Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Mobile Computing Technologies for Health and Mobility Assessment: Research Design and Results of the Timed Up and Go Test in Older Adults
Previous Article in Journal
Implementation and Optimization of a Dual-confocal Autofocusing System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission

1
School of Information and Communication Engineering, Xi’an Jiaotong University, No.28, Xianning West Road, Xi’an 710049, China
2
Graduate School of Information, Production and Systems, Waseda University, 2–7, Hibikino, Wakamatsu-ku, Kitakyushu, Fukuoka 808–0135, Japan
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(12), 3480; https://doi.org/10.3390/s20123480
Submission received: 27 April 2020 / Revised: 29 May 2020 / Accepted: 10 June 2020 / Published: 19 June 2020
(This article belongs to the Section Communications)

Abstract

:
Intelligent reflecting surface (IRS) is a very promising technology for the development of beyond 5G or 6G wireless communications due to its low complexity, intelligence, and green energy-efficient properties. In this paper, we combined IRS with physical layer security (PLS) to solve the security issue of cognitive radio (CR) networks. Specifically, an IRS-assisted multi-input single-output (MISO) CR wiretap channel was studied. To maximize the secrecy rate of secondary users subject to a total power constraint (TPC) for the transmitter and interference power constraint (IPC) for a single antenna primary receiver (PR) in this channel, an alternating optimization (AO) algorithm is proposed to jointly optimize the transmit covariance R at transmitter and phase shift coefficient Q at IRS by fixing the other as constant. When Q is fixed, R is globally optimized by equivalently transforming the quasi-convex sub-problem to convex one. When R is fixed, bisection search in combination with minorization–maximization (MM) algorithm was applied to optimize Q from the non-convex fractional programming sub-problem. During each iteration of MM, another bisection search algorithm is proposed, which is able to find the global optimal closed-form solution of Q given the initial point from the previous iteration of MM. The convergence of the proposed algorithm is analyzed, and an extension of applying this algorithm to multi-antenna PR case is discussed. Simulations have shown that our proposed IRS-assisted design greatly enhances the secondary user’s secrecy rate compared to existing methods without IRS. Even when IPC is active, the secrecy rate returned by our algorithm increases with transmit power as if there is no IPC at all.

1. Introduction

Cognitive radio (CR) was proposed as one of the most promising technologies aiming to solve the spectrum scarcity issues. Using spectrum sensing and sharing technology, the spectrum usage can be greatly improved so that the contradiction between exponential growth of wireless users and spectrum scarcity issues can be effectively relieved; however, CR networks are facing lots of security threads, such as primary user emulation, spectrum sensing data falsification, jamming, and eavesdropping [1]. In these attacks, eavesdropping brings great security risks due to the broadcast nature of wireless channels and open system architectures with wireless users in the same frequency band. To solve this security issue, physical layer security (PLS) has emerged as a very valuable technology to deal with eavesdropping attacks in wireless systems. In this approach, the properties of wireless channels are being fully utilized and by using signal processing strategy, and the transmitted information can be completely “hidden” from eavesdropping [2], which offers significant opportunities for enhancing the secrecy performance of CR networks [3].

1.1. Related Work

Secrecy rate (capacity) is the key issue of guaranteeing the user’s secret communication in PLS, and how to maximize the user’s secrecy rate has drawn wide attentions in the past decade. The multi-antenna wiretap channel (WTC) model became a popular tool to study PLS, the secrecy capacity of multiple-input single-output (MISO) and multiple-input multiple-output (MIMO) WTC subject to total power constraint (TPC) was deeply analyzed in [4,5]. Later, the channel was extended to the CR setting where an extra interference power constraint (IPC) at primary receiver (PR) was considered, and several solutions were proposed to maximize the secondary user’s secrecy rate [6,7,8,9,10,11,12,13]. The secrecy capacity optimization problem of CR MISO WTC was studied in [6], and several optimal solutions as well as sub-optimal beamforming solutions were proposed to solve this problem. This channel was extended to a special case where imperfect channel state information (CSI) was known at transmitter [7]. Furthermore, artificial noise (AN) approach was later proposed to maximize the secrecy rate of this channel under full/imperfect CSI [8,9]. Based on the study of MISO case, the secrecy capacity of CR MIMO WTC was also studied in [10], and several optimal analytical solutions under special cases [10,11] as well as optimal [12] and sub-optimal AN-aided [13] numerical solutions under general case were proposed to maximize the secrecy rate.
These existing solutions (such as AN and projected beamforming) for enhancing secrecy rate have obvious drawbacks due to two aspects. Firstly, although AN could effectively increase the user’s secrecy performance (especially for reverse degraded WTC case), it consumes certain amount of power at transmitter so that the residual power for signaling has reduced. Hence, the potential of AN method for boosting the secrecy rate is very limited. Secondly, different from non-CR settings with only TPC, as IPC is becoming active, full power allocation is not optimal for information signaling so that the secrecy rate saturates, which happens mostly when PR is located very close to secondary receiver. If putting full power for signaling under this case, the interference to PR can be easily beyond the predefined threshold so that the quality of service (QoS) at PR could be seriously affected [10]. Although the existing project beamforming solutions can null out the interference at PR so that IPC can be ignored [6,10], it decreases the degree of freedom at transmitter significantly. If PR is close to the secondary receiver, the signals could also be canceled out at receiver so that the secrecy rate of secondary user becomes zero; therefore, it is necessary to find an effective solution to not only boost the secondary user’s secrecy rate but also guarantee the QoS at PR without sacrificing any power as well as degree of freedom at transmitter.
Recently, intelligent reflecting surface (IRS), which is also called re-configurable intelligent surface, has been proposed and it has drawn wide attention for its applications in wireless communications. IRS is a software-controlled metasurface consisting of large numbers of passive reflecting elements. These elements induce certain phase shifts for the incident electromagnetic signal wave and reflect the signals with very low power consumption. It is confirmed by academia that IRS could play a key role in developing massive MIMO 2.0 for future’s beyond 5G or even 6G communications [14,15]. Since IRS is an intelligent metasurface, it has great benefits compared to the traditional reflecting surface, relaying systems and backscatter communications [15,16,17]. These significant advantages make IRS as a green energy-efficient technique and can be applied to various communication models such as multi-cell, massive device-to-device (D2D), wireless information and power transfer, and PLS [18]. The research of IRS was applied in to cognitive radio system and solutions ware discussed in [19,20,21,22]. In [19], an IRS-assisted multi-user cognitive radio (CR) channel model was formulated, and an algorithm was proposed to jointly optimize the beamforming vector at transmitter and continuous phase shift coefficients at IRS. Simulation results showed that the system sum rate is dramatically improved by proposed scheme compared to two baseline schemes. The authors of [20] introduce multiple IRSs to a downlink multiple-input single-output (MISO) CR system, where a single secondary user coexists with a primary network with multiple primary user receivers. The proposed algorithm jointly optimized the beamforming at the secondary user transmitter and the inflecting coefficient at each IRSn to maximize the achievable rate of the secondary user. Simulation results demonstrate that IRS can improve the achievable rate of secondary user. Furthermore, in [21], both bounded the CSI error model and statistical CSI error model for primary user (PU)-related channels in IRS aided CR systems were considered and the results indicate that the efficiency of the proposed algorithms and meaningful insights for the design of robust beamforming in IRS-aided CR systems. In addition, downlink multigroup multicast communication systems assisted by an IRS was consider in [22], where a huge increase of energy efficiency of the introduced IRS and the effectiveness in terms of the convergence and complexity were achieved.
All these contributions indicate that IRS greatly helps enhancing the transmission rate of users. Furthermore, IRS is currently also used to combine with PLS to overcome the eavesdropping attack issue in wireless networks [18]. By adjusting the phase shift coefficients, the reflected signal by IRS is not only added constructively with the non-reflected signal at the user, but also added destructively with the non-reflected signal at eavesdropper. As a consequence, the signal-to-noise (SNR) ratio is increased at the user and decreased at the eavesdropper so that higher secrecy rate can be achieved. Several latest research results about secure IRS-assisted MISO WTC were established in [23,24,25,26,27,28]. In [23,24], it was shown that IRS significantly improves the user’s secrecy rate compared with no-IRS case. A special case where no direct link between transmitter and receiver was considered in [25,26]. The multi-user MISO downlink wiretap channel was studied in [27], and also a special case where there is no direct link between transmitter and receiver was studied in [28]. All these results again indicate that IRS greatly boosts user’s secrecy rate rather than no-IRS case.

