang","year":"2019","unstructured":"P.M. Huang, Y.Q. Hao, T.J. Lv, Secure Beamforming Design in Relay-Assisted Internet of Things. IEEE Internet Things J. 6(4), 6453\u20136464 (2019)","journal-title":"IEEE Internet Things J."},{"key":"1732_CR11","doi-asserted-by":"publisher","first-page":"5121","DOI":"10.1109\/ACCESS.2017.2687046","volume":"5","author":"X Xie","year":"2017","unstructured":"X. Xie, H. Yang, A.V. Vasilakos, Robust Transceiver Design Based on Interference Alignment for Multi-User Multi Cell MIMO Networks With Channel Uncertainty. IEEE Access 5, 5121\u20135134 (2017)","journal-title":"IEEE Access"},{"issue":"12","key":"1732_CR12","doi-asserted-by":"publisher","first-page":"11354","DOI":"10.1109\/TVT.2018.2876788","volume":"67","author":"H Yang","year":"2018","unstructured":"H. Yang, C. Chen, W. Zhong, et al., Joint Precoder and Equalizer Design for Multi-User Multi-Cell MIMO VLC Systems. IEEE Trans. Veh. Technol. 67(12), 11354\u201311364 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1732_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TMTT.2019.2896513","volume":"67","author":"A Gebhard","year":"2019","unstructured":"A. Gebhard, O. Lang, M. Lunglmayr, et al., A Robust Nonlinear RLS Type Adaptive Filter for Second-Order-Intermodulation Distortion Cancellation in FDD LTE and 5G Direct Conversion Transceivers. IEEE Transactions on Microwave Theory and Techniques 67, 5 (2019)","journal-title":"IEEE Transactions on Microwave Theory and Techniques"},{"issue":"11","key":"1732_CR14","doi-asserted-by":"publisher","first-page":"6414","DOI":"10.1109\/TWC.2015.2453414","volume":"14","author":"KX Nguyen","year":"2015","unstructured":"K.X. Nguyen, Y. Rong, S. Nordholm, MMSE-Based Transceiver Design Algorithms for Interference MIMO Relay Systems. IEEE Trans. Wirel. Commun. 14(11), 6414\u20136424 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"1732_CR15","doi-asserted-by":"publisher","first-page":"8979","DOI":"10.1109\/TVT.2017.2703641","volume":"66","author":"L Gopal","year":"2017","unstructured":"L. Gopal, Y. Rong, Z.Q. Zang, Robust MMSE Transceiver Design for Nonregenerative Multicasting MIMO Relay Systems. IEEE Trans. Veh. Technol. 66(10), 8979\u20138989 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"1732_CR16","doi-asserted-by":"publisher","first-page":"3547","DOI":"10.1109\/TWC.2017.2684122","volume":"16","author":"HB Kong","year":"2017","unstructured":"H.B. Kong, H.M. Shin, T. Oh, Joint MMSE Transceiver Designs for MIMO AF Relaying Systems With Direct Link. IEEE Trans. Wirel. Commun. 16(6), 3547\u20133560 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"1732_CR17","first-page":"4147","volume":"64","author":"YL Cai","year":"2016","unstructured":"Y.L. Cai, M.M. Zhao, Q.J. Shi, et al., Joint Transceiver Design Algorithms for Multiuser MISO Relay Systems With Energy Harvesting. IEEE Trans. Commun. 64(10), 4147\u20134164 (2016)","journal-title":"IEEE Trans. Commun."},{"key":"1732_CR18","doi-asserted-by":"publisher","first-page":"24203","DOI":"10.1109\/ACCESS.2017.2771305","volume":"5","author":"JL Yang","year":"2017","unstructured":"J.L. Yang, Z. He, Q.Y. Rong, Transceiver Optimization for Two-Hop MIMO Relay Systems With Direct Link and MSE Constraints. IEEE Access 5, 24203\u201324213 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"1732_CR19","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/LCOMM.2015.2513768","volume":"20","author":"ZG Wen","year":"2018","unstructured":"Z.G. Wen, X.Q. Liu, R. Wang, Joint Source and Relay Beamforming Design for Full-Duplex MIMO AF Relay SWIPT Systems. IEEE Commun. Lett. 20(2), 320\u2013323 (2018)","journal-title":"IEEE Commun. Lett."},{"issue":"9","key":"1732_CR20","doi-asserted-by":"publisher","first-page":"3576","DOI":"10.1109\/TSP.2009.2020030","volume":"57","author":"N Vucic","year":"2009","unstructured":"N. Vucic, H. Boche, S. Shi, Robust transceiver optimization in downlink multiuser MIMO systems. IEEE Trans. Signal Process. 57(9), 3576\u20133587 (2009)","journal-title":"IEEE Trans. Signal Process."},{"issue":"2","key":"1732_CR21","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1002\/nla.1811","volume":"20","author":"S Noschese","year":"2013","unstructured":"S. Noschese, L. Pasquini, L. Reichel, Tridiagonal Toeplitz matrices: Properties and novel applications. Numer. Linear Algebra. 20(2), 302\u2013326 (2013)","journal-title":"Numer. Linear Algebra."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01732-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01732-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01732-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T23:46:37Z","timestamp":1623109597000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01732-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,8]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1732"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01732-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2020,6,8]]},"assertion":[{"value":"29 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"119"}}