Resource Allocation for a Secure SWIPT Network Based on a Quantitative Energy Harvesting Mechanism

Simultaneous wireless information and power transfer (SWIPT) technology can effectively extend the lifecycle of energy-constrained networks. In order to improve the energy harvesting (EH) efficiency and network performance in secure SWIPT networks, this paper studies the resource allocation problem based on the quantitative EH mechanism in the secure SWIPT network. Based on a quantitative EH mechanism and nonlinear EH model, a quantified power-splitting (QPS) receiver architecture is designed. This architecture is applied in the multiuser multi-input single-output secure SWIPT network. With the goal of maximizing the network throughput, the optimization problem model is established under the conditions of meeting the legal user’s signal-to-interference-plus-noise ratio (SINR), EH requirements, the total transmit power of the base station, and the security SINR threshold constraints. Due to the coupling of variables, the problem is a nonconvex optimization problem. To deal with the nonconvex optimization problem, a hierarchical optimization method is adopted. Firstly, an optimization algorithm based on the optimal received power of EH circuit is proposed, and a power mapping table is constructed through the optimization algorithm, from which the optimal power ratio to meet the user’s EH requirements is obtained; then, the nonconvex problem is transformed into a convex problem by using variable substitution, semidefinite relaxation, dichotomous optimization, etc. The simulation results show that compared with the power splitting receiver architecture, the input power threshold range of the QPS receiver architecture is larger, which can avoid the EH circuit falling into the saturated working area and maintain high network throughput.


Introduction
With the large-scale commercial use of 5G technology, the situation of the Internet of Everything has gradually formed [1][2][3], energy-constrained networks such as wireless sensor networks and remote wireless LANs are troubled by the continuous supply of energy, and it is difficult to achieve large-scale development and application [4,5]. Simultaneous wireless information and power transfer (SWIPT) technology uses radio frequency (RF) signals to carry information and energy and simultaneously realizes information decoding (ID) and energy harvesting (EH) [6][7][8]; it prolongs the lifecycle of wireless sensor network nodes, provides a new opportunity for the development of energy-constrained networks, and has become one of the hot technologies currently researched in the field of wireless communication. SWIPT receivers convert collected RF signals into energy or information required by the terminal equipment.
When collecting wireless energy in the SWIPT network, the energy carried by the RF signal is transmitted to the receiving end through the antenna at the transmitting end. After collecting the RF signals, the antenna at the receiving end converts the energy in the data transmission volume, it is necessary to improve the information transmission rate while ensuring communication security. Quantitative EH is the process of optimizing, segmenting, and collecting energy during the energy collection process. The nonlinear EH model can also adopt the method of quantifying the EH. The above research adopted the nonlinear EH model and did not study the information transmission rate of the secure SWIPT system based on the quantified EH model. Therefore, in order to fill the research gap, this paper explores the performance of a secure SWIPT network based on quantized EH receiver models. In this paper, we propose a quantitative EH model, which is applied to multiuser MISO-SWIPT networks to maximize the throughput of the SWIPT network, while meeting the signal-to-interference-plus-noise ratio (SINR) requirements of legitimate users, the EH requirements, the total transmission power of the base stations, and the security SINR threshold constraints. While ensuring the security of user communication, the transmission rate of information is improved. The main contributions are summarized as follows: • We quantify the energy collection process to improve the conversion efficiency of the EH process. Compared with the receiver architecture containing multiple nonlinear EH circuits, the quantized power division receiver architecture proposed in this paper considers the RF-DC conversion efficiency of the circuit in the EH receiver, quantifies the input power of the receiver based on the optimal receiving power, and improves the conversion efficiency of the receiver EH process.

•
To meet the user's EH demand, an optimization algorithm ( Figure 1) based on EH circuit characteristics is proposed to construct a power mapping table. In order to facilitate obtaining the minimum input power of the receiver corresponding to the user's EH requirements, this paper proposes an optimization algorithm based on the circuit input and output power characteristics to determine the number of power shunts and constructs the corresponding power mapping table between the user's EH demand and the minimum input power of the receiver. We search the power mapping table to find the circuit input power and power shunt number that meet the user's EH needs.

•
The hierarchical optimization method is used to solve the nonconvex optimization problem constructed in this paper. First, the equivalent transformation method is used to transform some constraints into convex constraints. Then, the power mapping table is used to transform the EH requirements constraints that are difficult to solve directly. Secondly, the variable replacement, semidefinite relaxation, binary optimization, and other methods are used to transform the problem into a convex optimization problem. Finally, the convex optimization problem is solved with the help of optimization tools CVX and the optimization algorithm.

