当前位置:首页 > 专题范文 > 公文范文 >

Optimal,Beamforming,for,Secure,Transmit,in,Practical,Wireless,Networks

时间:2023-06-15 18:25:03 来源:网友投稿

Qiuqin Yang,Linfang Li,Ming-Xing Luo,*and Xiaojun Wang

1The School of Information Science and Technology,Southwest Jiaotong University,Chengdu,610031,China

2School of Electronic Engineering,Dublin City University,Dublin 9,Ireland

Abstract:In real communication systems,secure and low-energy transmit scheme is very important.So far,most of schemes focus on secure transmit in special scenarios.In this paper,our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise(AN),the imperfect receiver and imperfect channel state information (CSI) of eavesdropper,weight of beamforming(BF)vector,cooperative jammers(CJ),multiple receivers,and multiple eavesdroppers,and the analysis shows that the protocol can reduce the transmission power,and at the same time the safe reachability rate is greater than our pre-defined value,and the analysis results are in good agreement with the simulation results.In this letter,the minimal transmit power is modeled as a non-convexity optimization that is general difficult.Our method is to transform it into a two-level non-convex problem.The outer is a univariate optimization that can be solved by the golden search algorithm.The inner is a convex optimization solved by using the CVX.The solutions are further used to improve the confidentiality rate of the system,and reduce the transmit power of the system and resource consumption in terms of the imperfect CSI.Simulations show the efficiency and robustness of the proposed protocol.

Keywords:Secure transmission;MISO system;imperfect CSI;BF vector;convex optimization

Physical Layer Security (PLS) has received extensive attention in ensuring the security of data transmission.The main goal of PLS in applications is to ensure the secrecy of messages,which transmitted by legitimate receivers[1].This is achieved by reducing the signal-to-noise ratio (SNR)of the eavesdropper.One method is to add AN to the legal signal[2-4].Cooperative relay (CR) is useful in the secure transmit of CR-assisted multi-antenna systems.CR can act as a jammer and expand the interference range[5-7].At the same time,the status information of the channel should also be considered.It is difficult to obtain accurate CSI because of the time-varying characteristics of the channel.Some schemes have studied robust and secure transmit with imperfect CSI[8-12].There are two kinds of protocols with uncertain CSI.One is uncertain on one side,that is,only the status information of the eavesdropper or receiver is unknown[13-15].The other is uncertain on both sides,which mean the CSI of both parties is completely unknown[16-19].In addition to the secrecy performance,the power consumption of the system is also considered[20-25].Reference[25]gives the best solution for spectral efficiency and energy consumption issues in 5G communications.

Our motivation comes from the fact that most of cooperative interferences only consider one or a few factors,while the actual factors are not involved in applications,such as imperfect receiver and imperfect CSI of eavesdropper,cooperative jammer,multiple Receivers,and multiple eavesdroppers.In this article,we propose a secure transmit protocol by considering all these factors,which provide a more reliable model for complex networks.The main consideration is coordinated interference,which ensures the confidentiality of the receiver CSI (RCSI) and the eavesdropper CSI (ECSI) under the imperfect premise.At the same time,we will reduce the power required to transmit the signal.Due to the bounded error of CSI,we propose a robust and secure transmit scheme in the MISO downlink network.To further improve the security performance,we also use multi-antenna auxiliary jammers.The main contributions made in this paper are as follows:

(2)We introduce a slack-variable logarithm and semi-definite slack(SDR)to simplify the transmit power optimization,which is due to the non-convexity of the optimization problem involved.At the same time,the Lagrange duality is used to obtain the analytical formula of the constraint conditions.The non-convex problem further becomes a two-level optimization.The external is a univariate optimization,which is solved by using the golden search algorithm.The inner layer is a semi-definite programming(SDP)problem which will be resolved by CVX.

