3pt {textblock}0.84(0.08,0.95) ©2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. DOI: 10.1109/JIOT.2023.3313870.
Joint Information and Jamming Beamforming for Securing IoT Networks With Rate-Splitting
Abstract
The goal of this paper is to address the physical layer (PHY) security problem for multi-user multi-input single-output (MU-MISO) Internet of Things (IoT) systems in the presence of passive eavesdroppers (Eves). To this end, we propose an artificial noise (AN)-aided rate-splitting (RS)-based secure beamforming scheme. Our design considers the dual use of common messages and places the research emphasis on hiding the private messages for secure communication. In particular, leveraging AN-aided RS-based beamforming, we aim to maximize the focused secrecy sum-rate (F-SSR) by jointly designing transmit information and AN beamforming while satisfying the desired received constraints for the private messages at IoT devices (IoDs), and per-antenna transmit power constraint at base station. Then, we proposed a two-stage algorithm to iteratively find the optimal solution. By transforming non-convex terms into linear terms, we first reformulate the original problem as a convex program. Next, we recast the optimization problem to an unconstrained problem to obtain the global optimal solutions. Utilizing the duality framework, we further develop an efficient algorithm based on a barrier interior point method to solve the reformulated problem. Simulation results validate the superior performance of our proposed schemes.
Index Terms:
Rate splitting, physical layer security, beamforming, artificial noise (AN), secrecy sum-rate, Internet of Things (IoT).I Introduction
The sixth-generation (6G) wireless communication networks are envisioned to revolutionize customer services and applications via the Internet of Things (IoT) to a future of highly intelligent and autonomous system [1]. With the dramatic increase of IoT devices (IoDs) in a variety of emerging application scenarios, such as smart city, data analysis, intelligent transportation, and security surveillance, vast amounts of private and resource information are interacted through IoT networks [2, 3, 4]. Similarly to other wireless networks, IoT networks are particularly faced with security threats due to the broadcasting kind of wireless medium. Unfortunately, many low-end IoT commercial products do not usually support strong security mechanisms, and can hence be target of a number of security attacks. Traditionally, secure communication relies on the cryptographic encryption. However, it may fail to provide satisfactory secure transmission with the development of computing power and intelligent detection technologies in future networks. Physical layer (PHY) security, as an alternative method, which does not depend on the computing power and key management, has attracted extensive attention recently [5]. For PHY security, the key is to exploit the randomness of wireless channels to achieve encrypting data transmission [6]. Specifically, PHY security technique allows the enhancement of signal gain on the desired users’ directions while reducing power leakage and/or debilitating signal phase along the eavesdropper (Eve) by judiciously designing the beamforming of the multiple transmit antennas [7].
It is of interest to exploit flexibility at PHY that provides secure wireless communication. The wiretap channel is a fundamental primitive to model eavesdropping at the PHY [8]. After that, Csisźar and Körner studied the secure communication over broadcast channel [9], and established the secrecy rate, which is an epoch-making metric of measuring the security performance. Inspired by these works, nowadays various techniques have been researched to achieve PHY security. In [10], the authors proposed switched phased-array transmission schemes to scramble the constellation in both amplitude and phase along undesired directions. The authors of [11] considered a phased-array transmission structure via polygon construction PSK modulation to achieve secure transmission. Also, it is highly promising to use PHY security in IoT networks. By maximizing the secrecy sum rate, the authors in [12] jointly designed the beamforming matrix and vectors for a two-way cognitive radio IoT networks.
Additionally, jamming noise was frequently used to improve the PHY security performance by degrading the channel condition of the eavesdropping link, which is called as artificial noise (AN). Aware that intentional jamming is able to reduce eavesdroppers’ capabilities, the authors of [13] were first investigated an AN-aided beamforming scheme that consumes a certain transmit power to generate AN so as to hide information transmission. The authors of [14] presented an AN cooperative transmission scheme for non-orthogonal multiple access (NOMA)-based IoT networks. Additionally, the authors of [15] employed multiple tools—random subcarrier, AN, beamforming, and OFDM to achieve an ultimate aim of PHY security communication. Nevertheless, the conventional transmit beamforming and AN-aided design fail to provide PHY security when Eves fall within the main-lobe beam due to the limitation of the only angle-dependent characteristic of the beampattern [16].
Rate-splitting multiple access (RSMA) has emerged as a novel, general, and powerful framework for the design and optimization of non-orthogonal transmission, multiple access, and interference management strategies for future wireless networks [17]. Under the RSMA umbrella, various rate-splitting (RS) architectures have been developed. By partially decoding and partially treating interference as noise, RS can result in spectral efficiency [18], energy efficiency [19], robustness [20], and security enhancement [21] over wireless networks. For overloaded cellular IoT networks, the authors in [22] analyzed the degrees of freedom and rate. Two new multiple access techniques based on multi-antenna RS, time partitioning–RSMA and power partitioning–RSMA, were proposed to achieve the optimal degrees of freedom (DoF). RS provides new ideas for PHY security by multiplex common and private beams. By dual using energy of common message as transmit information and interference, the authors of [23] developed a robust secure beamforming design method to maximize the worst-case secrecy rate in multi-input single-output (MISO) systems. In [24], the max-min secrecy fairness of cellular networks was investigated, in which cooperative RS aided down-link transmissions are employed to safeguard the downlink of a two-user system against an external multi-antenna Eves. Besides, the authors in [25] proposed an application of RS by joint communications and jamming under a multi-carrier waveform for a multi-antenna cognitive radio system. It is worth noting that most of the prior research on PHY security directly maximized the achievable secrecy rate. However, the achievable secrecy rate requires the perfect or estimate of location information of Eves. It may not be possible to acquire any information of the passive devices in practice.