•
We design a joint optimization algorithm (Figure 1) based on a QPS receiver to maximize network throughput. With the help of the power mapping table, a joint optimization algorithm based on the quantized power segmentation and dichotomous method is designed to optimize the allocation of resources in the secure energy-carrying network based on QPS receivers and to maximize the throughput of SWIPT network.
The simulation results show that the joint optimization algorithm has good convergence under the quantized EH model. Compared with the PS receiver architecture, the QPS receiver architecture based on the nonlinear quantized power division model can avoid the EH circuit falling into the saturated working area and can maintain high network throughput. In addition, compared with the PS receiver architecture, the QPS receiver can maintain a near-optimal EH conversion efficiency in a wide receiving power domain, which helps to improve the RF-DC conversion efficiency of the receiver. The rest of this paper is organized as follows. Section 2 presents the system and network models. In Section 3, the problem formulation, transformation methods, and optimization process are elaborated. In Section 4, the simulation results and analysis are provided. Finally, the paper is concluded in Section 5.     Figure 1. The flow charts of the proposed Algorithms 1 and 2.

Transmission Scheme
This paper investigates a multiuser MISO secure SWIPT network in the downlink. As shown in Figure 2, the SWIPT network adopts an OFDM access mode, there are I single antenna users within the coverage area of the multiantenna BS, and the network bandwidth is divided into multiple quadrature subchannels. When the BS transmits signals to N legitimate users with N T antennas, idle K users (K = I − N) may eavesdrop on legitimate user information. For simplicity, we use n and k to indicate the nth legitimate recipient and the kth eavesdropper, respectively, n ∈ N {1, 2, . . . , N}, k ∈ K {1, 2, . . . , K}.

Transmission Scheme
This paper investigates a multiuser MISO secure SWIPT network in the downlink. As shown in Figure 2, the SWIPT network adopts an OFDM access mode, there are I single antenna users within the coverage area of the multiantenna BS, and the network bandwidth is divided into multiple quadrature subchannels. When the BS transmits signals to N legitimate users with T N antennas, idle K users ( K I N = − ) may eavesdrop on legitimate user information. For simplicity, we use n and k to indicate the n th legitimate recipient and the k th eavesdropper, respectively, In order to ensure the security of communication, artificial noise (AN) is embedded in the transmitted signal. Thus, the transmitted signal can be given by: where s n ∈ C represents the user's independent Gaussian data symbol, E{|s n | 2 } = 1, w n ∈ C N T ×1 is the beamforming vector of the nth legitimate receiver, and z n ∈ C N T ×1 represents the AN vector with a power of P H n = Tr(z n z H n ). w E is the energy signal transmitted by the transmitter, which is a Gaussian pseudo-random sequence that supplies energy to the user, i.e., w E ∼ CN (0, W E ), where W E represents the covariance matrix of the energy signal at the transmitter. In addition, all subchannels adopt block static flat fading channels, the channel vector within the block remains unchanged, and the equivalent channel responses from the BS to the nth legitimate user and the kth eavesdropping user are denoted by h n ∈ C N T ×1 and g k ∈ C N T ×1 , respectively. The signal received by the nth legitimate user can be written as follows: where n n ∼ CN σ n 2 is the Additive White Gaussian Noise (AWGN) at the nth user, and the power is σ n 2 . Since σ n 2 generally has much lower noise power than the noise power δ 2 n introduced by the baseband processing circuit in ID process, similar to many existing works [21,25], σ n 2 is ignored in the analysis below. In the legal channel, the AN is transmitted in zero space and can be eliminated by the receiver. Let z n R n d n , where R n R H n = I, d n ∼ CN (0, Σ), R n is the orthogonal basis of h H n zero space, and h H n R n = 0, so that the AN contained in the received signal by legitimate user n is completely eliminated. The receiving end of the legitimate user n applies PS power splitting technology, the power splitting ratio ρ n for ID, 0 < ρ n < 1, H, and the remaining power proportional 1 − ρ n is used for EH; so, the legitimate user n in the downlink receives the signal for EH, which can be expressed as: Assuming that the interference with the energy signal w E can be perfectly eliminated by the ID process of each legitimate receiver [12], the signals collected for the ID by legitimate users can be given as: where ϑ n ∼ CN 0, δ 2 n is the noise generated by the ID receiver processing the baseband signal, with a mean of zero and a variance of δ 2 n . Since the OFDM access transmission mode is used, and the subchannels for transmitting information between users are orthogonal to each other, the SINR of the legitimate users n can be expressed as: Eavesdropping users cannot obtain the AN signal designs for legitimate channels; so, the AN cannot be eliminated. When eavesdropping user k collects information from legitimate user n, its received signal can be given by: y EA k,n = g H k w n s n + g H k z n + ϑ n , ∀n.
The noise σ 2 n generated by the antenna is small enough relative to the EH power to be ignored during the EH process [26]. According to the user's EH power distribution ratio, the nth user's EH power can be determined by: Sensors 2023, 23, 5117 7 of 17 When user k intercepts the received information of legitimate user n, its SINR can be written as: and the total transmit power of the BS can be given by:

Quantitative EH Model
Due to the nonlinear characteristics of the diode, there is a saturated input voltage. Therefore, in the nonlinear EH circuit, during the process of gradually increasing the input power, the RF-DC conversion efficiency of the actual energy acquisition circuit first increases and then decreases, and the energy conversion efficiency is not high. Thus, when the input power is large, it is necessary to use the multi-energy harvesting circuit to collect energy, and the energy allocation problem of the multi-energy harvesting circuit is worth studying.
From a practical perspective, this section introduces a nonlinear EH model with adjustable parameters based on the sigmoidal (S-type) function [27], which combines the actual measurement data of [28] and adjusts the parameters to accurately simulate the input and output power characteristics of the EH circuits. The EH model [27], based on the S-type function has been widely used in the nonlinear energy collection network model [24,26,29,30] since it was proposed. The input and output power characteristics and conversion efficiency curves of the EH circuit are shown in Figure 3. It is worth noting that when the input power is connected to the area around 21.5 mW, it is closer to the saturation output power (23 mW) of the EH circuit, and the conversion efficiency is higher. In this case, while maintaining high conversion efficiency, it ensures the efficient utilization of the input power threshold of the EH circuit. Based on the above analysis and experimental comparison of the EH circuit's power distribution with a nonlinear S-type function EH model, a receiver system architecture using quantified power allocation is proposed.
be ignored during the EH process [26]. According to the user's EH power distribution ratio, the n th user's EH power can be determined by: When user k intercepts the received information of legitimate user n , its SINR can be written as: and the total transmit power of the BS can be given by:

Quantitative EH Model
Due to the nonlinear characteristics of the diode, there is a saturated input voltage. Therefore, in the nonlinear EH circuit, during the process of gradually increasing the input power, the RF-DC conversion efficiency of the actual energy acquisition circuit first increases and then decreases, and the energy conversion efficiency is not high. Thus, when the input power is large, it is necessary to use the multi-energy harvesting circuit to collect energy, and the energy allocation problem of the multi-energy harvesting circuit is worth studying.
From a practical perspective, this section introduces a nonlinear EH model with adjustable parameters based on the sigmoidal (S-type) function [27], which combines the actual measurement data of [28] and adjusts the parameters to accurately simulate the input and output power characteristics of the EH circuits. The EH model [27], based on the S-type function has been widely used in the nonlinear energy collection network model [24,26,29,30] since it was proposed. The input and output power characteristics and conversion efficiency curves of the EH circuit are shown in Figure 3. It is worth noting that when the input power is connected to the area around 21.5 mW, it is closer to the saturation output power (23 mW) of the EH circuit, and the conversion efficiency is higher. In this case, while maintaining high conversion efficiency, it ensures the efficient utilization of the input power threshold of the EH circuit. Based on the above analysis and experimental comparison of the EH circuit's power distribution with a nonlinear S-type function EH model, a receiver system architecture using quantified power allocation is proposed.   In the ID, in order to avoid the input power of the EH circuit in the saturation zone, a quantified power-splitting (QPS) receiver based on multiple EH circuits is proposed. Since the ID and EH processes are in different modules, the QPS receiver divides the RF signal power received by legitimate user n into two parts, one for the ID and one for the EH. Then, according to the characteristics of the circuit, as shown in Figure 3a, since the ratio of the input power to the output power of a single EH circuit is maximum at P o , the received power P n is quantized by the input power at P o (i.e., quantization power), and the number of power shunts is determined by the ratio of the received power to the quantified power, which is given by the following formula: P n l = lP n , ∀n.
Let L o = [L], represent the number of power shunts, [·] represents the rounding operation, and l is the fractional part of L. For a legitimate user n, the total power collected during the EH process in the QPS receiver can be expressed as: where ϕ n is the sigmoidal function, and Ω n is a constant to guarantee an input/output response of zero. In addition, parameters a n and b n are constants related to circuit characteristics. M n is a constant representing the maximum output power of a single EH circuit at saturation. Note that parameters a n , b n , and M n can be obtained by the curve fitting tool [27]. The proposed QSP EH model is used to describe the throughput of the system, and the resource allocation algorithm is designed. The network throughput based on the QPS receiver architecture can be given by

