使用Chrome浏览器效果最佳,继续浏览,你可能不会看到最佳的展示效果,

确定继续浏览么?

复制成功,请在其他浏览器进行阅读

A novel optimization scheme for artificial-noise-aided MU-MISOME broadcast secure communication system in slow fading channel environment  PDF

  • YAO Li 1
  • LIU Youjiang 1
  • ZHANG Jian 2
1. Institute of Electronic Engineering,China Academy of Engineering Physics,Mianyang Sichuan 621999,China; 2. School of Electronic Science and Engineering,University of Electronic Science and Technology of China, Chengdu Sichuan 611731,China

CLC: TN929.5

Updated:2023-03-06

DOI:10.11805/TKYDA2020568

  • Full Text
  • Figs & Tabs
  • References
  • Authors
  • About
CITE
OUTLINE

Abstract

This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO) broadcast wiretap system designs in slow fading channel environment. We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance. To overcome the complexity of this model, a novel optimization scheme using semi-closed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secure transmission performance. In this article, we detail the procedure of our new method, and conduct some heuristic simulation works. The simulation results reveal how power allocation ratio and information rate influence the multiuser system secure transmission probability and effective secrecy throughput of the multiuser system. We compare the multiuser system security and throughput performance with each user's performance, which helps us to verify the security ability of our method. Our research results extend the traditional single-user artificial noise design method to multi-user scenarios, and provide ideas for solving the optimization problem of multi-user broadcast communication.

1 Introduction

Due to the broadcasting nature of electromagnetic waves, private data is vulnerable for potential eavesdroppers, especially in multiuser communication scenarios. Traditionally, cryptographic algorithms are widely used to ensure system security. However, because of the neglect of channel's physical layer characteristics, the perfect secrecy of cryptographic algorithms cannot be always guaranteed, especially in the scenario that eavesdroppers have infinite computational ability. Physical-layer security prevents eavesdropping by taking advantage of physical properties of wireless channels. This technique is based on perfect secrecy theory introduced by Shannon[

1], and was first proposed in [2]. Following these studies, an increasing number of researchers has engaged in this new field.

Enhancing security by worsening the eavesdropper's channel is a novel approach to achieve physical-layer security. In [3], Goel and Negi proposed to confuse the eavesdropper by Artificial Noise(AN). They blend the information-bearing signal with artificially made noise signal which lies in the null space of the legitimate receiver. After that, the authors of [4] worked out fast fading channel optimal power allocation issue via closed-form expressions, and considered the impact of imperfect Channel State Information(CSI). Different from fast fading channel scenes, slow fading channel scenarios, in which the channel coherence time is longer than the codeword length, and burst errors may appear suddenly, seems more challenging, and closer to reality. The authors of [5] proposed the effective secrecy throughput as a performance metric in the design of secure transmission using artificial noise over slow fading. They derived closed-form expressions for the effective secrecy throughput and determined the optimal power allocation and optimal secrecy rate for on-off transmission scheme and adaptive transmission scheme to maximize the secure transmission performance. Based on previous research results, researchers of [6] examined the secrecy performance of three AN-aided secure transmission schemes, namely, the partially-adaptive, fully-adaptive, and on-off schemes. And a power allocation approach for artificial noise aided beamforming was proposed in MISO wiretap channels in [7].

The above-mentioned articles are all about traditional point-to-point communication system, namely, one transmitter conveys messages to one receiver. For multiuser security communication system with artificial noise, some problems are still open. The authors in [8] researched on secrecy outage constraint artificial noise aided multiuser communication system.Atallah and his partner in [9] proposed a new location-based multicasting technique to improve the security in the presence of non-colluding passive eavesdroppers. However, the fore-mentioned articles were aimed at multicast channel where a common message is transmitted to multiple receivers. While for multiuser broadcast channels where a unique data symbol is transmitted to each of all users, multiuser beamforming technique is always used to eliminate inter-user interference. [10] proposed zero-forcing beamforming in broadcast channels. Minimum Mean Square Error(MMSE) broadcast beamforming technique was studied in [11]. The authors of [12] proposed the optimal beamforming design for multiuser broadcast secure transmission under secrecy outage probability constraint with artificial noise technique for different users, which has different priorities and importance. And the outage performance of cooperative Non-Orthogonal Multiple Access(NOMA) under multiuser and multi-relay system was studied in reference [

13].

