DOI QR코드

DOI QR Code

A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels

  • Huang, Boyang (Electric of Power Research Institute, China Southern Power Grid Co Ltd.) ;
  • Kong, Zhengmin (School of Electrical Engineering and Automation, Wuhan University) ;
  • Fang, Yanjun (School of Electrical Engineering and Automation, Wuhan University) ;
  • Jin, Xin (Electric of Power Research Institute, China Southern Power Grid Co Ltd.)
  • 투고 : 2018.04.18
  • 심사 : 2018.11.07
  • 발행 : 2019.04.30

초록

In this paper, we investigate the problem of secure communications in multiple-input-multiple-output interference networks from the perspective of physical layer security. Specifically, the legitimate transmitter-receiver pairs are divided into different categories of active and inactive. To enhance the security performances of active pairs, inactive pairs serve as cooperative jammers and broadcast artificial noises to interfere with the eavesdropper. Besides, active pairs improve their own security by using joint transceivers. The encoding of active pairs and inactive pairs are designed by maximizing the difference of mean-squared errors between active pairs and the eavesdropper. In detail, the transmit precoder matrices of active pairs and inactive pairs are solved according to game theory and linear programming respectively. Experimental results show that the proposed algorithm has fast convergence speed, and the security performances in different scenarios are effectively improved.

키워드

1. Introduction

Interference channels are usually used to model multi-user scenarios, such as cognitive radiosystems, ad-hoc wireless networks, and various forms of broadcast channels [1]. Due to the broadcast nature, signals from any transmitter are shared by all access receivers, which meansinterference channels are exposed to security risks of eavesdropping attacks. Traditionally, secure communications are achieved by using encryption algorithms [2-3]. However, with therapid development of computing speed, once quantum computers are put into practice, traditional cryptography will be greatly challenged by brute force of quantum computing. Therefore, the physical layer security (PLS) technology, which is defined from the perspective of the information theory, has been proposed in the physical layer to complement and enhance the confidentiality provided at upper layers [4-5]. By PLS encoding, the qualities of legitimatechannels are improved while the eavesdropping channels are degraded. As a benefit, even if the encoding leaked, security can still be guaranteed because of the advantage in channel qualities [6].

Recently, the multiple-input and multiple-output (MIMO) techniques have been proposed to improve the spectral efficiency as well as the multiplexing gain in wireless communicationsystems. With multi-antennas at both transmitters and receivers, communication resources in physical layer are highly increased, which significantly facilitates the PLS encoding [7]. In last decade, several PLS methods have been proposed. Without the aid of external communicationnodes, beam-forming is the main method for improving the PLS in MIMO wirelessinterference networks [8-12]. Specifically, confidential signals are precoded at the transmitterand decoded at the receiver according to the channel state information (CSI), which is known as the joint transceiver [13-14]. Besides, the quality of the eavesdropping channel can be degraded by transmitting artificial noises (AN) together with confidential signals. To eliminate influences on the legitimate channel, AN must occupy part of antennas which are initially used to transmit confidential signals. As a result, the data rate will reduce remarkably. On the contrary, if there are excess communication nodes in the network, redundant transmitters can serve as cooperative jammers and send AN to interfere with the eaves dropper[15-16]. By this means, it is no need to allocate data streams to send AN, so the data rate can remain at a high level.

On the other hand, although cooperative jamming has been widely recognized as aneffective approach for improving the PLS, its application in MIMO Interference networks remains a significant challenge. The main difficulty lies in reducing the interferences from cooperative jammers to legitimate users. In multiple-input-single-output (MISO) systems and MIMO systems with redundant antennas, the authors in [17-18] force the AN to be zero by sending it in the null space of channel transfer matrices. However, in MIMO system, if the transmitters and receivers use the same number of antennas to transmit data symbols, the nullspace is not existent and the zero-forcing is infeasible. Except for zero-forcing, although some AN designs in MIMO interference networks have been proposed to ensure PLS whilereducing the impact on legitimate receivers by as much as possible [19-20], but the optimization problem of the secrecy rate is non-convex and the complexity remains fairly high. Therefore, how to design cooperative jamming considering both security performance and computing efficiency is still an unsolved problem.

Motivated by this challenge, we aim for providing an algorithm with low complexity and well security performance in order to jointly design the PLS encoding of transmitters, receivers and jammers. Specifically, we consider a MIMO interference network consisting of a plurality of legitimate transmitter-receiver pairs and one eavesdropper (Eve). The transmitter-receiver pairs are divided into active pairs (AP) and inactive pairs (IP) according to if they are active or not. The security performances of APs are our main concern, hence IP splay supporting roles and broadcast AN to interfere with Eve. To this end, we did the following contributions: 1) we use mean-squared errors (MSE) to denote the securityperformance, and the security problem in MIMO interference wiretap channel is formulated as an optimization problem for the purpose of maximizing the MSE difference between APs and Eve. 2) We propose an asynchronous algorithm to obtain the Nash equilibrium (NE) solution of joint transceivers. Specifically, the non-convex MSE expressions of APs are transformed into convex forms, and the closed-form solutions are obtained at each iteration. Benefit from that, the computational time is saved greatly, and the proposed algorithm has fast convergencespeed. 3) We design the ANs from cooperative jammers for the purpose of maximizing the MSE difference between APs and Eve while reducing the impacts on APs as much as possible. The MSE variation of APs and Eve with the active of IPs is derived and the TPCs of IPs aresolved based on the linear programming.

The rest of this paper is organized as follows: Section 2 analyses the MIMO interferencenetwork and build the wiretap channel model. In section 3, the security strategies of APs and IPs are designed respectively. And an asynchronous algorithm is put forth to solve the jointtransmitters and receivers. In Section 4, the performance of our design is tested by simulationexperiments, and a detailed analysis is also conducted. Finally, this paper is concluded in Section 5.

2. System Model

Here we consider an interference network of M+N legitimate transmitter-receiver pairs, in which each receiver could be the potential Eve. For each legitimate transmitter-receiver pair, apair of transceivers consisting of a TPC and a receive decoder (RDC) is adopted to achievesecure communications, and Eve only has a RDC for eavesdropping. We assume that analliance is formed by all the legitimate transmitter-receiver pairs, the aim of which is to enhance the security performance of the whole network. In fact, transmitter-receiver pairs can be divided into two types: M APs and N IPs. APs are engaged with transmitting and receiving data while IPs are idle. For the benefit of the whole network, APs share their CSIs and TPC matrices. We assume that Eve is an active eavesdropper who may register in the network. Since Eve is not recognized as a hostile node, but as one existing receiver who tries to wiretapdata signals from non-paired transmitter, so the perfect CSIs of APs are available to Eve as well. On the contrary, IPs serve as cooperative jammers and broadcast ANs without publishing their TPC matrices. Moreover, it takes a very short time to transmit a data frame, so each channel is assumed to change sufficiently slowly to be considered fixed during this period.