Problem Formulation
In the multiantenna MISO-SWIPT communication network based on OFDM, the nonlinear multi-circuit QPS EH model is used to establish the optimization problem P 1 , with the constraints of the legitimate users' SINR requirements, the EH requirements, the total transmission power of BS, and the security SINR threshold, aiming at maximizing the throughput of the SWIPT network. This optimization problem is mathematically formulated as: subject to ρ n h H n w n 2 δ 2 n ≥ γ n , ∀n, E NL n ≥ E min,n , ∀n, Sensors 2023, 23, 5117 9 of 17 |g k w n | 2 |g k w n | 2 + δ 2 n ≤ Γ, ∀n, k, In the formula, γ n , E min,n , and Γ, respectively indicate for the target SINR, the minimum harvest power required by user n, the maximum transmission power of the BS, and the upper limit of the SINR noise ratio of the illegally received signal by the eavesdropping user; L o is a positive integer, and (23) is the semi-positive definite Hermitian matrix of the energy signal. However, the constraint set in problem P 1 contains quadratic terms, has variable coupling, and is a nonconvex constraint set, which makes the problem difficult to solve.

Constraints Transformation
To solve problem P 1 , the partial constraint is expressed in an equivalent form. First, the nonconvex constraints (18) and (20) of problem P 1 are expressed in equivalent form, i.e., the requirement for the signal quality and the requirements for the EH. Equivalently, we express constraint (18) as: Since 1/ρ n is a convex function, (25) is a convex constraint on ρ n . Note that because Ω n has no effect on the design of the optimization problem, E NL n is used directly to describe the harvested power at the nth user. Thus, the inverse function of (15) can be written as: and with Equations (10), (13), and (26), constraints (20) can be transformed as: which is a convex constraint about ρ n , because 1/(1 − ρ n ) is a convex function. Inequality (21) can be replaced with the following constraints: The following determines the more independent integer variable L o . When the EH circuit characteristics are determined, for a given EH requirement E min,n , each power shunt number L o has a unique optimal EH circuit number corresponding to it. Based on this observation, by searching for the conversion efficiency mapping table corresponding to the EH circuit's input and output power, the uniquely determined optimal number of power shunts can be obtained. Part of the conversion efficiency mapping is shown in Table 1, and the method of obtaining Table 1 is summarized as Algorithm 1. Algorithm 1 starts from the actual characteristics of the EH circuit; when determining the number of power shunts, the number of comparisons is small, which is effective for determining the L o from small to large, and the mapping table required for EH can be constructed efficiently and completely. In [24], the author adopted the SMO method (with a computational complexity of O(Mˆ2L)), and the proposed Algorithm 1 has a lower computational complexity (O(10NT)).
In addition, building the mapping table offline does not add computational complexity to the inline beamforming design. Table 1 shows an example of a mapping table, where M k = 23 mW, and L * o represents the optimal number of power shunts. η 2 , η 3 , and η * represent the two and three equal divisions of power P n and the optimal conversion efficiency, respectively.
The conversion efficiency units are %, the power units are mW, η Q , and η 1 , which represent the RF-DC conversion efficiency of the QPS receivers and the traditional singlecircuit EH receivers, respectively, and η 1 P n < E min,n indicates that the user EH requirements are not supported. It can be seen that the QPS receiver improves the conversion efficiency of the RF-DC and, more importantly, breaks through the limitation of the output DC power. According to the correspondence of the mapping table, the EH requirements constraint of user n can be satisfied by the convex constraint (27). Figure 4 shows the conversion efficiency trend plotted by the reference Algorithm 1, showing the change trend of the input and output conversion efficiency of some EH circuits. With the gradual increase in the input power, when the number of circuits is 1~3, only part of the power segment occupies the optimal EH conversion efficiency; in sharp contrast to this, with the increase in the input power, the conversion efficiency (η Q ) of the quantified power input curve was around the optimal EH conversion efficiency, fluctuating slightly and tending toward the optimal EH conversion efficiency. It can be seen that the quantized power input scheme has better stability than the optimal shunt input scheme, and the EH conversion efficiency η Q of the QPS receiver tends to the optimal EH conversion efficiency when the input power is large. Therefore, a quantized QPS receiver with stable output EH conversion efficiency is adopted. quantified power input curve was around the optimal EH conversion efficiency, fluctuating slightly and tending toward the optimal EH conversion efficiency. It can be seen that the quantized power input scheme has better stability than the optimal shunt input scheme, and the EH conversion efficiency Q η of the QPS receiver tends to the optimal EH conversion efficiency when the input power is large. Therefore, a quantized QPS receiver with stable output EH conversion efficiency is adopted.