Motivated by the aforementioned aspects and secure performance enhancement requirements, a new flexibility of beamforming transmission technique is urgent to futher enhance the PHY security for IoT networks. In this paper, we conceive an AN-aided RS-based secure communication scheme for the multi-user multiple input single output (MU-MISO) IoT networks in the presence of multiple passive Eves. The main contributions of this paper are listed as below:
1) We pioneer the study of the application of AN-aided RS-based beamforming framework in IoT secure transmission systems with multiple passive Eves. We maximize the focused secrecy sum-rate (F-SSR) by jointly designing the transmit information and AN beamforming subject to the received signal-to-noise ratio (SNR) constraints of the private streams and the per-antenna transmit power constraints. In this way, the PHY security is enhanced by the dual use of the common message for RS, which is actually serving both as a desired message and interference for IoDs and Eves, respectively. In particular, private messages are implicitly embedded in the common messages.
2) To fill the research gap on the practical implementation, our design scheme is under the case of statistical sense of Eves’ channel [26] due to the passive nature of Eves. Additionally, since each antenna is equipped with its own power amplifier and is limited individually by the linearity of the amplifier in practice, we employ a more realistic per-antenna power constraint.
3) To handle the F-SSR maximization problem, we first introduce an auxiliary variable to confine the allowable signal-to-interference-plus-noise ratio (SINR) of private parts for Eves. Then, we present a two-stage algorithm to make the problem feasible. In particular, the auxiliary variable is fixed in the first stage. The non-convex terms of the objective are transformed into linear terms, and then the semidefinite programming (SDP) relaxation approach can be applied for the suitable reformulation; next, in the second stage, the global solution of the problem is obtained via the Broyden-Fletcher-Goldfarb-Shanno (BFGS) method [27], which is a Lagrange dual program related to the quasi-Newton optimization. Utilizing the special features, the considered problem is reduced to a mini-max program via duality. It facilitates a barrier interior point method to obtain the optimal solution.
The rest of this paper is organized as follows. Section II describes the system model of the AN-aided RS-based beamforming transmission and formulates the optimization problem. Some insights into the F-SSR maximization problem is provided; then, a two-stage algorithm is proposed to solve the problem in Section III. An efficient mini-max program to solve the problem is extended in Section IV. Simulation results are shown in Section V. Finally, the conclusion is drawn in Section VI.
II System Model and Problem Formulation
In this section, we specify the system model of AN-aided RS-based beamforming for secure communication followed by the formulated F-SSR maximization problem.
II-A Transmit Signal Model
We consider a MU-MISO IoT transmission system that consists of an array central controller/base station, single-antenna IoDs, and single-antenna passive Eves, 111Given the passive nature of Eves, the information of the detection channel is hard to be precisely acquired by base station, including the number. For analytical tractability, we assume a particular number for such that the based station can handle at most Eves. as illustrated in Fig. 1. The base station equipped with isotropic antennas provides wireless service to IoDs whereas the Eves try to eavesdrop. Following the RS principle [28], we employ multi-antenna RS at base station and successive interference cancellation (SIC) at the IoDs. More specially, the confidential messages intended to IoD , , are split into common parts and private parts. The common parts are combined into common messages , , which are packed into the common stream shared to all IoDs. The private messages are independently encoded into the private streams sent to IoD , . As a result, we group the transmit symbols as a vector, i.e., with , where indicates the expectation. The private streams are mapped to transmit array in a multicast fashion, while the common stream beamforming is designed in a broadcast manner. As a consequence, the AN-aided RS-based beamforming transmit baseband signal, denoted by , is described as [16, 23]
(1) |
where and , , indicate the beamforming to control the common stream and the private streams , respectively, is the AN, whose elements satisfy , is the AN projection matrix for imposing a disturbance to Eves, is an AN vector, which consists of complex Gaussian variables with zero-mean and unit-variance, satisfying .
Without loss of generality, we employ an uniform linear array (ULA) consisted of isotropic antennas at base station, and the features can be easily applied to multi-dimensional periodic arrays. The first element of the ULA is viewed as the origin of the coordinate system and the phase reference. Let denote the ULA’ s adjacent elements spacing, satisfying to avoid creating grating lobes, where and indicate the carrier frequency and the speed of light, respectively. All involved channels are modeled as far-field line-of-sight (LoS) transmission, and the LoS assumption also captures the essence to facilitate the ongoing and fruitful high-frequency secure communications. 222Following the spirit of [11], the channel model can be extended to the Saleh-Valenzuela geometric model with multi-path mmWave transmission. Therefore, the instantaneous received signal for IoDs at time , denoted by , represents as
(2) |
where denotes the th element of the vector, , , , denotes the signal attenuation factor, denotes the base station-IoD distance, is the direction of IoD, and is the background thermal noise. Due to the far-field transmission, satisfying , the attenuation difference among the transmit antennas is negligible.
