Abstract
This study investigates artificial noise aided Multiuser Multiple-Input Single-Output(MU-MISO) broadcast wiretap system designs in slow fading channel environment. We adopt a beamforming technique with artificial noise to achieve secure multiuser communication and optimize system performance. To overcome the complexity of this model, a novel optimization scheme using semi-closed-form expressions and Monte Carlo method is employed to derive the relationship between transmission parameters and secure transmission performance. In this article, we detail the procedure of our new method, and conduct some heuristic simulation works. The simulation results reveal how power allocation ratio and information rate influence the multiuser system secure transmission probability and effective secrecy throughput of the multiuser system. We compare the multiuser system security and throughput performance with each user's performance, which helps us to verify the security ability of our method. Our research results extend the traditional single-user artificial noise design method to multi-user scenarios, and provide ideas for solving the optimization problem of multi-user broadcast communication.
Due to the broadcasting nature of electromagnetic waves, private data is vulnerable for potential eavesdroppers, especially in multiuser communication scenarios. Traditionally, cryptographic algorithms are widely used to ensure system security. However, because of the neglect of channel's physical layer characteristics, the perfect secrecy of cryptographic algorithms cannot be always guaranteed, especially in the scenario that eavesdroppers have infinite computational ability. Physical-layer security prevents eavesdropping by taking advantage of physical properties of wireless channels. This technique is based on perfect secrecy theory introduced by Shanno
Enhancing security by worsening the eavesdropper's channel is a novel approach to achieve physical-layer security. In [3], Goel and Negi proposed to confuse the eavesdropper by Artificial Noise(AN). They blend the information-bearing signal with artificially made noise signal which lies in the null space of the legitimate receiver. After that, the authors of [4] worked out fast fading channel optimal power allocation issue via closed-form expressions, and considered the impact of imperfect Channel State Information(CSI). Different from fast fading channel scenes, slow fading channel scenarios, in which the channel coherence time is longer than the codeword length, and burst errors may appear suddenly, seems more challenging, and closer to reality. The authors of [5] proposed the effective secrecy throughput as a performance metric in the design of secure transmission using artificial noise over slow fading. They derived closed-form expressions for the effective secrecy throughput and determined the optimal power allocation and optimal secrecy rate for on-off transmission scheme and adaptive transmission scheme to maximize the secure transmission performance. Based on previous research results, researchers of [6] examined the secrecy performance of three AN-aided secure transmission schemes, namely, the partially-adaptive, fully-adaptive, and on-off schemes. And a power allocation approach for artificial noise aided beamforming was proposed in MISO wiretap channels in [7].
The above-mentioned articles are all about traditional point-to-point communication system, namely, one transmitter conveys messages to one receiver. For multiuser security communication system with artificial noise, some problems are still open. The authors in [8] researched on secrecy outage constraint artificial noise aided multiuser communication system.Atallah and his partner in [9] proposed a new location-based multicasting technique to improve the security in the presence of non-colluding passive eavesdroppers. However, the fore-mentioned articles were aimed at multicast channel where a common message is transmitted to multiple receivers. While for multiuser broadcast channels where a unique data symbol is transmitted to each of all users, multiuser beamforming technique is always used to eliminate inter-user interference. [10] proposed zero-forcing beamforming in broadcast channels. Minimum Mean Square Error(MMSE) broadcast beamforming technique was studied in [11]. The authors of [12] proposed the optimal beamforming design for multiuser broadcast secure transmission under secrecy outage probability constraint with artificial noise technique for different users, which has different priorities and importance. And the outage performance of cooperative Non-Orthogonal Multiple Access(NOMA) under multiuser and multi-relay system was studied in reference [
Based on the above-mentioned articles, this work combines multiuser beamforming and artificial noise to achieve multiuser broadcast secure communication. We focus on a multiuser, Multiple-Input, Single-Output per user, and Multi-antenna Eavesdropper(MU-MISOME) wiretap channel, and build a complete model for AN-aided MU-MISOME secure communication system. We suppose a slow fading channel scene, and adopt a more popular pre-coding method in recent articles like [5] and [6]. Then, the expression about Signal-to Noise-Ratio(SNR) of each user and eavesdropper is derived, which is a basic step in physical security optimization problems.
A new solution to the MU-MISOME broadcast wiretap channel optimization problem is proposed. Since it's hard to get optimal parameters by a closed-form method in this system, Monte-Carlo algorithm is employed to show the influence of system parameters on system security performance.
We investigate the general principle underlying the relationship of secure transmission probability and effective secrecy throughput with power allocation factor and information rate by simulation. It's easy to get optimal parameters by this means. Moreover, we compare the system performance with each user's performance, which will help us to verify the security ability of our method.
Notation:scalar variables are denoted by italic symbols. Vectors and matrices are denoted by lowercase and uppercase boldface symbols, respectively. denotes the transpose, denotes the complex conjugate transpose, denotes the inverse, and denotes the Frobenius norm of matrix.
We consider a MU-MISOME broadcast system. As shown in