Variable Substitution and Optimization Solution
We define

Variable Substitution and Optimization Solution
We define Z n = z n z H n , ∀n and obtain ||w n || 2 = Tr(W n ) , ||z n || 2 = Tr(Z n ) ; similarly, we define H n = h n h H n and G k = g k g H k ,∀n, k, the matrix W n is positively definite, satisfying Rank(W n ) = 1, ∀n, and after variable substitution, the optimization problem P 1 can be rewritten as: (Tr(H n W n ) + Tr(H n Z n )) + Tr(H n W E ) ≥ P n (E min,n ) 1 − ρ n , ∀n, Using the semidefinite relaxation (SDR) method, dropping the rank-one constraint in the problem P 2 , the optimization problem can be relaxed as: Since the objective function (29) and constraints (30) and (32) have coupling variables ρ n , when ρ n is determined, the optimization problem P 3 can be rewritten as: As shown in Equation (41), the Hessen matrix of the objective function of problem P 4 is ∇ 2 α and has eigenvalues less than zero; thus, Equation (39) is a concave function. Constraints (30)-(35) are convex sets. Therefore, the optimization problem P 4 is a convex problem that can be solved by the CVX toolbox [31].
For the variable ρ n , within its feasible range, the optimal solution ρ * n can be obtained by dichotomy, and after determining ρ * n , the optimization tool CVX is used to solve the problem P 4 to obtain the optimal solution {W * n , W * E , Z * n }. The P 1 problem is equivalent to the P 2 problem, the P 2 problem is transformed into the P 3 problem by the SDR method, and the solution to the P 3 problem is an approximate solution of P 2 . Thus, the solution to the P 3 problem, which is obtained by using the dichotomy and the CVX tool, is the approximate optimal solution of the original optimization problem P 1 .
The solution method of the original problem is summarized as an optimization Algorithm 2, which is based on the QPS EH mechanism and the dichotomous method, and is summarized on page 5.