As shown in Fig. 1, the mth transmitter, the mth receiver, and Eve are equipped with \(\begin{equation} N_{t, m} \end{equation}\).\(\begin{equation} N_{r, m} \text { and } N_{e} \end{equation}\) antennas, respectively. Because of the broadcast nature, the mth receiver will receive the signals not only from the mth transmitter but also other transmitters including transmitters of IPs, which causes mutual interferences. We assume that Eve is trying to wiretapdata signals from the mth transmitter, and the wiretap model can be built from the perspective of the mth receiver and Eve as:

\(\begin{equation} y_{m}=\mathbf{H}_{m m} \mathbf{T}_{m} s_{m}+\sum_{i \neq m}^{M} \mathbf{H}_{i m} \mathbf{T}_{i} s_{i}+\sum_{n=1}^{N} \mathbf{H}_{m n} \mathbf{\Gamma}_{n} z_{n}+n_{m} \end{equation}\)       (1)

\(\begin{equation} y_{e, m}=\mathbf{H}_{m e} \mathbf{T}_{m} s_{m}+\sum_{i \neq m}^{M} \mathbf{H}_{i e} \mathbf{T}_{i} s_{i}+\sum_{n=1}^{N} \mathbf{H}_{n e} \mathbf{\Gamma}_{n} z_{n}+n_{e} \end{equation}\)        (2)

where , \(\begin{equation} y_{m} \in \mathbb{C}^{N_{r, m} \times 1}, \quad y_{e} \in \mathbb{C}^{N_{e} \times 1} \end{equation}\) are the vectors of signals at the mth receiver and Eve, respectively, and \(\begin{equation} C \end{equation}\) denotes the complex field; \(\begin{equation} s_{m} \in \mathbb{C}^{d \times 1} \text { and } z_{n} \in \mathbb{C}^{d \times 1} \end{equation}\) are the vectors of datasymbols from the mth transmitter and AN from the nth IP, where d is the number of datastreams; \(\begin{equation} \mathbf{T}_{m} \in \mathbb{C}^{N_{t, m} \times d} \end{equation}\) and .. are the TPC matrices of the mth AP and the nth IP, respectively;\(\begin{equation} \mathbf{H}_{i m} \in \mathbb{C}^{N_{r a} \times N_{i j}} \text { and } \mathbf{H}_{i e} \in \mathbb{C}^{N_{e} \times N_{i}} \end{equation}\) are the channel matrices of the ith transmitter to the m threceiver link and the ith transmitter to Eve link, respectively; \(\begin{equation} n_{m} \in \mathbb{C}^{N_{r, x} \times 1} \text { and } n_{e} \in \mathbb{C}^{N_{e} \times 1} \end{equation}\) are the complex additive white Gaussian noise (AWGN) vectors received by the mth receiver and Eve, respectively. And we have \(\begin{equation} n_{m} \sim \mathcal{C N}\left(0, \delta_{m}^{2} \mathbf{I}\right) \text { and } n_{e} \sim \mathcal{C} \mathcal{N}\left(0, \delta_{e}^{2} \mathbf{I}\right) \end{equation}\) , where \(\begin{equation} \delta_{m}^{2} \text { and } \delta_{e}^{2} \end{equation}\) are the variances of noises.

 

Fig. 1. a MIMO interference network with M APs, N IPs and an Eve

Let ,\(\begin{equation} \mathbf{R}_{m} \in \mathbb{C}^{d \times N_{r m}} \text { and } \mathbf{R}_{e, m} \in \mathbb{C}^{d \times N_{c}} \end{equation}\) denote the RDC matrices of the mth AP and Eve respectively, the estimated data symbol vectors of the mth receiver and Eve are given by:

\(\begin{equation} \hat{s}_{m}=\mathbf{R}_{m}^{H} y_{m}=\mathbf{R}_{m}^{H} \mathbf{H}_{m m} \mathbf{T}_{m} s_{m}+\mathbf{R}_{m}^{M} \sum_{i \neq m}^{M} \mathbf{H}_{i m} \mathbf{T}_{i} s_{i}+\mathbf{R}_{m}^{M} \sum_{n=1}^{N} \mathbf{H}_{m} \mathbf{\Gamma}_{n} z_{n}^{2}+\mathbf{R}_{m}^{M} n_{m} \end{equation}\)       (3)

\(\begin{equation} \hat{s}_{e, m}=\mathbf{R}_{e, m}^{H} y_{m}=\mathbf{R}_{e, m}^{H} \mathbf{H}_{m e} \mathbf{T}_{m} s_{m}+\mathbf{R}_{e, m}^{H} \sum_{i \neq m}^{M} \mathbf{H}_{i e} \mathbf{T}_{i} s_{i}+\mathbf{R}_{e, m}^{H} \sum_{n=1}^{N} \mathbf{H}_{n e} \mathbf{\Gamma}_{n} z_{n}+\mathbf{R}_{e, m}^{H} n_{e} \end{equation}\)       (4)

where \(\begin{equation} (\cdot)^{H} \end{equation}\)⋅ is the Hermitian operator.

Based on the fact that the bit-error-rate is closed related to the MSE, we use the MSE of the transmitted data symbols to measure the security performance. Secure communications can berealized if the MSE of the mth transmitter to mth receiver link is smaller than that of the m th transmitter to Eve link. By assuming that \(\begin{equation} \mathbb{E}\left\{s_{m} s_{m}^{H}\right\}=\mathbf{I}, \forall m \in\{1,2, \ldots, M\} \end{equation}\) , MSE matrices of both links are as follows:

\(\begin{equation} \begin{aligned} \operatorname{MSE}_{\mathrm{Tx}_{m}, \mathrm{R} x_{m}}=& \mathbb{E}\left\{\left(\hat{s}_{m}-s_{m}\right)\left(\hat{s}_{m}-s_{m}\right)^{H}\right\} \\ =& \mathbf{R}_{m}^{H} \sum_{i=1}^{M} \mathbf{H}_{i m} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{R}_{m}+\mathbf{R}_{m}^{H} \sum_{n=1}^{N} \mathbf{H}_{n m} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{n m}^{H} \mathbf{R}_{m}-\mathbf{R}_{m}^{H} \mathbf{H}_{m m} \mathbf{T}_{m} \\ &-\mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H} \mathbf{R}_{m}+\sigma_{m}^{2} \mathbf{R}_{m}^{H} \mathbf{R}_{m}+\mathbf{I} \end{aligned} \end{equation}\)       (5)

\(\begin{equation} \begin{aligned} \mathbf{M S E}_{\mathrm{Tx}_{\mathrm{m}}, \mathrm{Eve}}=& \mathbb{E}\left\{\left(\hat{s}_{e, m}-S_{m}\right)\left(\hat{s}_{e, m}-s_{m}\right)^{H}\right\} \\ =& \mathbf{R}_{e, m}^{H} \sum_{i=1}^{M} \mathbf{H}_{i e} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{H}_{i e}^{H} \mathbf{R}_{e, m}+\mathbf{R}_{e, m}^{H} \sum_{n=1}^{N} \mathbf{H}_{n e} \mathbf{\Gamma}_{n} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{n e}^{H} \mathbf{R}_{e, m}-\mathbf{R}_{e, m}^{H} \mathbf{H}_{m e} \mathbf{T}_{m} \\ &-\mathbf{T}_{m}^{H} \mathbf{H}_{m e}^{H} \mathbf{R}_{e, m}+\sigma_{e, m}^{2} \mathbf{R}_{e, m}^{H} \mathbf{R}_{e, m}+\mathbf{I} \end{aligned} \end{equation}\)        (6)

where \(\begin{equation} \mathbb{E}(\cdot) \end{equation}\) is the expectation operator; I is the identity matrix.

For the sake of communication quality, we expect the MSE of the evaluations of confidential signals to be as small as possible. Thus, in this paper, the linear MMSE receiver isselected as the RDC matrix [21-22], which can be calculated by taking a derivative withrespect to the MSE expression:

\(\begin{equation} \frac{d \mathbf{M S E}_{R X_{n}, T X_{n}}(\{\mathbf{T}\},\{\mathbf{\Gamma}\})}{d \mathbf{R}_{m}^{H}}=0 \end{equation}\)       (7)

As shown in (7), the RDC matrix depends on the set of TPC matrices. Therefore, in what follows, the main focus of our work is solving for the optimal TPC matrices.

3. TPC Design Method

For the purpose of maximizing the MSE difference between APs and Eve, we design the TPC matrices of APs and IPs separately. Firstly, to simplify the analysis, the TPC matrices of APs are solved while ignoring the interferences from IPs. Secondly, the TPC matrices of IPs aregenerated with the smallest possible impact on APs.