Fig.1 A model of MU-MISOME broadcast wiretap channel
According to usual assumption in MU-MISOME broadcast system, we have and .If the assumption is violated, artificial noise signal may be eliminated by Eve, and detailed explanation is listed in former researching articles like[7] and [9]. To ensure security, Alice transmits artificial noise signal in conjunction with information signal , where is a zero-mean complex Gaussian random vector, , and the variance of its entries is . The total transmit power is assumed to be , and we denote the total information signal power as . Assuming that Alice equally distributes the transmit power to every user, the variance of is . Given to represent power allocation factor, namely the ratio of information signal power to the total power, we have , , where .
To mix artificial noise signal with information signal and convey information to multiple users, we use beamforming matrix as pre-coding procedure, . is a zero-forcing beamforming matrix for transmitting information signal to Bobs, . is the artificial noise pre-coding matrix, which keeps artificial noise lies in the null space of main channels. Alice performs eigenvalue decomposition on matrix , and let be eigenvectors corresponding to zero eigenvalue of . The transmission signal on antennas is
(1) |
where represents the whole artificial noise for antennas, and is the power normalization parameter.
After passing the main channel, the received signal at Bob-j is
(2) |
where is the Additive White Gaussian Noise(AWGN) of Bob-j's receiver. In this article, we assume that all users' AWGNs have the same variance, namely . Therefore, the instantaneous SNR of Bob-j is
(3) |
where , and we can define this constant as the average SNR of Bob-. At Eve, we assume an extreme situation that the receiver noise is zero. Hence the received signal for Eve is
(4) |
. To overhear all users' signal, Eve needs to eliminate influence caused by beamforming matrix. As we have assumed Eve can get the perfect instantaneous CSI of , it can also obtain beamforming matrix used by Alice easily. In this article, it is assumed Eve can use the knowledge of to eliminate beamforming, or we call it ‘de-beamforming’. As shown in
(5) |

Fig.2 Procedure of ‘De-beamforming’ in Eve
The vector , where . To this, the instantaneous receiving SNR of Bob-j's signal in Eve is
(6) |
where . Based on (5) and (6), it can be seen that the AN component behaves as noise to the eavesdropping signal.
In this section, we first introduce the principle about system secrecy and throughput performance of MU-MISOME broadcast wiretap channel. Then the means of performance optimization by Monte Carlo method is presented.
In MU-MISOME broadcast system, the Bob-j's achievable secrecy rate can be expressed as
(7) |
where is the channel capacity of Bob-j, and is the channel capacity of Eve about Bob-j's signal. In this article, we use the on-off transmission scheme in [9], and we express secure transmission probability as
(8) |
where is the channel capacity of the whole system, and is the transmitting information rate in Alice. In multiuser system, to ensure security of every user, we choose the minimum channel capacity of all Bobs as the system capacity, namely . We have
(9) |
People can also use the effective secrecy throughput to quantify the average rate of the messages that are securely transmitted from Alice to Bo
(10) |
Based on (3),(6),(7) and (9),(10), we know that the security performance of system is determined by power allocation factor and information rate Rs. The authors of article [9] derived closed-form expressions of and about and for MISOME slow fading wiretap system. But in MU-MISOME system, it's hard to get closed-form expressions about Probability Density Functions(PDFs) of in
To calculate the system secure transmission probability in any given , we propose to simulate the secure transmission probability by Monte-Carlo method. The feasibility of this method is based on the reality that Alice can get the distribution of eavesdropper's channel matrix since Eve locates in the same environment as Bobs, this reality is also available in recent articles like [9] and [10]. Steps of our simulation method is given as
1:Input system constants like , , , , and the instantaneous main channel CSI . |
---|
2:Setting Monte‒Carlo coefficient , and the range of (namely the maximum of information rate ). |
3:Generate samples of eavesdropper's channel , the number of samples is . |
4:For a given , we calculate every user's using (6) by every sample of . Then we can get samples. For every sample, it can be judged whether secure or not by (9). Checking all samples, then we simulate to get secure transmission probability of given as , and effective secrecy throughput . |
5:Vary from 0 to 1, from 0 to , one can derive the whole relationship of and with . |
By the Monte-Carlo method proposed above, simulation work has been carried out. In our simulation work, we suppose a (namely , , and ) MU-MISOME system. , moreover, there is no AWGN in Eve. We also employ Monte-Carlo coefficient , namely it created 100 000 samples of eavesdropper's channel. The main channel and Eve's channel are both subject to Rayleigh distribution.
Our simulation result is shown as

Fig.3 3D figures of the relationship about effective secrecy throughput(U) with power ratio() and information rate()
Therefore, we can get an optimal parameters pair that makes the effective secrecy throughput maximum, as circled by the red line in
After that, some disciplines of secure transmission probability with different and were inspected. In following figures, we apply the legend “User 1” to “User 4”for expressing the simulation result of Bob-1 to Bob-4, and the legend “min” as the simulation result of the whole system.