Simulation Results
This section compares and analyzes the performance of the joint optimization algorithm under the EH models and QSP receiver architecture. In the multiuser MISO secure SWIPT network model, as shown in Figure 2, the distance between the BS and the legitimate users as well as the eavesdropping users was equal, and both were set as d = 2 m. The number of antennas equipped with the BS was N T = 4. The legitimate users and the eavesdropping users were equipped with a single antenna. The target SINR of the legitimate user was γ n = 10dB. In addition, the BS transmit power was P max = P × N = 30dBm. The number of legitimate users was N = 3, and the number of eavesdropping users was K = 1. The noise power at the ID process was δ 2 n = −40dBm. Channel models h n and g k are random variables that follow the Gaussian distribution of zero mean and unit variance. The user's EH threshold E min,n = −42mW, and the security SINR threshold Γ = 0dB. The parameters of the nonlinear EH circuits were M n = 23mW, a = 1900 and, b = 0.003.
When the transmission power of the BS was fixed, the relationship between the system throughput and the EH threshold under different EH models is shown in Figure 5. The system throughput decreased with the increase in the EH threshold. Since the BS transmission power remained unchanged, more power was allocated to the EH process. The energy allocated to the ID process was reduced, and the system data transmission rate was reduced. Compared with the steeper curve of the linear EH model, the trend of the nonlinear QPS EH model curve was more realistic. When the conversion efficiency of the linear EH model was set to 0.4 and 0.7, the energy that could be collected by the EH circuit was reduced due to misestimation, which could not meet the user's energy collection needs; thus, the algorithm designed in this paper allocates more energy to the EH process under the linear EH model. When the linear EH conversion efficiency reached 0.9, as the energy collection circuit reached the saturation zone, the conversion efficiency decreased, and the actual collected energy was less than the theoretical calculation, resulting in the user's EH requirements not being met. Therefore, compared with the linear EH model, the resource allocation scheme based on the nonlinear EH model can predict the network performance more accurately and meet the user's EH requirements.
was reduced due to misestimation, which could not meet the user's energy collection needs; thus, the algorithm designed in this paper allocates more energy to the EH process under the linear EH model. When the linear EH conversion efficiency reached 0.9, as the energy collection circuit reached the saturation zone, the conversion efficiency decreased, and the actual collected energy was less than the theoretical calculation, resulting in the user's EH requirements not being met. Therefore, compared with the linear EH model, the resource allocation scheme based on the nonlinear EH model can predict the network performance more accurately and meet the user's EH requirements. Figure 5. The relationship between the throughput and the EH threshold under different EH models. Figure 6 shows the variation trend of the network throughput with user EH thresholds under different receiver architectures. Compared with other receiver models, the QPS receiver model maintained a high network throughput. With the increase in the EH threshold, the energy used to decode the legitimate user information decreased; thus, the system throughput under different receiver models gradually decreased. When the single PS receiver model was adopted, and the EH threshold was greater than 20mW, the EH capacity range of the PS receiver exceeded the EH threshold and could not meet the user's EH requirements. When the EH threshold was greater than 23 mW, due to the limitation of the saturated output power (the saturation output power threshold was 23 mW), the system allocated all the energy to the EH process, which still could not meet the user's EH requirements, and the system could not perform the ID process. Although the limitation of saturated output power could be avoided by using a QPS receiver model with a power splitting ratio of 0.5, the reachable network throughput was lower than that of the QPS receiver model, because the receive power splitting ratio n ρ was not optimized.  Figure 6 shows the variation trend of the network throughput with user EH thresholds under different receiver architectures. Compared with other receiver models, the QPS receiver model maintained a high network throughput. With the increase in the EH threshold, the energy used to decode the legitimate user information decreased; thus, the system throughput under different receiver models gradually decreased. When the single PS receiver model was adopted, and the EH threshold was greater than 20 mW, the EH capacity range of the PS receiver exceeded the EH threshold and could not meet the user's EH requirements. When the EH threshold was greater than 23 mW, due to the limitation of the saturated output power (the saturation output power threshold was 23 mW), the system allocated all the energy to the EH process, which still could not meet the user's EH requirements, and the system could not perform the ID process. Although the limitation of saturated output power could be avoided by using a QPS receiver model with a power splitting ratio of 0.5, the reachable network throughput was lower than that of the QPS receiver model, because the receive power splitting ratio ρ n was not optimized. The relationship between the system throughput between the different EH thresholds and the safety SINR thresholds is shown in Figure 7. The system throughput increased with the increase in the safety SINR threshold. The reason is that when the security SINR threshold of eavesdropping users increased, the power allocated to the AN decreased, and the energy used for the ID processing of legitimate users increased, resulting in greater system throughput. When the security SINR was constant, the system throughput decreased with the increase in the EH threshold. The reason is that the energy used for the ID decreased with the increase in the user's EH requirements, resulting in the de- The relationship between the system throughput between the different EH thresholds and the safety SINR thresholds is shown in Figure 7. The system throughput increased with the increase in the safety SINR threshold. The reason is that when the security SINR threshold of eavesdropping users increased, the power allocated to the AN decreased, and the energy used for the ID processing of legitimate users increased, resulting in greater system throughput. When the security SINR was constant, the system throughput decreased with the increase in the EH threshold. The reason is that the energy used for the ID decreased with the increase in the user's EH requirements, resulting in the decrease in the information transmission rate. The relationship between the system throughput between the different EH thresholds and the safety SINR thresholds is shown in Figure 7. The system throughput increased with the increase in the safety SINR threshold. The reason is that when the security SINR threshold of eavesdropping users increased, the power allocated to the AN decreased, and the energy used for the ID processing of legitimate users increased, resulting in greater system throughput. When the security SINR was constant, the system throughput decreased with the increase in the EH threshold. The reason is that the energy used for the ID decreased with the increase in the user's EH requirements, resulting in the decrease in the information transmission rate. The relationship between different BS transmission powers and network throughputs is shown in Figure 8. The network throughput increased with the total transmission power of the BS. This is because when the network EH threshold and security SINR remained unchanged, the energy used for the ID increased with the increase in the BS total transmission power, resulting in greater network throughput. When the transmission distance was constant, the network throughput increased with the increase in the number of the BS antennas. The reason is that the channel gain of SWIPT system increased with the increase in the number of the BS antennas, and the transmission quality of the signal increased. When the number of the BS antennas was constant, the network throughput The relationship between different BS transmission powers and network throughputs is shown in Figure 8. The network throughput increased with the total transmission power of the BS. This is because when the network EH threshold and security SINR remained unchanged, the energy used for the ID increased with the increase in the BS total transmission power, resulting in greater network throughput. When the transmission distance was constant, the network throughput increased with the increase in the number of the BS antennas. The reason is that the channel gain of SWIPT system increased with the increase in the number of the BS antennas, and the transmission quality of the signal increased. When the number of the BS antennas was constant, the network throughput decreased with the increase in the distance between the BS and the user. The reason is that with the increase in the transmission distance between the user and the BS, the signal transmission path loss increased, which made the channel transmission quality worse, resulting in a decrease in network throughput. decreased with the increase in the distance between the BS and the user. The reason is that with the increase in the transmission distance between the user and the BS, the signal transmission path loss increased, which made the channel transmission quality worse, resulting in a decrease in network throughput. The convergence of the joint optimization algorithms based on the quantized EH and dichotomous method is shown in Figure 9. Due to the advantages of the dichotomous method and the range of the PS factor being (0,1), in the first five iterations of the network throughput and the PS factor, the search range of the optimization variables of the algorithm was rapidly narrowed, and the range of the optimal value was approximated. Then, the algorithm began to refine the search, converged at the tenth iteration, and the PS factor and network throughput reached the optimal value, indicating that the joint optimization The convergence of the joint optimization algorithms based on the quantized EH and dichotomous method is shown in Figure 9. Due to the advantages of the dichotomous method and the range of the PS factor being (0, 1), in the first five iterations of the network throughput and the PS factor, the search range of the optimization variables of the algorithm was rapidly narrowed, and the range of the optimal value was approximated. Then, the algorithm began to refine the search, converged at the tenth iteration, and the PS factor and network throughput reached the optimal value, indicating that the joint optimization algorithm had good convergence. The convergence of the joint optimization algorithms based on the quantized EH and dichotomous method is shown in Figure 9. Due to the advantages of the dichotomous method and the range of the PS factor being (0,1), in the first five iterations of the network throughput and the PS factor, the search range of the optimization variables of the algorithm was rapidly narrowed, and the range of the optimal value was approximated. Then, the algorithm began to refine the search, converged at the tenth iteration, and the PS factor and network throughput reached the optimal value, indicating that the joint optimization algorithm had good convergence.