Based on the above-mentioned articles, this work combines multiuser beamforming and artificial noise to achieve multiuser broadcast secure communication. We focus on a multiuser, Multiple-Input, Single-Output per user, and Multi-antenna Eavesdropper(MU-MISOME) wiretap channel, and build a complete model for AN-aided MU-MISOME secure communication system. We suppose a slow fading channel scene, and adopt a more popular pre-coding method in recent articles like [5] and [6]. Then, the expression about Signal-to Noise-Ratio(SNR) of each user and eavesdropper is derived, which is a basic step in physical security optimization problems.

A new solution to the MU-MISOME broadcast wiretap channel optimization problem is proposed. Since it's hard to get optimal parameters by a closed-form method in this system, Monte-Carlo algorithm is employed to show the influence of system parameters on system security performance.

We investigate the general principle underlying the relationship of secure transmission probability and effective secrecy throughput with power allocation factor and information rate by simulation. It's easy to get optimal parameters by this means. Moreover, we compare the system performance with each user's performance, which will help us to verify the security ability of our method.

Notation:scalar variables are denoted by italic symbols. Vectors and matrices are denoted by lowercase and uppercase boldface symbols, respectively. ·T denotes the transpose, ·H denotes the complex conjugate transpose, ·-1 denotes the inverse, and · denotes the Frobenius norm of matrix.

2 System model of MU-MISOME broadcast wiretap channel

We consider a MU-MISOME broadcast system. As shown in Fig.1, the transmitter Alice with MT antennas transmits information signal s to K single-antenna users, Bob-1, Bob-2,…, Bob-K. s=s1s2   sjsKT, j=1,2,,K, sj represents Bob-j's information signal. The channel between Alice and Bob is defined as main channel, and the CSI of main channel is a K × MT matrix H, H=h1T h2T   hjThKTT, the 1 × MT vector hjT represents the channel matrix between Alice and Bob-j. We assume that the instantaneous CSI H is perfectly known by Bobs and is sent to Alice with feedback links. Transmitted information is overheard by a passive eavesdropper Eve with ME antennas. The channel matrix between Alice and Eve is a ME × MT matrix G. The instantaneous CSI of G is not available to Alice. And with an extreme hypothesis, Eve can get the perfect instantaneous CSI of H because of the unsafe feedback links from Bobs to Alice. The Eve's channel and the main channels are all modeled as independent and identically distributed (i.i.d.) Rayleigh fading, and subject to slow fading.

Fig.1  A model of MU-MISOME broadcast wiretap channel

According to usual assumption in MU-MISOME broadcast system, we have MT> K and MT> ME.If the assumption is violated, artificial noise signal may be eliminated by Eve, and detailed explanation is listed in former researching articles like[7] and [9]. To ensure security, Alice transmits artificial noise signal r in conjunction with information signal s, where r is a MT-K×1 zero-mean complex Gaussian random vector, r=r1r2  rMT-KT, and the variance of its entries is σr2. The total transmit power is assumed to be PT, and we denote the total information signal power as σs2. Assuming that Alice equally distributes the transmit power to every user, the variance of sj is σj2=σs2/K. Given to represent power allocation factor, namely the ratio of information signal power to the total power, we have σj2=PT/K, σr2=1-PT/MT-K, where 0<1.

To mix artificial noise signal with information signal and convey information to multiple users, we use beamforming matrix B as pre-coding procedure, B=BsBr. Bs is a MT ×K  zero-forcing beamforming matrix for transmitting information signal s to Bobs, Bs= HHH·HH-1=b1b2bK. Br is the artificial noise pre-coding matrix, which keeps artificial noise lies in the null space of main channels. Alice performs eigenvalue decomposition on matrix HHH, and let Br be eigenvectors corresponding to zero eigenvalue of HHH. The transmission signal x on MT antennas is

x=1B·BsBr·sr=1B·Bs·s+Br·r=δ·Bs·s+v (1)

where v=Br·r represents the whole artificial noise for MT antennas, and δ=1/B is the power normalization parameter.