The rest of the paper is organized as follows.Section 2 introduces the system model.In Section 3,we establishes the problem formulationand model the robust transmit power as a non-convex minimization problem.The two-level optimization algorithms will be applied to solve the present problem.Section 4 contributes the simulation that shows the efficiency of the proposed schemes while last section concludes the paper.

Before introducing the system model,we introduce the parameter symbols used in this paper and their meanings,as shown in Tab.1.The matrix is indicated in bold capital letters.Vectors are represented in bold lowercase letters.

Table 1:Notions used in this paper

Table 1:Continued

We consider anassisting jammer (AJ)-assisted MISO system as shown in Fig.1.Alice sends message to multiple receivers Bob1,...,Bobl.The AJ sends AN (here,Gaussian noises will be used in what follows)for the secure transmit by confusingKeavesdroppers Eve.Due to limited feedback,assume that Alice knows the imperfect CSI of each receiver and eavesdropper.The channel estimation errorΔis bounded.The receiver is equipped with an antenna,Eves as same as the receiver.The total number of antennas for the transmitter and assisting jammer is denoted asNtandNj,respectively.

3.1 Channel Mismatch

3.2 Robust Transmit Power Minimization

The present problem is to minimize the transmit power,while the guarantee the minimum transmit secrecy rate.Here,the estimation error of CSI is considered.For the worst case of secrecy capacity,according to the principle of power minimization,the optimization function after adding AN is given by

whereRsis the pre-defined target secrecy rate.In the model,the secrecy rate is evaluated by the difference between the minimum secrecy capacity of the receiver and the maximum secrecy capacity of the eavesdropper.So,the secrecy rate obtained in the optimization is the minimum secrecy rate of the system.In our setting,the minimum secrecy rate should also be higher than the target secrecy rate.To simplify the secrecy capacity function,we introduceβis used as a slack variable.The optimization problem Q1 is equivalently written into

where log(·)denotes the base-2 logarithmic function.

The man slammed on the brakes. Before he could ask her why she wanted to stop, the woman was out of the car and hurrying up a nearby grassy19 slope with the lilacs still in her arms. At the top of the hill was a nursing home and, because it was such a beautiful spring day, the patients were outdoors strolling with relatives or sitting on the porch.

According to Shannon’s formula,the achievable secure rate of Bobland the Evekcan be represented as

From Eqs.(14b),(14c),(15a)and(15b),we can obtain

The Q3 is still non-convex problem.We resort to the idea of SDR to deal with Q3.Define W =wwH.It follows that W ■0,rank(W)= 1.By regardless of the constraint rank(W)= 1,Q3 is written into

whereF1=1-2RsβandF2=1-β

Due to the semi-definite constraints in Eqs.(17b)and(17c),it is difficult to solve the problem Q5.To solve this problem,we firstly transformed into a convex form to get an accurate form.It can be stated as the following proposition.

Now,in order to obtain the optimal value ofβ,we use the one-dimensional search variables method to calculate.Since the inner-level problem is a convex SDP,which will be solved by the CVX[29].The outer layer problem for a fixedβis solved by using the golden search method[30].In summary,we obtain a specific algorithm to solve Q6 as shown in Algorithm 1:

Algorithm 1:to solve Problem Q6 Input:Rs,a0,b0,Pmax,ε.1 Use golden search method to solve Q7 to obtain an optimal solution β* = ai+bi 2 2 Q6 is solved by getting the optimal values of W*,Q*z,P*using β*.3 Output:the optimal solution(W*,Q*)

This section provides numerical results to verify the performances of the proposed transmit scheme.The main setups are shown in Tab.2.