Conclusions
This paper aimed to maximize the network throughput and study the resource allocation problem in multiuser MISO secure SWIPT networks with an AN. Inspired by the nonlinear EH model, a QSP receiver architecture based on quantitative EH mechanism was designed, and the receiver was applied to the EH process to avoid the receiver's EH circuit operating in the saturation region. Under the conditions of satisfying the

Conclusions
This paper aimed to maximize the network throughput and study the resource allocation problem in multiuser MISO secure SWIPT networks with an AN. Inspired by the nonlinear EH model, a QSP receiver architecture based on quantitative EH mechanism was designed, and the receiver was applied to the EH process to avoid the receiver's EH circuit operating in the saturation region. Under the conditions of satisfying the requirements of legitimate users' SINR, the EH requirements, the total transmitted power of the BS, and the security SINR threshold constraints, a joint optimization algorithm based on the quantization model was proposed to solve the nonconvex optimization problem of maximizing the network throughput. The QSP receiver architecture proposed in this paper can achieve near optimal EH conversion efficiency, and compared with the PS receiver architecture, the input power threshold range is larger, which can avoid the saturation zone of the EH circuit and maintain high network throughput. However, the QPS EH mechanism proposed in this paper has not been applied in practice. Therefore, the gap between the theoretical and practical applications provides a direction for future research.

Conflicts of Interest:
The authors declare no conflict of interest.