3.1 TPC Design Method of APs

In this section, we design the TPC matrices of APs by using the game theory, the main reasons are as follows. Firstly, the security performances of all the APs are assumed to be of equal importance, which is satisfied the conditions of a non-cooperative game. Secondly, as shown in (5), the MSE of each AP is determined by not only its TPC matrix but also TPC matrices of all other pairs. Thus, it is difficult to obtain the closed-form solution of the globaloptimal solution, which tries to minimize the sum-MSE of all APs, because of the high complexity of solving all TPC matrices synchronously. Conversely, after using game theory and asynchronous algorithm to simplify the expression, the closed-form solution of NE can be obtained at each iteration. Therefore, we formulate the problem as a non-cooperative game, in which all APs are regarded as competing players. Each player acts independently and simultaneously according to their own interests with no apriori knowledge of other players & rsquo;strategies. Specifically, we formulate the problem as follow:

Definition 1: Given a strategic form game \(\begin{equation} \mathcal{G}=\left(\mathcal{M},\left\{\mathcal{Q}_{m}\right\}_{m e \mathcal{M}},\left\{\mathcal{U}_{m}\right\}_{m \in \mathcal{M}}\right) \end{equation}\), an action profile  \(\begin{equation} \mathbf{T}^{\star} \in \mathcal{Q} \end{equation}\) is a pure-strategy NE of G if the following condition holds for all m∈M:

\(\begin{equation} \mathcal{U}_{m}\left(\mathbf{T}_{m}^{*}, \mathbf{T}_{-m}^{*}\right) \geq \mathcal{U}_{m}\left(\mathbf{T}_{m}, \mathbf{T}_{-m}^{*}\right), \forall \mathbf{T}_{m} \in \mathcal{Q}_{m} \end{equation}\)      (8)

where \(\begin{equation} \mathcal{M}=\{1,2, \ldots, M\} \end{equation}\) is the set of players; \(\begin{equation} \mathcal{Q}_{m} \end{equation}\) is a nonempty set of the available pure strategies for the mth player; Um is the utility function of the mth player. The existence of NE is proved in Appendix A.

According to the non-cooperative game, we define the utility function as (9). Anasynchronous algorithm, which is formally presented in Table 1, is proposed to obtain the NE solution.

\(\begin{equation} \mathcal{U}_{m}\left(\mathbf{T}_{m}^{\star}, \mathbf{T}_{-m}^{\star}\right)=\mathbf{M S E}_{\mathrm{T}_{x}, \mathrm{Eve}}-\mathbf{M S E}_{\mathrm{Tx}_{\mathrm{r}}, \mathrm{Rx}_{-}} \end{equation}\)      (9)

Table 1. Asynchronous Algorithm

 

To obtain the optimal solution of the utility function, the influences from IPs are ignored, then (5) and (6) can be transformed as:

\(\begin{equation} \mathbf{M S E}_{\mathrm{Tx}_{m}, \mathrm{Rx}_{m}}=\mathbf{R}_{m}^{H} \sum_{i=1}^{M} \mathbf{H}_{i m} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{R}_{m}-\mathbf{R}_{m}^{H} \mathbf{H}_{m m} \mathbf{T}_{m}-\mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H} \mathbf{R}_{m}+\sigma_{m}^{2} \mathbf{R}_{m}^{H} \mathbf{R}_{m}+\mathbf{I} \end{equation}\)       (11)

\(\begin{equation} \mathbf{M S E}_{\mathrm{Tx}_{m}, \mathrm{Eve}}=\mathbf{R}_{e, m}^{H} \sum_{i=1}^{M} \mathbf{H}_{i e} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{H}_{i e}^{H} \mathbf{R}_{e, m}-\mathbf{R}_{e, m}^{H} \mathbf{H}_{m e} \mathbf{T}_{m}-\mathbf{T}_{m}^{H} \mathbf{H}_{m e}^{H} \mathbf{R}_{e, m}+\sigma_{e, m}^{2} \mathbf{R}_{e, m}^{H} \mathbf{R}_{e, m}+\mathbf{I} \end{equation}\)       (12)

For secure communications, we ensure that the MSE of the signals from each AP decoded by Eve remains higher than a certain threshold. In detail, we set the minimum threshold of the MSE to an acceptable constant, any value greater than it will be considered as a representation of poor communication quality. Then, the optimization problem of utility function can beformulated as:

\( \mathbf{T}_{m}^{\star}=\arg \min _{\mathbf{T}_{m}} \operatorname{tr}\left(\mathbf{M S E}_{\mathrm{Tx}_{m}, \mathrm{Rx}_{m}}\right), \forall m \in\{1,2, \ldots, M\} s.t. $\operatorname{tr}\left(\mathbf{M S E}_{\mathrm{Tx}_{m}, \mathrm{Eve}}\right) \geq \varepsilon_{m}, \quad \forall m \in\{1,2, \ldots, M\}$ \left\|\mathbf{T}_{m}\right\|_{F}^{2} \leq p_{m}, \quad \forall m \in\{1,2, \dots, M\} \)       (13)

where \(\begin{equation} \mathbf{T}_{m}^{*} \end{equation}\) is the optimal solution obtained;\(\begin{equation} \|\cdot\|_{F} \end{equation}\) denotes the Frobenius norm of a matrix; \(\begin{equation} t r(\cdot) \end{equation} \)denotes the trace operator; \(\begin{equation} \varepsilon_{m} \end{equation}\) is the minimum threshold of MSE of the mth transmitter to Eve link; Pm is the maximum power constraint imposed on the mth transmitter. In fact, the increase of Pm will grow the signal-to-noise-ratio, which will finally decrease εm . Thus, Pm and εm are in inverse proportion, the mathematical proof of which is shown in Appendix B. As a result, once εm is fixed, the minimum of Pm is determined, and the optimization problem can besimplified by ignoring the transmitted power constraint.

To start with, according to (7) and (11), we calculate the RDC matrix of the mth AP as follow:

\(\begin{equation} \begin{aligned} \mathbf{R}_{m} &=\left(\mathbf{H}_{m m} \mathbf{T}_{m} \mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H}+\sum_{i \neq m}^{M} \mathbf{H}_{i m} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{H}_{i m}^{H}+\sigma_{m}^{2} \mathbf{I}\right)^{-1} \mathbf{H}_{m m} \mathbf{T}_{m} \\ &=\left(\mathbf{H}_{m m} \mathbf{T}_{m} \mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H}+\mathbf{\Phi}_{m}\right)^{-1} \mathbf{H}_{m m} \mathbf{T}_{m} \end{aligned} \end{equation}\)     (14)

where \(\begin{equation} \mathbf{\Phi}_{m}=\sum_{i \neq m}^{M} \mathbf{H}_{i m} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{H}_{i m}^{H}+\sigma_{m}^{2} \mathbf{I} \end{equation}\)

By substituting (14) into (11) and using the matrix inversion lemma, the MSE matrix issimplified as:

\(\begin{equation} \mathbf{M S E}_{\mathrm{Tx}_{m}, \mathrm{Rx}_{m}}=\mathbf{I}-\mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H}\left(\mathbf{H}_{m m} \mathbf{T}_{m} \mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H}+\mathbf{\Phi}_{m}\right)^{-1} \mathbf{H}_{m m} \mathbf{T}_{m}=\left(\mathbf{I}+\mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H} \mathbf{\Phi}_{m}^{-1} \mathbf{H}_{m m} \mathbf{T}_{m}\right)^{-1} \end{equation}\)       (15)

Similarly, the MSE matrix of the mth transmitter to Eve link is as follow:

\(\begin{equation} \mathbf{M S E}_{\mathrm{Tx}_{n}, \mathrm{Eve}}=\left(\mathbf{I}+\mathbf{T}_{m}^{H} \mathbf{H}_{m e}^{H} \mathbf{\Phi}_{e, m}^{-1} \mathbf{H}_{m e} \mathbf{T}_{m}\right)^{-1} \end{equation}\)       (16)

where \(\begin{equation} \mathbf{\Phi}_{e, m}=\sum_{i \neq m}^{M} \mathbf{H}_{i e} \mathbf{T}_{i} \mathbf{T}_{i}^{H} \mathbf{H}_{i e}^{H}+\sigma_{e, m}^{2} \mathbf{I} \end{equation}\) 

Then, the optimization problem in (13) can be transformed as:

\(\begin{equation} \mathbf{T}_{m}^{\star}=\arg \min _{\mathbf{T}_{m}} \operatorname{tr}\left(\mathbf{I}+\mathbf{T}_{m}^{H} \mathbf{H}_{m m}^{H} \mathbf{\Phi}_{m}^{-1} \mathbf{H}_{m m} \mathbf{T}_{m}\right)^{-1} \end{equation}\)       (17)

\(\begin{equation} \text { s.t. } \operatorname{tr}\left(\mathbf{I}+\mathbf{T}_{m}^{H} \mathbf{H}_{m e}^{H} \mathbf{\Phi}_{e, m}^{-1} \mathbf{H}_{m e} \mathbf{T}_{m}\right)^{-1} \geq \varepsilon_{m}, \quad \forall m \in\{1,2, \ldots, M\} \end{equation}\)

To simplify analysis, we note that \(\begin{equation} \mathbf{H}_{m n n}^{H} \mathbf{\Phi}_{m}^{-1} \mathbf{H}_{m m} \text { and } \mathbf{H}_{m e}^{H} \mathbf{\Phi}_{e, m}^{-1} \mathbf{H}_{m e} \end{equation}\) are two Hermite matrices, which can be diagonalized by a non-singular matrix C at the same time [23].

\(\begin{equation} \left\{\begin{array}{l} {\mathbf{C}^{H} \mathbf{H}_{m m}^{H} \mathbf{\Phi}_{m}^{-1} \mathbf{H}_{m m} \mathbf{C}=\mathbf{\Lambda}_{m}=\operatorname{diag}\left(\gamma_{m, i}\right)} \\ {\mathbf{C}^{H} \mathbf{H}_{m e}^{H} \mathbf{\Phi}_{e, m}^{-1} \mathbf{H}_{m e} \mathbf{C}=\mathbf{\Lambda}_{e m}=\operatorname{diag}\left(\gamma_{e m, i}\right)} \end{array}\right. \end{equation}\)       (18)

where \(\begin{equation} \gamma_{m, i} \geq 0, \gamma_{e, i} \geq 0, \forall i \in\{1,2, \ldots, d\} ; \operatorname{diag}\left(\gamma_{m, i}\right) \text { and } \operatorname{diag}\left(\gamma_{e m, i}\right) \end{equation}\) are diagonal matrices, the coefficients of which are \(\begin{equation} \gamma_{m, i} \text { and } \gamma_{e m, i} \end{equation}\).

In [24], the optimal TPC matrix in MIMO wiretap channel with secrecy constraints is proved to follow the diagonal structure as follow:

\(\begin{equation} \mathbf{T}_{m}=\mathbf{C} \operatorname{diag}(\sqrt{\varphi_{m, i}}) \end{equation}\)       (19)

where \(\begin{equation} \varphi_{m, i} \geq 0, \forall i \in\left\{1,2, \ldots, d_{m}\right\} \end{equation}\) , the problem in (17) can be simplified as:

\( \mathbf{T}_{m}^{\star}=\underset{\mathbf{T}_{m}}{\arg \min } \sum_{i=1}^{d_{m}}\left(1+\gamma_{m, i} \varphi_{m, i}\right)^{-1} \\ s.t. $\sum_{i=1}^{d_{m}}\left(1+\gamma_{m e, i} \varphi_{m, i}\right)^{-1} \geq \varepsilon_{m}, \quad \forall m \in\{1,2, \ldots, M\}\)       (20)

However, the utility function in (20) is non-convex. Thus, we use a one-to-one mapping \(\begin{equation} \varphi_{m, i}^{\prime}=\left(1+\gamma_{m e, \mathscr{I}} \varphi_{m, i}\right)^{-1} \end{equation}\) to transform it into a standard convex form. By substituting \(\begin{equation} \varphi_{m, i}^{\prime}=\left(1+\gamma_{m e, \mathscr{I}} \varphi_{m, i}\right)^{-1} \end{equation}\) into (20), we have:

\(\begin{equation} \begin{array}{l} {\mathbf{T}_{m}^{\star}=\underset{\mathbf{T}_{m}}{\arg \min } \sum_{i=1}^{d_{m}} \frac{\varphi_{m, i}^{\prime}}{\varphi_{m, i}^{\prime}\left(1-\frac{\gamma_{m, i}}{\gamma_{e m, i}}\right)+\frac{\gamma_{m, i}}{\gamma_{e m, i}}}} \\ {\text { s.t. } \sum_{i=1}^{d_{m}} \varphi_{m, i}^{\prime} \geq \varepsilon_{m}, \quad \forall m \in\{1,2, \ldots, M\}} \\ {0 \leq \varphi_{m, i}^{\prime} \leq 1, \forall m \in\{1,2, \ldots, M\}} \end{array} \end{equation}\)       (21)

The Lagrangian function of (21) is as follow:

\(\begin{equation} \begin{aligned} L\left(\mathbf{T}_{m}, \mathbf{R}_{m}, \mu_{m}, \lambda_{m}\right)=& \sum_{i=1}^{d_{m}} \frac{\varphi_{m, i}^{\prime}}{\varphi_{m, i}^{\prime}\left(1-\frac{\gamma_{m, i}}{\gamma_{e m, i}}\right)+\frac{\gamma_{m, i}}{\gamma_{e m, i}}}+\lambda_{m}\left[\varepsilon_{m}-\varphi_{m, i}^{\prime}\right] \\ &+\mu_{m}\left(0-\varphi_{m, i}^{\prime}\right)+\mu_{m}^{\prime}\left(\varphi_{m, i}^{\prime}-1\right) \end{aligned} \end{equation}\)       (22)

where \(\begin{equation} \lambda_{m}, \mu_{m} \text { and } \mu_{m}^{\prime} \end{equation}\) are the Lagrange multipliers. Since it is convex, at the optimal point, the Karush-Kuhn-Tucker (KKT) conditions must be satisfied, which are given by: Stationarity:

\(\begin{equation} \frac{\partial L\left(\mathbf{T}_{m}, \mathbf{R}_{m}, \mu_{m}, \lambda_{m}\right)}{\partial \varphi_{m, i}^{\prime}}=0 \Rightarrow \frac{\frac{\gamma_{m, i}}{\gamma_{e m, i}}}{\left[\varphi_{m, i}^{\prime}\left(1-\frac{\gamma_{m, i}}{\gamma_{e m, i}}\right)+\frac{\gamma_{m, i}}{\gamma_{e m, i}}\right]^{2}}=\lambda_{m}+\mu_{m}-\mu_{m}^{\prime} \end{equation}\)       (23)

Primal Feasibility:

\(\begin{equation} \varepsilon_{m}-\varphi_{m, i}^{\prime} \leq 0 \end{equation}\)       (24)

\(\begin{equation} 0-\varphi_{m, i}^{\prime} \leq 0 \end{equation}\)       (25)

\(\begin{equation} \varphi_{m, i}^{\prime}-1 \leq 0 \end{equation}\)       (26)