1.2. Contributions

Motivated by the aforementioned research results, we applied the IRS into the PLS of the CR issue in this paper, and focus on enhancing the secondary user’s secrecy rate. Compared to the other no-IRS algorithms, the main reasons for choosing IRS to enhance the secrecy performance in our work are due to these key aspects: Firstly, since the signal is destructively added to the eavesdropper with the aid of IRS, it is also possible to make the signals destructively add to the PR, hence the secrecy rate could be boosted and also the QoS at PR is satisfied. Secondly, IRS is an energy-efficient passive reflector, it neither consumes any power itself, nor sacrifices any part of power at transmitter, and the degree of freedom for transmission also can be increased by deploying more reflecting elements on IRS. Therefore, IRS has significant advantages compared with conventional AN and project beamforming solution. Finally, PLS is of great importance on the development of secure 5G communications, our work of combing IRS with PLS brings new ideas and thoughts to solve the security issues for beyond 5G or 6G based CR networks.
Based on the aforementioned aspects, the main contributions of our paper are summarized as follows:
1. In this paper, we set up an IRS-assisted Gaussian CR MISO wiretap channel, and focus on maximizing the secrecy rate of secondary user by jointly optimizing the transmit covariance at transmitter as well as phase shift coefficient at IRS subject to IPC at a PR with single antenna in addition to TPC at secondary transmitter. To the best of our knowledge, IRS has never been applied into the study of secure CR issue. Our work makes up for the lack of research in this area.
2. The formulated secrecy rate optimization problem is a difficult non-convex problem; therefore, an iterative alternating optimization (AO) algorithm is proposed, which is based on optimizing the transmit covariance matrix for secondary transmitter and phase shift matrix for IRS by fixing the other as a constant in two sub-problems. When the phase shift coefficient is fixed, the global optimal solution of transmit covariance is obtained by equivalently transforming the quasi-convex sub-optimization problem to a convex one. When the transmit covariance is fixed, the sub-optimal solution of phase shift coefficent is optimized in the non-convex fractional programming problem by using bisection search algorithm in combination with minorization–maximization (MM) algorithm. Due to the non-convexity of the constraints, it is still difficult to optimize the phase shift coefficient during each iteration of MM algorithm; therefore, another bisection search algorithm is proposed which is able to find the global optimal closed-form solutions of phase shift coefficient given fixed initial point from the previous iteration of MM algorithm.
3. The convergence of the AO algorithm is analyzed in detail by proposing a series of propositions, from which the solution returned by the AO algorithm is guaranteed to converge to a limit point. It is shown that the proposed algorithm also applies for multi-antenna PR case. Simulation results indicate that our proposed IRS-assisted design greatly boosts the secondary user’s secrecy rate. More importantly, even when PR and the secondary receiver are located in the same direction, full power allocation at secondary transmitter is still optimal so that the secrecy rate returned by our algorithm is still increasing with transmit power. This is significantly different from the no-IRS case in which the secrecy rate saturates gradually as transmit power is increasing since IPC is becoming active and full power allocation is not optimal signaling strategy.
The rest of the paper is organized as follows: Section 2 describes the channel model and formulate the optimization problem. In Section 3, the AO algorithm is proposed to jointly maximize the transmit covariance and phase shift coefficient. Simulations were carried out to evaluate the performance and convergence of the proposed algorithm, with results shown in Section 4. Finally, Section 5 concludes the paper.
Notations: bold lower-case letters ( a ) and capitals ( A ) denote vectors and matrices respectively; A T , A * , and A H denote transpose, conjugate, and Hermitian conjugate of A , respectively; A 0 means positive semi-definite; E { · } is statistical expectation, λ i ( A ) denotes eigenvalues of A , which are in decreasing order unless indicated otherwise, i.e., λ 1 λ 2 λ 3 . . . ; | A | and t r ( A ) are determinant and trace of A ; I is an identity matrix of appropriate size; C M × N and R M × N denotes the space of M × N matrix with complex-valued elements and real-valued elements, respectively; a r g ( a ) denotes the phase of each entry of a ; d i a g ( a ) is to transform the vector a to a diagonal matrix in which all diagonal entries are in a ; R e { a } denotes the real element of a . A ( i , j ) denotes the entry in the i-th row and j-th column of A ; ⊙ denotes Hadamard product; N ( A ) denotes the null space of A and R ( A ) denotes the range of A . r a n k ( A ) denotes the Rank of the A .

2. Channel Model and Problem Formulation

Let us consider an IRS-assisted MISO wiretap channel model shown as Figure 1 secondary transmitter Alice, a secondary receiver Bob, an eavesdropper Eve, and a PR and an IRS are included. The antenna number deployed at Alice and the number of reflecting elements deployed on IRS are m and n, respectively, and Bob, Eve, and PR are all equipped with a single antenna. The task for IRS in this model is to help Bob to improve its secrecy performance on the condition that the QoS at PR is satisfied. Therefore, IRS adjusts the phase shift coefficient for the reflecting elements by its controller, and reflect the broadcasted information signals from Alice passively to Bob, Eve, and PR (without generating any extra noise) so as to constructively add to the non-reflected signal from Alice–Bob link and destructively add with the non-reflected signal from Alice–Eve. Meanwhile, the reflected signal also destructively add with the non-reflected one from Alice–PR link so that the interference to PR does not exceed the pre-defined threshold. Our goal is to maximize the achievable secrecy rate of Bob by jointly optimizing the transmit covariance at Alice and phase shift coefficient at IRS.
Based on this setting, the received signals at Bob and Eve are expressed as
y B = h A B x + h I B Q H A I x + ξ B
y E = h A E x + h I E Q H A I x + ξ E
respectively, where x C M × 1 denotes the information signals, h A B C 1 × M , h A E C 1 × M , h I B C 1 × N , h I E C 1 × N , and H A I C N × M are the channel vectors (matrix) representing the direct link of Alice–Bob, Alice–Eve, IRS–Bob, IRS–Eve, and Alice–IRS respectively (direct link means the link for direct communication between transmitter and receiver, without hopping or relaying), ξ B , and ξ E represent complex noise at Bob and Eve respectively, Q = d i a g ( [ q 1 , q 2 , , q n ] T ), q i = e j θ i is the diagonal phase shift matrix for IRS, θ i is the phase shift coefficient at reflecting element i. In addition, the received signals at PR are also expressed as
y P = h A P x + h I P Q H A I x + ξ P
where h A P C 1 × M , h I P C 1 × N , are the channel vectors representing the direct link of Alice–PR and IRS–PR respectively, ξ P represent complex noise at PR. Without loss of generality, it is assumed that all the noise ξ B , ξ E and ξ P are distributed as CN ( 0 , 1 ) throughout the paper. We consider that full CSI is available to Alice and IRS, which can be achieved by modern adaptive system design, where channel is estimated at Bob and PR, and then sent back to the Alice and IRS via a feedback link; when Eve is just another user accessed in the system, they also share their CSI with Alice and IRS (In practice, Alice and IRS may not be able to have perfect CSI of Alice, Eve, and IRS–Eve link if Eve is a hidden unidentified user, and IRS also may requires extra equipment to obtain the CSI of IRS–Bob and IRS–PR link. The results in this paper serve as a theoretical performance upper bound for the considered real system.). Meanwhile, Alice and IRS could also exchange the CSI between each other via the control link. In this paper, we only consider using the CSI (channel state information), and all the optimization are based on this setting, thus the presented solution does not consider the effects of multi-path in the non-line-of-sight(NLOS) scenario. We will consider these in the future.
Based on Equations (1)–(3), the secrecy rate maximization problem of this channel model is expressed as
P 1 : max R , Q C s ( R , Q ) s . t . R 0 , t r ( R ) P T , ( h I P Q H A I + h A P ) R ( h I P Q H A I + h A P ) H P I , | q i | = 1 , i = 1 , 2 , , n .
where
C s ( R , Q ) = l o g 2 ( 1 + ( h I B Q H A I + h A B ) R ( h I B Q H A I + h A B ) H 1 + ( h I E Q H A I + h A E ) R ( h I E Q H A I + h A E ) H )
and where R = E { x x H } denotes the transmit covariance at Alice, P T denotes total transmit power budget for Alice and t r ( R ) P T is the TPC, P I denotes the maximum interference power budget for PR and ( h I P Q H A I + h A P ) R ( h I P Q H A I + h A P ) H P I is the IPC, the unit modulus constraint | q i | = 1 ensures that each reflecting element in IRS does not change any amplitude of the signals.
Before solving this problem, a few remarks are in order.
Remark 1.
Note that in P1, we maximize the secrecy rate by optimizing the general covariance matrix R instead of transmit beamforming vector at Alice. The reason is that since extra IPC is considered here and also the secrecy rate is related to both R and Q ; therefore, it is not known whether beamforming is still the optimal signaling strategy in this scenario. In fact, we will later propose an AO algorithm to optimize R by fixing Q , and prove that beamforming is still the optimal solution (i.e., the rank of optimal R is still 1).
Remark 2.
Different from the MISO CR secrecy capacity optimization problem without IRS in [6], the formulated optimization problem P1 is a new complicate non-convex optimization problem with two variables. There is no optimal (or sub-optimal) closed-form or numerical solutions for this problem currently. Although some numerical solutions are established for the IRS-assisted MISO WTC case in which only TPC at Alice is considered [23,24,25,26,27,28], they all fail to the CR setting when extra IPC at PR is considered. This is because with IPC, full power allocation for signaling at Alice is not always optimal unless IPC can be ignored as an inactive constraint.
Remark 3.
The key difficulty in solving P1 is how to optimize Q subject to the unit modulus constraint | q i | = 1 , since this is a unique non-convex constraint and cannot be approximated to convex one by using some existing methods such as Taylor series expansion [13]. Q is also not a Hermitian matrix, thereby significantly increasing the difficulty of solving this problem.