Fig.4 Relationship of secure transmission probability with information rate by different power ratios in a 10×4×5 multiuser system
We also studied the system secure transmission probability and single user's secure transmission probability. Since we choose the minimum channel capacity of all Bobs as the system capacity, the system's is always lower than single user's secure transmission probability. When a system threshold(for example, ) is set, the corresponding can always keep all users' secure transmission probability higher than the threshold, as shown in

Fig.5 Relationship of secure transmission probability with power ratio by different information rates in a 10×4×5 multiuser system

Fig.6 Relationship of effective secrecy throughput with information rate by different power ratios in a 10×4×5 multiuser system
In this article, we investigated performance optimization in AN-aid MU-MISOME secure communication system. We first built a new MU-MISOME model in slow fading channels, and derived some expressions of system performance. To overcome difficult problem of closed-form optimization method, we employed Monte-Carlo method to simulate the secure transmission probability for different system parameters, and optimized system secure transmit throughput. Furthermore, we inspected influence on secure transmission probability and effective secrecy throughput by different power ratios and information rates, which will help us to achieve an optimal multiuser secure communication system in practice.
References
SHANNON C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949,28(4):656‒715. doi:10.1002/j.1538-7305.1949.tb00928.x. [Baidu Scholar]
WYNER A D. The wire‒tap channel[J]. The Bell System Technical Journal, 1975,54(8):1355-1387. doi:10.1002/j.1538‒7305. 1975.tb02040.x. [Baidu Scholar]
GOEL S,NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008,7(6):2180‒2189. doi:10.1109/TWC.2008.060848. [Baidu Scholar]
ZHOU X,MCKAY M R. Secure transmission with artificial noise over fading channels:achievable rate and optimal power allocation[J]. IEEE Transactions on Vehicular Technology, 2010,59(8):3831‒3842. doi:10.1109/TVT.2010.2059057. [Baidu Scholar]
YANG N,ELKASHLAN M,DUONG T Q,et al. Optimal transmission with artificial noise in MISOME wiretap channels[J]. IEEE Transactions on Vehicular Technology, 2016,65(4):2170‒2181. doi:10.1109/TVT.2015.2419318. [Baidu Scholar]
YAN S,YANG N,LAND I,et al. Three artificial-noise-aided secure transmission schemes in wiretap channels[J]. IEEE Transactions on Vehicular Technology, 2018,67(4):3669-3673. doi:10.1109/TVT.2017.2779508. [Baidu Scholar]
HU D,MU P,ZHANG W,et al. Minimization of secrecy outage probability with artificial-noise-aided beamforming for MISO wiretap channels[J]. IEEE Communications Letters, 2020,24(2):401-404. doi:10.1109/LCOMM.2019.2957121. [Baidu Scholar]
WANG B,MU P. Artificial noise-aided secure multicasting design under secrecy outage constraint[J]. IEEE Transactions on Communications, 2017,65(12):5401-5414. doi:10.1109/TCOMM.2017.2748118. [Baidu Scholar]
ATALLAH M,KADDOUM G. Secrecy analysis in wireless network with passive eavesdroppers by using partial cooperation[J]. IEEE Transactions on Vehicular Technology, 2019,68(7):7225‒7230. doi:10.1109/TVT.2019.2913934. [Baidu Scholar]
YOO T,GOLDSMITH A. On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming[J]. IEEE Journal on Selected Areas in Communications, 2006,24(3):528-541. doi:10.1109/JSAC.2005.862421. [Baidu Scholar]
CHRISTENSEN S S,AGARWAL R,DE CARVALHO E,et al. Weighted sum-rate maximization using weighted MMSE for MIMO‒BC beamforming design[J]. IEEE Transactions on Wireless Communications, 2008,7(12):4792-4799. doi:10.1109/T-WC.2008.070851. [Baidu Scholar]
YAO Li,LIU Youjiang,ZHANG Jian,et al. Secure beamforming method for artificial-noise-aided multiuser broadcast system with users of different importance under secrecy outage probability constraint[J]. IET Communications, 2020,14(19):3380‒3387. doi:10.1049/iet‒com.2020.0277. [Baidu Scholar]
刘凯,李新颖,郝浩. 多用户多中继系统下协作NOMA的中断性能[J]. 太赫兹科学与电子信息学报, 2020,18(4):586-594. [Baidu Scholar]
LIU Kai,LI Xinying,HAO Hao. Outage performance of cooperative NOMA under multiuser and multi-relay system[J]. Journal of Terahertz Science and Electronic Information Technology, 2020,18(4):586‒594.doi:10.11805/TKYDA2019007. [Baidu Scholar]