Dual Feasibility:

\(\begin{equation} \lambda_{m} \geq 0 \end{equation}\)       (27)

\(\begin{equation} \mu_{m} \geq 0 \end{equation}\)       (28)

\(\begin{equation} \mu_{m}^{\prime} \geq 0 \end{equation}\)       (29)

Complementary Slackness:

\(\begin{equation} \lambda_{m}\left[\varepsilon_{m}-\varphi_{m, i}^{\prime}\right]=0 \end{equation}\)       (30)

\(\begin{equation} \mu_{m}\left(0-\varphi_{m, i}^{\prime}\right)=0 \end{equation}\)       (31)

\(\begin{equation} \mu_{m}^{\prime}\left(\varphi_{m, i}^{\prime}-1\right)=0 \end{equation}\)         (32)

Combining (23)-(32), the optimal solution is given by:

\(\begin{equation} \left\{\begin{array}{c} {\varphi_{m, i}^{\prime}=1, \frac{\gamma_{m, i}}{\gamma_{e m, i}} \leq \lambda_{m}} \\ {\varphi_{m, i}^{\prime}=\left(\sqrt{\frac{\gamma_{m, i} \gamma_{e m, i}}{\lambda_{m}}}-\gamma_{m, i}\right) /\left(\gamma_{e m, i}-\gamma_{m, i}\right), \frac{\gamma_{m, i}}{\gamma_{e m, i}}<\lambda_{m}<\frac{\gamma_{e m, i}}{\gamma_{m, i}}} \\ {\varphi_{m, i}^{\prime}=0, \frac{\gamma_{e m, i}}{\gamma_{m, i}} \geq \lambda_{m}} \end{array}\right. \end{equation}\)       (33)

 

Consequently, the allocation of \(\begin{equation} \varphi_{m, i} \end{equation}\) can be derivable from (33):

\(\begin{equation} \left\{\varphi_{m, i}=(\sqrt{\frac{\gamma_{m, i}}{\lambda_{m} \gamma_{e n, i}}}-1) /\left(\gamma_{m, i}-\gamma_{e m, i} \sqrt{\frac{\gamma_{m, i}}{\lambda_{m} \gamma_{e m, i}}}\right), \frac{\gamma_{e m, i}}{\gamma_{m, i}}<\lambda_{m}<\frac{\gamma_{m, i}}{\gamma_{e m, i}}\right. \end{equation}\)       (34)

Obviously, (34) is a piecewise function which is segmented by mλ . And mλ can be derived by substituting (33) into (30):

\(\begin{equation} \sqrt{\lambda_{m}}=\left(\sum_{i=1}^{n_{e c t}} \frac{\sqrt{\gamma_{m, i} \gamma_{e m, i}}}{\gamma_{e m, i}-\gamma_{m, i}}\right) /\left(\sum_{i=1}^{n_{e x}} \frac{\gamma_{m, i}}{\gamma_{e m, i}-\gamma_{m, i}}+\varepsilon_{m}-n_{\text {inact}}\right) \end{equation}\)        (35)

where \(\begin{equation} n_{a c t} \text { and } n_{\text {inact}} \end{equation}\) are the number of active data streams (where ,\(\begin{equation} 0<\varphi_{m, i}<\infty \end{equation}\)) and inactivedata streams (\(\begin{equation} \text { where } \varphi_{m, i}=0 \end{equation}\) ), respectively.

By substituting (34) into (35), we can obtain the solution of ,\(\begin{equation} \varphi_{m, i} \end{equation}\). But the expression of \(\begin{equation} \lambda_{m} \end{equation}\)consists of \( n_{\text {inact }}\) , which is related to \(\begin{equation} \varphi_{m, i} \cdot \mathrm{So}, \varphi_{m, i} \text { and } \lambda_{m} \end{equation}\) depend on each other. To solve them, value of \(n_{\text {inact }}\) must by obtained firstly. Therefore, we propose a searching algorithm tosearch \(n_{\text {inact }}\) by comparing λm to boundary conditions in (34). Specifically, we rearrange the values of \(\begin{equation} \frac{\gamma_{m, i}}{\gamma_{e m, i}} \end{equation}\) in a decreasing order, i.e. , ,\(\begin{equation} \frac{\gamma_{m, 1}}{\gamma_{e m, 1}}>\frac{\gamma_{m, 2}}{\gamma_{e m, 2}}>\ldots>\frac{\gamma_{m, d_{m}}}{\gamma_{e m, d_{m}}} \end{equation}\). After that, λm is compared to \(\begin{equation} \frac{\gamma_{m, d_{m}}}{\gamma_{e m, d_{m}}} \end{equation}\), and if \(\begin{equation} \frac{\gamma_{e m, d_{m}}}{\gamma_{m, d_{m}}}<\lambda_{m}<\frac{\gamma_{m, d_{m}}}{\gamma_{e m, d_{m}}} \end{equation}\)  is satisfied, \(\begin{equation} \frac{\gamma_{e m, 1}}{\gamma_{m, 1}}<\lambda_{m}<\frac{\gamma_{m, 1}}{\gamma_{e m, 1}} \end{equation}\) is also satisfied. If it is not, we will continue to compare the \(\begin{equation} \lambda_{m} \text { to } \frac{\gamma_{m, d_{m}-1}}{\gamma_{e m, d_{m}-1}} \end{equation}\) until the right  \( n_{\text {inact }}\) is obtained. The searching algorithm is summarized in Table 2. To ensure the existence of the solution of this algorithm, two conditions should be satisfied. Firstly\(\begin{equation} \frac{\gamma_{e m, i}}{\gamma_{m, i}} \leq \frac{\gamma_{m, i}}{\gamma_{e m, i}} \end{equation}\) should be satisfied to ensure the interval \(\begin{equation} \left(\frac{\gamma_{e m, i}}{\gamma_{m, i}}, \frac{\gamma_{m, i}}{\gamma_{e m, i}}\right) \end{equation}\) non-empty. Secondly, the right-hand side in (35) must be positive. Tosum up the discussion, following condition should be satisfied:

\(\begin{equation} \begin{aligned} \sqrt{\frac{\gamma_{m, i}}{\gamma_{e m, i}}} \sum_{i=1}^{n_{w}} \frac{\sqrt{\gamma_{m, i} \gamma_{e m, i}}}{\gamma_{e m, i}-\gamma_{m, i}}-\sum_{i=1}^{n_{m}} & \frac{\gamma_{m, i}}{\gamma_{e m, i}-\gamma_{m, i}}+n_{m a c t}<\varepsilon_{m} \\ <& \sqrt{\frac{\gamma_{c m, i}}{\gamma_{m, i}}} \sum_{i=1}^{n_{m}} \frac{\sqrt{\gamma_{m, i} \gamma_{e m, i}}}{\gamma_{e m, i}-\gamma_{m, i}}-\sum_{i=1}^{n_{m}} \frac{\gamma_{m, i}}{\gamma_{e m, i}-\gamma_{m, i}}+n_{m a c t} \end{aligned} \end{equation}\)       (36)

Table 2. TPC Generation Algorithm of APs 

 

3.2 TPC Design Method of IPs

In this section, TPC matrices of IPs are designed to improve the security performance of APs, which is reflected by the MSE difference between APs and Eve. According to (5), ANs from IPs will increase the MSE of the mth AP by \(\begin{equation} \mathbf{R}_{m}^{H} \sum_{n=1}^{N} \mathbf{H}_{n m} \mathbf{\Gamma}_{n} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{n m}^{H} \mathbf{R}_{m} \end{equation}\) . In traditional zero-forcing method, this term is completely eliminated by setting the TPC matrix Γn in the null space of \(\begin{equation} \mathbf{H}_{n m} \end{equation}\). However, if the transmitters and receivers make use of the same number of antennas, the null space is not existent. Thus, we can only reduce the impact from AN as muchas possible by design Γn reasonably. Specifically, we expect that ANs from each IP will maximize the difference between the sum-MSE of signals from all APs decoded by Eve and the sum-MSE of APs, which can be formulated as an optimization problem as follow:

\( \mathbf{\Gamma}_{n}^{*}=\underset{\mathbf{\Gamma}_{n}}{\arg \max } \operatorname{tr}\left(\sum_{m=1}^{M} \mathbf{R}_{e, m}^{H} \mathbf{H}_{n e} \mathbf{\Gamma}_{n} \mathbf{\Gamma}_{n}^{H} \mathbf{R}_{e, m}-\sum_{m=1}^{M} \mathbf{R}_{m}^{H} \mathbf{H}_{n m} \mathbf{\Gamma}_{n} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{m n}^{H} \mathbf{R}_{m}\right)\\ s.t. \left\|\mathbf{\Gamma}_{n}\right\|_{F}^{2} \leq P_{n}\)       (37)

where Pn is the maximum power of the transmitter of nth IP.

Using the properties of trace \(\begin{equation} \operatorname{tr}\left(\mathbf{A} \mathbf{A}^{H}\right)=\operatorname{tr}\left(\mathbf{A}^{H} \mathbf{A}\right) \end{equation}\) , we rewrite the MSE expressions as:

\(\begin{equation} \left\{\begin{array}{l} {\operatorname{tr}\left(\sum_{m=1}^{M} \mathbf{R}_{m}^{H} \mathbf{H}_{m m} \mathbf{\Gamma}_{n} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{n m}^{H} \mathbf{R}_{m}\right)=\operatorname{tr}\left(\sum_{m=1}^{M} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{n m}^{H} \mathbf{R}_{m} \mathbf{R}_{m}^{H} \mathbf{H}_{n m} \mathbf{\Gamma}_{n}\right)} \\ {\operatorname{tr}\left(\sum_{m=1}^{M} \mathbf{R}_{e, m}^{H} \mathbf{H}_{n e} \mathbf{\Gamma}_{n} \mathbf{\Gamma}_{n e}^{H} \mathbf{R}_{e, m}\right)=\operatorname{tr}\left(\sum_{m=1}^{M} \mathbf{\Gamma}_{n}^{H} \mathbf{H}_{n e}^{H} \mathbf{R}_{e, m} \mathbf{R}_{e, m}^{H} \mathbf{H}_{n e} \mathbf{F}_{n}\right)} \end{array}\right. \end{equation}\)       (38)

Similar to the mathematical manipulation in section 3.1, \(\begin{equation} \mathbf{H}_{n m}^{H} \mathbf{R}_{m} \mathbf{R}_{m}^{H} \mathbf{H}_{m n} \text { and } \mathbf{H}_{n e}^{H} \mathbf{R}_{e, m} \mathbf{R}_{e, m}^{H} \mathbf{H}_{n e} \end{equation}\)are diagonalized synchronously by a non-singular matrix U , and The TPC matrix of the nth IP can be formulated according to (39) and (40).

\(\begin{equation} \left\{\begin{array}{c} {\mathbf{U}^{H} \mathbf{H}_{n m}^{H} \mathbf{R}_{m} \mathbf{R}_{m}^{H} \mathbf{H}_{m n} \mathbf{U}=\mathbf{\Lambda}_{n}=\operatorname{diag}\left(\delta_{n, i}\right)} \\ {\mathbf{U}^{H} \mathbf{H}_{n e}^{H} \mathbf{R}_{e, m} \mathbf{R}_{e, m}^{H} \mathbf{H}_{n e} \mathbf{U}=\mathbf{\Lambda}_{e n}=\operatorname{diag}\left(\delta_{e n, i}\right)} \end{array}\right. \end{equation}\)       (39)

\(\begin{equation} \Gamma_{n}=\mathbf{U} \operatorname{diag}(\sqrt{\omega_{n, i}}) \end{equation}\)       (40)

where \(\begin{equation} \delta_{n, i} \geq 0, \delta_{e n, i} \geq 0, \omega_{i} \geq 0, \forall i \in\{1,2, \ldots, d\} \end{equation}\).

Then, the optimization problem in (37) is simplified as:

\(\begin{equation} \begin{aligned} \mathbf{\Gamma}_{n}^{*} &=\underset{\mathbf{\Gamma}_{n}}{\arg \max } \sum_{i=1}^{n}\left(\delta_{e n, i}-\delta_{n, i}\right) \omega_{n, i}, \forall n \in\{1,2, \ldots, N\} \\ \text { s.t. } & \sum_{i=1}^{d} \omega_{n, i} \leq P_{n}, \quad \forall n \in\{1,2, \ldots, N\} \\ & \omega_{n, i} \geq 0, \forall i \in\{1,2, \ldots, d\} \end{aligned} \end{equation}\)       (41)

where ,\(\begin{equation} \omega_{n, i} \end{equation}\) is the power of the ith data stream.

Obviously, it is a linear programming problem, and among\(\begin{equation} \left\{\left(\delta_{e n, i}-\delta_{n, i}\right) \omega_{n, i}\right\} \end{equation}\), the one with the largest coefficient will be allocated with all the transmitted power. If coefficients of all datastreams are negative, the equivalent channels between the nth IP and APs are worse than that between the nth IP and Eve, and \(\begin{equation} \left\{\omega_{n, i}\right\} \end{equation}\)will be set to zero. The pseudo-codes are summarized in Table 3.

Table 3. TPC Generation Algorithm of IPs 

 

4. Simulation Analysis

In this section, we provide numerical results to examine the effectiveness of the proposed algorithm. Specifically, we consider a MIMO interference network with five legitimatetransmitter-receiver pairs and an Eve. Each legitimate transmitter-receiver pairs may be active or inactive. In the network, all the transmitters and receivers are equipped with 3 antennas, and the channels are 3×3 dimension. The elements of all channel matrices are assumed to be i.i.d. zero-mean unit-variance complex-valued Gaussian random variables, i.e. \(\begin{equation} \mathcal{C N}(0,1) \end{equation}\) . The power of background noise is assumed to be the same for all APs and Eve, i.e.\(\begin{equation} \delta_{m}^{2}=\delta_{e}^{2}=1 \end{equation}\) . For each scenario below, we randomly generate 500 channel realizations, and any conclusion is the arithmetic mean of 500 trials. The simulation runs on a computer equipped with a 2.30GHz dual-core CPU and 8 gigabytes of memory.

4.1 Convergence performance

In the network we considered, there is no difference among the APs statistically. Therefore, without any loss of generality, we use the performance of the 1st AP to reflect other APs. Forsecure communications, we ensure the MSE between every AP and Eve is bigger than 2, i.e. \(\begin{equation} \varepsilon_{1}=\varepsilon_{2}=\ldots=\varepsilon_{M}=2, \forall m \in\{1,2, \ldots, M\} \end{equation}\) . Then the joint transceivers of APs are solved according to section 3.1. And we select the Minimum Total MSE (MT-MSE) algorithm in [13] which pursues global optimality as a comparison. Fig. 2. Shows the MSE performance of two algorithms with increasing iteration number in networks with different number of APs. We observe that MSE values of two algorithms are convergent over iterations, and the final MSEvalues are very close. This can be explained by that the channels of all APs are independentidentically distributed, and the NE solution and global optimality solution are similar. However, MSE of the NE algorithm is falling faster. As shown in Table 4, MT-MSE algorithm takes more CPU time at each iteration, and it is sharply increased with the number of APs increasing. Conversely, for NE algorithm, average CPU time at each iteration is increased slightly. This mainly because that the closed-form solution can be obtained at each iteration by using NE algorithm. Conversely, MT-MSE leads to approximately solution at each iteration. So NE algorithm has lower complexity and faster convergence speed.

Table 4. Iteration and CPU time of NE and MT-MSE algorithm

 

 

Fig. 2. MSE performance of the 1st transmitter to the 1st receiver link

4.2 Security Performance

Without the help of IPs, the MSE performance in networks of the number from 2 to 4 APs are simulated. As shown in Fig. 3, the MSE of the 1st AP decreases with the transmitted powerincreasing. We note that the final MSE of the 1st AP is in proportion to the total number of APs. This can be explained by that the mutual interferences are more serious in the networks of more APs. Furthermore, the final MSE is smaller than the MSE of the 1st transmitter to Evelink, the minimum threshold of which is set to 2. Therefore, the secure communications of the 1st AP is achieved. Moreover, we note that the MSE of the 1st AP is larger than 2 whentransmitted power is insufficient. In such case, since the transmitted power is small, the MSE of both legitimate receivers and Eve is higher than 2, and the secrecy constraint in (24) is failed to achieve. Therefore, enough transmitted power should be provided in practical application.

 

Fig. 3. MSE performance of the 1st transmitter to the 1st receiver link

Next, we enable the IPs in the network and Fig. 4 show the MSE performance of the 1st AP in different scenarios. As expected, the MSE of the 1st transmitter to Eve link is remarkably increased with the increase of transmitted power of IPs while MSE of the 1st transmitter to the 1st receiver link is scarcely increased. Moreover, the MSE of the 1st transmitter to Eve linkgrows faster when the proportion of IPs in the network increases. This can be explained by two primary reasons. Firstly, with the number of cooperative jammers increasing, the total power of AN is increased, which will interfere Eve more effectively. Secondly, each IP allocates the power of AN for the benefit of all APs according to (41). The data stream selected may not bethe optimal choice for some APs. If IPs are sufficient, this defect can be remedied efficiently.

Fig. 4. MSE performance of the 1st transmitter to the 1st receiver link with cooperative jammers

5. Conclusion

In this paper, we investigated the joint transceiver design for secure communications in MIMO interference networks. In order to make full use of communication nodes, legitimatetransmitter-receiver pairs have been divided into different categories of active and inactive. IPs served as cooperative jammers and sent ANs to enhance the security performance of APs. Specifically, we designed the security strategies of APs and IPs based on maximizing the MSEdifference between APs and Eve. Firstly, the optimization problem of TPC matrices of APshas been formulated as a non-cooperative game, and the NE solution has been solved by anasynchronous algorithm. Then, the TPC matrices of IPs were designed following the principleminimizing the impact on APs. The simulation results demonstrated that our securitystrategies can effectively increase the MSE difference between APs and Eve. The proposed asynchronous algorithm was also confirmed to have faster convergence speed compared to aniterative algorithm pursuing global optimality.

Appendix A. Proof of the Existence and uniqueness of Nash Equilibrium

In [25], Nash demonstrated the existence of equilibrium points in n-person games by Kakutani’s fixed-point theorem.

Theorem 1 Kakutani’s fixed-point theorem: Given \(\begin{equation} \mathrm{X} \subseteq \mathbb{R}^{n}, \text { let } \mathrm{S}(x): \mathrm{X} \ni x \rightarrow \mathrm{S}(x) \subseteq \mathrm{X} \end{equation}\) be a multifunction. Suppose that the following hold:

(a) X is a nonempty, compact and convex set;

(b) \(S( x)\) is a convex-valued correspondence and has a closed graph.

Then, there exists a fixed point of \(S( x)\) .

For classical n-person games, assumption (b) of Theorem 1 can be simplified into two sufficient conditions [26-27].

Theorem 2 Existence of NE: Consider a strategic form \(\begin{equation} \mathcal{G}=\left(\mathcal{M},\left\{\mathcal{Q}_{m}\right\}_{m \in \mathcal{M}},\left\{\mathcal{U}_{m}\right\}_{m \in \mathcal{M}}\right) \end{equation}\) , where M is a finite set. Suppose that:

(a) Each \(\begin{equation} \mathcal{Q}_{m} \end{equation}\) is a non-empty, compact and convex subset of a finite-dimensional Euclideanspace;

(b) One of the two following conditions holds

(1) Each utility function \(\begin{equation} \mathcal{U}_{m}\left(\mathbf{T}_{m}, \mathbf{T}_{-m}\right) \end{equation}\) is continuous on \(\begin{equation} \mathcal{Q} \end{equation}\), and for any given \(\begin{equation} \mathbf{T}_{-m} \in \mathcal{Q}_{m} \end{equation}\) , itis quasi-concave on \(\begin{equation} \mathcal{Q}_{m} \end{equation}\) ;

(2) Each utility function \(\begin{equation} \mathcal{U}_{m}\left(\mathbf{T}_{m}, \mathbf{T}_{-m}\right) \end{equation}\) is continuous on \(\begin{equation} \mathcal{Q} \end{equation}\), and for any given \(\begin{equation} \mathbf{T}_{-m} \in \mathcal{Q}_{m} \end{equation}\) , the following optimization problem 

 \(\begin{equation} \max \mathcal{U}_{m \atop \mathrm{T}_{\mathrm{rel}}=e_{0}}\left(\mathbf{T}_{m}, \mathbf{T}_{-m}\right) \end{equation}\)       (42)

admits a unique optimal solution.

 Then, game \(G\) admits a pure-strategy NE.

Here, the proof of existence of NE algorithm we proposed is given as follow:

Proof:

According to (19), the TPC matrix of the mth transmitter is transformed into the product of a constant matrix and a diagonal matrix. Due to the power constraint, coefficients of the diagonal matrix are follow \(\varphi_{i} \in\left[0, p_{i}\right], \quad \forall i \in\{1,2, \ldots, N\}\) , which means Qm is bounded. Moreover, Qm is a nonempty, compact and convex subset of a N-dimensional Euclidean space. Thus, Theorem 2 (a) is satisfied.

According to (21), the utility function  \(\begin{equation} \mathcal{U}_{m}\left(\mathbf{T}_{m}, \mathbf{T}_{-m}\right) \end{equation}\) is continuous and convex. And the closed-form solution of the optimization problem (21) is given by (34), which means the solution is unique and optimal. Therefore, Theorem 2 (b.2) is satisfied. And the existence of NE is proved

Appendix B. Proof of the Inverse Correlation between MSE and Transmitted Power

Proposition 1: the minimum threshold of power constraint\(\begin{equation} P_{m, \mathrm{min}} \end{equation}\) is inversely proportional to the MSE constraint εm.

Proof: According to (35), we have \(\begin{equation} \varepsilon_{m}=\sqrt{\frac{1}{\lambda_{m}}} \alpha-\beta+n_{\text {inact}} \end{equation}\), where ,\(\begin{equation} \alpha=\sum_{i=1}^{n_{e c t}} \frac{\sqrt{\gamma_{m, i} \gamma_{e m, i}}}{\gamma_{e m, i}-\gamma_{m, i}}<0 \end{equation}\)\(\begin{equation} \beta=\sum_{i=1}^{n_{e x}} \frac{\gamma_{m, i}}{\gamma_{e m, i}-\gamma_{m, i}}<0, \text { and } \lambda_{m}>0 \end{equation}\)

Take the derivative of it with respect to λm , we have \(\begin{equation} \frac{d \varphi_{m, j}}{d \lambda_{m}}=\frac{-\frac{1}{2} \sqrt{\frac{\gamma_{m, i}}{\lambda_{m} \lambda_{e i}}}\left(\gamma_{m, i}-\gamma_{e m, i}\right)}{\left(\gamma_{m, i}-\gamma_{e m, i} \sqrt{\frac{\gamma_{m, i}}{\lambda_{m} \gamma_{m, i}}}\right)^{2}}<0 \end{equation}\), which means that εm is in direct proportion to λm .

Take the derivative of (34) with respect to λm , we have \(\begin{equation} \frac{d \varphi_{m, i}}{d \lambda_{m}}=\frac{-\frac{1}{2} \sqrt{\frac{\gamma_{m, i}}{\lambda_{m} \lambda_{e i}}}\left(\gamma_{m, i}-\gamma_{e m, i}\right)}{\left(\gamma_{m, i}-\gamma_{e m, i} \sqrt{\frac{\gamma_{m, i}}{\lambda_{m} \gamma_{e m, i}}}\right)^{2}}<0 \end{equation}\), which means that ,\(\begin{equation} \varphi_{m, i} \end{equation}\) is in direct proportion to λm .

In conclusion, ,\(\begin{equation} \varphi_{m, i} \end{equation}\) is in inversely proportion to \(\begin{equation} \mathcal{E}_{m} \end{equation}\) and \(\begin{equation} p_{m, \min }=\sum_{i} \varphi_{m, i}, \text { thus } p_{m, \min } \end{equation}\) is ininversely proportional to the security constraint \(\begin{equation} \mathcal{E}_{m} \end{equation}\) .

참고문헌

  1. D. Maamari, D. Tuninetti, N. Devroye, "Multi-user Cognitive Interference Channels: A Survey and New Capacity Results," IEEE Transactions on Cognitive Communication & Networking, vol. 1, no. 1, pp. 29-44, 2017. https://doi.org/10.1109/TCCN.2015.2488633
  2. F. Liu and H. Koenig, "A survey of video encryption algorithms," Computers & Security, vol. 29, no. 1, pp. 3-15, 2010. https://doi.org/10.1016/j.cose.2009.06.004
  3. Z. Wang, X. Pang, Y. Chen, et al, "Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server," in Proc. of IEEE Transactions on Mobile Computing, pp. 1-1, 2018.
  4. W. Harrison, J. Almeida, M. Bloch, et al, "Coding for Secrecy :An overview of error-control coding techniques for physical-layer security," IEEE Signal Processing Magazine, vol. 30. no. 5, pp. 41-50, 2013. https://doi.org/10.1109/MSP.2013.2265141
  5. M. Bloch, M. Hayashi, A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy," Proceedings of the IEEE, vol. 103, no. 10, pp. 1725-1746, 2015. https://doi.org/10.1109/JPROC.2015.2463678
  6. A. Mukherjee, S. Fakoorian, J. Huang, et al, "Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey," IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550-1573, 2014. https://doi.org/10.1109/SURV.2014.012314.00178
  7. V. Singh, A. Chaturvedi, "Statistically Robust Transceiver Design Algorithms for Relay aided MIMO Interference Systems," IET Signal Processing, vol. 12, no. 1, pp. 51-63, 2018. https://doi.org/10.1049/iet-spr.2017.0054
  8. X. Chen, D. Ng, W. Gerstacker, et al, "A Survey on Multiple-Antenna Techniques for Physical Layer Security," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, 1027-1053, 2017. https://doi.org/10.1109/COMST.2016.2633387
  9. Q. Li, W. Ma, D. Han. "Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming," IEEE Journal of Selected Topics in Signal Processing, vol. 10, no. 8, pp. 1359-1374, 2016. https://doi.org/10.1109/JSTSP.2016.2603970
  10. Q. Shi, W. Xu, J. Wu, et al, "Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer," IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp. 2841-2853, 2014. https://doi.org/10.1109/TWC.2015.2395414
  11. X. Gong, H. Long, H. Yin, et al, "Robust amplify-and-forward relay beamforming for security with mean square error constraint," IET Communications, vol. 9, no. 8, pp. 1081-1087, 2015. https://doi.org/10.1049/iet-com.2014.1112
  12. L. Jiang, H. Tian, C. Qin, et al, "Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks," IEEE Communications Letters, vol. 20, no. 3, pp. 522-525, 2016. https://doi.org/10.1109/LCOMM.2016.2514353
  13. Z. Kong, S. Yang, F. Wu, et al, "Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels," IEEE Transactions on Information Forensics & Security, vol. 11, no. 3, pp. 594-608, 2017. https://doi.org/10.1109/TIFS.2015.2493888
  14. H. Shen, B. Li, M. Tao, et al, "MSE-Based Transceiver Designs for the MIMO Interference Channel," IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3480-3489, 2010. https://doi.org/10.1109/TWC.2010.091510.091836
  15. S. Huang, L. Zhu, S. Liu, "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network," Eurasip Journal on Wireless Communications & Networking. 2018.
  16. I. Stanojev, A. Yener, "Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming," IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 134-145, 2013. https://doi.org/10.1109/TWC.2012.120412.112001
  17. J. Yang, I. Kim, I. Dong, "Power-Constrained Optimal Cooperative Jamming for Multiuser Broadcast Channel," IEEE Wireless Communications Letters, vol. 2, no. 4, pp. 411-414, 2013. https://doi.org/10.1109/WCL.2013.050613.130216
  18. P. Siyari, M. Krunz, D. Nguyen, "Price-based Friendly Jamming in a MISO Interference Wiretap Channel," in Proc. of The 35th Ann. IEEE Conf. on 35th Computer Communications, pp. 1-9, 2016.
  19. P. Siyari, M. Krunz, D. Nguyen, "Joint transmitter- and receiver-based friendly jamming in a MIMO wiretap interference network," in Proc. of 2017 IEEE Int. Conf. on Communications Workshops. pp. 1323-1328, 2017.
  20. P. Siyari, M. Krunz, D. Nguyen, "Friendly Jamming in a MIMO Wiretap Interference Network: A Nonconvex Game Approach," IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 601-614, 2017. https://doi.org/10.1109/JSAC.2017.2659580
  21. C. Zhong, T. Ratnarajah, Z. Zhang, et al, "Performance of Rayleigh-Product MIMO Channels with Linear Receivers," IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2270-2281, 2014. https://doi.org/10.1109/TWC.2014.031314.131478
  22. M. Razaviyayn, M. Sanjabi, Z. Luo, "Linear Transceiver Design for Interference Alignment: Complexity and Computation," IEEE Transactions on Information Theory, vol. 58, no. 5, pp. 2896-2910, 2012. https://doi.org/10.1109/TIT.2012.2184909
  23. M. Pei, L. Wang, D. Ma, "Linear MMSE Transceiver Optimization for General MIMO Wiretap Channels with QoS Constraints," in Proc. of 2013 IEEE/CIC Int. Conf. Communications in China, pp. 259-263, 2013.
  24. M. Rodrigues, P. Almeida, "Filter Design with Secrecy Constraints: The Degraded Parallel Gaussian Wiretap Channel," in Proc. of 2008 IEEE Global Telecommunications Conf., pp. 1-5, 2008.
  25. J. Nash, "Equilibrium Points in n-Person Games," Proceedings of the National Academy of Sciences of the United States of America, vol. 36, no. 1, pp. 48-49, 1950. https://doi.org/10.1073/pnas.36.1.48
  26. J. Rosen, "Existence and Uniqueness of Equilibrium Points for Concave N-Person Games," Econometrica, vol. 33, no. 3, pp. 520-534, 1965. https://doi.org/10.2307/1911749
  27. G. Scutari, D. Palomar, S. Barbarossa, "Competitive optimization of cognitive radio MIMO systems via game theory," in Proc. of 2009 Int. Conf. on Game Theory for Networks, vol. 23, no.3, pp. 13-15, 2009.