3. Alternation Optimization Algorithm

Since P1 is a complicate non-convex optimization problem with two variables, it is difficult to directly optimize R and Q simultaneously. We propose an iterative AO algorithm to solve the secrecy rate maximization problem P1 via solving the two sub-problems alternatively: maximizing R when Q is given and maximizing Q when R is given. As sufficiently enough iterations are reached, the corresponding results returned by the AO algorithm are guaranteed to local convergence.

3.1. Optimizing R Given Q

In this subsection, we focus on solving the sub-problem of maximizing R given Q . For simplicity, let
h n = h I n Q H A I + h A n , n { B , E , P }
Then given fixed Q , the sub-problem of optimizing R can be expressed as P2:
P 2 : max R 1 + h B R h B H 1 + h E R h E H s . t . R 0 , t r ( R ) P T , h P R h P H P I ,
where the log function is ignored here due to its monotonicity. Since Q is fixed, h B , h E , and h P are all fixed vectors so that all the constraints for R are convex constraints. P2 is a quasi-convex optimization problem, which can be globally optimized via numerical solutions. Note that since IPC is considered, the closed form optimal beamforming solution proposed in [4] is not always the optimal solution for this problem, unless IPC is an inactive constraint. To optimize R , we transformed P2 to the following problem P3 by introducing a variable t:
P 3 : max R , t t + h B R ˜ h B H s . t . R ˜ 0 , t 0 , t r ( R ˜ ) t P T , h P R ˜ h P H t P I , h E R ˜ h E H + t = 1 ,
where t = ( 1 + h E R h E H + 1 ) 1 , R ˜ = t R . It can be proved that the optimal solution in P3 is the feasible solution in P2, and the optimal solution in P2 is also the feasible solution in P3, also note that the objective function in both P2 and P3 are equivalent; therefore, P2 and P3 are equivalent. Since P3 is a convex optimization problem with linear objective and linear constraints, we use the standard optimization software package CVX [29] to optimize P3. Once the optimal R ˜ and t are obtained, the optimal solution of R for P2 can be obtained directly.
Note that when only TPC is considered, it is proved that beamforming is the optimal solution for transmitter [4]. In fact, when IPC is included in the problem, beamforming is also the optimal solution in P2, from which the following proposition holds.
Proposition 1.
Consider R o p t is the optimal solution for P2 given Q , then r a n k ( R o p t ) 1 holds.
Proof. 
See Appendix A.1. □
Proposition 1 indicates that although IPC is considered, beamforming is still the optimal signaling strategy even when IPC is active. This conclusion holds for any settings of P T , P I as well as any number of antennas deployed at PR. Note that the closed-form optimal beamforming results illustrated in [4] only applies for inactive IPC case, the closed-form solutions when IPC is active is still an open problem.