Let us use to denote the channel vector of the links from the transmit array to IoD as
(3) |
Denote by and the coordinates of the IoD , , and Eve , , , respectively. For notational convenience, let and indicate the channels of the IoD and Eve , i.e., , , and , . Assume that all reception processes for IoDs are perfectly synchronized in time and frequency. Then, the received baseband signals after down-conversion at the IoD and Eve , denoted by and , are given by
(4) |
and
(5) |
respectively, where and denote the additive Gaussian noise (AWGN) at the IoD and Eve , satisfying and , respectively.
Remark 1: Using a large-scale array transmitter, it has a higher spatial DoF. Hence, the beamforming technique seems to be a good candidate of security enhancement and large numbers of IoDs applications, especially with a large-scale antenna array.
II-B Problem Statement
Following the processes of RS-based reception, each IoD first decodes the common streams by regarding the private streams as interference. After successfully decoding and extracting the common streams via SIC, the IoD detects its intended private streams by viewing the private streams of other IoDs as noise [23]. It is built upon RS, a low-complexity strategy that relies on SIC at each IoD. The corresponding capacity achieved by each IoD is directly related to its received SINR values. Given the above way, the received SINRs associated with common and private streams for IoD , denoted by and , are specified as
(8) |
Under the Gaussian channel, the corresponding achievable rates of the IoD in decoding the common messages and its corresponding private messages, denoted by and , can be attained by
(11) |
In contrast, the received signals at Eves are the mixed signals containing the common and all private streams. This results in mutual interference between common and all private streams. Therefore, the received SINRs of the common stream and the private stream at the Eve , denoted by and , can be expressed as
(15) |
where . The corresponding achievable rates of Eve in decoding the common message and the private message, denoted by and , can be calculated by
(18) |
For simplify, the thermal noise is assumed identical for all IoDs and Eves due to the similar environment and hardware architectures, i.e., , and .
Remark 2: By designing the message split and the power allocation to the common and private streams, RS manages to partially decode the messages and views the remaining messages as interference. This capability allows RS to act as a bridge between the two extreme message management ways of fully treating messages as interference and fully decoding interference, and creates the opportunity to enhance the secure performance.
For its simplicity and effectiveness, joint design of information and AN beamforming in PHY security provisioning is desired. Furthermore, only if the decoding of both the common and private parts is correct, the confidential messages can be effectively recovered. To unleash the potential of information, one interesting PHY security idea is to hide the private messages deep into the common messages so that the Eves’ ability to wiretap the private part is degraded. Toward this end, the F-SSR maximization problem is then formulated as
P1: | (10a) | |||
(10b) | ||||
(10c) | ||||
(10d) |
where denotes the entry in the th row and th column of a matrix. The objective in (10a) is to maximize the sum achievable rate of common messages for IoDs, while minimizing the achievable rate of the private message for Eves based on the dual use of common streams as well as focused protection of the private messages. In this way, the low-power private stream is embedded into the high-power common stream. The constraint in (10b) is to eliminate the AN interference with IoDs. In (10c), denotes the th transmit antenna power constraint. Due to the own power amplifier in the analog front-end for each physical implementation antenna, the transmit power need to be limited within the linearity of the power amplifier [29]. Therefore, it is more realistic to impose power constraint on a per-antenna basis. 333In fact, our proposed per-antenna constraint can also be tuned to support the sum power constraint by modifying the constraint in (10c) as , , where Tr means the trace of a matrix. In (10d), is the minimum required received SINR of the private message for the IoD , . The constraint is to protect the private message reception, so that the received SINR of the private streams at the IoD is more than a given threshold.
III A Two-stage Algorithm to Solve F-SSR Maximization Problem
The F-SSR maximization problem P1 is challenging for the non-concave objective. To solve the problem, we first give some insights into P1, and then we propose a two-stage algorithm.
III-A Some Insights to the F-SSR Maximization Problem
Introducing an intermediate variable [30], P1 can be equivalently solved by following problem
P2: | (11a) | |||
(11b) | ||||
(11c) |
where denotes maximum allowable SINR for successfully wiretapping the private streams at Eves.
To further simplify P2, let us first define the channel matrix of all IoDs as
(12) |
where denotes the definition operations. The projection matrix is placed in the null space of all the IoD channels, i.e., . We perform the singular-value decomposition (SVD) operation on the IoD channel matrix, i.e., . Then, the variables can be directly modified into , .
The information of IoD is assumed to be perfectly acquired at base station. Nevertheless, all Eves remain radio silent to hide their presence. Therefore, the information of passive Eves is not available by base station. Assume that Eve channels undergo independent and identically distributed (i.i.d.) Rayleigh fading [31]. A standard optimization problem P2 is given by
P3: | (13a) | |||
(13b) | ||||
(13c) | ||||
(13d) | ||||
(13e) |
where , , , is a probability factor for ensuring the security, and , , with denoting the th unit vector, i.e., , . In constraint (13b), we aim to limit the maximum received SINR among Eves to less than the SINR threshold with probability .