Table 2:Simulation parameters

The channel uncertainty is given in the following form.:

Figs.2 and 3 show the relationships betweenRs,P,Randαb.Fig.2a presents the actual total transmit power in terms of the target secrecy rate andαe.We setξb,l=ξe,k=1.It shows that the total transmit power increases asαeincreases.Moreover,as the uncertainty of the Eve’s channel increases,the proposed BF scheme requires a higher total transmit power in order to ensureRstarget secrecy rate.From Fig.2b,the achievable secrecy rate in the worst case is higher than the target secrecy rate,which satisfies the secrecy requirement of the system in Eq.(13b).In addition,although Fig.2b shows that the larger theαe,the larger the actual secrecy rate when the target secrecy rate takes a certain value,which does not seem to be true.However,when we compare the actual secrecy rate,the consumed power P jointly,as shown in Fig.3,a reasonable explanation can be obtained.As its shown in Fig.3,the largerαeis,the smaller the achievable secrecy rate is obtained in the system with the same power.This is because in the present scheme,the power is related to the target secrecy rate,while the achievable secrecy rate in the worst case and the power are correlated.So,the larger the channel uncertainty is,the lower the system secrecy performance is.Fortunately,this can be overcome by increasing the transmit powerPmax.

Fig.4 shows the system channel capacity and transmit power with random 100 independent experiments.There are more than 90% channels which satisfy the target secrecy rate and the power requirements.This shows that the proposed scheme should be applicable in piratical channels.

Now,we compare the present schemes with previous schemes to show its performances.We mainly consider the LD system model in ref.[23]and CVaR and BTiE in ref.[31],while other schemes may not be consistent with the communication model in this paper or have inconsistent optimization objectives,so no more schemes are selected for comparison.The transmit power and achievable secrecy rate in worst case will be simulated.

Fig.5a shows a comparison between the present scheme and its in ref.[23]for one receiver and one eavesdropper.In Fig.5a,the present scheme costs less power than the LD scheme when the system secrecy rate is less than 4.4 provided that the secrecy rate in the worst case reaches the target.However,when the achievable secrecy rate is larger than 4.4,we get converse result.So,when the system secrecy rate is less than 3.8,the present scheme is better than its in ref.[23]to guarantee both the secrecy and power consumption Fig.5b shows the comparison between the present scheme and the two approaches in ref.[31]for one receiver and multiple eavesdroppers.In both models,the simulations are completed with the same total transmit power ofPmax= 30dB.Here,ξb,l=ξe,k= 0.002.In Fig.5b,the present scheme achieves the bettersecrecyperformance when three schemes have the same transmit power.Hence,these results show when both power loss and achievable secrecy rate are involved,our transmit scheme is better than both schemes in refs.[23,31].Other parameter effects and performance indicators were not considered in this simulation,but it is worth considering.

In this paper,we investigate the robust transmit BF design for MISO wiretapping channels with the imperfect CSI and the minimum transmit power.The covariance-based CSIs of both legitimate receivers and eavesdroppers are imperfect,where the CSI error is restricted to the ellipsoidal model.The communication models are assisted by AJs.We jointly optimized the covariance of the interference signal generated by the auxiliary node and the beamforming vector of the source node in the AJassisted system.The SDR method is firstly used to approximate the present non-convex optimization.We then obtained the equivalent tractable semi-infinite constraints by using the Lagrange duality.This transforms the original non-convex optimization into a two-level optimization with univariate optimization in the outer layer and convex SDP in the inner layer.Simulation results show the present scheme is better than previous schemes.This provides an efficient transmit scheme in practical systems.

Funding Statement:This work was supported by the national natural Science Foundation of China(no.62172341),and Fundamental Research Funds for the Central Universities(no.2682014CX095).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

Appendix A.

It can be verified that the convex problem (18) satisfies Slater’s conditions[27].Hence the strong duality holds between(18)and its dual problem,i.e.,they have the same objective value.The Lagrangian of(18)can be written as

λis the dual variable corresponding to the inequality constraint.Differentiating(27)with respect toΔand setting the derivative to zero,we have

After applying the identitywe have the following equality

The Lagrangian dual function for the problem(18)can be written as

Appendix B.

推荐访问:Secure Beamforming Optimal

相关推荐