3.2. Optimizing Q Given R

In this subsction, we focus on our attention on solving the sub-problem of maximizing Q given R . Firstly, when R is fixed, P1 can be relaxed as the following sub-problem P4:
P 4 : max Q 1 + h B R h B H 1 + h E R h E H s . t . h P R h P H P I ,
Apparently, this is a difficult non-convex fractional programming optimization problem with non-convex objective as well as non-convex constraints, especially the unit modulus constraint of Equation (4); therefore, we propose a solution to optimize a local optimal Q for this problem, the key idea in our paper is of three steps. Firstly, we temporarily fix Equation (4), and make manipulations to the objective as well as IPC h B R h B H P I so as to make P4 to be a more tractable problem (shown as P5 and P6). Secondly, we propose bisection search algorithm in combination with iterative MM algorithm to solve this tractable problem. Thirdly, to overcome the non-convex constraint of Equation (4) in each iteration of MM algorithm, we propose another bisection search algorithm to obtain the global optimal Q given the initial point returned from the previous iteration of MM algorithm.
Specifically, let
s = [ q 1 * , q 2 * , . . . , q n * ] T
then for m { B , E , P } ,
1 + h m R h m H = 1 + h I m Q H A I R H A I H Q H h I m H + h A m R H A I H Q H h I m H + h I m Q H A I R h A m H + h A m R h A m H
= 1 + h A m R h A m H + s H { d i a g ( h I m T ) H A I R [ d i a g ( h I m T ) H A I ] H } s + 2 R e { s H d i a g ( h I m T ) H A I R h A m H }
= 1 + h ¯ A m + s H H ¯ I m s + 2 R e { s H h ˜ I m }
where Equation (5) holds since a H Q b = s H d i a g ( a H ) b holds for any vectors a and b with proper sizes, and where
h ¯ A m = h A m R h A m H + s H , h ˜ I m = d i a g ( h I m T ) H A I R h A m H H ¯ I m = d i a g ( h I m T ) H A I R [ d i a g ( h I m T ) H A I ] H
Therefore, problem P4 can be equivalently expressed as the following P5:
P 5 : max s 1 + h ¯ A B + s H H ¯ I B s + 2 R e { s H h ˜ I B } 1 + h ¯ A E + s H H ¯ I E s + 2 R e { s H h ˜ I E } s . t . ( 4 ) , h ¯ A P + s H H ¯ I P s + 2 R e { s H h ˜ I P } P I
It can be known that P5 is more tractable problem compared with P4, since both the numerator and denominator of the objective function as well as the IPC are quadratic convex function respect to s . To optimize s in P5, we add a non-negative parameter u > 0 , and transform P5 to the following P6:
P 6 : min s f ( s / u ) = 1 + h ¯ A E u ( 1 + h ¯ A B ) + s H ( H ¯ I E u H ¯ I B ) s + 2 R e { s H ( h ˜ I E u h ˜ I B ) } s . t . ( 4 ) , ( 7 ) ,
Let s ( u ) denote the optimal value of P6 given fixed u, according to the key idea of fractional programming [30], finding the optimal solution of P5 is equivalent to searching for the optimal u such that the value of objective function f ( s ( u ) / u ) = 0 . In this paper, we apply bisection search algorithm to solve P5 according to the monotonic property of f ( s ( u ) / u ) in u.
Since P6 is still a non-convex optimization problem due to Equation (4), it is difficult to directly optimize s given fixed u in each iteration of bisection search. Although the existing semi-definite relaxation method proposed in [19,20,21,22,23] could solve P6 by properly transforming the objective and constraints (including Equation (4)) to convex formula so that CVX can be directly applied to optimize s by dropping the rank constraints, it requires significant computational complexity especially when m and n are large. Moreover, extra Gaussian randomization approach is needed to recover the rank-1 solution if the results produced by CVX is not rank-1, thereby further increasing the computational complexity; therefore, we propose the MM algorithm to solve P6 given u in each iteration of bisection search, which has been widely used in the applications of wireless signal processing. The key idea of MM algorithm is to firstly approximate the original problem by formulating an approximately upper bound of the objective and constraints, and then iteratively compute the optimal value of this approximated problem by initializing a feasible starting point. If the bound is constructed properly, any limit point of the solutions returned by MM algorithm is guaranteed to local convergence for the original problem [31].
To find the surrogate function of f ( s / u ) in P6, we apply the following Lemma illustrated in [32]:
Lemma 1.
Let X be an n × n Hermitian matrix, then for any point a ˜ C n × 1 , a H X a is upper bounded by
a H X a a H Y a 2 R e { a H ( Y X ) a ˜ } + a ˜ H ( Y X ) a ˜ , w h e r e Y = λ 1 ( X ) I
Using this lemma, the upper bound of f ( s / u ) can be obtained as
f ( s / u ) c 1 ( u ) + c 2 ( u ) + 2 R e { s H [ ( h ˜ I E u h ˜ I B ) ( λ 1 ( H ¯ I E u H ¯ I B ) I ( H ¯ I E u H ¯ I B ) ) s ˜ ] } = f ˜ ( s / ( u , s ˜ ) )
where s ¯ is the solution returned by MM algorithm in the previous iteration, and where c 1 ( u ) and c 2 ( u ) are constant terms if u is fixed, which are expressed as
c 1 ( u ) = 1 + h ¯ A E u ( 1 + h ¯ A B ) + s H λ 1 ( H ¯ I E u H ¯ I B ) I s = 1 + h ¯ A E u ( 1 + h ¯ A B ) + n λ 1 ( H ¯ I E u H ¯ I B )
c 2 ( u ) = s ˜ H [ λ 1 ( H ¯ I E u H ¯ I B ) I ( H ¯ I E u H ¯ I B ) ] s ˜ = n λ 1 ( H ¯ I E u H ¯ I B ) s ˜ H ( H ¯ I E u H ¯ I B ) s ˜
respectively. Equations (9) and (10) hold since s ˜ H s ˜ = s H s = n . It can be verified that f ˜ ( s / ( u , s ˜ ) ) is continuous in s and s ˜ given fixed u, and also f ˜ ( s / ( u , s ˜ ) ) = f ˜ ( s ˜ / u ) , s f ˜ ( s / ( u , s ˜ ) ) s = s ˜ = s f ( s / u ) s = s ˜ hold; therefore, f ˜ ( s / ( u , s ˜ ) ) is a surrogate function of f ( s / u ) , and also a linear function respect to s. Similarly, Equation (7) can also be approximated to an upper bound:
g ( s ) = h ¯ A P + s H H ¯ I P s + 2 R e { s H h ˜ I P } c 3 + 2 R e { s H [ h ˜ I P ( λ 1 ( H ¯ I P ) I H ¯ I P ) s ˜ ] } = c 3 + ( g ˜ ( s / s ˜ ) P I
where
c 3 ( u ) = h ¯ A P + 2 n λ 1 ( H ¯ I P ) s ˜ H H ¯ I P s ˜ g ˜ ( s / s ˜ ) = 2 R e { s H [ h ˜ I P ( λ 1 ( H ¯ I P ) I H ¯ I P ) s ˜ ] }
Then, P6 can be approximated to a new optimization problem P7:
P 7 : min s f ˜ ( s / ( u , s ˜ ) ) s . t . ( 4 ) , g ˜ ( s / s ˜ ) P I c 3 = P ˜ I
Using the MM algorithm to solve P7 by setting feasible initial point s ˜ , the output result is guaranteed to be a local optimal point of P6 (which will be proved later).
During each iteration of theMM algorithm, P7 is still difficult to solve due to Equation (4). In the following, we propose another bisection search algorithm to obtain a closed-form global optimal solution of P7 given initial point s ˜ . Specifically, we firstly write the Lagrangian of P7 as
L ( s , μ , υ i ) = f ˜ ( s / ( u , s ˜ ) ) + μ ( g ˜ ( s / s ˜ ) P ˜ I ) + i = 1 n υ i ( | q i | 1 ) ,
where μ and υ i denote the Lagrange multipliers responsible for the constraints of Equations (12) and (4) respectively. Thus, the Karush Kuhn–Tucker (KKT) conditions of P7 expressed as
s f ˜ ( s / ( u , s ˜ ) ) + μ s g ˜ ( s / s ˜ ) + i = 1 n υ i s | q i | = 0 ,
μ ( g ˜ ( s / s ˜ ) ) P ˜ I ) = 0 , υ i ( | q i | 1 ) = 0 ,
g ˜ ( s / s ˜ ) ) P ˜ I , | q i | = 1 ,
μ 0 , υ i 0 , i = 1 , 2 , . . . , n ,
where Equation (13) is the stationary condition, Equation (14) contains the complementary slackness conditions, Equation (15) contains the primal feasibility conditions, and Equation (16) contains the dual feasibility conditions. According to [33], although P7 is non-convex problem, its optimal solution as well as dual optimal solutions must satisfy the above KKT conditions. Consider s ( μ ) is the optimal solution of P7, where μ is the corresponding dual optimal Lagrange multiplier, then
μ ( g ˜ ( s ( μ ) / s ˜ ) ) P ˜ I ) = 0 .
Our goal is to search for the primal optimal s ( μ ) and dual optimal μ satisfying Equation (17).
It is straightforward to know that the optimal dual variable μ can be either zero or positive. We consider the simple case μ = 0 , which means Equation (12) is not active so that g ˜ ( s ( μ ) / s ˜ ) ) < P ˜ I . Therefore, P7 can be equivalently reduced to the following problem P8:
P 8 : max s f ˜ ( s / ( u , s ˜ ) ) s . t . ( 4 ) .
Obviously, it can be known that the objective function in P8 is maximized only when each entry in s has same angular with those in q ˜ where
q ˜ = [ ( λ 1 ( H ¯ I E u H ¯ I B ) I ( H ¯ I E u H ¯ I B ) ] s ˜ ( h ˜ I E u h ˜ I B ) .
Therefore, the closed-form optimal solution for maximizing P8 is
s ( μ = 0 ) = e j a r g ( q ˜ ) ,
and Equation (19) is also the global optimal solution of P7 if Equation (12) is inactive.
The next case is when μ > 0 , i.e., Equation (12) is active so that g ˜ ( s ( μ ) / s ˜ ) ) = P ˜ I . It can be known that Equation (19) is no longer the optimal solution for P8 in this case. To obtain the optimal solution, we firstly give the following proposition.
Proposition 1.
The function g ˜ ( s ( μ ) / s ˜ ) ) is a monotonically decreasing function in μ , where s ( μ ) is the optimal solution of P7 with given μ .
Proof. 
See Appendix A.2. □
With this proposition, we add the term μ g ˜ ( s ( μ ) / s ˜ ) ) after the objective function in P7, and consider the following problem P9:
P 9 : max s f ˜ ( s / ( u , s ˜ ) ) μ g ˜ ( s ( μ ) / s ˜ ) ) s . t . ( 4 ) .
It can be known that given fixed μ > 0 , the objective in P9 is maximized only when each entry in s has same angular with those in q ˜ μ q ¯ , where
q ¯ = h ˜ I P ( λ 1 ( H ¯ I P ) I H ¯ I P ) s ˜ .
Therefore, the closed-form optimal solution for P9 is expressed as
s ( μ > 0 ) = e j a r g ( q ˜ μ q ¯ ) ,
and this is also the global optimal solution of P7 if μ is found such that the complementary slackers condition of Equation (17) is satisfied (which will be proved later). Since g ˜ ( s ( μ ) / s ˜ ) ) is decreasing in μ , one can find the optimal dual variable μ satisfying Equation (17) using existing numerical algorithm. Based on this property, we propose the bisection search algorithm again to search for the optimal μ of P7 under the active Equation (12) case, which is concluded as Algorithm 1. In this algorithm, given initial μ u and μ l , the total number of iterations k ϵ 1 need to achieve the target accuracy ϵ 1 for bisection search is k ϵ 1 = l o g 2 ( ( μ u μ l ) / ϵ 1 ) . The main computational complexity lies in computing the eigenvalue λ 1 ( H ¯ I P u H ¯ I B ) , λ 1 ( H ¯ I P ) and computing s ( μ ) via Equations (19) or (21). Therefore, if Equation (12) is inactive, the total computational complexity is o ( n 3 + n 2 ) , and if Equation (12) is active, the total complexity is o ( n 3 + k ϵ 1 n 2 ) . In the following, we show that the results returned by Algorithm 1 is the global optimal solution of P7.
Proposition 2.
If Equation (12) is active, the output μ and s ( μ ) returned by Algorithm 1 is the global optimal and dual optimal.
Proof. 
See Appendix A.3. □
Algorithm 1 (Bisection algorithm to solve P7 if Equation (12) is active)
Require: Initialize μ l and μ u , set ϵ 1 > 0 .
  repeat
         1. Set μ = ( μ l + μ u ) / 2 .
         2. Compute s ( μ ) via (21).
         3. If g ˜ ( s ( μ ) / s ˜ ) ) P I ˜ , set μ l = μ , otherwise set μ u = μ .
  until | μ u μ l | ϵ 1 .
  4. Output s ( μ ) as the global optimal solution of P7.
With Algorithm 1 at hand, we conclude the MM algorithm for solving P6 given fixed u shown as Algorithm 2. We set the initial point s ˜ = [ 1 , 1 , . . . , 1 n ] T , and solve s in P7 iteratively until the target accuracy ϵ 2 for convergence is reached. The following proposition shows the local convergence of Algorithm 2.
Proposition 3.
In Algorithm 2, the sequence of the objective f ( s k / u ) , k = 1 , 2 , . . . is guaranteed to converge with k and the output s is the local optimal solution of P6.
Proof. 
See Appendix A.4. □
Algorithm 2 ((Minorization–maximization (MM) algorithm to solve P6)
Require: Initialize starting point s 0 , set ϵ 2 > 0 .
  1. Set k = 0 , compute f 0 = f ( s 0 / u ) .
  repeat
        2. Set k = k + 1 ,
        3. Compute s k via (19), if g ˜ ( s k / s k 1 ) > P ˜ I , then compute s k via Algorithm 1.
        4. Compute f k = f ˜ ( s k / ( u , s k 1 ) ) .
        5. Set s k as new starting point.
  until | f k f k 1 | / | f k 1 | ϵ 2 .
  6. Output s as the local optimal solution of P6.
With Algorithms 1 and 2, the residual work solves the fractional programming P5, which is based on the following key proposition.
Proposition 4.
Consider s ( u ) is the local optimal solution returned by Algorithm 2 given fixed u, then f ( s k / u ) is monotonically decreasing in u.
Proof. 
See Appendix A.5. □
Based on this proposition, the bisection search algorithm in combination with MM algorithm to search for the optimal u such that f ( s ^ ( u ) / u ) = 0 is concluded as Algorithm 3. Same with Algorithm 1, the total number of iterations k ϵ 3 for achieving the target accuracy ϵ 3 is k ϵ 3 = l o g 2 ( ( u u u l ) / ϵ 3 ) .
Algorithm 3 (Bisection algorithm to solve P5)
Require: Initialize u l and u u , set ϵ 3 > 0 .
  repeat
      1. Set u = ( u l + u u ) / 2 .
      2. Compute s ^ ( u ) via Algorithm 2
      3. If f ( s ^ ( u ) / u ) 0 , set u l = u , otherwise set u u = u .
  until | u u u l | ϵ 3 .
  4. Output s ^ ( u ) Q .