However, P3 is still a non-convex program for the probabilistic/chance constraints, tightly coupled variables, and the rank-one constraints. Aiming at the above-mentioned difficulties, in the ;ing we first replace the constraint (13b) by a linear matrix inequality (LMI) constraint. As a compromise, we investigate a reformulation to serve as a lower bound for the original constraint as following lemma.
Lemma 1: The constraint (13b) is recast as
(14) |
where , with indicating the inverse cumulative distribution function (c.d.f.) of an inverse central chi-square random variable with DoF.
Proof:
See Appendix A. ∎
Remark 3: According to the central limit theorem [32], we assume that the Eve channels are modeled as Rayleigh fading channels since there are a large number of statistically independent reflected and scattered paths between the base station and the passive Eves.
Remark 4: We would like to emphasize that the feasible solution of P4 satisfies P3 but not vice versa for the inequality transformation in (49).
Now, constraints , are still not convex, which are the remaining obstacle in solving P4. To make problem in a form suitable for semidefinite relaxation (SDR), we drop the rank constraints. The optimal matrix will usually not be rank-one for the rank relaxation. If it is, then its principal component is the optimal solution of the original problem. If not, then , , is a lower bound needed to meet the constraints. Some ways of generating good solutions have been studied [33].
III-B Optimization Algorithm With a Fixed
Intuitively, it is an equivalent solution with less difficulty by adjusting . We can solve P4 by first optimizing over , and considering to be fixed. It is observed that the term in objective can be dropped to simplify the optimization problem without affecting the optimal solution.
It can be easily found that (15a) is neither convex nor concave. To make P4 a tractable problem, the non-concave parts are converted to corresponding lower bound function according to the following proposition [34].
Proposition 1: Supposing a positive scalar and function , we have
(16) |
The optimal solution of the right-hand side in (16) is .
Proof:
Since is concave, the optimal solution to the right-hand side is obtained when the gradient equals to 0, i.e., . ∎
By setting , the corresponding surrogate lower bound functions, denoted by , can be given by
(17) |
Then, we obtain the affine function as
(18) |
To guarantee a tight approximation, in the th iteration, is updated by
(19) |
The closed-form solution of above problem is obtained by
(20) |
After obtaining , P4 is replaced by
(21) |
Obviously, it is found that the problem (21) is a typical SDP problem. By means of standard convex software, such as CVX [35] and SeDuMi [36], we can get the optimal solutions.
Algorithm 1 Joint design algorithm for P4 |
Initialization: Set , , |
, and tolerance ; |
1. repeat |
2. ; |
3. Determine via CVX by substituting |
into (21); |
4. Determine by substituting into (20); |
5. until some convergence condition is met. |
Output: . |
The rudimentary procedure for P4 is outlined in Algorithm 1. We prove that the Algorithm 1 theoretically converge to the optimal points presented in the following proposition.
Proposition 2: The sequence is generated by the Algorithm 1 with stationary convergence guarantee, which is a Karush-Kuhn-Tucker (KKT) point of the original problem P4.
Proof:
See Appendix B. ∎
III-C Optimization Over
Next, let us turn back to optimize over to obtain the global optimal solutions by one dimensional search. The F-SSR maximization problem over is then formulated as
(22) |
where is defined as
(23) |
Due to the concave objective function, we adopt an efficient method to find the global optimal . For this goal, we optimize over and keep fixed. Then, we further simplify the optimization problem as
P6: | (24a) | |||
(24b) |
where . For the monotonicity of function , the objective is simplified to .
The Lagrangian function of the reformulated problem, denoted by , can be derived as
(25) |
Actually, let us obtain the optimal solution of P6 by solving the dual problem verified by the following theorem.
Theorem 1: The dual problem with implicit constraint is given by
(26) |
Proof:
See Appendix C. ∎
An efficient method for solving the unconstrained problem (26) is BFGS method [27], which exhibits a superior convergence rate to solve log concave function. Then, we get a simpler problem without affecting optimality as
(27) |
The BFGS algorithm is summarized as
Step1. Choose a initial point , , and tolerance ;
Step2. Update search direction: , where vec stacks columns of matrix into a single column vector, and denotes the gradient of with respect to ;
Step3. Obtain dual variables: , where indicates the step length;
Step4. Calculate iterate variables: , and ;
Step5. Update
(28) |
where , , , and ;
Step6. If , stop iteration;
Step7. Otherwise, , return to Step 2.
Algorithm 2 Two-stage iterative algorithm for P1 |
Initialization: Pick up , and |
tolerance ; |
1. repeat |
2. Compute in (21) as Algorithm 1; |
3. Determine by ; |
4. Update , , and as the BFGS algorithm; |
5. Determine by substituting , and into (29); |
6. until ; |
Output: . |
Corollary 1: The closed-form solution of P6 can be got from that of (27) as
(29) |
Proof:
After obtaining the optimal dual variables and , P6 boils down to find the optimal such that the KKT condition of (25) is satisfied, i.e.,
(30) |
Thus, Corollary 1 follows. ∎
Finally, we summarize the two-stage transmit information and AN beamforming design algorithm for the F-SSR maximization problem in Algorithm 2. Specifically, we first get the optimal beamforming vectors and AN under fixed allowable SINR; Next, based on the optimal values, we search the optimal allowable SINR.