After x passing the main channel, the received signal at Bob-j is

yj=hjTx+ξj=δhjTbjsj+hjTijKbisi+hjTv+ξj=δhjTbjsj+ξj=δsj+ξj (2)

where ξj is the Additive White Gaussian Noise(AWGN) of Bob-j's receiver. In this article, we assume that all users' AWGNs have the same variance, namely σ2. Therefore, the instantaneous SNR of Bob-j is

γj=δ·σj2σ2=δ·PTK·σ2=γ¯j (3)

where γ¯j=δ·PT/Kσ2, and we can define this constant as the average SNR of Bob-j. At Eve, we assume an extreme situation that the receiver noise is zero. Hence the received signal for Eve is

w=G·x=δ·G·Bs·s+v (4)

w=w1w2    wMET. To overhear all users' signal, Eve needs to eliminate influence caused by beamforming matrix. As we have assumed Eve can get the perfect instantaneous CSI of H, it can also obtain beamforming matrix used by Alice easily. In this article, it is assumed Eve can use the knowledge of H to eliminate beamforming, or we call it ‘de-beamforming’. As shown in Fig.2, the ‘de-beamforming’ K × ME matrix D=G·Bs+=d1Td2T   djTdKTT. D is the pseudo inverse matrix for G·Bs. After ‘de-beamforming’, Eve can get the eavesdropping signal z as

z=D·w=δ·GBs-1·GBs·s+δ·GBs-1·G·v=δ·s+δ·D·G·v. (5)

Fig.2  Procedure of ‘De-beamforming’ in Eve

The K×1 vector z=z1z2zjzKT, where zj=δ·sj+djT·G·v. To this, the instantaneous receiving SNR of Bob-j's signal in Eve is

γEj=σj2djT·G·v2=PT/KdjT·G·Br2·1-PTMT-K=1-1ρ·djT·G·Br2 (6)

where ρ=KMT-K. Based on (5) and (6), it can be seen that the AN component behaves as noise to the eavesdropping signal.

3 Secure transmission optimization by Monte Carlo method

In this section, we first introduce the principle about system secrecy and throughput performance of MU-MISOME broadcast wiretap channel. Then the means of performance optimization by Monte Carlo method is presented.

3.1 Secrecy and throughput performance of MU-MISOME broadcast system

In MU-MISOME broadcast system, the Bob-j's achievable secrecy rate Cj can be expressed as

Cj=CBj-CEj,γj>γEj0,                γjγEj (7)

where CBj=log21+γj is the channel capacity of Bob-j, and CEj=log21+γEj is the channel capacity of Eve about Bob-j's signal. In this article, we use the on-off transmission scheme in [9], and we express secure transmission probability as

Psec=PrCRs (8)

where C is the channel capacity of the whole system, and RS is the transmitting information rate in Alice. In multiuser system, to ensure security of every user, we choose the minimum channel capacity of all Bobs as the system capacity, namely C=minKCj. We have

Psec=PrminKCjRs=PrmaxKγEj1+γj2RS-1 (9)

People can also use the effective secrecy throughput to quantify the average rate of the messages that are securely transmitted from Alice to Bob[

4]. We can express the effective secrecy throughput as

U=RsPsec (10)

Based on (3),(6),(7) and (9),(10), we know that the security performance of system is determined by power allocation factor and information rate Rs. The authors of article [9] derived closed-form expressions of Psec and U about and Rs for MISOME slow fading wiretap system. But in MU-MISOME system, it's hard to get closed-form expressions about Probability Density Functions(PDFs) of γEj in equation (6) since the distribution of dj·G·Br2 is difficult to derive. That problem inspires us to find a new route to obtain optimal and Rs.