3.3. Overall AO Algorithm

Finally, we conclude the overall AO algorithm for solving P1 is as Algorithm 4. In this algorithm, we set the feasible starting point Q 0 = I and R 0 = P T I / a m where a > 0 is a adjustable constant so as to guarantee that both TPC and IPC in P1 are satisfied. Denote the objective function in P5 as h ( s ) , based on the relationship between original function f ( s / u ) and surrogate function f ˜ ( s / ( u , s ˜ ) ) in MM algorithm, one obtains that
h ( s ) 1 u o p t = h ( s ( u o p ) )
where s ( u o p t ) is the solution of P5 satisfying f ( s ( u o p t ) / u o p t ) = 0 returned by Algorithm 3. This indicates that the objective value of h ( s ) is non-decreasing during each iteration of AO algorithm. Since R and Q are optimized alternatively, and also R is the global optimal solution given fixed Q in P2, the value of objective C s ( R , Q ) in P1 is non-decreasing, i.e.,
C s ( R 1 , Q 1 ) C s ( R 2 , Q 2 ) . . . C s ( R k , Q k ) ,
Furthermore, R and Q are both bounded by the constraints illustrated in P1 receptively. By applying the Cauchy’s theorem [27], one obtains that a solution R o p t and Q o p t always exist such that
0 = lim k { C s ( R k , Q k ) C s ( R o p t , Q o p t ) } lim k { C s ( R k + 1 , Q k + 1 ) C s ( R o p t , Q o p t ) } = 0 .
which means C s ( R k , Q k ) must converge to a limit point C s ( R o p t , Q o p t ) eventually. Our extensive numerical experiments have validate that the monotonic convergence process of the AO algorithm is guaranteed.
Algorithm 4 ((Alternating optimization (AO) algorithm of solving P1)
Require: Starting point R 0 and Q 0 , ϵ 4 > 0 .
  1. Set k = 0 , Compute C s ( R 0 , Q 0 ) .
  repeat(AO algorithm)
        2. Set k = k + 1 .
        3. Optimize global optimal R k given fixed Q k 1 via CVX.
        4. Optimize local optimal Q k given fixed R k via Algorithm 3.
        5. Compute C s ( R k , Q k ) .
  until | C s ( R k , Q k ) C s ( R k 1 , Q k 1 ) | / | C s ( R k 1 , Q k 1 ) | ϵ 4 .
  7. output R k , Q k as a limit point of P1.

3.4. An Extension to Multi-Antenna PR Case

In this subsection, we consider that PR illustrated in Figure 1 is equipped with multiple antennas, and shows that the proposed AO algorithm still can be applied to this case by properly making some manipulations to the IPC. Specifically, consider R is equipped with N p antennas, then denote H A P C N p × M and H I P C N p × M as the channel matrices representing the direct link of Alice–PR and IRS–PR respectively. Then, the corresponding IPC in P1 is replaced by t r ( H P R H P H ) P I where H P = H A P + H I P Q H A I . Since the objective function s unchanged, given fixed Q , the optimal R also can be obtained by solving P3 in which the constraint h P R ˜ h P H t P I is replaced by t r ( H p R ˜ H P H ) t P I .
To obtain the solution of Q given fixed R , the IPC can be further expressed as
t r ( H P R H P H ) = t r ( H A P R H A P H + H I P Q H A I R H A P H + H A P R H A I H Q H H I P H + H I P Q H A I R H A I H Q H H I P H ) = c + t r ( Q A 1 ) + t r ( Q H A 1 H ) + t r ( Q H H I P H H I P Q A 2 )
= c + 2 R e { a 1 q * } + q * H ( ( H I P H H I P ) A 2 T ) q = c + 2 R e { q * H a 1 H } + q * H ( ( H I P H H I P ) A 2 T ) * q *
= c + 2 R e { s H a 1 H } + s H ( ( H I P H H I P ) A 2 T ) * s P I
where
c = t r ( H A P R H A P H ) , A 1 = H A I R H A P H H I P , A 2 = H A I R H A I H , q = [ q 1 , q 2 , . . . , q n ] T , a 1 = [ A 1 H ( 1 , 1 ) , A 1 H ( 2 , 2 ) , . . . , A 1 H ( n , n ) ] ,
Equation (25) is obtained via the matrix property (see Equation (1.10.6) in [34]), Equation (26) holds since q * = s . Note that Equation (26) has just same equation with Equation (7). Therefore, by applying Algorithm 3, the solution of Q can also be obtained given fixed R . Hence, the AO algorithm can be applied to multi-antenna PR case.

4. Simulation Results

To validate the performance and convergence of the proposed AO algorithm, various simulation results are provided in this section. We set μ l = 0 and μ u = 0 , u l = 0 and u u = 1 for bisection algorithms, and the target accuracy is set as ϵ 1 = ϵ 2 = ϵ 3 = ϵ 4 = 10 4 in the absence of special instructions. All the channels were randomly generated as complex zero-mean Gaussian random variables with unit covariance.