IV Efficient Algorithm Design
Solving a convex SDP via the interior-point method directly is inefficient due to a Hermitian matrix of variables in particular with a large-scale transmit array. By introducing an auxiliary variable following the spirit of [26], P4 is transformed as
P7: | (31a) | |||
(31b) | ||||
(31c) | ||||
(31d) | ||||
(31e) |
P7 can be reforged to a more amenable form by utilizing the special features. We can solve the problem via a simple form as following theorem.
Theorem 2: P7 can be equivalently formulated as following mini-max problem
P8: | (32a) | |||
(32b) | ||||
(32c) |
where , , , and . Then, we have
(33) |
Proof:
See Appendix D. ∎
Remark 5: One can verify that the inequality constraints in (32b) and (32c) hold with equality at the optimum. As proof, assuming for a given , there exists an arbitrarily small number satisfying . Let’s replace by the objective function so as to yield a larger objective value. This creates contradiction due to the optimal value . The same conclusion can be drawn in constraint for a given . This way, it facilitates a barrier interior point method to solve P8 since equality constraints are usually easier to get access. Interestingly, solving P8 with respect to demands for much lower complexity compared with optimizing .
For ease of exposition, we first define
(34) | |||
(35) |
As a standard step, the modified objective, denoted by , can be reorganized as
(36) |
where (36) is equivalent to problem P8 when , , , , , and denote the logarithmic barrier factors to explicate the non-negativity constraints, , , , , and , respectively, and denotes regulation term for the logarithm barrier terms. A standard equality constrained problem can be solved with a fixed , i.e.,
P9: | (37a) | |||
(37b) | ||||
(37c) |
The procedure of the barrier method is to search the optimal solutions with a fixed , and then adjust until some stopping criterion is satisfied. It is widely known that the infeasible-start Newton’s method for solving a mini-max optimization problem shows a faster rate of convergence. We start with the necessary and sufficient optimal conditions (i.e. the KKT conditions [37]) for P9 as
(38a) |
(38b) |
(38c) |
(38d) |
(38e) |
(38f) |
(38g) |
(38h) |
(38l) |
In particular, the Newton step is computed for updating in (38a) as
(39) |
where . Applying matrix inverse lemma, 444The matrix inverse approximation can be applied to small entries of matrix [38, Ch. 3]. When Algorithm 3 closes to optimal value as the iterative number increasing, the residual error can be ignored. then, (39) is approximated by
(40) |
where .
Then, we use each Newton step to stack as a system of linear equations [39].
The rudimentary numerical algorithm to obtain the optimal solutions of problem P9 is outlined in Algorithm 3.
Algorithm 3 Barrier algorithm for P9 |
Initialization: Pick up , |
, , and tolerance |
; |
1. repeat{Outer iteration} |
2. repeat {Inner iteration (centering step)} |
3. Obtain the Newton step |
from linear equations; |
4. Backtracking line search: |
5. ; |
6. while |
do |
7. |
8. end while |
9. Compute primal and dual variables: |
10.until |
11.Increase ; |
12.until is sufficiently large to tolerate the duality gap. |
V Simulation Results
In this section, we highlight the advantages of the proposed schemes by comparing the secure performance with other reference schemes through numerical simulation. The carrier frequency is chosen GHz. The IoDs’ number is set as with directions , , respectively. To highlight the performance gain contributed from beamforming, the reference distance is set to 1000 meters for all IoDs. For simplicity, the per-antenna power constraint is , . The background thermal noise variances are dBm, , and dBm, . The minimum desired received SINR of the private stream is identical for each IoD, i.e., , . The number of Eves is . The probability parameter is picked up . Two existing baseline schemes, i.e., secrecy rate maximization (SRM) [23] and maximum ratio transmission (MRT) [40], are used to compare with our proposed scheme. The signal attenuation factor, denoted by , is determined by [41]
(41) |
According to the analysis in Section II, we know that the multiple private streams need to simultaneously transmit toward corresponding IoDs and the common streams need to transmit toward all IoDs. For the case with , dB, and dBm. We explore the transmit beampatterns versus direction in Fig. 2, where the received SINR values of the common and private streams correspond to right-hand axis and left-hand axis, respectively. As expected, two sharp SINR peaks for the common streams are formed in the directions of IoDs. The SINRs of private streams along the directions of corresponding IoDs are fully compliant with the predefined requirements whose values are poised above the required SINR 8 dB. Those guarantee reliable transmissions of the private streams from the based station to IoDs. One can see that the private streams are hidden deep in the common streams, intuitively. In contrast, the performed SINRs are so poor in undesired directions.
Figure 3 shows the convergence rate of Algorithm 1 with iteration initial values starting from random points. We can observe that Algorithm 1 converges faster, as well as it is slightly sensitive to the system configurations.
In Fig. 4 , we depict our proposed Algorithm 2 in terms of convergence behavior, and we also compare with the damped Newton method. Admittedly, one way to solve the considered problem via the damped Newton method follows similar steps as in [35, Sec. 9.5.2]. The initial value of the maximum allowable SINR of the private stream for Eves is set as 0 dB. It is found that the Algorithm 2 can obtain the same duality gap as damped Newton method with fewer iterations. This is expected since the BFGS algorithm is very effective self-correcting properties in dealing with the inverse of the true Hessian matrix [27].
