Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
Abstract—This paper addresses joint transceiver design for through signal processing techniques in order to improve the
secure downlink communications over a multiple-input multiple- security of wireless transmission. It has become a very active
output (MIMO) relay system in the presence of multiple legiti- research area lately and is called upon to play a key role in
mate users and malicious eavesdroppers. Specifically, we jointly
optimize the base station (BS) beamforming matrix, the relay future 5G networks [7], [8].
station (RS) amplify-and-forward (AF) transformation matrix Using multiple-input multiple-output (MIMO) relays in
and the covariance matrix of artificial noise (AN), so as to multiuser multi-antenna cellular systems can further increase
maximize the system worst-case secrecy rate in the presence of the link quality, reliability, and data rate. Among the different
the colluding eavesdroppers under power constraints at the BS available relaying strategies, the amplify-and-forward (AF)
and the RS, as well as quality of service (QoS) constraints for
the legitimate users. This problem is very challenging due to scheme is often considered to be the most practical approach
the highly coupled design variables in the objective function and due to its low-complexity of operation at the relay station
constraints. By adopting a series of transformation, we first derive (RS) [9]. However, with the introduction of one or more relay
an equivalent problem that is more tractable than the original nodes in the transmission, the confidentiality of the transmitted
one. Then we propose and fully develop a novel algorithm based information may be more easily compromised.
on the penalty concave-convex procedure (penalty-CCCP) to solve
the equivalent problem, where the difficult coupled constraint is To address this issue, a number of schemes have been
penalized into the objective and the resulting nonconvex problem proposed for MIMO relay systems that offer improved security
is solved at each iteration by resorting to the CCCP method. against eavesdroppers [10]–[24]. In particular, as in [10]–
It is shown that the proposed joint transceiver design algorithm [12], secrecy beamforming and precoding schemes can be
converges to a stationary solution of the original problem. Finally, divided into two categories, depending on whether the relay is
our simulation results reveal that the proposed algorithm achieves
better performance than other recently proposed transceiver trusted or untrusted. Beamforming and precoding for untrusted
designs. MIMO relay systems have been investigated in [13]–[15].
Transceiver design for trusted MIMO relays has received
Index Terms—Beamforming, transceiver design, MIMO relay,
physical layer security, penalty-CCCP. more attention due to its wider spread application [16]–[25].
Ding et al. [16] have combined interference alignment with
cooperative jamming in order to ensure secure transmission
I. I NTRODUCTION to the legitimate receiver in the presence of an eavesdropper.
The explosive growth in the number and types of mobile A generalized singular-value decomposition (GSVD) method
devices poses a formidable challenge to the design of wireless has been used by Huang et al. in [17] to develop a co-
communication systems, which need to provide a high level operative jamming (CJ) scheme for secure communications
of message security in the presence of eavesdroppers who try with MIMO relays. Besides, secure relay beamforming for
to retrieve information from ongoing transmissions [1]. As a simultaneous wireless information and power transfer has been
complement to traditional encryption, physical layer security investigated in [18]. The above works in [16]–[18] consider
(PLS) [2]–[6] aims to exploit wireless channel characteristics one eavesdropper in the MIMO relay sub-network. When
there are multiple eavesdroppers, the studies in [19]–[21] have
The work of Y. Cai was supported in part by the National Natural Science developed null-space beamforming and jamming techniques
Foundation of China under Grant 61471319 and the Fundamental Research to maximize the secrecy capacity of each user. Gao et al.
Funds for the Central Universities. The work of Q. Shi was supported by the
National Natural Science Foundation of China under Grants 61671411 and [22] have developed an energy-efficient secure beamforming
61302076. (Corresponding author: Q. Shi) scheme for self-sustainable relay-aided multicast networks. In
Y. Cai is with the Department of Information Science and Electronic addition, the investigations in [23] and [24] have proposed
Engineering, Zhejiang University, Hangzhou 310027, China (e-mail: yl-
cai@zju.edu.cn). robust beamforming algorithms to improve the secrecy per-
Q. Shi is with the School of Information and Science Technol- formance in the presence of imperfect eavesdroppers’ channel
ogy, Zhejiang Sci-Tech University, Hangzhou 310018, China (e-mail: state information (CSI). However, there is only limited work
qing.j.shi@gmail.com).
B. Champagne is with the Department of Electrical and Computer En- on the joint optimization of the base station (BS) beamforming
gineering, McGill University, Montreal, QC, Canada, H3A 0E9 (e-mail: matrix and the RS transformation matrix for secrecy sum-rate
benoit.champagne@mcgill.ca). maximization in secure multiuser MIMO relay systems, which
G. Y. Li is with the School of Electrical and Computer Engineering, Georgia
Institute of Technology, Atlanta, USA (e-mail: liye@ece.gatech.edu). could potentially further improve the performance metrics for
secure communications. An optimal power allocation scheme
with each other for stealing the legitimate users’ information. J k
We consider the joint optimization problem for the BS beam- E
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3693
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017 3
MIMO relaying literature, the transmission is divided into two worst-case scenario of colluding eavesdroppers, where all the
orthogonal phases. Flat channel fading is assumed throughout, Ek can be treated as a virtual multi-antenna eavesdropper that
but extension to frequency selective channels is possible. performs joint processing. From the derivation in Appendix
In the first phase (from BS to RS), the received vector at A, and by assuming that the optimal maximum ratio com-
the RS is given by biner (MRC) scheme is employed, the SINR at the colluding
eavesdropper for user l is given by (9).
rR = H1 Pb + n1 , (1)
where b = [b1 , . . . , bL ]T denotes the L × 1 transmitted B. Problem formulation
symbol vector, whose elements are modeled as independent
Acquiring eavesdroppers’ CSI in a practical wireless net-
zero-mean circular complex Gaussian random variables with
work is quite challenging. However, according to [28] we can
variance E{|bl |2 } = 1, P = [p1 , . . . , pL ]∈CNt ×L denotes the
still estimate the CSI through the local oscillator power inad-
BS beamforming matrix, H1 ∈CNr ×Nt is the channel matrix
vertently leaked from the eavesdroppers receiver RF frontend.
between the BS and the RS and n1 ∈CNr ×1 is the additive
However, when compared to the legitimate receivers’ CSI, the
zero-mean circular complex Gaussian noise vector at the RS
eavesdroppers’ CSI is expected to be much less accurate. In
with covariance matrix E{n1 nH 1 } = σ1 I, where σ1 denotes
2 2
this work, we consider the commonly used norm-bounded
the noise variance.
error (NBE) model [29] to characterize the eavesdroppers’
In the second phase (from RS to Dl , ∀l ∈ L), the received
CSI. The true (but unknown) CSI for the BS-Ek and RS-Ek
vector rR ∈CNr ×1 at the RS is operated by the RS AF
channels can be expressed as follows:
transformation matrix W∈CNr ×Nr . Moreover, an artificial
noise (AN) vector v∈CNr ×1 with zero mean and covariance gj,k = ĝj,k + △gj,k , k ∈ K, j ∈ {1, 2} (10)
matrix V = E[vvH ] is sent by the RS to guarantee security.
Accordingly, the forwarded signal vector from the RS is given where ĝj,k denotes the imperfect channel estimate while
by △gj,k captures the corresponding uncertainty. Without any
xR = W(H1 Pb + n1 ) + v. (2) statistical knowledge of the latter we assume that it lies in
the following bounded region
Consequently, the received signal at the lth legitimate user is
given by Rj,k = {△gj,k : ∥△gj,k ∥2 ≤ ε2j,k } (11)
yD,l = hH H H
2,l xR + n2,l = h2,l W(H1 Pb + n1 ) + h2,l v + n2,l ,
where εj,k denotes the radius of the uncertainty region. There-
(3) fore, the worst-case system secrecy rate [12], [21] can be
where h2,l ∈CNr ×1 is the conjugate transpose of the channel expressed as follows
vector between the RS and the lth legitimate user, and n2,l ( )
1∑
L
denotes the additive noise, modeled as a zero-mean circular C(P, V, W) = log 1 + SINRD l
complex Gaussian noise, where with variance E{|n2,l |2 } = 2
l=1
2
σ2,l . ( )
1∑
L
From (1) and (2), the transmit power of the BS in the first − max log 1 + SINRl .E
∀△gj,k ∈Rj,k 2
phase and that of the RS in the second phase will be l=1
(12)
PB = E{∥Pb∥2 } = ∥P∥2 (4)
To guarantee the secure transmission, we aim to design
and the BS beamforming matrix P, the AN covariance matrix V
PR = E{∥xR ∥2 } = ∥WH1 P∥2 + σ12 ∥W∥2 + Tr{V}, (5) and the RS AF transformation matrix W jointly, in order to
maximize the worst-case system secrecy rate under the BS
respectively. From (3), the received signal-to-interference- and the RS power constraints while keeping the SINRs of the
plus-noise ratio (SINR) at legitimate user l is given by (6). legitimate users above a certain threshold, i.e., QoS constraint.
During the transmission, each Ek for k ∈ K can overhear The corresponding optimization problem can be formulated as
signals from both the BS and the RS. Let g1,k ∈CNt ×1 and
g2,k ∈CNr ×1 denote the conjugate transpose BS-Ek and RS-
Ek channels, respectively. The signals overheard by Ek from max C(P, V, W) (13a)
P,W,V≽0
the BS and the RS during the two transmission phases will be s.t. PB ≤ Pt , PR ≤ Pr , (13b)
H
y1,k = g1,k Pb + n1,k , (7) SINRD
l ≥ γl , ∀l ∈ L. (13c)
and As we can see from the inspection of (4)-(6), (9) and (12), the
H H H design variables are highly coupled in the objective function
y2,k = g2,k xR + n2,k = g2,k W(H1 Pb + n1 ) + g2,k v + n2,k ,
and constraints and accordingly, it appears impossible to
(8)
globally solve problem (13). In the following section, we
respectively, where n1,k and n2,k denote circular complex propose an efficient joint design algorithm that can find a local
Gaussian additive noise terms with zero-mean and variances stationary solution by applying proper convex optimization
2 2
σ1,k and σ2,k , respectively. In this work, we consider the techniques.
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3694 IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER42017
|hH
2,l WH1 pl |
2
SINRD
l = ∑L . (6)
l′ ̸=l |hH
2,l WH1 pl | + σ1 ∥h2,l W∥ + h2,l Vh2,l + σ2,l
′ 2
2 H 2 H 2
K (
∑ )
|g1,k
H
pl |2 |g2,k
H
WH1 pl |2
SINRE
l = ∑L + ∑L . (9)
k=1 l′ ̸=l
H p ′ |2 + σ 2
|g1,k l 1,k l′ ̸=l
H WH p ′ |2 + σ 2 ∥gH W∥2 + gH Vg
|g2,k 1 l 1 2,k 2,k
2
2,k + σ2,k
III. P ROPOSED JOINT TRANSCEIVER DESIGN it into a combination of a linear matrix inequality (LMI) and
a difference of convex (DC) function equality:
In this section, we propose to employ an extended penalty
method, referred to as the penalty-CCCP algorithm, which is G11 X WH1
detailed in Appendix B, to address problem (13). In Subsection XH G22 PH ≽ 0, (18)
A, by applying the penalty technique, we present an alternative H H
H1 W P I
formulation to (13) where a penalty term is incorporated into
the objective in order to handle a complex constraint. In Tr{G11 } − Tr{WH1 HH
1W }=0
H
(19)
Subsections B and C, we transform the penalized problem
into a more tractable yet equivalent problem and develop where G11 and G22 are introduced as auxiliary variables.
an efficient CCCP algorithm to solve it. In particular, in Moreover, due to (18), the left-hand-side of (19) must be
order to approximate the equivalent problem as a convex nonnegative. Making use of (18) and (19), problem (14) can
problem, a locally tight lower bound for the objective function be recast as
is derived; furthermore, linearization is used to approximate
the nonconvex constraints. In Subsection D, we analyze the max C(P, V, W, X) (20a)
P,W,V≽0,X
computational complexity of the proposed transceiver design
algorithm. s.t. (14b) − (14d), (18), (20b)
√
1 W } = 0, (20c)
Tr{G11 } − Tr{WH1 HH H
l′ ̸=l |hH
2,l xl | + σ1 ∥h2,l W∥ + h2,l Vh2,l + σ2,l
′ 2
2 H 2 H 2
the objective via the inequality (21c) and τ > 0 denotes the
(16) corresponding penalty parameter that prescribes a high cost
and for the violation of the constraint. In particular, in the limit
K (
∑ τ → ∞, problems (14) and (21) are equivalent [31].
|g1,k
H
pl |2
ηlE = ∑L
k=1 l′ ̸=l |g1,k
H p ′ |2 + σ 2
l 1,k
) B. Problem transformation
|g2,k
H
xl |2
+ ∑L .
l′ ̸=l |g2,k xl | + σ1 ∥g2,k W∥ + g2,k Vg2,k + σ2,k
H ′ 2
2 H 2 H 2 We first transform optimization problem in (21) in-
(17) to an equivalent yet more tractable form. Specifical-
ly, by introducing a number of auxiliary variables, i.e.
Note that here for clarity, we have rewritten the SINR ex- {ul , vl , αk,l , βk,l , ρk,l , ϕk,l }, (21) can be formulated as the
pressions in (16) and (17). According to [30], in order to deal following equivalent problem (22), in the sense that both
with the equality constraint (14e), we can equivalently convert problems share the same global optimal solutions for P, W
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3695
5
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
( ) ( )
1∑ 1∑ ∑ ∑
L L K K
max max log(vl ) − vl el (ul , X, W, V) − log 1 + αk,l + ρk,l − τ θ (22a)
{αk,l ,βk,l , {ul ,vl >0} 2 2
ρk,l ,ϕk,l }, l=1 l=1 k=1 k=1
P,W,V≽0,X
s.t. (14b) − (14d), (18), (21c), (22b)
∑L
2
(σ1,k + l′ ̸=l |g1,k
H
pl′ |2 )
|g1,k
H
pl |2 − ≤ 0, (22c)
ϕk,l
∑L
(σ12 ∥g2,k
H
W∥2 + l′ ̸=l |g2,k H
xl′ |2 + g2,k
H 2
Vg2,k + σ2,k )
|g2,k xl | −
H 2
≤ 0, (22d)
βk,l
ρk,l βk,l ≥ 1, (22e)
αk,l ϕk,l ≥ 1, (22f)
∀△gj,k ∈ Rj,k , j ∈ {1, 2}, ∀l ∈ L, ∀k ∈ K, (22g)
and V under the given constraints, where 1) Lower bound for the objective function: Let us treat
∑ the variables {ul , vl : ∀l ∈ L} as the intermediate variables,
el (ul , X, W, V) , |1 − u∗l hH
2,l xl | +
2
|u∗l hH
2,l xl′ |
2
then for any X, W, V, X̄, W̄, V̄, we can obtain the following
l′ ̸=l
inequality for the objective function (i.e., the inner maximiza-
+ |ul |2 (σ12 ∥hH 2 H 2
2,l W∥ + σ2 + h2,l Vh2,l ) tion) of problem (22):
(23)
( )
1∑
L
denotes the mean squared error (MSE) of user l, and ul denotes max log(vl ) − vl el (ul , X, W, V) −
the receiver weight of user l. Note that ul only appears in {ul ,vl } 2
l=1
the objective function (22a); hence, by fixing the remaining ( )
1∑ ∑ ∑
L K K
variables and taking the gradient with respect to u∗l , we obtain log 1 + αk,l + ρk,l − τ θ
the minimum mean squared error (MMSE) receiver: 2
l=1 k=1 k=1
( ) (26)
1∑
L
hH
2,l xl
ũl = ∑L . ≥ log(v̄l ) − v̄l el (ūl , X, W, V) −
|hH
2,l xl | + σ1 ∥h2,l W∥ + h2,l Vh2,l + σ2
l′ =1
′ 2
2 H 2 H 2 2
l=1
(24) ( )
1∑ ∑ ∑
L K K
Using (24), the value of the MSE in (23) is now given by log 1 + αk,l + ρk,l − τ θ,
2
2,l xl |
|hH 2 l=1 k=1 k=1
ẽl = 1 − ∑L .
|hH
2,l xl | + σ1 ∥h2,l W∥ + h2,l Vh2,l + σ2
l′ =1
′ 2
2 H 2 H 2 where v̄l and ūl are given by
(25)
1
The detailed proof of the equivalence between problems (21) v̄l = , (27)
and (22) is presented in Appendix C. ēl
|hH
2,l x̄l |
2
C. Proposed CCCP algorithm for solving problem (22) ēl = 1 − ∑L ,
In the following, we develop an efficient CCCP algorithm |hH 2,l x̄l | + σ1 ∥h2,l W̄∥ + h2,l V̄h2,l + σ2
l′ =1
′ 2
2 H 2 H 2
(28)
for the optimization of P, W and V in problem (22), which
by nature is non-convex. In order to approximate this problem hH 2,l x̄ l
ūl = ∑L .
as a convex one, we first find a locally tight lower bound of ′
l =1 |h H x̄ ′ |2 + σ 2 ∥hH W̄∥2 + hH V̄h
2,l l 1 2,l 2,l
2
2,l + σ2
the objective and then linearize the nonconvex constraints with (29)
the aid of CCCP concepts, so that the nonconvex problem can Since the logarithm function is concave, we can see that
be approximated as a convex one. the right-hand-side of inequality (26) can be rewritten as
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3696 IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
6
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3697
7
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
( )
∑K
∑
L k=1 (αk,l − αk,l
i
) + (ρk,l − ρik,l )
1 (33)
fˆ2 (si1 , s1 ) = f2 (si1 ) + 2ℜ{▽f2H (si1 )(s1 − si1 )} = f2 (si1 ) − ∑K .
2 1 + k=1 (αk,l i + ρi )
k,l
l=1
[ ]
H
hH2,l xl
[h2,l x1 , . . . , hH x , hH
x , . . . , h H
x ], σ h H
W, π , σ
2,l
≤ √ , ℑ{hH
2,l xl } = 0. (37)
2,l (l−1) 2,l (l+1) 2,l L 1 2,l 1,l
γ1
{ 2 H } ( 2 H ∑L )
σ1 g2,k Wi WH g2,k σ1 ∥g2,k Wi ∥2 + l′ ̸=l |g2,k
H
xil′ |2 + π2,k
i2 2
+ σ2,k βk,l
ˆ i
f6 (s3 , s3 ) = 2ℜ −
i
βk,l i2
βk,l
{∑ L iH H } 2 i (50)
xl′ g2,k g2,k xl′ 2σ2,k + 2π2,k π2,k
+ 2ℜ i
+ i
.
′
βk,l βk,l
l ̸=l
−Uk,l + µk I ( −Uk,l
) ĝ2,k
2
2σ2,k i
+2π2,k π2,k
i2
π2,k 2
+σ2,k βk,l ≽ 0, (51)
−ĝ2,k
H
Uk,l i
βk,l
− i2
βk,l
− ĝ2,k
H
Uk,l ĝ2,k − µk ε22,k
where fˆ6 (si3 , s3 ) is shown in (50). By following the same TABLE I: Proposed CCCP algorithm for problem (22)
approach as in Appendix E, we can equivalently convert (49)
into the finite LMI constraint (51) and 1. Define the tolerance of accuracy δ2 and the maximum number of
iteration Nmax . Initialize the algorithm with a feasible point (P,
W, X, V) and set W̄ = W, X̄ = X, V̄ = V. Set the iteration
[ ] number i = 0.
Fl xl
≽0 (52) 2. Repeat
xH
l 1 – Update {ūl } based on (29), ∀l ∈ L.
– Update {v̄
{ l } based on (27), ∀l ∈ L. }
– Update P, W, V, X, {αk,l , βk,l , ρk,l , ϕk,l }, θ based on
σ12 Wi WH +σ12 WWiH σ12 Wi WiH βk,l solving problem (54), ∀l ∈ L, ∀k ∈ K.
where Uk,l , Fl − i + −i2 – Update the iteration number : i = i + 1.
( βk,l
) βk,l
∑L xl′ xiH i H
′ +x ′ x ′ xi′ xiH
′ βk,l
3. Until the difference successive values of the objective function is
l′ ̸=l
l l l
i
βk,l
− l l
i2
βk,l
, and µk ≥ 0 denotes a less than δ2 or the maximum number of iterations is reached, i.e.,
i > Nmax .
slack variable.
Finally let us tackle constraint (21c). Due to the DC
constraint, by linearizing the subtrahend Tr{WH1 HH1W }
H
i
around the current point W , (21c) can be approximated as of the original problem.2
the following linear constraint:
D. Computational Complexity
(
Tr{G11 } − Tr{W H1 HH1W }
i iH In this part, we present the computational complexity
) (53) analysis for the proposed penalty-CCCP transceiver design
+ 2ℜ{Tr{H1 HH iH
1 W (W − W )}} ≤ θ.
i
algorithm. To this end, we apply the same basic elements of
complexity analysis as in [38].
Finally, by following the CCCP concept, problem (22) can Since the update of ūl and v̄l only requires solving closed
be reformulated as a convex optimization problem in the ith form solutions, the complexity of the proposed algorithm
iteration shown in (54). This problem can be efficiently solved is dominated by solving problem (54) I1 I2 times, where
by the convex programming toolbox CVX [37]. I1 and I2 denote the number of iterations for the outer
and inner loop, respectively. Problem (54) mainly involves
The proposed CCCP algorithm for solving problem (22) is
summarized in Table I. Moreover, the overall penalty-CCCP 2 In the absence of better alternative, it is readily seen that this proposed
algorithm is summarized in Table II, where f (τ (n) ) denotes algorithm is currently the best choice for solving this optimization problem.
the value of objective function (34) in the nth iteration of the Due to the NP-hard nature of the problem, based on the current optimization
techniques, it does not seem possible to provide a quantitative analysis of
outer loop. Since we propose applying the CCCP algorithm to the performance gap between the optimal solution and that obtained with
address the penalized problem, the proposed transceiver design the proposed algorithm. At the present time, providing stationary point
scheme is referred to as penalty-CCCP algorithm. Based on convergence is the best we can do in terms of convergence analysis for
this kind of constrained optimization problem. The characterization of the
the proof in Appendix B, we can see that the proposed joint performance gap between the optimal and iterative solutions remains an open
transceiver design algorithm converges to a stationary solution problem for the future research.
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
-7
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3699 9
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
1.6 1
K=3, L=3, N =6
r
1.4 K=3, L=3, N =8
r
0.9
0.7
1
Value of Z
0.6
0.8
5
4.5
4.5
Joint design with AN (ǫ=0.1) Joint design with AN
Joint design without AN (ǫ=0.1) AO with AN
4 Joint design with AN (ǫ=0.3) 4
Joint design without AN
Joint design without AN (ǫ=0.3) AO without AN
Secrecy rate (bits/s/Hz)
3
3
2.5
2.5
2
1.5 2
1
1.5
0.5
1
0
4 5 6 7 8 9 10 11 12
0.5
Nr 1 2 3 4
K
Fig. 4: Secrecy rate versus the number of relay antennas (Nr )
for the proposed joint transceiver design algorithm (K = 3). Fig. 6: Secrecy rate versus the number of eavesdroppers for the
proposed joint transceiver design algorithm with and without
AN, and for the AO and null-space based beamforming
mance of the proposed joint transceiver design algorithm with algorithms (Nr = 8, ε = 0.1).
AN, with that of its counterpart without AN. We show the
results for ε = 0.1 and ε = 0.3. Fig. 4 shows the steady-
state secrecy rate performance of the two algorithms versus the Nr , while it decreases as the eavesdroppers’ CSI error bound
number of RS antennas (Nr ). From the figure, it is seen that increases. Moreover, the proposed joint transceiver design
the secrecy rate performance improves as the number of RS algorithm with AN outperforms its counterpart without AN,
antennas increases. Moreover, the proposed joint transceiver which shows the effectiveness of the proposed approach.
design with AN achieves superior performance than the design In the following experiment, we compare the performance
without AN. In addition, an increase in the size of the of the proposed joint transceiver design algorithm with and
eavesdroppers’ CSI errors degrade the performance. without AN, as well as of the conventional AO-CCCP based
Fig. 5 compares the percentage of successful cases achieved transceiver design and the existing null-space beamforming
by the proposed joint algorithm with and without AN designs approach for MIMO relay systems. For the null-space beam-
versus the number of RS antennas (Nr ), for different values of forming scheme, the RS attempts to nullifies eavesdroppers
channel error bound and K = 3. In this simulation, a design reception by exploiting the null-space of the estimated eaves-
algorithm is considered unsuccessful for a channel realization droppers’ second phase channel matrix in the design of the RS
if CVX reports an infeasible status. From this figure, it is AF transmission matrix [19]–[21]. Therefore, this method is
seen that the rate of success of both algorithms increases with only applicable, when Nr > 2K. Fig. 6 depicts the system
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3700 10
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
secrecy rate performance versus the number of eavesdrop- channel vector and
pers (K) for the analyzed algorithms. In particular, we set ∑
2 H
Σl = Diag{[σ1,1 + g1,1 pl′ pH g ,
l′ 1,1
Nr = 8 and ε = 0.1 in this simulation. From the results, the
l′ ̸=l
proposed joint transceiver design algorithm outperforms the ∑
1 W g2,1 + |g2,1 W| σ1
H
conventional alternating optimization based algorithm and the g2,1 WH1 pl′ pH
l′
HH H H 2 2
n2,K ]T ∈ C2K×1 denotes the interference and noise particular, when ϱ → ∞, solving the above problem yields
vector. The eavesdropper aims to design a joint receiver to an identical solution to problem (60) [31]. However, it is
maximize the received SINR. By defining the joint receiver still difficult to globally solve problem (P ) when it is a
ϱ
as fl ∈ C2K×1 , then we formulate the following problem: nonconvex problem. Thus, we propose the penalty-CCCP
method summarized in Table III to solve problem (60), where
max Υ (56) in each iteration problem (Pϱ ) is approximately solved using
fl
the CCCP method. The resulting solution is denoted simply
as xk+1 = CCCP (Pϱk , xk ) in Step 2 of Table III.
|f p̃ |
H 2
where Υ = f Hl Σll fl denotes the SINR at the colluding eaves- Regarding the convergence of the penalty-CCCP method,
l
dropper for user l. Here, p̃l = H̃l pl denotes the equivalent we have the following theorem.
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3701
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
11
H −1
SINRE
l = p̃k Σk p̃k
∑K ( )
|g1,k
H
pl |2 |g2,k
H
WH1 pl |2 (59)
= ∑L + ∑L .
l′ ̸=l |g1,k pl | l′ ̸=l |g2,k WH1 pl | σ12 ∥g2,k
H ′ 2 + 2
σ1,k H ′ 2 + H W∥2 + H Vg
g2,k + 2
σ2,k
k=1 2,k
TABLE III: Penalty-CCCP algorithm for problem (60) the limit on both sides of the above equality, we can show that
there exists µ⋆ and ν ⋆ ≥ 0 together with x⋆ such that
0. initialize x0 ∈ X , ϱ0 > 0, and set c > 1, k = 0
1. repeat ∇f (x⋆ ) + ∇h(x⋆ )T µ⋆ + ∇g(x⋆ )T ν ⋆ = 0.
2. xk+1 = CCCP (Pϱk , xk ) This completes the proof.
3. ϱk+1 = cϱk
Remark: The termination condition (62) is used to establish
4. k =k+1
the convergence of the penalty-CCCP algorithm. In practice,
5. until some termination criterion is met
however, it is also reasonable to terminate the penalty-CCCP
algorithm based on the progress of the objective value fρ (x),
|f (xk )−fρ (xk−1 )|
i.e., ρ |fρ (xk−1 ≤ ϵk .
Theorem 1: Let ν k ≥ 0 be the multiplier associated with )|
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
12
3702 IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
( )
1∑
L
max log 1 + ηlE
∀△gj,k ∈Rj,k 2
l=1
(
1∑ ∑ ( |g1,k pl |2
L K H
= log 1 + max ∑L (64)
l′ ̸=l |g1,k pl | + σ1,k
2 ∀△g1,k ∈R1,k H ′ 2
2
l=1 k=1
)
|g2,k
H
xl |2 )
+ max ∑L .
∀△g2,k ∈R2,k
l′ ̸=l |g2,k
H x ′ |2 + σ 2 ∥gH W∥2 + gH Vg
l 1 2,k 2,k
2
2,k + σ2,k
( ) ( )
1∑ 1∑ ∑ ∑
L L K K
max log 1 + ηl −
D
log 1 + αk,l + ρk,l − τ θ (65a)
{αk,l ,ρk,l },P,W,V≽0,X 2 2
l=1 l=1 k=1 k=1
s.t. (14b) − (14d), (18), (21c), (65b)
|g1,k
H
pl |2
∑L ≤ αk,l , (65c)
l′ ̸=l
H p ′ |2 + σ 2
|g1,k l 1,k
|g2,k
H
x l |2
∑L ≤ ρk,l , (65d)
l′ ̸=l |g2,k
H x ′ |2 + σ 2 ∥gH W∥2 + gH Vg
l 1 2,k 2,k
2
2,k + σ2,k
( ) ( )
1∑ 1∑ ∑ ∑
L L K K
max log 1 + ηl −
D
log 1 + αk,l + ρk,l − τ θ (66a)
{αk,l ,ρk,l ,βk,l ,ϕk,l }, 2 2
P,W,V≽0,X l=1 l=1 k=1 k=1
( ) ( )
1∑ 1∑ ∑ ∑
L L K K
1
max log − log 1 + αk,l + ρk,l − τ θ, (68a)
{αk,l ,βk,l ,ρk,l ,ϕk,l }, 2 ẽl 2
P,W,V≽0,X l=1 l=1 k=1 k=1
By taking the square root of (70), (14c) can be converted to converted to the following SOC constraint:
the following SOC constraint:
[ ]
[ ]
1, (ρk,l − βk,l )
≤ (ρk,l + βk,l ) . (73)
2
2
vec(X)T , σ1 vec(W)T , (Pr − Tr{V} − 1)
2
By following the same approach, (22f) can be equivalently
(71)
(Pr − Tr{V} + 1) transformed into the following SOC constraint:
≤ .
[ ]
1, (αk,l − ϕk,l )
≤ (αk,l + ϕk,l ) .
2
(74)
Then, let us focus on (22e) and (22f). Note that (22e) can 2 2
be rewritten as
A PPENDIX E
(ρk,l − βk,l )2 (ρk,l + βk,l )2 T HE LMI CONSTRAINTS
1+ ≤ . (72)
4 4 Let us equivalently convert (40) into (75) based on the
∑L ( { pl piH }
By taking the square root of both sides of (72), (22e) can be S-procedure, where Ỹk,l , pl pHl − l′ ̸=l 2ℜ ϕi
l
−
k,l
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3703
IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017 13
[ ]
−Ỹk,l + λk I −Ỹk,l ĝ1,k
2
2σ1,k 2
σ1,k ϕk,l ≽ 0, (75)
−ĝ1,k
H
Ỹk,l ϕik,l
− ϕi2
− ĝ1,k
H
Ỹk,l ĝ1,k − λk ε21,k
k,l
[ ]
−Yk,l + λk I −Yk,l ĝ1,k
2
2σ1,k 2
σ1,k ϕk,l ≽ 0, (76)
−ĝ1,k
H
Yk,l i
ϕk,l
− ϕi2
− ĝ1,k
H
Yk,l ĝ1,k − λk ε21,k
k,l
pil piH
l ϕk,l
)
ϕ2i
. We note that (75) is not LMI due to the second [16] Z. Ding, M. Peng, and H.-H. Chen, “A general relaying transmission
k,l
protocol for MIMO secrecy communications,” IEEE Trans. Commun.,
order term pl pH
l .
To tackle this problem, we introduce a new vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
auxiliary matrix variable Dl , ∀l ∈ L, which is subject to [17] J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure
Dl ≽ pl pH l . Therefore, (75) can be equivalently expressed
communications in MIMO relay networks,” IEEE Trans. Signal Process.,
vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
as (76) and [18] Q. Li, Q. Zhang, and J. Qin, “Secure relay beamforming for simulta-
Dl ≽ pl pH l , (77) neous wireless information and power transfer in nonregenerative relay
networks,” IEEE Trans. Vehi. Technol., vol. 63, no. 5, pp. 2462-2467, Jun.
∑L ( { p piH } pil piH l ϕk,l
)
where Yk,l , Dl − l′ ̸=l 2ℜ ϕl i l − ϕ2i
. It is 2014.
k,l k,l [19] C. Wang, H. Wang, D. W. K. Ng, X.-G. Xia, and C. Liu, “Joint
readily seen that (76) now corresponds to an LMI constraint. beamforming and power allocation for secrecy in peer-to-peer relay
Furthermore, by applying the Schur complement [36], (77) can networks,” IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3280-3293,
Jun. 2015.
be transformed into the following LMI constraint:
[20] H. Wang, F. Liu, and X.-G. Xia, “Joint source-relay precoding and power
[ ] allocation for secure amplify-and-forward MIMO relay networks,” IEEE
Dl pl
≽ 0. (78) Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
pH
l 1 [21] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless
physical layer security via cooperating relays,” IEEE Trans. Signal
Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
R EFERENCES
[22] H. Gao, T. Lv, W. Wang, and N. C. Beaulieu, “Energy-efficient and
[1] Y. Liang, H. V. Poor, and S. Shamai, “Information theoretical security,” secure beamforming for self-sustainable relay-aided multicast networks,”
Found. Trends Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2008. IEEE Signal Process. Lett., vol. 23, no. 11, pp. 1509-1513, Nov. 2016.
[2] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, [23] C. Wang and H. Wang, “Robust joint beamforming and jamming for
pp. 1355-1387, Jan. 1975. secure AF networks: low-complexity design,” IEEE Trans. Vehi. Technol.,
[3] R. Liu and W. Trappe, Securing Wireless Communications at the Physical vol. 64, no. 5, pp. 2192-2198, May 2014.
Layer. Springer, Norwell, MA, USA, 2009. [24] C. Zhang, H. Gao, H.-J. Liu, and T. Lv, “Robust beamforming and
[4] A. Khisti and G. Wornell, “Secure transmission with multiple antennas— jamming for secure AF relay networks with multiple eavesdroppers,” in
I: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. IEEE Military Commun. Conf. (MILCOM), pp. 495-500, Oct. 2014.
7, pp. 3088- 3104, July. 2010. [25] D. Wang, B. Bai, W. Chen, and Z. Han, “Energy efficient secure
[5] A. Khisti and G. Wornell, “Secure transmission with multiple antennas— communication over decode-and-forward relay channels,” IEEE Trans.
II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. Commun., vol. 63, no. 3, pp. 892–905, Mar. 2015.
11, pp. 5515-5532, Nov. 2010. [26] A. L. Yuille and A. Rangarajan, “The concave-convex procedure,”
[6] M. Bloch and J. Barros, Physical-Layer Security: From Information Neural Computation, vol. 15, no. 4, pp. 915–936, Apr. 2003.
Theory to Security Engineering. Cambridge University Press, 2011. [27] G. R. Lanckriet and B. K. Sriperumbudur, “On the convergence of
[7] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, the concave-convex procedure,” in Advances in Neural Info. Processing
“Safeguarding 5G wireless communication networks using physical layer Systems, pp. 1759–1767, 2009.
security,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015. [28] A. Mukherjee and A. L. Swindlehurst, “Detecting passive eavesdroppers
[8] T. Lv, H. Gao and S. Yang, “Secrecy transmit beamforming for hetero- in the MIMO wiretap channel,” in Proc. IEEE ICASSP, Kyoto, Japan, pp.
geneous networks,” IEEE J. Sel. Areas Commun., vol. 33, no. 6, pp. 2809-2812, Mar. 2012.
1154-1170, Jun. 2015. [29] P. Ubaidulla and A. Chockalingam, “Relay precoder optimization in
[9] J. N. Laneman and G. W. Wornell, “Cooperative diversity in wireless MIMO-relay networks with imperfect CSI,” IEEE Trans. Signal Process.,
network: Efficient protocols and outage behaviour,” IEEE Trans. Inf. vol. 59, no. 11, pp. 5473-5484, Nov. 2011.
Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
[30] P. Apkarian and H. D. Tuan, “Robust control via concave minimization
[10] Y.-W. Hong, P. Lan, P.-C. Kuo, and C.-C. Jay, “Enhancing physical-
local and global algorithms,” IEEE Trans. Autom. Control, vol. 45, no. 2,
layer secrecy in multiantenna wireless systems: An overview of signal
pp. 299-305, Feb. 2000.
processing approaches,” IEEE Signal Process. Mag., vol. 30, no. 5, pp.
[31] D. Bertsekas, Nonlinear Programming, 2nd ed. Belmont, MA: Athena
29-40, 2013.
Scientific, 1999.
[11] X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, “Multi-antenna relay
aided wireless physical layer security” IEEE Commun. Mag., vol. 53, no. [32] Z. Lu and Y. Zhang, “Sparse approximation via penalty decomposition
12, pp. 40-46, Dec. 2015. methods,” SIAM J. Optim., vol. 23, no. 4, pp. 2448-2478, 2013.
[12] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, [33] Z. Lu and Y. Zhang, “Penalty decomposition methods for rank minimiza-
“Principles of physical layer security in multiuser wireless networks: A tion,” Optim. Methods Softw., vol. 30, no. 3, pp. 531-558, May 2015.
survey,” IEEE Commun. Surv. Tut., vol. 16, no. 3, pp.1550-1573, 2014. [34] D. H. Brandwood, “A complex gradient operator and its application in
[13] C. Jeong, I.-M. Kim, and D. Kim, “Joint secure beamforming design adaptive array theory,” in Proc. Inst. Elect. Eng., vol. 130, no. 1, pp.
at the source and the relay for an amplify-and-forward MIMO untrusted 11-16, 1983.
relay system,” IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, [35] Y. Cheng and M. Pesavento, “Joint optimization of source power
Jan. 2012. allocation and distributed relay beamforming in multiuser peer-to-peer
[14] J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO relay networks,” IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2962-
two-way communications with an untrusted relay,” IEEE Trans. Signal 2973, Jun. 2012.
Process., vol. 62, no. 9, pp. 2185-2199, May 1, 2014. [36] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
[15] C. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret key generation Cambridge Univ. Press, 2004.
with colluding untrusted relays,” IEEE Trans. Wireless Commun., vol. 15, [37] M. Grant and S. Boyd. CVX: Matlab software for disciplined convex
no. 2, pp. 1517-1530, Feb. 2016. programming, version 2.0 beta. http://cvxr.com/cvx, Sep. 2013.
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2017.2708110, IEEE
Transactions on Communications
3704 IEEE TRANSACTIONS ON COMMUNICATIONS, VOLUME 65, NO 9, SEPTEMBER 2017
14
[38] K.-Y. Wang, A. Man-Cho So, T.-H. Chang, W.-K. Ma, and C.-Y. Chi,
“Outage constrained robust transmit optimization for multiuser MISO
downlinks: Tractable approximations by conic optimization,” IEEE Trans.
Signal Process., vol. 62, no. 21, pp. 5690-5705, Nov. 2014.
[39] Y. Cai, M.-M. Zhao, Q. Shi, B. Champagne, and M.-J. Zhao, “Joint
transceiver design algorithms for multiuser MISO relay systems with
energy harvesting,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4147–
4164, Oct. 2016.
[40] M.-M. Zhao, Y. Cai, Q. Shi, M. Hong, and B. Champagne, “Joint
transceiver designs for full-duplex K-pair MIMO interference channel
with SWIPT,” IEEE Trans. Commun., vol. 65, no. 2, pp. 890–905, Feb.
2017.
[41] R. A. Horn and C. R. Johnson, Matrix analysis. Cambridge, U.K.:
Cambridge Univ. Press, 2012.
[42] Q. Shi, M. Hong, X. Gao, E. Song, Y. Cai, and W. Xu, “Joint source-
relay design for full-duplex MIMO AF relay systems,” IEEE Trans. Signal
Process., vol. 62, no. 23, Dec. 2016.
[43] A. Ruszczynski, Nonlinear Optimization. Princeton University Press,
2011.
0090-6778 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.