4.1. Secrecy Rate and the Activeness of Constraints

In this subsection, we compute the secrecy rate of IRS assisted CR MISO WTC via the proposed AO algorithm, and compare its performance with several existing methods without IRS. Moreover, the interplay between TPC and IPC is also analyzed under both IRS-assisted and no IRS case.
Firstly, we randomly generate the channels as
h A B = [ 0 . 64 0 . 79 j , 0 . 18 0 . 51 j , 1 . 34 1 . 24 j ] , h A E = [ 0 . 00 0 . 37 j , 0 . 70 0 . 21 j , 0 . 34 0 . 11 j ] , h I B = [ 1 . 38 0 . 43 j , 0 . 33 + 0 . 50 j , 0 . 46 + 0 . 20 j ] , h I E = [ 1 . 04 0 . 36 j , 0 . 49 0 . 55 j , 0 . 61 + 0 . 30 j ] , h I P = [ 0 . 72 + 0 . 54 j , 0 . 18 + 0 . 09 j , 0 . 39 0 . 19 j ] ,
h A I = 0 . 15 0 . 93 j 0 . 30 0 . 88 j 0 . 62 + 0 . 16 j 1 . 51 + 0 . 92 j 0 . 08 0 . 13 j 1 . 57 + 1 . 49 j 0 . 46 + 0 . 70 j 0 . 76 0 . 53 j 1 . 38 0 . 62 j
so that the eigenvalues of h A B H h A B h A E H h A E are { 4 . 60 , 0 , 0 . 75 } , i.e., the channel of direct link is non-degraded (since there exists negative eigenvalue –0.75). Particularly, we consider a worst case by setting h A P = 0 . 5 h A B , i.e., both PR and Bob are located in the same direction so that the channels h A P and h A B are strongly correlated and hence as P T is increasing, the secrecy rate is likely to saturate with transmit power under no IRS case (since PR is easily to receive the interference in this case so that IPC is becoming active and full power cannot be used for signaling). Then, we compare the performance of proposed AO algorithm with several methods without IRS: optimal solutions in [6], sub-optimal AN-aided solutions. We note that although the proposed model in [13] is a simultaneous information and wireless transfer based CR MIMO WTC, its proposed AN design and algorithm also applies for regular no IRS CR MISO WTC. In [13], sub-optimal project beamforming solutions by projecting the interference to the null space of matrix h A P H h A P as well as another AN-aided sub-optimal solutions by putting half of the total power for signaling via the solution in [6] and the residual half of the power for generating AN to the null space of both h A B H h A B and h A P H h A P (so that only Eve could receive AN signals). According to the results illustrated in Figure 2, note that our proposed IRS-assisted design and algorithm achieves significantly better secrecy rate performance than all the other solutions under no-IRS assisted case. The reason is that via optimizing the phase shift coefficient for the reflecting elements, the reflected signal by the IRS and the direct non-reflected signal can be constructively added at Bob but destructively added at Eve, thus providing new degree of freedom. Also note that all the secrecy rates returned by the optimal solutions and two sub-optimal AN methods without IRS saturates as P T is increasing, since TPC is inactive and IPC is active so that Alice cannot use more power for signal transmission; however, for the IRS-assisted case, the secrecy rate is still keep increasing with P T as if there is no IPC at all. The reason is that the reflected signal by the IRS and the direct non-reflected signal also destructively added to the PR. Therefore, although PR and Bob are in the same direction, Alice can still apply more power for the transmission through the Alice–IRS–Bob link and the QoS at PR is also not affected. In addition, the project beamforming solution has zero secrecy rate performance since the signals are completely nulled out at Bob and hence secrecy communication is not achievable.
To see how the interplay between TPC and IPC is returned by the proposed AO algorithm, Figure 2 and Figure 3 show the corresponding secrecy rate and the actual power consumption at Alice (i.e., t r ( R ) ). Note that in Figure 2, the secrecy rate gradually saturates with P T for no IRS design, since PR has better quality of channel than Bob. Therefore, as P T is increasing, full power allocation is not the optimal signaling strategy, or the interference generated to PR will exceed the threshold P T . However, for the IRS-assisted design, the secrecy rate keeps increasing with P T as if the IPC is not present at all. The main reason is that IRS helps to make the signals from Alice–PR link and Alice–IRS–PR link destructively added at PR so as to eliminate the interference and hence full power allocation is always optimal at Alice. This can be further validated in Figure 3, in which the actual power used at Alice (i.e., t r ( R ) ) and actual interference power generated to PR (i.e., h P R h P H ) returned by AO algorithm under the same setting of channels and P T as in Figure 2 ( P T = 30 d B m ), and the results are also compared with the optimal solution without IRS. From Figure 3, we note that the actual total power ( t r ( R ) returned by AO algorithm) of the IRS case is always equal to P T and the h P R h P H = P I , i.e., the actual total power ( t r ( R ) returned by AO algorithm) of IRS case is still linearly increasing with P T . This means Alice can always use full power for transmitting, and the interference generated to PR still does not exceed the threshold P I , even when the IPC is active, which makes the secrecy rate increase with P T illustrated in Figure 2. The main reason is that IRS helps to make the signals from Alice–PR link and Alice–IRS–PR link destructively added at PR so as to eliminate the interference and hence full power allocation is always optimal at Alice.
Otherwise, From Figure 3, we can find that the actual total power ( t r ( R ) returned by AO algorithm) of no IRS case is equal to P T and the h P R h P H < P I , when P T 30 , i.e., IPC is inactive so that Alice can use full power for transmitting, and the interference generated to PR still does not exceed the threshold P I . However, when P T > 30 , we note that the t r ( R ) < P T (although t r ( R ) is still growing with P T ) and h P R h P H = P I appears, i.e., Alice can not full power for transmitting due to IPC active. This is because if it signals at full power, the interference power to PR will exceed the threshold ( P I = 30 ) and affect the communication quality of PR, which is contrary to the IPC and TPC of the CR system. Hence, from these results we find that IRS not only greatly helps enhance the secrecy rate, but also eliminates the restriction brought by IPC on secrecy performance under some certain channel conditions, which bring broad prospects for future development of CR systems.
In fact, the sufficient and necessary condition for the secrecy rate to grow unbounded with P T given fixed P I is that the effective channel h i = h A i + h I i Q H A I , i { B , E , P } satisfy [10]
N ( h E H h E ) N ( h P H h P ) N ( h B H h B ) .
Without IRS (i.e., Q = 0 ) and if h A P = 0 . 5 h A B , then N ( h P H h P ) = N ( h A P H h A P ) = N ( h B H h B ) = N ( h A B H h A B ) so that (31) does not hold (even when N ( h A P H h A P ) N ( h A E H h A E ) = ). With IRS, Q can be properly optimized by our AO algorithm so as to meet (31), which is the key reason why full power allocation is always optimal and the secrecy rate is keep increasing with P T .
To validate the performance of AO algorithm under more channel realizations, we keep the setting h A P = 0 . 5 h A B , and compute the average secrecy rate under 100 randomly generated channels. The results are shown in Figure 4 and Figure 5, note that our proposed solution still achieves significantly better performance than the optimal solutions without IRS given different values of m and n. With the aid of IRS, the average secrecy rate keeps (almost linearly) increasing with P T , which is significantly different from no IRS case (that the saturation appears as IPC is active). The reason is that via jointly optimizing the phase shift coefficient for the reflecting elements, the reflected signals and the direct non-reflected signal can be constructively added at Bob but destructively added at Eve so that the secrecy performance can be enhanced. Figure 5 also shows that as m and n increase, a larger degree of freedom can be obtained so that a larger secrecy rate can be achieved. Collectively, according to the aforementioned results in Figure 2, Figure 3 and Figure 4, we conclude that our proposed AO algorithm based on IRS-assisted design greatly enhances the secondary user’s secrecy performance in CR network.

4.2. Convergence of the Proposed AO Algorithm

In this subsection, we validate the convergence of proposed AO algorithm. In Figure 5, Figure 6, Figure 7 and Figure 8, the results are all computed under fixed P T = P I = 35 d B m , and randomly generated channels.
Figure 6 and Figure 7 shows the value of function g ˜ ( s ( μ ) / s ˜ ) and f ( s / μ ) respectively. It can be seen that under various settings of m and n, g ˜ ( s ( μ ) / s ˜ ) is strictly decreasing in μ and f ( s / u ) is strictly decreasing in u, which validates the Propositions 2 and 5. Note that in Figure 6, g ˜ ( s ( μ ) / s ˜ ) is firstly quickly decreasing when 0 < μ < 20 , and then decreasing slowly until converge when μ > 20 . This means that s is very sensitive to low value of μ and as μ is increasing to large enough, μ has very little effect on the value of s. Based on our extensive simulations, the target μ such that g ˜ ( s ( μ ) / s ˜ ) = P ˜ I always exists at the range where g ˜ ( s ( μ ) / s ˜ ) is quickly decreasing. In addition, in Figure 6, the optimal u such that f ( s / u ) = 0 must lies in (0, 1). If u > 1 , then the corresponding transmission rate at Alice is less than that in Eve and hence secrecy communication cannot be realized.
Finally, Figure 8 and Figure 9 illustrate the convergence of the MM algorithm to solve P6 and the proposed AO algorithm for solving P1 under different settings of m and n, respectively. We plot the objective value f k in Algorithm 2 and C s ( R k , Q k ) in Algorithm 4 versus the number of iterations k under several randomly generated channels with different settings of m and n. Note that for all considered m and n, f k is monotonically decreasing function and C s ( R k , Q k ) is monotonically increasing function, which validate the convergence of MM Algorithm 2 and AO Algorithm 4. It requires about 5 to 50 iterations for f k to converge, and 5 to 19 iterations are required to converge for C s ( R k , Q k ) . Furthermore, note that larger settings of m and n requires more iterations to converge to the same accuracy. The reason is that the dimensions of variable R and Q become larger so that the AO algorithm requires more iterations to optimize each element in these variables. In addition to these results, our other extensive simulations also indicate that a monotonic convergence of AO algorithm is guaranteed.

5. Conclusions

In this paper, an IRS-assisted CR Gaussian MISO wiretap channel is studied. To maximize the secrecy rate of secondary user in this channel subject to TPC at transmitter as well as IPC at PR, an AO algorithm is proposed in which the transmit covariance for transmitter and phase shift coefficient for IRS are optimized alternatively by fixing the other as constant. Simulation results have validated the performance and convergence of the proposed AO algorithm. It is shown that with IRS, the secrecy rate of secondary user can be greatly enhanced compared with existing solutions for no IRS case. And as IPC is active, full power allocation is still optimal so that the secrecy rate keeps increasing with transmit power, which is significantly different from no IRS case.

Author Contributions

Conceptualization, H.X. and L.D.; Data curation, H.X.; Formal analysis, H.X. and L.D.; Funding acquisition, H.X.; Investigation, H.X.; Methodology, H.X. and L.D.; Project administration, W.W.; Resources, H.X.; Software, H.X. and L.D.; Validation, H.X.; Writing—original draft, H.X. and L.D.; Writing—review and editing, W.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by [China National Key Research and Development Program] grant number 2019QY0301.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Proof of Proposition 1

Proposition 1 can be obtained by following the step of proof for Proposition 1 and 2 in [10]. Let W j = h j H h j , j { B , E , P } then the stationary condition in the KKT condition of P2 can be expressed as
( I + W B R ) 1 W B W E ( I + R W E ) 1 + M = α 1 I + α 2 W P
where α 1 , α 2 , and M represent the Lagrange multipliers corresponding to TPC, IPC, and R 0 in P2 respectively. Using the same steps of proof in [10] by manipulating the above stationary condition, one obtains that the optimal signaling strategy for Alice is over the positive directions of the difference channel W B W E , i.e.,
x H ( W B W E ) w 0
for any information signal x R ( R o p t ) , and signaling over negative directions of W B W E would provide more information to Eve so that secrecy communication can not be guaranteed. Hence, according to Proposition 2 in [10],
r a n k ( R o p t ) = m i n ( m , 1 ) = 1
which completes the proof.