Figure 5 presents the convergence rate of Algorithm 3. The barrier control parameters are set as and , respectively. The initial values in Algorithm 3 are randomly generated. A general observation in Fig. 5 is that Algorithm 3 presents a fast convergence rate. Besides, the number of iterations slightly increases as the number of transmit antennas and IoDs increases. It should be mentioned that for current hardware platforms, the 200MHz clock rate can be easily implemented [42]. Therefore, it has enough time to calculate and update variables, and thus realize beam tracking for mobility of IoDs in practice.
We should mention that the confidential message can be correctly decoded only if both the recover of common parts and the private parts are correct. It is required that the received SINR of the private stream is over the prescribed minimum received value, or else system secrecy sum-rate (SSR) is zero. We define the average system SSR as
(45) |
Then, we illustrate the average system SSR (bit/s/Hz) versus the number of antennas in Fig. 6. For a fair comparison, the total transmit power is set to equal. In addition, we also show the secrecy rate upper bound, i.e., the maximum IoD achievable rate under no passive Eve existence in the system. We can observe that the average system SSR increases as the number of transmit antennas increases. And by all accounts in array signal processing, more antennas equipped with the transmit array enhance the array’s capability in the degree of spatial freedom. Especially, the base station is more efficient beamforming for the information and AN with more transmit antennas. Moreover, the gap between the average system SSR and the secrecy rate upper bound diminishes when the number of transmit antennas is relatively large. Under our configurations, it is apparent that the secure performance of proposed scheme is better than other baseline schemes. The superior secrecy performance comes from the dual-use of the common messages and the enveloped private messages.
In Fig. 7, we present the average system SSR versus the total transmit power. As expected, a better performance is yielded for the proposed scheme compared with other baseline methods. More particularly, our design gradually converges to theoretic secrecy rate upper bound. By observing in Fig. 7, we can also see that the average system SSR shows an increasing trend with total transmit power. The performance gain obtained by higher IoD achievable rate and lower Eve rate is due to more transmit power utilization.
In Fig. 8, we explore the effect of system configurations for proposed method on average system SSR. This evaluation confirms that the average system SSR drops as the minimum required received SINR of the private stream increases. It is true since more transmit power is allocated to the private stream when the minimum required received SINR of the private stream becomes more stringent. Interestingly, a higher total transmit power results in a better average system SSR. Besides, it is also shown that the average system SSR increases with the increasing number of antennas.
In the last scenario, we quantify two different types of power constraints, i.e., sum power constraint and per-antenna power constrain. As shown in Fig. 9, the sum power constraint causes better secure performance compared to the per-antenna power constrain. The gaps between the two types of power constraints are negligible in large number and high transmit power. This is because large number of IoDs and high transmit power are short of the DoF to take advantage of multiuser diversity.
VI Conclusion
In this paper, an AN-aided RS-based beamforming scheme was proposed to enhance the PHY security over MU-MISO IoT systems in the presence of passive Eves. We developed a F-SSR maximization problem by jointly optimizing transmit information and AN beamforming while satisfying per-antenna power constraints and prescribed minimum received SINR of the private stream. To solve this challenging problem, we studied a two-stage algorithm. More specifically, we first facilitated the non-concave parts simplification by the lower bound constraints with fixed allowable SINR, and then SDP relaxation method was adopted to solve the reformulated problem. Next, the BFGS algorithm was developed to search the global optimal solution. Additionally, an efficient algorithm was developed to solve the mimi-max program. Finally, simulation results demonstrated the superiority of the proposed scheme to provide PHY security in IoT communications. More importantly, the proposed scheme is not limited to only IoT networks. It is also appropriate in many applications requiring a high-level of security, such as satellite communications, unmanned aerial vehicles networks, military communications, millimeter-Wave communications.
Appendix A Proof of Lemma 1
The left-hand side in constraint (13b) can be equal to
(46) |
Then, by some mathematical manipulations, it is rearranged as
(47) |
where , and . Note that the Eves are modeled equivalent random channels following i.i.d., and thus the index of Eve channel can be removed.
Then, the probabilistic constraint upper bound can be expressed as
(48) |
where , , and indicate the th, maximum, and minimum eigenvalue of the matrix, respectively, and the order satisfies . Additionally, the inequality holds for the trace inequality of the positive Hermitian matrices [43]. The equations and can be established since is a rank-one positive semidefinite matrix.
As a result, the probabilistic constraint can be converted as
(50) |
The equivalent transformation can be got due to positive definite matrix , holds for a basic property of probability, and follows steps similar to [31, Lemma 2]. Note that the implication can also be applied to any continuous channel distribution by replacing with an inverse c.d.f. with respect to the corresponding distribution. Thus, Lemma 1 follows.
Appendix B Proof of Proposition 2
Utilizing the following lemma,
Lemma A [44, Coroll. 2]: Given the problem
(51) |
where is a continuously differentiable function, and and are closed, nonempty, and convex subsets, every limit point of the iterates is a stationary point.
