DOI QR코드

DOI QR Code

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen (Collage of Communications Engineering, University of Army Engineering University of PLA) ;
  • Gao, Yuanyuan (Collage of Communications Engineering, University of Army Engineering University of PLA) ;
  • Sha, Nan (Collage of Communications Engineering, University of Army Engineering University of PLA) ;
  • Zang, Guozhen (Collage of Communications Engineering, University of Army Engineering University of PLA) ;
  • Wang, Shijie (Collage of Communications Engineering, University of Army Engineering University of PLA)
  • Received : 2018.05.04
  • Accepted : 2021.03.16
  • Published : 2021.06.30

Abstract

This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

Keywords

1. Introduction

Because of the broadcast characteristics of wireless communication, its security problem has attracted great attention. Traditional key-based cryptography assumes that the eavesdropper has limited computing resources, but it is not always reliable due to the great improvement of computing power. Besides, due to the large amount of computation, this strategy may not be suitable for high-speed transmission of future communication. Therefore, the concept of physical layer security has been paid increasing attention.

The notion of security based on information theory was first introduced in [1]. [2]studied the wiretap channel and secrecy capacity considering the imperfections introduced by the channel. [3] studied a more general vision of wiretap channel and considered transmission of secret messages over broadcast channels. Maenwhile, multi-antenna transmission is considered to be an effective and practical method to improve the capacity and reliability of wireless communication [4-6]. For multiple-input single-output (MISO) case, [7] studied the beamforming schemes and got the optimal scheme using generalized eigenvalues. [8] proposed the AN-aided transmission, in case the main channel is worse than the wiretap channel. For the cases where multiple eavesdroppers exist, [9] proposed the joint optimization of transmit weights and AN. [10] considered the problem of secure communication in fading channels and obtained a closed-form expression of achievable secrecy rate. [11,12] researched the AN-aided secure schemes in cognitive radio. When multiple help jammers are available, [13] proposed the optimal power allocation scheme to maximize the secrecy rate. For multiple-input multiple-output (MIMO) case, [14] computed the perfect secrecy capacity of the multiple antenna MIMO broadcast channel. [15] tried to obtain the optimal beamforming schemes for MIMO transmission with the tool of generalized singular value decomposition (GSVD). When the squared M-square quadrature amplitude modulated (M-QAM) modulation scheme is adopted, [16] found that the AN in the form of QAM or rotated QAM phase selection performs better than the Gaussian AN in improving the symbol error rate (SER) performance. Meanwhile, the secure tranmission in massive MIMO system is attracting increasing attention [17-19].

In practice, the channel state information (CSI) is uaually estimated with errors. Generally, there are mainly two ways describing the CSI estimation error: the stochastic and the deterministic models. For the former, the CSI errors are considered as complex random variables. Based on this assumption, [20,21] considered robust transmit strategies against the imperfectness of CSI in MISO and MIMO channel, respectively. The later model assumes that the CSI errors lie in a known set of possible values. Based on deterministic model, [22,23] studied the secure transmission in MISO channel. [24,25] considered secure transmit schemes for MISO wiretap channels with cooperative jamming from helper. Recently, [26] proposes a Lagrangian dual based method by using the statistical characteristics of the CSI errors for full-duplex secure communication. In [27], considering the proximity of the legitimate receiver and eavesdropper, the impact of the shadowing correlation and composite fading parameters on secrecy performance is studied. In addition, with the fast fading channel, [28] analyzed the impact of outdated CSI on secrecy performance.

In this paper, we take the deterministic model to describe the CSI errors, and study the robust transmit schemes. It is assumed that the receiver and the eavesdroppers are located far enough, and the antenna distance is long enough. The correlation among the eavesdroppers and intended receiver channel, and the correlation among different antennas can be ignored. The slow fading channel is studied, and the outdated CSI is not considered here. It is also assumed that the transmitter generates Gaussian information signal and no help jammer is available. The main contributions of this paper are as following.

. We design the robust joint optimal beamforming for minimizing transmit power with considering the CSI errors of wiretap channel based on deterministic model. Assuming the passive method of eavesdroppers, it is difficult to obtain accurate CSI of wiretap channel, which greatly degrades the performance of transmit schemes based on accurate instantaneous CSI. Although the robust transmit schemes were proposed in [22,29], these papers did not considered the improvement for the application of AN. The work in [9] did not consider influence of CSI errors.

. We manage to show the tightness and robustness of the proposed power optimization design by calculating the worst signal-to-interference-and-noise ratio (SINR) at eavesdroppers. [24] proposed a way to calculate the worst-case SINR at intended receiver in the case of single-antenna eavesdroppers by dual theory. However, the problem is more difficult for the scenario of multi-antenna eavesdroppers interfered by AN. In this paper, we derive a method to calculate the worst-case SINR using semidefinite programming (SDP), which is flexible for this more delicate case.

. With given total transmit power, the secrecy rate maximization is studied for the case of single-antenna eavesdroppers. The original problem is fractional and non-convex, hence we propose an iterative method by relaxing it into tractable formulation with recently presented sequential parametric convex approximation (SPCA) method. The sub-optimal solution can be obtained using the proposed method. Our proposed transmit scheme shows obvious performance gains compared with the existing schemes.

The paper is organized as following. Section 2 introduces transmit model and problem formulations. In section 3, we design the transmit power optimization with imperfect CSI. The work to derive the worst-case SINR at eavesdroppers is also included. Section 4 describes the robust secrecy rate optimization. The simulation results are shown in section 5 and conclusion is drawn in section 6.

The notation of this paper is as follows. Boldface lowercase and uppercase letters are used to denote vectors ant matrices, respectively. \(\mathbf{I}_{n}\) denotes the n−by−n identity matrix, 0 is a zero matrix. By \(\mathbf{X} \succeq \mathbf{0}\) , we mean that X is a Hermitian positive semidefinite matrix. The operators \((\cdot)^{T},(\cdot)^{H}, \operatorname{vec} (), \operatorname{Tr}(\cdot), \nabla\) and |⋅| represent the transpose, Hermitian, trace, vectorization, gradient and determinant operations, respectively. Rm×n and Cm×n stand for the set of matrices with real- and complex-valued entries. The symbol \(\mathbb{E}\{\cdot\}\) represents the statistical expectation of the argument. The Frobenius norm is denoted by \(\|\cdot\|_{F} \cdot \otimes\) denotes the Kronecker product and Re{⋅} represents the real part of a complex value.

2. Transmit Model and Problem Formulation

2.1 System Model

The communication system contains a transmitter, an intended receiver and K illegal eavesdroppers. The transmitter and eavesdropper k (1 ≤ k ≤ K ) are equipped with Nt and \(N_{e_{k}}\) antennas, respectively. The eavesdroppers try to tap confidential messages from the transmitter passively without collusion. The scenario is described in Fig. 1.

E1KOBZ_2021_v15n6_2204_f0001.png 이미지

Fig. 1. System Model

The transmit signal vector is denoted as \(\mathbf{x}(t) \in C^{N_{t}}\), the received signals at the receiver and eavesdropper k are

\(\begin{aligned} y_{r}(t) &=\mathbf{h}^{H} \mathbf{x}(t)+n_{r} \\ \mathbf{y}_{e_{k}}(t) &=\mathbf{G}_{k} \mathbf{x}(t)+\mathbf{n}_{e_{k}} \quad k=1,2, \cdots, K \end{aligned}\)       (1)

Here, \(h \in C^{N_{t}}\) denotes the channel from the transmitter to receiver, \(\mathbf{G}_{k} \in C^{N_{e_{k}} \times N_{t}}\) denotes the channel from transmitter to eavesdropper \(k \cdot y_{r}(t) \in C\) and \(\mathbf{y}_{e_{k}}(t) \in C^{N_{e_{k}}}\) are the signal obtained by receiver and eavesdropper, respectively. \(n_{r} \in C\) and \(\mathbf{n}_{e_{k}} \in C^{N_{e_{k}}}\) denote independent and identical distributed (i.i.d.) complex white Gaussian noises with variances \(\sigma_{r}^{2}\) and \(\sigma_{e_{k}}^{2} \mathbf{I}_{N_{e_{k}}}\).

This paper studies the AN-aided transmit schemes [8]. Considering this way, the transmit signal vector can be denoted as

\(\mathbf{x}(t)=\mathbf{w} S(t)+\mathbf{Z} \mathbf{v}\)       (2)

where \(s(t) \in C\) is confidential information for the receiver, \(\mathbf{v} \in C^{N_{t} \times 1}\) denotes the AN vector following an zero-mean i.i.d. complex Gaussian distribution generated by transmitter. \(\mathbf{w} \in C^{N_{t} \times 1}\) and \(\mathbf{Z} \in C^{N_{t} \times N_{t}}\) denote the signal beamforming vector and AN beamforming matrix, respectively. It is set \(\mathbb{E}\left\{|s(t)|^{2}\right\}=1\) and \(\mathbb{E}\left\{\mathbf{vv}^{H}\right\}=\mathbf{I}_{N_{t}}\) without loss of generality.

In reality, the transmitter usually captures imperfect CSI of the wiretap channel. A Time Division Duplex (TDD) system is considered in this paper. In this case, the main channel h can be reliably estimated throughout the transmission period, while the wiretap channel Gk is inaccurate [30]. To depict this scenario, we introduce the deterministic model [31]. The CSI errors are defined as

\(\boldsymbol{\Delta}_{k}=\mathbf{G}_{k}-\hat{\mathbf{G}}_{k}\)       (3)

where \(\hat{G_{k}}\) is the estimated wiretap channel. Δk represents the CSI corresponding estimation error. We have \(\boldsymbol{\Delta}_{k} \in\left\{\boldsymbol{\Delta}:\|\boldsymbol{\Delta}\|_{F} \leq \varepsilon_{k}\right\}\) with εk denoting the uncertainty.

2.2 Problem Formulations

According to the transmit model above, the SINR at receiver is

\(\operatorname{SINR}_{r}\left(\mathbf{w}, \mathbf{Q}_{z}\right)=\frac{\operatorname{Tr}\left(\mathbf{h}^{H} \mathbf{w} \mathbf{w}^{H} \mathbf{h}\right)}{\operatorname{Tr}\left(\mathbf{h}^{H} \mathbf{Q}_{Z} \mathbf{h}\right)+\sigma_{r}^{2}}\)       (4)

where QZ= ZZH. With CSI errors, the SINR at eavesdropper k can be expressed as

\(\operatorname{SINR}_{e_{k}}\left(\mathbf{w}, \mathbf{Q}_{z}\right)=\frac{\operatorname{Tr}\left(\left(\hat{\mathbf{G}_{k}}+\mathbf{\Delta}_{k}\right) \mathbf{w} \mathbf{w}^{H}\left(\hat{\mathbf{G}_{k}}+\mathbf{\Delta}_{k}\right)^{H}\right)}{\operatorname{Tr}\left(\left(\hat{\mathbf{G}_{k}}+\mathbf{\Delta}_{k}\right) \mathbf{Q}_{z}\left(\hat{\mathbf{G}_{k}}+\mathbf{\Delta}_{k}\right)^{H}\right)+N_{e_{k}} \sigma_{e_{k}}^{2}}\)       (5)

Assuming that the minimum SINR required at receiver is Γr and maximum tolerable SINR at eavesdropper k is \(\Gamma_{e_{k}}\), the robust transmit power minimization is described as

\(\begin{array}{lll} \min _{\mathbf{w}, \mathbf{Q}_{\mathbf{z}}} & |\mathbf{w}|^{2}+\operatorname{Tr}\left(\mathbf{Q}_{\mathbf{z}}\right) & \\ \text { s.t. } & \operatorname{SINR}_{r}\left(\mathbf{w}, \mathbf{Q}_{z}\right) \geq \Gamma_{r} & \\ & \operatorname{SINR}_{e_{k}}\left(\mathbf{w}, \mathbf{Q}_{z}\right) \leq \Gamma_{e_{k}}, \quad k=1, \ldots, K \\ & \left\|\Delta_{k}\right\|_{F} \leq \varepsilon_{k}, \quad \quad k=1, \ldots, K \\ & \mathbf{Q}_{z} \succeq \mathbf{0} \end{array}\)       (6)

It is set that Γr is much larger than \(\Gamma_{e_{k}}\) for available secrecy rate. It should be noted that the formula may not be feasible, but if the constraint is not too tight, the problem is not serious. In most cases, the formulation above is feasible. The following lemma shows this problem in detail.

\(\text { Lemma 1: Defining } \mathbf{Q}_{h}=\mathbf{h} \mathbf{h}^{H} \ \text { and } \ \tilde{\mathbf{G}}_{k}=\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)^{H}\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right), \text { if } \mathbf{Q}_{h} \neq \rho \tilde{\mathbf{G}}_{k}\) for any \(k=1,2, \cdots K\) , where ρ is a constant, the problem (6) is feasible.

The proof of Lemma 1 is in Appendix A.

With CSI errors of wiretap channel, the secrecy rate is given as [32]

\(R_{s}=\log _{2}\left(1+\frac{\mathbf{h}^{H} \mathbf{w} \mathbf{w}^{H} \mathbf{h}}{\mathbf{h}^{H} \mathbf{Z} \mathbf{Z}^{H} \mathbf{h}+\sigma_{r}{ }^{2}}\right)-\underset{1 \leq k \leq K} {\max}\log _{2}\left|\mathbf{I}+\frac{\left(\hat{\mathbf{G}}_{k}+\mathbf{\Delta}_{k}\right) \mathbf{w} \mathbf{w}^{H}\left(\hat{\mathbf{G}}_{k}+\mathbf{\Delta}_{k}\right)^{H}}{\left(\hat{\mathbf{G}}_{k}+\mathbf{\Delta}_{k}\right) \mathbf{Z} \mathbf{Z}^{H}\left(\hat{\mathbf{G}}_{k}+\mathbf{\Delta}_{k}\right)^{H}+\sigma_{e_{k}}{ }^{2} \mathbf{I}}\right|\)       (7)

The robust secrecy rate maximization is defined as

\(\begin{array}{ll} \underset{\mathbf{w}, Q_{z}}{\max } \underset{\mathbf{\Delta}_{k}}{\min} & R_{s} \\ \text { s.t. } & |\mathbf{w}|^{2}+\operatorname{Tr}\left(Q_{z}\right) \leq P_{\max } \\ & \left\|\Delta_{k}\right\|_{F} \leq \varepsilon_{k},\qquad\qquad k=1, \ldots, K \\ & \mathbf{Q}_{\mathbf{Z}}=\mathbf{Z} \mathbf{Z}^{H}, \mathbf{Q}_{z} \succeq \mathbf{0} \end{array} \)      (8)

Pmax denotes the maximum total power at transmitter. In this design, we aim to maximize the worst case secrecy rate with considering the CSI errors.

3. Robust Transmit Power Minimization

This section is motivated by power saving for secure transmission. Excessive energy consumption brings a heavy burden to the communication systems as well as raises serious environment concerns. So, green communication attracts increasing attention. We consider minimizing the transmit power with the SINR constraints at the receiver and eavesdroppers, i.e. guaranteeing the SINR at receiver higher than requirement and keeping the maximum SINR at eavesdroppers lower than the threshold. In this way, the communication with reliable secure rate is available. In this section, it is assumed that all the eavesdroppers are multiple-antenna. The estimation of main channel is accurate, whle the estimation of wiretap channel is not. For the CSI errors of wiretap channel, it is set the Frobenius norm F = 2.

3.1 Beamforming Design

Letting \(\mathbf{W}=\mathbf{w} \mathbf{w}^{H}, \mathbf{Q}_{h}=\mathbf{h} \mathbf{h}^{H}, \mathbf{Q}_{G_{k}}=\mathbf{G}_{k} \mathbf{G}_{k}{ }^{H} \text { and } \mathbf{Q}_{Z}=\mathbf{Z} \mathbf{Z}^{H}\) , problme (6) can be rewritten as 

\(\underset{\mathbf{W}, \mathbf{Q}_{\mathbf{z}}}{\min} \operatorname{Tr}(\mathbf{W})+\operatorname{Tr}\left(\mathbf{Q}_{\mathbf{z}}\right)\)       (9a)

\(\text { s.t. } \quad \frac{1}{\Gamma_{r}} \operatorname{Tr}\left(\mathbf{W Q}_{h}\right)-\operatorname{Tr}\left(\mathbf{Q}_{\mathbf{z}} \mathbf{Q}_{h}\right) \geq \sigma_{r}^{2}\)       (9b)

\(\frac{1}{\Gamma_{e_{k}}} \operatorname{Tr}\left(\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right) \mathbf{W}\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)^{H}\right)-\operatorname{Tr}\left(\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right) \mathbf{Q}_{z}\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)^{H}\right) \leq N_{e_{k}} \sigma_{e_{k}}{ }^{2}, \quad k=1, \ldots, K\)        (9c)

\(\left\|\Delta_{k}\right\|_{2} \leq E_{k}\),      \(k=1, \ldots, K\)       (9d)

\(\mathbf{Q}_{z} \succeq \mathbf{0}, \mathbf{W} \succeq \mathbf{0}, \operatorname{rank}(\mathbf{W})=1\)       (9e)

The problem (9) is solved to get the optimal transmit scheme with CSI errors in the wiretap channel.

Theorem 1: Given the main channel h , inaccurate estimation wiretap channel Gk with \(\hat{\mathbf{g}}_{k}=\operatorname{vec}\left(\hat{\mathbf{G}}_{k}\right)\) , required SINR at the receiver Γr and threshold SINR at the eavesdroppers \(\Gamma_{e_{k}}\), the optimal transmit power can be calculated as

\(\underset{\mathbf{W}, \mathbf{Q}_{\mathbf{z}}}\min \operatorname{Tr}(\mathbf{W})+\operatorname{Tr}\left(\mathbf{Q}_{\mathbf{z}}\right)\)       (10a)

\(\text { s.t. } \quad \frac{1}{\Gamma_{r}} \operatorname{Tr}\left(\mathbf{W} \mathbf{Q}_{h}\right)-\operatorname{Tr}\left(\mathbf{Q}_{\mathbf{z}} \mathbf{Q}_{h}\right) \geq \sigma_{r}^{2}\)       (10b)

\(-\left[\begin{array}{cc} \left({\mathbf{Q}^{T}}_{e_{k}}-\mu_{k} \mathbf{I}_{N_{t}}\right) \otimes \mathbf{I}_{N_{e}} & \left({\mathbf{Q}^{T}}_{e_{k}} \otimes \mathbf{I}_{N_{e_{k}}}\right) \hat{\mathbf{g}}_{k} \\ \hat{{\mathbf{g}}_{k}}^{H}\left(\mathbf{{Q}^{T}_{e_{k}}} \otimes \mathbf{I}_{N_{e_{x}}}\right)^{H} & {\hat{\mathbf{g}}_{k}}^{H}\left({\mathbf{Q}^{T}_{e_{k}}} \otimes \mathbf{I}_{N_{e_{k}}}\right) \hat{\mathbf{g}}_{k}-N_{e_{k}} \sigma_{e_{k}}{ }^{2}+\mu_{k} \varepsilon_{k}{ }^{2} \end{array}\right] \succeq \mathbf{0}, \quad k=1, \ldots, K\)       (10c)

\(\mathbf{Q}_{e_{k}}=\frac{1}{\Gamma_{e_{k}}} \mathbf{W}-\mathbf{Q}_{z}, \mu_{k} \geq 0, \quad k=1, \ldots, K\)       (10d)

\(\mathbf{Q}_{z} \succeq \mathbf{0}, \mathbf{W} \succeq \mathbf{0}\)       (10e)

Proof:To get the result, we transform constraints in (9c) into linear matrix inequalities (LMIs) based on S-Procedure [33].

Lemma 2 (S-Procedure): Let \(f_{k}(\mathbf{x}), k=1,2\) , be defined as

\(f_{k}(\mathbf{x})=\mathbf{x}^{H} \mathbf{A}_{k} \mathbf{x}+2 \operatorname{Re}\left\{{\mathbf{b}_{k}}^{H} \mathbf{x}\right\}+c_{k}\)       

Where \(\mathbf{A}_{k}=\mathbf{A}_{k}{ }^{H} \in C^{n \times n}, \mathbf{b}_{k} \in C^{n}\) and \(c_{k} \in R\) . Then, the implication \(f_{1}(\mathbf{x}) \leq 0 \Rightarrow f_{2}(\mathbf{x}) \leq 0\) hold if and only if there exist µ ≥ 0 such that

\(\mu\left(\begin{array}{cc} \mathbf{A}_{1} & \mathbf{b}_{1} \\ \mathbf{b}_{1}^{H} & c_{1} \end{array}\right)-\left(\begin{array}{cc} \mathbf{A}_{2} & \mathbf{b}_{2} \\ {\mathbf{b}_{2}}^{H} & c_{2} \end{array}\right) \succeq \mathbf{0}\),

Provided there exists a point \(\hat{\mathbf{x}} \text { with } f_{k}(\hat{\mathbf{x}})>0\).

We can transfer (10c) as

\(\operatorname{Tr}\left[\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)\left(\frac{1}{\Gamma_{e_{k}}} \mathbf{W}-\mathbf{Q}_{z}\right)\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)^{H}\right] \leq N_{e_{k}} {\sigma_{e_{k}}}^{2}\)       (11)

Defining \(\hat{\mathbf{g}}_{k}=\operatorname{vec}\left(\hat{\mathbf{G}}_{k}\right), \boldsymbol{\delta}_{k}=\operatorname{vec}\left(\boldsymbol{\Delta}_{k}\right), \mathbf{Q}_{e_{k}}=\frac{1}{\Gamma_{e_{k}}} \mathbf{W}-\mathbf{Q}_{z}\) ,(11) can be rewritten as

\(\boldsymbol{\delta}_{k}^{H}\left(\mathbf{Q}_{e_{k}}^{T} \otimes \mathbf{I}_{N_{e_{k}}}\right) \boldsymbol{\delta}_{k}+2 \operatorname{Re}\left\{\hat{\mathbf{g}}_{k}^{H}\left(\mathbf{Q}_{e_{k}}^{T} \otimes \mathbf{I}_{N_{e_{k}}}\right) \boldsymbol{\delta}_{k}\right\}+\hat{\mathbf{g}}_{k}^{H}\left(\mathbf{Q}_{e_{k}}^{T} \otimes \mathbf{I}_{N_{c k}}\right) \hat{\mathbf{g}}_{k} \leq N_{e_{k}} \sigma_{e_{k}}{ }^{2}\)       (12)

According to (9d), we can get

\(\left\|\Delta_{k}\right\|_{2} \leq \varepsilon_{k} \Rightarrow \operatorname{Tr}\left(\Delta_{k} \Delta_{k}{ }^{H}\right)=\operatorname{Tr}\left(\boldsymbol{\delta}_{k} \boldsymbol{\delta}_{k}{ }^{H}\right) \leq \varepsilon_{k}{ }^{2}\)        (13)

Combining (12) and (13), based on Lemma 2, we can get that there exists µk ≥ 0 such that

\(-\left[\begin{array}{cc} \left({\mathbf{Q}^{T}_{e_{k}}}-\mu_{k} \mathbf{I}_{N_{t}}\right) \otimes \mathbf{I}_{N_{e}} & \left({\mathbf{Q}^{T}}_{e_{k}} \otimes \mathbf{I}_{N_{e_{k}}}\right) \hat{\mathbf{g}}_{k} \\ {\hat{\mathbf{g}}_{k}}^{H}\left({\mathbf{Q}^{T}}_{e_{k}} \otimes \mathbf{I}_{N_{e_{e}}}\right)^{\mathbf{H}} & {{\hat{\mathbf{g}}_{k}}}^{H}\left({\mathbf{Q}^{T}}_{e_{k}} \otimes \mathbf{I}_{N_{e_{k}}}\right) \hat{\mathbf{g}}_{k}-N_{e_{k}} \sigma_{e_{k}}^{2}+\mu_{k} {\varepsilon_{k}}^{2} \end{array}\right] \succeq \mathbf{0}\)       (14)

Neglecting the constraint rank(W)=1, the Theorem 1 is proved. (10) is a SDP which can be solved efficiently (e.g. with CVX software [34]). And we introduce the following proposition to yield a rank-one solution of optimal W*.

Proposition 1: Given the SDR problem (10) is feasible, we can always get the optimal solution W* which satisfies rank(W*)= 1.

The proof is in Appendix B.

3.2 Worst-case SINR with Imperfect CSI

Through Theorem 1, we have designed robust transmit scheme which guarantees the SINR at eavesdroppers lower than the threshold considering CSI errors. Actually, the S-Procedure based method introduces safe approximation of (9), which may waste extra power if the estimation is excessively conservative. Hence, a method is needed to evaluate the tightness of the proposed scheme. Besides, we want to measure the robustness of existing designs based on the accurate instantaneous CSI, i.e. the worst-case SINR [24] at eavesdroppers with the designed signal beamforming vector w* and AN beamforming matrix Z*. As this calculation is challenging for the analytical methods, in this part we will present the derivation of worst-case SINR with SDP based on deterministic model.

For the eavesdropper k, the maximum SINR at eavedropper k can be expressed as

\(\begin{array}{ll} {\underset{\Delta_{k}}\max} & \frac{\operatorname{Tr}\left[\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right) \mathbf{W}^{*}\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)^{H}\right]} {\operatorname{Tr}\left[\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right) {\mathbf{Q}_{z}}^{*}\left(\hat{\mathbf{G}}_{k}+\boldsymbol{\Delta}_{k}\right)^{H}\right]+N_{e_{k}} {\sigma^{2}}_{e_{k}}} \\ \text { s.t. } & \left\|\Delta_{k}\right\|_{F} \leq \varepsilon_{k} \end{array}\)       (15)

where \(\mathbf{W}^{*}=\mathbf{w}^{*} \mathbf{w}^{*H} \ \text { and }\ {\mathbf{Q}_{z}}^{*}=\mathbf{Z}^{*} \mathbf{Z}^{* H} \). Letting \( \hat{\mathbf{g}}_{k}=\operatorname{vec}\left(\mathbf{G}_{k}\right), \quad \boldsymbol{\delta}_{k}=\operatorname{vec}\left(\boldsymbol{\Delta}_{k}\right)\), (15) can be rewritten as

\(\underset{\boldsymbol{\delta}_{k}}\max \frac{\operatorname{Tr}\left[\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)\left(\mathbf{W}^{*} \otimes \mathbf{I}_{N_{e_{k}}}\right)\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H}\right]}{\operatorname{Tr}\left[\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)\left({\mathbf{Q}_{z}}^{*} \otimes \mathbf{I}_{N_{e_{k}}}\right)\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H}\right]+N_{e_{k}} {\sigma^{2}_{e_{k}}}}\)       (16a)

\(\text { s.t. } \operatorname{Tr}\left(\boldsymbol{\delta}_{k} {\boldsymbol{\delta}_{k}}^{H}\right) \leq {\varepsilon_{k}}^{2}\)       (16b)

To employ SDR programming, we introduce auxiliary variable t and make t2 = 1 . Defining \(\tilde{\boldsymbol{\delta}}_{k}=\left(\boldsymbol{\delta}_{k}{ }^{T}, t\right)^{T}\) , according to (16a) it can be obtained that

\(\frac{\operatorname{Tr}\left[\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)\left(\mathbf{W}^{*} \otimes \mathbf{I}_{N_{e_{k}}}\right)\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H}\right]}{\operatorname{Tr}\left[\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)\left({\mathbf{Q}_{z}}^{*} \otimes \mathbf{I}_{N_{e_{k}}}\right)\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H}\right]+N_{e_{k}} {\sigma^{2}}_{e_{k}}}=\frac{\operatorname{Tr}\left(\tilde{\boldsymbol{\delta}}_{k} \mathbf{\Pi}_{W} \tilde{\boldsymbol{\delta}}_{k}^{H}\right)}{\operatorname{Tr}\left(\tilde{\boldsymbol{\delta}}_{k} \boldsymbol{\Pi}_{Q} {\tilde{\boldsymbol{\delta}}_{k}}^{H}\right)+N_{e_{k}} {\sigma^{2}}_{e_{k}}}\)       (17)

where we define

\(\mathbf{\Pi}_{W}=\left(\begin{array}{cc} \mathbf{W}^{*} \otimes \mathbf{I}_{N_{e_k}} & \left(\mathbf{W}^{*} \otimes \mathbf{I}_{N_{e_k}}\right) \hat{\mathbf{g}}_{k} \\ {\hat{\mathbf{g}}_{k}}^{H}\left(\mathbf{W}^{*} \otimes \mathbf{I}_{N_{e_k}}\right) & {\hat{\mathbf{g}}_{k}}^{H}\left(\mathbf{W}^{*} \otimes \mathbf{I}_{N_{e_k}}\right) \hat{\mathbf{g}}_{k} \end{array}\right), \mathbf{\Pi}_{Q}=\left(\begin{array}{cc} {\mathbf{Q}_{z}}^{*} \otimes \mathbf{I}_{N_{e_k}} & \left({\mathbf{Q}_{z}}^{*} \otimes \mathbf{I}_{N_{e_k}}\right) \hat{\mathbf{g}}_{k} \\ {\hat{\mathbf{g}}_{k}}^{H}\left({\mathbf{Q}_{z}}^{*} \otimes \mathbf{I}_{N_{e_k}}\right) & {\hat{\mathbf{g}}_{k}}^{H}\left(\mathbf{Q}_{z}^{*} \otimes \mathbf{I}_{N_{e_k}}\right) \hat{\mathbf{g}}_{k} \end{array}\right)\)

Based on (17), problem (16) can be relaxed as

\(\underset{\widetilde{\mathbf{Q}}_{\delta_{k}}}\max \frac{\operatorname{Tr}\left(\mathbf{Q}_{\tilde{\delta}_{k}} \mathbf{\Pi}_{W}\right)}{\operatorname{Tr}\left(\mathbf{Q}_{\tilde{\delta}_{k}} \mathbf{\Pi}_{Q}\right)+N_{e_{k}} {\sigma^{2}}_{e_{k}}}\)       (18a)

\(\text { s.t. } \operatorname{Tr}\left(\mathbf{Q}_{\tilde{\delta}_{k}} \tilde{\mathbf{I}}_{N_{t} \times N_{c}}\right) \leq {\varepsilon_{k}}^{2}, \quad k=1,2, \cdots, K\)       (18b)

\(\operatorname{Tr}\left(\mathbf{Q}_{\tilde{\delta}_{k}} \boldsymbol{\Xi}\right)=1\)        (18c)

\(\mathbf{Q}_{\tilde{\delta}_{k}} \succeq \mathbf{0}\)       (18d)

Where \(\mathbf{Q}_{\tilde{\delta}_{k}}=\tilde{\boldsymbol{\delta}}_{k} {\tilde{\boldsymbol{\delta}}_{k}}^{\mathbf{H}}, \tilde{\mathbf{I}}_{N_{t} \times N_{e}}=\left(\begin{array}{cc} \mathbf{I}_{N_{t} \times N_{e}} & 0 \\ 0 & 0 \end{array}\right), \quad \boldsymbol{\Xi}=\left(\begin{array}{cc} \mathbf{0}_{N_{t} \times N_{e}} & 0 \\ 0 & 1 \end{array}\right)\) . (18c) is used to guarantee the constraint t2 = 1 . (18) is a quasi-convex problem, we can solve it through the Charnes-Cooper transformation [35]. Letting \(\boldsymbol{\Theta}_{\tilde{\delta}_{k}}=\lambda \mathbf{Q}_{\tilde{\delta}_{k}}\) where λ ≥ 0 is a slack variable, (18) is transferred as

\(\begin{array}{ll} \underset{{\boldsymbol{\Theta}_{\tilde{\delta}_{k}, \lambda}}}\max & l_{k} \\ \text { s.t. } & \operatorname{Tr}\left(\boldsymbol{\Theta}_{\widetilde\delta_{k}} \mathbf{\Pi}_{W}\right) \geq l_{k} \\ & \lambda N_{e_{k}} \sigma_{e_{k}}^{2}+\operatorname{Tr}\left(\boldsymbol{\Theta}_{\tilde{\delta}_{k}} \mathbf{\Pi}_{Q}\right)=1 \\ & \operatorname{Tr}\left(\boldsymbol{\Theta}_{\tilde{\delta}_{k}} \tilde{\mathbf{I}}_{N_{t} \times N_{e}}\right) \leq \lambda {\varepsilon_{k}}^{2}, \operatorname{Tr}\left(\boldsymbol{\Theta}_{\tilde{\delta}_{k}} \boldsymbol{\Xi}\right)=\lambda \\ & \boldsymbol{\Theta}_{\tilde{\delta}_{k}} \succeq \mathbf{0}, \lambda \geq 0 \end{array}\)       (19)

lk is a slack variable and the maximum value denotes the maximum SINR at the eavesdropper k. (19) is a SDP problem and can be solved effectively. It is easy to obtain that the optimal solution satisfy that rank\(\left(\boldsymbol{\Theta}_{\delta_{k}}{ }^{*}\right)=1\) , the proof is identical to that of Proposition 1 and thus is omitted. Based on the derivation above, we can get Theorem 2.

Theorem 2: Given the signal beamforming vector w* and AN beamforming matrix Z* , the maximum SINR at eavesdroppers who do not collude is max \(\left\{t_{1}, t_{2}, \cdots, t_{K}\right\}\) , where tk is defined in (19).

The proof of Theorem 2 is obvious. It should be noticed that Theorem 2 is available not only for the optimal beamforming proposed in Theorem 1 but also for all possible beamforming schemes. 

4. Robust Secrecy Rate Maximization

In this section, we will get approach to the secrecy rate maximization with given total transmit power. Suppose that all the eavesdroppers are single-antenna. The estimation of main channel is accurate, while the estimation of wiretap channel is noisy with Frobenius norm F = 2 . The maximum total power at transmitter is Pmax. By introducing a slack variable τ, the problem (8) can be expressed as

\(\underset {\mathbf{w}, \mathbf{Q}_{z}}\max \underset{\delta_{k}}\min \log _{2}\left(1+\frac{\mathbf{h}^{H} \mathbf{W h}}{\mathbf{h}^{H} \mathbf{Q}_{z} \mathbf{h}+{\sigma_{r}}^{2}}\right)-\tau\)       (20a)

\(s.t. \qquad \log _{2}\left(1+\frac{\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H} \mathbf{W}\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)}{\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H} \mathbf{Q}_{z}\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)+\sigma_{e_{k}}{ }^{2}}\right) \leq \tau, \quad k=1, \ldots, K\)       (20b)

\(\left\|\boldsymbol{\delta}_{k}\right\|_{2} \leq \varepsilon_{k}, \quad k=1, \ldots, K\)       (20c)

\(\operatorname{Tr}(\mathbf{W})+\operatorname{Tr}\left(\mathbf{Q}_{z}\right) \leq P_{\max }\)       (20d)

\(\mathbf{Q}_{z} \succeq \mathbf{0}, \mathbf{W} \succeq \mathbf{0}, \operatorname{rank}(\mathbf{W})=1\)       (20e)

with W = wwH and QZ =ZZH . \(\hat{\mathbf{g}}_{k} \) and \(\boldsymbol{\delta}_{k}\) represent wiretap channel and the corresponding CSI errors for the case of single-antenna eavesdroppers. Then, the rate maximization can be divided into two sub-problems. The outer one is an one-variable optimization problem with respect to (w.r.t.) τ

\({R_{s}}^{*}=\underset{0 \leq r \leq \tau_{\max }}\max R(\tau)=\underset{0 \leq r \leq \tau_{\max }}\max \max _{\mathbf{W}, \mathbf{Q}_{\mathbf{z}}} \log _{2}\left(1+\frac{\mathbf{h}^{H} \mathbf{W h}}{\mathbf{h}^{H} \mathbf{Q}_{z} \mathbf{h}+{\sigma_{r}}^{2}}\right)-\tau\)       (21)

The upper bound τmax is calculated as the achievable rate of main channel neglecting eavesdroppers

\(\tau_{\max }=\log _{2}\left(1+\frac{P_{\max } \mathbf{h}^{H} \mathbf{h}}{{\sigma_{r}}^{2}}\right)\)       (22)

The inner problem of (20) is getting the maximum secrecy rate with fixed τ (calculating R(τ)), which is equivalent to

\(\underset{\mathbf{W}, \mathbf{Q}_{\mathbf{z}}}\max \underset{\boldsymbol{\delta}_{k}}\min \quad F\left(\mathbf{W}, \mathbf{Q}_{\mathbf{z}}\right)=\log \left(\mathbf{h}^{H} \mathbf{W h}\right)-\log \left(\mathbf{h}^{H} \mathbf{Q}_{z} \mathbf{h}+{\sigma_{r}}^{2}\right)\)       (23a)

\(\text { s.t. } \quad\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right)^{H}\left(\mathbf{Q}_{\mathbf{z}}-\frac{\mathbf{W}}{2^{\tau}}\right)\left(\hat{\mathbf{g}}_{k}+\boldsymbol{\delta}_{k}\right) \geq 0, k=1, \ldots, K\)       (23b)

\({\boldsymbol{\delta}_{k}}^{H} \boldsymbol{\delta}_{k} \leq {\varepsilon_{k}}^{2}, \quad k=1, \ldots, K\)       (23c)

\(\operatorname{Tr}(\mathbf{W})+\operatorname{Tr}\left(\mathbf{Q}_{z}\right) \leq P_{\max }\)       (23d)

\(\mathbf{Q}_{z} \succeq \mathbf{0}, \mathbf{W} \succeq \mathbf{0}, \operatorname{rank}(\mathbf{W})=1\)       (23e)

Notice that in (23a), \(F\left(\mathbf{W}, \mathbf{Q}_{z}\right)\) is concave w.r.t. W and convex w.r.t. Qz. To deal with this obstacle, the SPCA method [36] is introduced. Suppose a nonconcave term f (X) and a concave function \(g\left(\mathbf{X}, \mathbf{X}_{0}\right)\) in X, with f(X)≥ g( X, X 0 ) for given X0. The SPCA is a iterative scheme, for the n iteration, which satisfies that

\(\begin{aligned} f(\mathbf{X}) &=g\left(\mathbf{X}, \mathbf{X}_{\mathbf{0}, n}\right) \\ \nabla f(\mathbf{X}) &=\nabla g\left(\mathbf{X}, \mathbf{X}_{\mathbf{0}, n}\right) \end{aligned}\)

where X0,n denotes the optimal solution X* of the last iteration. In this paper, we derive the low bound of F(W,Qz) by its first order Taylor series approximatin, i.e.

\(G\left(\mathbf{W}, \mathbf{Q}_{z}, \mathbf{Q}_{z 0, n}\right) \triangleq \log \left(\mathbf{h}^{H} \mathbf{W h}\right)-\log \left(\mathbf{h}^{H} \mathbf{Q}_{z 0, n} \mathbf{h}+{\sigma_{r}}^{2}\right)-\operatorname{Tr}\left(\frac{\mathbf{h} \mathbf{h}^{H}}{\mathbf{h}^{H} \mathbf{Q}_{z 0, n} \mathbf{h}+{\sigma_{r}}^{2}}\left(\mathbf{Q}_{z}-\mathbf{Q}_{z 0, n}\right)\right)\)       (24)

where \(\mathrm{Q}_{z 0, n}\), is a preset matrix. \(G\left(\mathbf{W}, \mathbf{Q}_{z}, \mathbf{Q}_{z 0, n}\right)\) is concave in both W and Qz . Hence, the tractable formulation of problem (23) in n iteration is expressed as

\(\underset{\mathbf{W}_{n}, \mathbf{Q}_{z, n}}\max G\left(\mathbf{W}_{n}, \mathbf{Q}_{z, n}, \mathbf{Q}_{z 0, n}\right)\)       (25a)

\(s.t. \quad \left[\begin{array}{lc} \mathbf{Q}_{z, n}-\frac{\mathbf{W}_{n}}{2^{\tau}}+u_{k} \mathbf{I} & \left(\mathbf{Q}_{z, n}-\frac{\mathbf{W}_{n}}{2^{\tau}}\right) \hat{\mathbf{g}} \\ {\hat{\mathbf{g}}}^{H}\left(\mathbf{Q}_{z, n}-\frac{\mathbf{W}_{n}}{2^{\tau}}\right) & \hat{\mathbf{g}}^{H}\left(\mathbf{Q}_{z, n}-\frac{\mathbf{W}_{n}}{2^{\tau}}\right) \hat{\mathbf{g}}-u_{k} {\varepsilon_{k}}^{2}+{\sigma_{k}}^{2} \end{array}\right] \succeq \mathbf{0}, \quad k=1, \ldots, K \)       (25b)

\(\operatorname{Tr}\left(\mathbf{W}_{n}\right)+\operatorname{Tr}\left(\mathbf{Q}_{z, n}\right) \leq P_{\max }\)       (25c)

\(\mathbf{Q}_{z, n} \succeq \mathbf{0}, \mathbf{W}_{n} \succeq \mathbf{0}, u_{k} \geq 0, \quad k=1, \ldots, K\)       (25d)

where (25b) is obtained using Lemma 2 and we set \(\mathbf{Q}_{z 0, n}=\mathbf{Q}_{z, n-1}^{*} \text { with } \mathbf{Q}_{z, n-1}^{*}\) denoting the optimal sulotion of n−1 iteration. We introduce SDR by relaxing the rank constrait in (25) and get the accurate optimal sulotion according to the following proposition.

Proposition 2: Given the SDR problem (25), we can always get the optimal solution Wn* which satisfies rank(Wn*)= 1 .

The proof is shown in Appendix C.

Let Gn(τ) be the output of (25a) for n iteration , the derivation of inner problem (23) using SPCA method is summarized in Algorithm 1.

Algorithm 1: SPCA procedure for solving (23)

Proposition 3: Setting {Gn(τ)} Gn τ be the sequence of output in (25a) obtained by Algorithm 1, then {Gn(τ)} Gn τ converges.

Proof: Suppose that in n−1 iteration, we get the optimal solution \({\mathbf{W}_{n-1}}^{*}, {\mathbf{Q}_{z, n-1}}^{*}\) and the corresponding \(G_{n-1}\left(\tau\right)\) . Apply \(\mathbf Q_{z0,n} = {\mathbf Q_{z,n-1}}^*\) in (25a) and solve problem (25) for n iteration, we can get the updated optimal solution \({\mathbf{W}_{n}}^{*}, {\mathbf{Q}_{z, n}}^{*}, \quad G_{n}(\tau)\). It is obvious that \(G\left({\mathbf{W}_{n}}^{*}, {\mathbf{Q}_{z, n}}^{*}, {\mathbf{Q}_{z, n-1}}^{*}\right) \geq G\left({\mathbf{W}_{n-1}}^{*}, {\mathbf{Q}_{z, n-1}}^{*}, \mathbf{Q}_{z 0, n-1}\right)\) hence \(G_{n}(\tau) \geq G_{n-1}(\tau)\) . In addition it satisfies that \(G\left(\mathbf{W}, \mathbf{Q}_{z}, \mathbf{Q}_{z 0, n}\right) \leq F\left(\mathbf{W}, \mathbf{Q}_{z}\right)\), hence we can conclude that \(\left\{G_{n}(\tau)\right\}\) converges.

Having solved the inner problem (23), we can perform a one-dimension search over τ (e.g. golden section search [37]) for the outer problem. Then the robust secrecy rate maximization problem (8) is solved.

5. Simulation Results

In this section, the simulation results are provided to show the performance of the transmit schemes proposed in this paper. The isotropic AN scheme [8] referred as iso-AN scheme and optimal transmit design without AN [22] referred as no-AN scheme are introduced for comparison. For the former, the signal beamforming vector and AN beamforming matrix are designed as

\(\mathbf{w}=\sqrt{\alpha} \frac{\mathbf{h}}{|\mathbf{h}|}, \quad \mathbf{Z}=\sqrt{\beta} {\mathbf{P}^{\perp}}_{\mathbf{h}}\)       (26)

where \({\mathbf{P}^{\perp}}_{\mathbf{h}}\) denotes the orthogonal complement projector of main channel h. The channel realizations h, G1 , … , GK are i.i.d. complex Gaussian distributed with zero mean and unite variance. The noise power at receiver is σr2 = 0 dB and all eavesdroppers have the same noise power \({\sigma_{e}}^{2} \stackrel{\Delta}{=} {\sigma_{e_{1}}}^{2}={\sigma_{e_{2}}}^{2} \cdots={\sigma_{e_{K}}}^{2}=0 d B\), unless specified. The CSI errors in (3) is limited as \(\boldsymbol{\Delta}_{k} \in\left\{\boldsymbol{\Delta}:\|\boldsymbol{\Delta}\|_{F} \leq \varepsilon_{k}\right\}\). Defining \({\varepsilon_{k}}^{2}={u\left\|\hat{\mathbf{G}_{k}}\right\|_{F}}^{2}\), in which the parameter u represents uncertainty of channel estimation. All simulation results were based on 1000 Monte-Carlo trials.

We first verify Theorem 1 in Fig. 2 and our proposed robust joint optimal beamforming is reffered as RJOBF. In this simulation, the required SINR at receiver is \(\Gamma_r = 10dB\) while the threshold SINR at eavesdroppers is \(\Gamma_{e} \stackrel{\Delta}{=} \Gamma_{e_{1}}=\Gamma_{e_{2}}=\cdots=\Gamma_{e_{K}}=0 d B\). It is assumed that the number of eavesdroppers K = 3 equipped with the same number of antennas. The noise power at receiver is σr2 = 0dB and uncertainty u = 0.1 . Fig. 2 shows minimum transmit power satisfying the security QoS requirement as a function of noise power at eavesdroppers with perfect CSI. We introduce the robust iso-AN and robust no-AN scheme for comparison which also can satisfy security QoS requirement considering imperfect CSI [13]. The proposed RJOBF scheme outperforms the other schemes in saving transmit power under the same QoS requirement. In Fig. 2(a), when 1/σe2 = 15 dB our proposed RJOBF scheme can save around 7dB power compared with robust iso-AN scheme while robust no-AN scheme becomes completely invalid.

E1KOBZ_2021_v15n6_2204_f0002.png 이미지

Fig. 2. Comparison of different transmit schemes with imperfect CSI for u= 0.1 ; (a) transmit power versus eavesdroppers’ noise for Nt = 8, Ne = 2; (b) transmit power versus eavesdroppers’ noise for Nt =8, Ne =4 ; (c) transmit power versus eavesdroppers’ noise for Nt = 10, Ne = 4 ; (d) power allocations of isotropic AN scheme and proposed robust AN scheme for Nt =8, Ne =4 .

Comparing Fig. 2(b) and Fig. 2(a), it can be found that with increasing number of antennas at eavesdroppers, no more transmit power is needed to guarantee the required security performance for RJOBF scheme and robust iso-AN scheme. This is because the eavesdroppers receive more AN than signal power in these cases, consequently offset the increase in the number of antennas. However for the robust no-AN design which can only works well in high noise cases, when wiretap channel gets better this scheme couldn’t handle the enhanced eavesdropping ability. From Fig. 2(c), we can find that all the three schemes require less transmit power equipped with more transmit antennas which provides more freedom degree for transmit design. The power allocated to the signal is represented by solid line and dotted line in Fig. 2(d), respectively., respectively. For power allocated to AN, the difference between RJOBF scheme and robust iso-AN scheme is about 10dB. Therefore, the main advantage of the scheme is better utilization of AN power. This result is consistent with the conclusion of [9].

Next, we study the performance of Theorem 2. For Monte-Carlo simulation, we first establish estimated wiretap channel and then produce 10, 000 estimation error realizations to obtain the maximum SINR at eavesdroppers. We introduce the non-robust iso-AN, non-robus no-AN and the joint optimal beamforming with accurate CSI (JOBF) scheme [9] as comparison. The results are shown using different kind of points in Fig. 3. The worst-case SINR calculated by Theorem 2 is depicted by dashed line for different transmit schemes. We can find that the theoretical calculation and measured value through Monte-Carlo method are well matched especially when the wiretap channel uncertainty is no larger than 25%, which shows the validity of Theorem 2.

E1KOBZ_2021_v15n6_2204_f0003.png 이미지

Fig. 3. Robustness of different transmit schemes with imperfect CSI; (a) Worst-case SINR at eavesdroppers versus desired SINR threshold for µ =0.1 ; (b) Worst-case SINR at eavesdroppers versus wiretap channel uncertainty for Nt =8, Ne =4, K =3 .

Fig. 3(a) shows the maximum measured SINR with an increasing SINR threshold at eavesdroppers. The points located in shadow area can satisfy the secure transmit constraints. Obviously, only the RJOBF designlies in the shadow. Besides, we can find that the safe approximation in RJOBF scheme is tight enough. The no-AN scheme and the JOBF scheme depend more on the wiretap channel estimation, so the two schemes behavior worse than iso-AN scheme without considering the CSI errors. In Fig. 3(b), the SINR threshold at eavesdroppers is set to 0dB. The results show that with the increasing of channel uncertainty, the proposed RJOBF scheme is less sensitive to wiretap channel uncertainty.

In Fig. 4, we show minimum transmit power versus the uncertainty of wiretap channel. As seen that the transmit power monotonically increases as channel uncertainty gets larger, meanwhile the gap between RJOBF scheme and robust iso-AN scheme is around 6dB. From Fig. 4(b), we can find that the power allocated to signal almost keep constant as channel uncertainty gets large for the both two schemes. This is because we assume the estimation of main channel is accurate and the wiretap channel uncertainty mainly affects the power for AN.

E1KOBZ_2021_v15n6_2204_f0004.png 이미지

Fig. 4. Transmit power versus chan nel uncertainty for Nt =8, Ne 4, K =3 ; (a) transmit power versus wiretap channel uncertainty; (b) power allocations of robust iso-AN and RJOBF.

Fig. 5 depicts transmit power versus the number of eavesdroppers. As shown, both the transmit schemes acquire more power to deal with more eavesdroppers. Fig. 5(b) shows that the power allocated to signal of RJOBF scheme is about 2dB more than robust iso-AN scheme. This indicates for resisting more eavesdroppers with enhanced eavesdropping ability, the RJOBF scheme introduces AN in main channel. To maintain SINR requirement at receiver, this scheme has to increase transmit power for signal and this design is proved superior to isotropic AN transmitted only in the null space of main channel.

E1KOBZ_2021_v15n6_2204_f0005.png 이미지

Fig. 5. Transmit power versus the number of eavesdroppers for Nt =8, Ne =4, µ =0.1 ; (a) transmit power versus eavesdroppers number; (b) power allocations of robust iso-AN and RJOBF.

Fig. 6 shows the performace of Algorithm 1 with transmit power upper limit Pmax 10 dB and τ= 1 . We generate three different channel realizations. It can be noticed that the value of objective function in (25) i.e. the output of R (1) , converges quickly which verifies the conclusion of Proposition 3. For the same channel realization, we take different Qz0 for initialization and the proposed beamforming schemes achieve the same value. It shows that Algorithm 1 converges independent of initial set.

E1KOBZ_2021_v15n6_2204_f0006.png 이미지

Fig. 6. Convergence of of Algorithm 1 for Nt= 8, K = 3, µ =0.1 .

In Fig. 7, we investigate the maximum secrecy rate versus total transmit power for different transmit schemes. We can conclude that under same condition, our proposed SPCA based transmit beamforming design (SPCA-BF) outperform the suboptimal schemes. Compared with robust no-AN, the SPCA-BF shows high performance especially under large transmit power condition. Meanwhile the gap between robust iso-AN and SPCA-BF is at least . In addition, it reveals that increasing number of antennas at transmitter will improve the transmit performance of SPCA-BF. The simulation shows the superiority of optimal designed AN-aided beamforming.

E1KOBZ_2021_v15n6_2204_f0007.png 이미지

Fig. 7. Average ahievable secrecy rate versus total transmit power for different transmit schemes with K = 3, µ=0.1 .

6. Conclusion

In this paper, we have designed the AN-aided secrecy transmit schemes in the presence of multiple eavesdroppers with imperfect CSI. We first derive the robust transmit power minimization, which is shown nonconvex. Considering CSI errors, the original problem is transferred into LMIs and sovled using the well studied SDR technique. The rank-one property of the optimal solution is provided. To investigate the tightness and robustness of the proposed scheme, we also have proposed a SDP based method to calculate the worst-case SINR at eavesdroppers for the given transmit schemes. Then, the robust secrecy rate maximization has been studied. Due to the nonconvex and fractional formulation of original problem, we propose the iterative SPCA based method along with SDR. Besides, we also prove the rank-one property of each iteration optimal solution as well as the convergence of proposed approximate algorithm. The simulation results demonstrate validity of our proposed transmit schemes.

Appendix

This work was supported by the National Natural Science Foundation of China (grant no. 61501511).

References

  1. C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech., vol. 28, no. 4, pp. 656-715, Oct. 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  2. Wyner, and D. A., "The wire-tap channel," Bell Labs Tech., vol. 54, no. 8, pp. 1355-1387, Oct. 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  3. I. Csiszar, and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978. https://doi.org/10.1109/TIT.1978.1055892
  4. E. Telatar, "Capacity of Multi-antenna Gaussian Channels," Eur. Trans. Telecommun, vol. 10, no. 6, pp. 585-595, 1999. https://doi.org/10.1002/ett.4460100604
  5. G. J. Foschini, and M. J. Gans, "On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas," Wirel. Pers. Commun., vol. 6, no. 3, pp. 311-335, Mar. 1998. https://doi.org/10.1023/A:1008889222784
  6. G. G. Raleigh, and J. M. Cioffi, "Spatio-temporal coding for wireless communications," IEEE Trans. Commun., vol. 46, no. 3, pp. 357-366, Mar. 1998. https://doi.org/10.1109/26.662641
  7. Khisti, Wornell, and W. G., "Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010. https://doi.org/10.1109/TIT.2010.2048445
  8. S. Goel, and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008. https://doi.org/10.1109/TWC.2008.060848
  9. W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011. https://doi.org/10.1109/TSP.2010.2094610
  10. X. Zhou, and M. R. Mckay, "Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010. https://doi.org/10.1109/TVT.2010.2059057
  11. F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, "Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT," IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, Apr. 2017. https://doi.org/10.1109/TWC.2017.2665465
  12. Y. Huang, Z. Li, F. Zhou, and R. Zhu, "Robust AN-Aided Beamforming Design for Secure MISO Cognitive Radio Based on a Practical Nonlinear EH Model," IEEE Access, vol. 5, pp. 14011-14019, 2017. https://doi.org/10.1109/ACCESS.2017.2730220
  13. K. Cumanan, G. C. Alexandropoulos, Z. Ding, and G. K. Karagiannidis, "Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis," IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7495-7505, Aug. 2017. https://doi.org/10.1109/TVT.2017.2657629
  14. F. Oggier, and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. of 2008 IEEE International Symposium on Information Theory, pp. 524-528, 2008.
  15. A. Khisti, and G. W. Wornell, "Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. https://doi.org/10.1109/TIT.2010.2068852
  16. Y. Liu, L. Li, G. Alexandropoulos, and M. Pesavento, "Securing relay networks with artificial noise: An error performance-based approach," Entropy, vol. 19, no. 8, pp. 384, Jul. 2017. https://doi.org/10.3390/e19080384
  17. T. R. Dean, and A. J. Goldsmith, "Physical-Layer Cryptography Through Massive MIMO," in Proc. of 2013 IEEE Information Theory Workshop (ITW), pp. 1-5, 2013.
  18. J. Zhu, Y. Li, N. Wang, and W. Xu, "Wireless Information and Power Transfer in Secure Massive MIMO Downlink With Phase Noise," IEEE Wireless Commun. Lett., vol. 6, no. 3, pp. 298-301, Jun. 2017. https://doi.org/10.1109/LWC.2017.2676109
  19. J. Zhu, W. Xu, and N. Wang, "Secure Massive MIMO Systems With Limited RF Chains," IEEE Trans. Veh. Technol., vol. 66, no. 6, pp. 5455-5460, Jun. 2017. https://doi.org/10.1109/TVT.2016.2615885
  20. J. Wang, and D. P. Palomar, "Worst-Case Robust MIMO Transmission With Imperfect Channel Knowledge," IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3086-3100, Aug. 2009. https://doi.org/10.1109/TSP.2009.2021451
  21. S. Ma, M. Hong, E. Song, X. Wang, and D. Sun, "Outage Constrained Robust Secure Transmission for MISO Wiretap Channels," IEEE Trans. Wireless Commun., vol. 13, no. 10, pp. 5558-5570, Oct. 2014. https://doi.org/10.1109/TWC.2014.2326415
  22. Q. Li, and W. K. Ma, "Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011. https://doi.org/10.1109/TSP.2011.2146775
  23. L. Li, Z. Chen, and J. Fang, "Robust transmit design for secure AF relay networks based on worst-case optimization," in Proc. of 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, pp. 2719-2723, 2014.
  24. J. Huang, and A. L. Swindlehurst, "Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012. https://doi.org/10.1109/TSP.2011.2182344
  25. X. Zhou, Z. Rezki, B. Alomair, and M. S. Alouini, "Achievable Rates of Secure Transmission in Gaussian MISO Channel with Imperfect Main Channel Estimation," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4470-4485, Jun. 2016. https://doi.org/10.1109/TWC.2016.2542128
  26. Q. Li, Y. Zhang, J. Lin, and S. X. Wu, "Full-Duplex Bidirectional Secure Communications Under Perfect and Distributionally Ambiguous Eavesdropper's CSI," IEEE Trans. Signal Process., vol. 65, no. 17, pp. 4684-4697, Sep. 2017. https://doi.org/10.1109/TSP.2017.2709270
  27. G. C. Alexandropoulos, and K. P. Peppas, "Secrecy outage analysis over correlated composite Nakagami-m Gamma fading channels," IEEE Commun. Lett., vol. 22, no. 1, pp. 77-80, Jan. 2017. https://doi.org/10.1109/lcomm.2017.2760255
  28. Y. Huang, P. Zhang, Q. Wu, and J. Wang, "Secrecy performance of wireless powered communication networks with multiple eavesdroppers and outdated CSI," IEEE Access, vol. 6, pp. 33774-33788, 2018. https://doi.org/10.1109/ACCESS.2018.2835832
  29. Z. Chu, H. Xing, M. Johnston, and S. L. Goff, "Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 283-297, Jan. 2016. https://doi.org/10.1109/TWC.2015.2472405
  30. D. W. K. Ng, E. S. Lo, and R. Schober, "Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014. https://doi.org/10.1109/twc.2014.2314654
  31. C. Shen, T. H. Chang, K. Y. Wang, Z. Qiu, and C. Y. Chi, "Distributed Robust Multicell Coordinated Beamforming With Imperfect CSI: An ADMM Approach," IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2988-3003, Jun. 2012. https://doi.org/10.1109/TSP.2012.2188719
  32. S. Shafiee, and S. Ulukus, "Achievable Rates in Gaussian MISO Channels with Secrecy Constraints," in Proc. of 2007 IEEE International Symposium on Information Theory, Nice, France, pp. 2466-2470, 2007.
  33. L. El Ghaoui, and S. L. Niculescu, "Advances in linear matrix inequality methods in control: advances in design and control," Society for Industrial & Applied Mathematics Philadelphia Pa, 1999.
  34. M. Grant and S. Boyd. (Mar. 2014). CVX: MATLAB Software for Disciplined Convex Programming, Version 2.1. [Online]. Available: http://cvxr.com/cvx
  35. J. Li, A. P. Petropulu, and S. Weber, "On Cooperative Relaying Schemes for Wireless Physical Layer Security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011. https://doi.org/10.1109/TSP.2011.2159598
  36. A. Beck, A. Ben-Tal, and L. Tetruashvili, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems," J. Global Optim., vol. 47, no. 1,pp. 29-51, May 2010. https://doi.org/10.1007/s10898-009-9456-5
  37. S. G. Nash, "Linear and Nonlinear Programming," International Encyclopedia of the Social & Behavioral Sciences, vol. 67, no. 2, pp. 8868-8874, 2001.