Appendix A.2. Proof of Proposition 2

Consider μ 1 > μ 2 > 0 , and let s ( μ 1 ) , s ( μ 2 ) denote the solution of P7 with μ 1 , μ 2 . Assume s ( μ 1 ) is the global optimal solution of P7, then
L ( s ( μ 1 ) , μ 1 , υ i ) L ( s ( μ 2 ) , μ 1 , υ i ) .
Similarly, assume s ( μ 2 ) is the global optimal solution of P7, then
L ( s ( μ 2 ) , μ 2 , υ i ) L ( s ( μ 1 ) , μ 2 , υ i ) .
Combining these two inequalities, one obtains
( μ 1 μ 2 ) g ˜ ( s ( μ 1 ) / s ˜ ) ( μ 1 μ 2 ) g ˜ ( s ( μ 2 ) / s ˜ ) .
Since μ 1 μ 2 , then g ˜ ( s ( μ 1 ) / s ˜ ) g ˜ ( s ( μ 2 ) / s ˜ , from which the proposition holds.

Appendix A.3. Proof of Proposition 3

Given initial point s ˜ , consider the global optimal solution for P7 is s ˜ , then the following holds
g ˜ ( s ^ / s ˜ ) = P ˜ I .
Then, consider the optimal μ returned by the Algorithm 1 is μ ^ , and the corresponding s as s ( μ ^ ) , it can be known that μ ^ returned by bisection search makes the following holds
g ˜ ( s ( μ ^ ) / s ˜ ) = P ˜ I .
Now we assume that s ( μ ^ ) is not the global optimal solution of P7, then
f ˜ ( s ( μ ^ ) / ( u , s ˜ ) ) f ˜ ( s ^ / ( u , s ˜ ) ) .
Note that s ( μ ^ ) is the global optimal solution of P9 under μ = μ ^ , then the following holds
f ˜ ( s ( μ ^ ) / ( u , s ˜ ) ) μ g ˜ ( s ( μ ^ ) / s ˜ ) f ˜ ( s ^ / ( u , s ˜ ) ) μ g ˜ ( s ^ / s ˜ ) .
By substituting Equations (A6) and (A7) into Equation (A9) and after some manipulations, one obtains
f ˜ ( s ( μ ^ ) / ( u , s ˜ ) ) f ˜ ( s ^ / ( u , s ˜ ) ) .
Combining Equations (A8) and (A10),
f ˜ ( s ( μ ^ ) / ( u , s ˜ ) ) = f ˜ ( s ^ / ( u , s ˜ ) ) .
holds so that s ( μ ^ ) = s ^ , i.e., s ( μ ^ ) returned by Algorithm 1 is the global optimal solution of P7, from which the proof is complete.

Appendix A.4. Proof of Proposition 4

Firstly, it can be known that s k always satisfies the unit modulus constraint of Equation (4) for each iteration k. Secondly, Since c 3 + g ˜ ( s / s ˜ ) is an surrogate function of g ( s ) , then given s k , one obtains
g ( s k ) = c 3 + g ˜ ( s k / s k ) g ˜ ( s k + 1 / s k ) P I .
where the first inequality holds due to the property of surrogate function and where the second inequality holds since s k + 1 is also a feasible solution of P7. Hence, the IPC g ( s k ) P I is also guaranteed during each iteration.
Thirdly, the sequence { f ( s k / u ) } is guaranteed to converge due to the property of MM algorithm:
f ( s k / u ) = f ˜ ( s k / ( u , s k ) ) f ˜ ( s k + 1 / ( u , s k ) ) f ˜ ( s k + 1 / ( u , s k + 1 ) ) = f ( s k + 1 / u ) .
Therefore, f ( s k / u ) f ( s k + 1 / u ) so that f ( s k / u ) is a monotonically decreasing sequence with k.
In the following, we show that the results produced by Algorithm 2 is a KKT point of P6. Consider the converged point by Algorithm 2 is s ^ , which is also the global optimal solution of P7 given initial point s ˜ = s ^ , then the corresponding KKT conditions of P7 are
s ^ f ˜ ( s / ( u , s ^ ) ) | s = s ^ + μ s ^ g ˜ ( s / s ^ ) | s = s ^ + i = 1 n υ i s ^ | q i | = 0 ,
μ ( g ˜ ( s ^ / s ^ ) P ^ I ) = 0 , υ i ( | q i | 1 ) = 0 , μ 0 , υ i 0
g ˜ ( s ^ / s ^ ) P ^ I , | q i | = 1 ,
where P ^ I = P I h ¯ A P + 2 n λ 1 ( h ¯ A P ) s ^ H H ¯ I P s ^ . Note that
s ^ g ˜ ( s / s ^ ) | s = s ^ = s ^ g ( s ) | s = s ^ , g ˜ ( s ^ / s ^ ) = g ( s ^ ) ,
by substituting Equation (A16) into Equations (A13)–(A15), we find that this is just the KKT conditions of P6. Therefore, the converged point s ^ is a KKT point of P6, from which the proof is complete.

Appendix A.5. Proof of Proposition 5

Consider 0 < u 1 < u 2 , then according to the property of surrogate function in the MM algorithm, we have
f ( s ( u 2 ) / u 2 ) f ˜ ( s ( u 2 ) / ( u 2 , s ( u 1 ) ) f ˜ ( s ( u 2 ) / ( u 2 , s ( u 1 ) ) = f ( s ( u 1 ) / u 2 ) f ( s ( u 1 ) / u 1 )
where Equation (A17) holds since u 1 < u 2 . Therefore, f ( s ( u 2 ) / u 2 ) f ( s ( u 1 ) / u 1 ) and hence f ( s ( u ) / u ) is a monotonically decreasing function in u.