Then, problem (21) is rewritten as
(52) |
The objective of (52) is continuously differentiable. The feasible set is closed, nonempty, and convex. By Bolzano–Weierstrass theorem, the sequence updated by solving problem (52) has limit points. Invoking Lemma A, we know that every limit point generated by Algorithm 1 is a stationary point of (52). Then, we will prove that every stationary point of problem (52) is also a stationary point of P4. We use and to denote the objective of problem (52) and P4, respectively. is a stationary point of(52), yielding
(53) | |||
(54) |
According to Proposition 1, (18), and (54), we obtain
(55) |
Inserting (55) into (53), one can easily verify that
(56) |
Based on (53) and (56), we thus claim that
(57) |
In other words, is the optimal solution of the following problem
(58) |
Consequently, the conditions in (58) are exactly the KKT conditions in P4, and thus, proposition 2 follows.
Appendix C Proof of Theorem 1
Appendix D Proof of Theorem 2
The partial Lagrangian function of the problem P7 is expanded as
(61) |
where .
We use a given set to transform the partial Lagrangian function (61) into
(62) |
where , , , , , , , , , , , and .
For simplicity, we define . Thereby, the dual objective of P7 is established by
(63) |
We use the results developed in [46, Appendix A] to transform (63) into
(64) |
where the relation between in (64) and in (63) satisfies
(65) | |||
(66) |
Then, (64) can be recast into a more compact form by
(67) |
where , and . The Lagrange dual problem can be simplified via minimizing , i.e.,
(68) |
or an explicit subjective as
(69) |
Introducing an intermediate variable , problem (69) is equivalently transformed as
(70) |
Then, we scale down to alter variables as
(77) |
Now, new optimization problem with respect , , , and is given by
(78) |
Obviously, we can form an equivalent problem by making these inequality constraints explicit, i.e.,
(79) |
Thus, Theorem 2 follows.
References
- [1] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, and H. V. Poor, “6G internet of things: A comprehensive survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 359–383, 2022.
- [2] Y. Fu, W. Cheng, W. Zhang, and J. Wang, “Scalable extraction based semantic communication for 6G wireless networks,” IEEE Communications Magazine, pp. 1–7, 2023.
- [3] H. Zhang and W. Cheng, “RIS-SWIPT for batteryless users in disaster areas,” Journal of Communications and Information Networks, vol. 7, no. 4, p. 14, 2022.
- [4] W. Cheng, Y. Xiao, S. Zhang, and J. Wang, “Adaptive finite blocklength for ultra-low latency in wireless communications,” IEEE Transactions on Wireless Communications, vol. 21, no. 6, pp. 4450–4463, 2022.
- [5] D. Wang, B. Bai, W. Zhao, and Z. Han, “A survey of optimization approaches for wireless physical layer security,” IEEE Communications Surveys Tutorials, vol. 21, no. 2, pp. 1878–1911, 2019.
- [6] U. Tiwari, S. Vollala, N. Ramasubramanian, B. S. Begum, and G. Lakshminarayanan, “Secure and energy efficient design of multi-modular exponential techniques for public-key cryptosystem,” Journal of Communications and Information Networks, vol. 7, no. 3, pp. 309–323, 2022.
- [7] A. Kalantari, M. Soltanalian, S. Maleki, S. Chatzinotas, and B. Ottersten, “Directional modulation via symbol-level precoding: A way to enhance security,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, no. 8, pp. 1478–1493, 2016.
- [8] A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975.
- [9] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978.
- [10] N. N. Alotaibi and K. A. Hamdi, “Switched phased-array transmission architecture for secure millimeter-wave wireless communication,” IEEE Transactions on Communications, vol. 64, no. 3, pp. 1303–1312, 2016.
- [11] X. Zhang, X. G. Xia, Z. He, and X. Zhang, “Phased-array transmission for secure mmwave wireless communication via polygon construction,” IEEE Transactions on Signal Processing, vol. 68, pp. 327–342, 2020.
- [12] Z. Deng, Q. Li, Q. Zhang, L. Yang, and J. Qin, “Beamforming design for physical layer security in a two-way cognitive radio IoT network with SWIPT,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10 786–10 798, 2019.
- [13] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, 2008.
- [14] R. Ruby, Q. V. Pham, K. Wu, A. A. Heidari, H. Chen, and B. M. ElHalawany, “Enhancing secrecy performance of cooperative NOMA-based IoT networks via multiantenna-aided artificial noise,” IEEE Internet of Things Journal, vol. 9, no. 7, pp. 5108–5127, 2022.
- [15] F. Shu, X. Wu, J. Hu, J. Li, R. Chen, and J. Wang, “Secure and precise wireless transmission for random-subcarrier-selection-based directional modulation transmit antenna array,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 890–904, 2018.
- [16] B. Qiu, W. Cheng, and W. Zhang, “Robust multi-beam secure mmwave wireless communication for hybrid wiretapping systems,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1393–1406, 2023.
- [17] Y. Mao, O. Dizdar, B. Clerckx, R. Schober, P. Popovski, and H. V. Poor, “Rate-splitting multiple access: Fundamentals, survey, and future research trends,” IEEE Communications Surveys Tutorials, vol. 24, no. 4, pp. 2073–2126, 2022.
- [18] G. Zhou, Y. Mao, and B. Clerckx, “Rate-splitting multiple access for multi-antenna downlink communication systems: Spectral and energy efficiency tradeoff,” IEEE Transactions on Wireless Communications, pp. 1–1, 2021.
- [19] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting for multi-antenna non-orthogonal unicast and multicast transmission: Spectral and energy efficiency analysis,” IEEE Transactions on Communications, vol. 67, no. 12, pp. 8754–8770, 2019.
- [20] H. Joudeh and B. Clerckx, “Robust transmission in downlink multiuser MISO systems: A rate-splitting approach,” IEEE Transactions on Signal Processing, vol. 64, no. 23, pp. 6227–6242, 2016.
- [21] A. Salem, C. Masouros, and B. Clerckx, “Secure rate splitting multiple access: How much of the split signal to reveal?” IEEE Transactions on Wireless Communications, vol. 22, no. 6, pp. 4173–4187, 2023.
- [22] Y. Mao, E. Piovano, and B. Clerckx, “Rate-splitting multiple access for overloaded cellular internet of things,” IEEE Transactions on Communications, vol. 69, no. 7, pp. 4504–4519, 2021.
- [23] H. Fu, S. Feng, W. Tang, and D. W. K. Ng, “Robust secure beamforming design for two-user downlink MISO rate-splitting systems,” IEEE Transactions on Wireless Communications, vol. 19, no. 12, pp. 8351–8365, 2020.
- [24] H. Bastami, M. Letafati, M. Moradikia, A. Abdelhadi, H. Behroozi, and L. Hanzo, “On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5018–5033, 2021.
- [25] O. Dizdar and B. Clerckx, “Rate-splitting multiple access for communications and jamming in multi-antenna multi-carrier cognitive radio systems,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 628–643, 2022.
- [26] V. D. Nguyen, T. Q. Duong, O. A. Dobre, and O. S. Shin, “Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2609–2623, 2016.
- [27] A. M. Nezhad, R. A. Shandiz, and A. E. Jahromi, “A particle swarm–BFGS algorithm for nonlinear programming problems,” Computers Operations Research, vol. 40, no. 4, pp. 963–972, 2013.
- [28] B. Rimoldi and R. Urbanke, “A rate-splitting approach to the gaussian multiple-access channel,” IEEE Transactions on Information Theory, vol. 42, no. 2, pp. 364–375, 1996.
- [29] W. Yu and T. Lan, “Transmitter optimization for the multi-antenna downlink with per-antenna power constraints,” IEEE Transactions on Signal Processing, vol. 55, no. 6, pp. 2646–2660, 2007.
- [30] W. Liao, T. H. Chang, W. Ma, and C. Chi, “QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach,” IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202–1216, 2011.
- [31] D. W. K. Ng, E. S. Lo, and R. Schober, “Robust beamforming for secure communication in systems with wireless information and power transfer,” IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4599–4615, 2014.
- [32] D. Tse and P. Viswanath, “Fundamentals of wireless communication,” Cambridge University Press, 2005.
- [33] Sidiropoulos, D. Nicholas, Davidson, N. Timothy, and Z. Q. Luo, “Transmit beamforming for physical-layer multicasting.” IEEE Transactions on Signal Processing, 2006.
- [34] R. Feng, Q. Li, Q. Zhang, and J. Qin, “Robust secure beamforming in MISO full-duplex two-way secure communications,” IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 408–414, 2016.
- [35] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1,” 2014.
- [36] J. F. Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones,” Optimization methods and software, vol. 11, no. 1-4, pp. 625–653, 1999.
- [37] L. N. Tran, M. Juntti, M. Bengtsson, and B. Ottersten, “Beamformer designs for MISO broadcast channels with zero-forcing dirty paper coding,” IEEE Transactions on Wireless Communications, vol. 12, no. 3, pp. 1173–1185, 2013.
- [38] C. D. Meyer, Matrix analysis and applied linear algebra. Siam, 2000, vol. 71.
- [39] S. Boyd, S. P. Boyd, and L. Vandenberghe, Convex optimization. Cambridge university press, 2004.
- [40] H. Joudeh and B. Clerckx, “Sum-rate maximization for linearly precoded downlink multiuser MISO systems with partial CSIT: A rate-splitting approach,” IEEE Transactions on Communications, vol. 64, no. 11, pp. 4847–4861, 2016.
- [41] A. Goldsmith, Wireless Communications. Wireless Communications, 2007.
- [42] “Introduction to the NI mmwave transceiver system hardware,” National Instruments, Austin, TX, USA, May 2023. [Online]. Available: http://www.ni.com/white-paper/53095/en/.
- [43] A. W. Marshall and I. Olkin, “Inequalities: Theory of majorization and its applications,” Academic Press, 1979.
- [44] L. Grippo and M. Sciandrone, “On the convergence of the block nonlinear Gauss-Seidel method under convex constraints,” Operations Research Letters, vol. 26, no. 3, pp. 127–136, 2000.
- [45] W. Fenchel, “On conjugate convex functions,” Canadian Journal of Mathematics, vol. 1, no. 1, 1949.
- [46] S. Vishwanath, N. Jindal, and A. Goldsmith, “Duality, achievable rates, and sum-rate capacity of gaussian MIMO broadcast channels,” IEEE Transactions on Information Theory, vol. 49, no. 10, pp. 2658–2668, 2003.