3.2 Monte Carlo optimization method

To calculate the system secure transmission probability in any given Rs, we propose to simulate the secure transmission probability by Monte-Carlo method. The feasibility of this method is based on the reality that Alice can get the distribution of eavesdropper's channel matrix since Eve locates in the same environment as Bobs, this reality is also available in recent articles like [9] and [10]. Steps of our simulation method is given as Table1.

Table1  Procedure of Monte‒Carlo method for MU‒MISOME optimization
1:Input system constants like MT, K, ME, γ¯j, and the instantaneous main channel CSI H.
2:Setting Monte‒Carlo coefficient β, and the range of Rs (namely the maximum of information rate Rs,max).
3:Generate samples of eavesdropper's channel G, the number of samples is β.
4:For a given iRs,i, we calculate every user's γEj using (6) by every sample of G. Then we can get β γEj samples. For every sample, it can be judged whether secure or not by (9). Checking all β samples, then we simulate to get secure transmission probability of given iRs,i as PseciRs,i, and effective secrecy throughput UiRs,i.
5:Vary from 0 to 1, Rs from 0 to Rs,max, one can derive the whole relationship of Psec and U with Rs.

4 Simulation results

By the Monte-Carlo method proposed above, simulation work has been carried out. In our simulation work, we suppose a 10×4×5(namely MT=10, K=4, and ME=5) MU-MISOME system. γ¯j=15 dB, moreover, there is no AWGN in Eve. We also employ Monte-Carlo coefficient β=100 000, namely it created 100 000 samples of eavesdropper's channel. The main channel H and Eve's channel G are both subject to Rayleigh distribution.

Our simulation result is shown as Fig.3. The Z axis represents effective secrecy throughputU, X axis and Y axis represent power ratio and transmission information rateRs respectively. It's easy to see that effective secrecy throughput increases firstly, then decreases with the increase of both and Rs, namely there is a peak in the 3D figure.

Fig.3  3D figures of the relationship about effective secrecy throughput(U) with power ratio() and information rate(Rs)

Therefore, we can get an optimal parameters pair that makes the effective secrecy throughput maximum, as circled by the red line in Fig.3.

After that, some disciplines of secure transmission probability with different and Rs were inspected. In following figures, we apply the legend “User 1” to “User 4”for expressing the simulation result of Bob-1 to Bob-4, and the legend “min” as the simulation result of the whole system. Fig.4 shows the relationship of Psec versus Rs by different . We can see that Psec keeps 1 before a threshold. It's just because the transmitting data rate is so slow that the system secure capacity is always larger than Rs, and no outage will occur. After the threshold, however, Psec decreases rapidly and tends to zero.

Fig.4  Relationship of secure transmission probability with information rate by different power ratios in a 10×4×5 multiuser system

We also studied the system secure transmission probability and single user's secure transmission probability. Since we choose the minimum channel capacity of all Bobs as the system capacity, the system's Psec is always lower than single user's secure transmission probability. When a system Psec threshold(for example, Psec0.95) is set, the corresponding Rs can always keep all users' secure transmission probability higher than the threshold, as shown in Fig.4. This will keep every user's communication secure.

Fig.5 shows how Psec changes with increasing for different Rs. Psec keeps zero when is too small, because low information signal power will cause low user SNR. After a threshold, Psec first increases, then decreases as increases. We can also notice that the optimal nearly keeps constant for different Rs. This conclusion also coincides with articles like [8] and [9].

Fig.5  Relationship of secure transmission probability with power ratio by different information rates in a 10×4×5 multiuser system

Fig.6 is the trend of effective secrecy throughput U with increasing Rs for different . It's a profile of a given in Fig.3(b). From this figure, it's obvious that before Rs reaching the peak, U linearly increases with Rs. After the maximum, U decreases to zero quickly. We also notice that the system optimal Rs(information rate corresponding to maximum system effective secrecy throughput) is smaller than each user's optimal Rs. That means when we set Rs as the system's optimal information, single user can hardly achieve its best transmission performance. Therefore, although this method can ensure security of the whole system, there are still improvement spaces when we want to strengthen a specific user's secure transmission ability.

Fig.6  Relationship of effective secrecy throughput with information rate by different power ratios in a 10×4×5 multiuser system

5 Conclusion

In this article, we investigated performance optimization in AN-aid MU-MISOME secure communication system. We first built a new MU-MISOME model in slow fading channels, and derived some expressions of system performance. To overcome difficult problem of closed-form optimization method, we employed Monte-Carlo method to simulate the secure transmission probability for different system parameters, and optimized system secure transmit throughput. Furthermore, we inspected influence on secure transmission probability and effective secrecy throughput by different power ratios and information rates, which will help us to achieve an optimal multiuser secure communication system in practice.

References

1

SHANNON C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949,28(4):656715. doi:10.1002/j.1538-7305.1949.tb00928.x. [Baidu Scholar] 

2

WYNER A D. The wire‒tap channel[J]. The Bell System Technical Journal, 1975,54(8):1355-1387. doi:10.1002/j.1538‒7305. 1975.tb02040.x. [Baidu Scholar] 

3

GOEL S,NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008,7(6):21802189. doi:10.1109/TWC.2008.060848. [Baidu Scholar] 

4

ZHOU X,MCKAY M R. Secure transmission with artificial noise over fading channels:achievable rate and optimal power allocation[J]. IEEE Transactions on Vehicular Technology, 2010,59(8):38313842. doi:10.1109/TVT.2010.2059057. [Baidu Scholar] 

5

YANG N,ELKASHLAN M,DUONG T Q,et al. Optimal transmission with artificial noise in MISOME wiretap channels[J]. IEEE Transactions on Vehicular Technology, 2016,65(4):21702181. doi:10.1109/TVT.2015.2419318. [Baidu Scholar] 

6

YAN S,YANG N,LAND I,et al. Three artificial-noise-aided secure transmission schemes in wiretap channels[J]. IEEE Transactions on Vehicular Technology, 2018,67(4):3669-3673. doi:10.1109/TVT.2017.2779508. [Baidu Scholar] 

7

HU D,MU P,ZHANG W,et al. Minimization of secrecy outage probability with artificial-noise-aided beamforming for MISO wiretap channels[J]. IEEE Communications Letters, 2020,24(2):401-404. doi:10.1109/LCOMM.2019.2957121. [Baidu Scholar] 

8

WANG B,MU P. Artificial noise-aided secure multicasting design under secrecy outage constraint[J]. IEEE Transactions on Communications, 2017,65(12):5401-5414. doi:10.1109/TCOMM.2017.2748118. [Baidu Scholar] 

9

ATALLAH M,KADDOUM G. Secrecy analysis in wireless network with passive eavesdroppers by using partial cooperation[J]. IEEE Transactions on Vehicular Technology, 2019,68(7):72257230. doi:10.1109/TVT.2019.2913934. [Baidu Scholar] 

10

YOO T,GOLDSMITH A. On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming[J]. IEEE Journal on Selected Areas in Communications, 2006,24(3):528-541. doi:10.1109/JSAC.2005.862421. [Baidu Scholar] 

11

CHRISTENSEN S S,AGARWAL R,DE CARVALHO E,et al. Weighted sum-rate maximization using weighted MMSE for MIMO‒BC beamforming design[J]. IEEE Transactions on Wireless Communications, 2008,7(12):4792-4799. doi:10.1109/T-WC.2008.070851. [Baidu Scholar] 

12

YAO Li,LIU Youjiang,ZHANG Jian,et al. Secure beamforming method for artificial-noise-aided multiuser broadcast system with users of different importance under secrecy outage probability constraint[J]. IET Communications, 2020,14(19):33803387. doi:10.1049/iet‒com.2020.0277. [Baidu Scholar] 

13

刘凯,李新颖,郝浩. 多用户多中继系统下协作NOMA的中断性能[J]. 太赫兹科学与电子信息学报, 2020,18(4):586-594. [Baidu Scholar] 

LIU Kai,LI Xinying,HAO Hao. Outage performance of cooperative NOMA under multiuser and multi-relay system[J]. Journal of Terahertz Science and Electronic Information Technology, 2020,18(4):586594.doi:10.11805/TKYDA2019007. [Baidu Scholar]