References

  1. Fragkiadakis, A.; Tragos, E.; Askoxylakis, I.G. A survey on security threats and detection techniques in cognitive radio networks. IEEE Commun. Surv. Tutorials 2013, 15, 428–445. [Google Scholar] [CrossRef]
  2. Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  3. Sharma, R.K.; Rawat, D.B. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey. IEEE Commun. Surv. Tutorials 2014, 17, 1023–1043. [Google Scholar] [CrossRef]
  4. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas–part I: The MISOME wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar] [CrossRef] [Green Version]
  5. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennass part II: The MIMOME wiretap channel. IEEE Trans. Inf. Theory 2010, 9, 1494–1502. [Google Scholar]
  6. Pei, Y.; Liang, Y.C.; Zhang, L.; Teh, K.C. Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun. 2010, 9, 1494–1502. [Google Scholar] [CrossRef]
  7. Pei, Y.; Liang, Y.C.; Teh, K.C. Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Trans. Signal Process. 2011, 59, 1683–1693. [Google Scholar] [CrossRef]
  8. Al-Nahari, A.; Geraci, G.; Al-Jamali, M.; Ahmed, M.H.; Yang, N. Beamforming with artificial noise for secure MISOME cognitive radio transmissions. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1875–1889. [Google Scholar] [CrossRef]
  9. Nguyen, V.-D.; Duong, T.Q.; Dobre, O.A.; Shin, O.-S. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2609–2623. [Google Scholar] [CrossRef] [Green Version]
  10. Dong, L.; Loyka, S.; Li, Y. The secrecy capacity of gaussian MIMO wiretap channels under interference constraints. IEEE J. Sel. Areas Commun. 2018, 36, 704–722. [Google Scholar] [CrossRef]
  11. Loyka, S.; Dong, L. Optimal full-rank signaling over MIMO wiretap channels under interference constraint. IEEE Wirel. Commun. Lett. 2018, 7, 534–537. [Google Scholar] [CrossRef]
  12. Dong, L.; Loyka, S.; Li, Y. An algorithm for optimal secure signaling over cognitive radio MIMO channels. In Proceedings of the 5th IEEE Global Conference on Signal and Information Processing (Globalsip), Montreal, QC, Canada, 14–16 November 2017; pp. 126–130. [Google Scholar]
  13. Fang, B.; Qian, Z.; Shao, W.; Zhong, W. AN-aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels. IEEE Commun. Lett. 2015, 19, 1632–1635. [Google Scholar] [CrossRef]
  14. Zhao, J. A survey of intelligent reflecting surfaces (IRSs): Towards 6G wireless communication networks with massive MIMO 2.0. arXiv 2019. Available online: https://arxiv.org/pdf/1907.04789.pdf (accessed on 2 November 2019).
  15. Basar, E.; Di Renzo, M.; De Rosny, J.; Debbah, M.; Alouini, M.S.; Zhang, R. Wireless communications through reconfigurable intelligent surfaces. IEEE Access 2019, 7, 116753–116773. [Google Scholar] [CrossRef]
  16. Hu, S.; Rusek, F.; Edfor, O. Beyond massive MIMO: The potential of data transmission with large intelligent surfaces. IEEE Trans. Signal Process. 2018, 66, 2746–2758. [Google Scholar] [CrossRef] [Green Version]
  17. Ntontin, K.; Di Renzo, M.; Song, J.; Lazarakis, F.; De Rosny, J.; Phan-Huy, D.-T.; Simeone, O.; Zhang, R.; Debbah, M.; Lerosey, G.; et al. Reconfigurable intelligent surfaces vs. relaying: Differences, similarities, and performance comparison. arXiv 2019. Available online: https://arxiv.org/abs/1908.08747 (accessed on 23 August 2019).
  18. Wu, Q.; Zhang, R. Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network. IEEE Commun. Mag. 2020, 58, 106–112. [Google Scholar] [CrossRef] [Green Version]
  19. Xu, D.; Yu, X.; Schober, R. Resource Allocation for Intelligent Reflecting Surface-Assisted Cognitive Radio Networks. arXiv 2020. Available online: https://arxiv.org/abs/2001.11729 (accessed on 31 January 2020).
  20. Yuan, J.; Liang, Y.; Joung, J.; Feng, G.; Larsson, E. Intelligent Reflecting Surface-Assisted Cognitive Radio System. arXiv 2019. Available online: https://arxiv.org/abs/1912.1067 (accessed on 2 December 2019).
  21. Zhang, L.; Pan, C.; Wang, Y.; Ren, H.; Wang, K. Robust Beamforming Design for Intelligent Reflecting Surface Aided Cognitive Radio Systems with Imperfect Cascaded CSI. arXiv 2020. Available online: https://arxiv.org/abs/2004.04595 (accessed on 9 April 2020).
  22. Zhou, G.; Pan, C.; Ren, H.; Wang, K. Intelligent Reflecting Surface Aided Multigroup Multicast MISO Communication Systems. IEEE Trans. Signal Process. 2020, 1. [Google Scholar] [CrossRef] [Green Version]
  23. Cui, M.; Zhang, G.; Zhang, R. Secure wireless communication via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef] [Green Version]
  24. Shen, H.; Xu, W.; Gong, S.; He, Z.; Zhao, C. Secrecy rate maximization for intelligent reflecting surface assisted multi-antenna communications. IEEE Commun. Lett. 2019, 23, 1488–1492. [Google Scholar] [CrossRef] [Green Version]
  25. Feng, B.; Wu, Y.; Zheng, M. Secure Transmission Strategy for Intelligent Reflecting Surface Enhanced Wireless System. arXiv 2019. Available online: https://arxiv.org/abs/1909.00629v1 (accessed on 2 September 2019).
  26. Yu, X.; Schober, R. Enabling secure wireless communications via intelligent reflecting surfaces. arXiv 2019. Available online: https://arxiv.org/abs/1904.09573 (accessed on 21 April 2019).
  27. Chen, J.; Liang, Y.; Pei, Y.; Guo, H. Intelligent reflecting surface: A programmable wireless environment for physical layer security. IEEE Access 2019, 7, 82599–82612. [Google Scholar] [CrossRef]
  28. Xu, D.; Yu, X.; Sun, Y.; Ng, D.W.K.; Schober, R. Resource allocation for secure IRS-assisted multiuser MISO systems. arXiv 2019. Available online: https://arxiv.org/abs/1907.03085 (accessed on 6 July 2019).
  29. Available online: http://cvxr.com/cvx/ (accessed on 2 January 2020).
  30. Dinkelbach, W. On nonlinear fractional programming. Manag. Sci. 1967, 13, 492–498. [Google Scholar] [CrossRef]
  31. Hanif, M.F.; Ding, Z.; Ratnarajah, T.; Karagiannidis, G.K. A minorization-maximization method for optimizing sum rate in the downlink of non-orthogonal multiple access systems. IEEE Trans. Signal Process. 2016, 64, 76–88. [Google Scholar] [CrossRef] [Green Version]
  32. Song, J.; Babu, P.; Palomar, D.P. Optimization methods for designing sequences with low autocorrelation sidelobes. IEEE Trans. Signal Process. 2015, 63, 3998–4009. [Google Scholar] [CrossRef] [Green Version]
  33. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  34. Zhang, X.-D.; Vandenberghe, L. Matrix Analysis and Applications; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
Figure 1. A block diagram of intelligent reflecting surface (IRS)-assisted Gaussian cognitive radio (CR) multi-input single-output (MISO) wiretap channel.
Figure 1. A block diagram of intelligent reflecting surface (IRS)-assisted Gaussian cognitive radio (CR) multi-input single-output (MISO) wiretap channel.
Sensors 20 03480 g001
Figure 2. Secrecy rate performance comparison between AO algorithms with IRS and other solutions without IRS. P T is fixed at 30 dBm, the channels are randomly generated. Our proposed algorithm significantly boosts the secrecy rate compared with the existing solutions without IRS.
Figure 2. Secrecy rate performance comparison between AO algorithms with IRS and other solutions without IRS. P T is fixed at 30 dBm, the channels are randomly generated. Our proposed algorithm significantly boosts the secrecy rate compared with the existing solutions without IRS.
Sensors 20 03480 g002
Figure 3. The actual transmit power used at Alice and actual interference power generated to PR under IRS-assisted and no-IRS case under same settings as in Figure 2. Note that t r ( R ) = P T always holds under IRS-assisted case, i.e., total power constraint (TPC) is always active even when IPC is active.
Figure 3. The actual transmit power used at Alice and actual interference power generated to PR under IRS-assisted and no-IRS case under same settings as in Figure 2. Note that t r ( R ) = P T always holds under IRS-assisted case, i.e., total power constraint (TPC) is always active even when IPC is active.
Sensors 20 03480 g003
Figure 4. Average secrecy rate of intelligent reflecting surface (IRS)-assisted case using AO algorithm and no-IRS case using optimal solution in [6] under different settings of m = 2 , 4 and n = 3 , 6 . P T is fixed at 30 dBm.
Figure 4. Average secrecy rate of intelligent reflecting surface (IRS)-assisted case using AO algorithm and no-IRS case using optimal solution in [6] under different settings of m = 2 , 4 and n = 3 , 6 . P T is fixed at 30 dBm.
Sensors 20 03480 g004
Figure 5. Average secrecy rate of IRS-assisted case using AO algorithm and no-IRS case using optimal solution in [6] under different settings of m = 4 , 5 and n = 8 , 10 . P T is fixed at 30 dBm.
Figure 5. Average secrecy rate of IRS-assisted case using AO algorithm and no-IRS case using optimal solution in [6] under different settings of m = 4 , 5 and n = 8 , 10 . P T is fixed at 30 dBm.
Sensors 20 03480 g005
Figure 6. Value of g ˜ ( s ( μ ) / s ˜ ) as function of μ under different settings of m, n. s ˜ is set as [ 1 , 1 , . . . , 1 n ] T , given each fixed value of μ , s ( μ ) is set as Equation (22) under the inactive Equation (13). Note that g ˜ ( s ( μ ) / s ˜ ) is monotonically decreasing in μ .
Figure 6. Value of g ˜ ( s ( μ ) / s ˜ ) as function of μ under different settings of m, n. s ˜ is set as [ 1 , 1 , . . . , 1 n ] T , given each fixed value of μ , s ( μ ) is set as Equation (22) under the inactive Equation (13). Note that g ˜ ( s ( μ ) / s ˜ ) is monotonically decreasing in μ .
Sensors 20 03480 g006
Figure 7. Value of the objective function f ( s / u ) as function of u under different settings of m, n. Given each fixed value of u, s / u is computed via Algorithm 2. Note that f ( s / u ) is monotonically decreasing in u.
Figure 7. Value of the objective function f ( s / u ) as function of u under different settings of m, n. Given each fixed value of u, s / u is computed via Algorithm 2. Note that f ( s / u ) is monotonically decreasing in u.
Sensors 20 03480 g007
Figure 8. Convergence of f k in Algorithm 2 as function of iteration k under different settings of m, n. μ is fixed with 0.5.
Figure 8. Convergence of f k in Algorithm 2 as function of iteration k under different settings of m, n. μ is fixed with 0.5.
Sensors 20 03480 g008
Figure 9. Convergence of C s ( R k , K k ) in Algorithm 4 as function of iteration k under different settings of m, n.
Figure 9. Convergence of C s ( R k , K k ) in Algorithm 4 as function of iteration k under different settings of m, n.
Sensors 20 03480 g009

Share and Cite

MDPI and ACS Style

Xiao, H.; Dong, L.; Wang, W. Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission. Sensors 2020, 20, 3480. https://doi.org/10.3390/s20123480

AMA Style

Xiao H, Dong L, Wang W. Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission. Sensors. 2020; 20(12):3480. https://doi.org/10.3390/s20123480

Chicago/Turabian Style

Xiao, Haitao, Limeng Dong, and Wenjie Wang. 2020. "Intelligent Reflecting Surface-Assisted Secure Multi-Input Single-Output Cognitive Radio Transmission" Sensors 20, no. 12: 3480. https://doi.org/10.3390/s20123480

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop