Next Article in Journal
On Entropy of Probability Integral Transformed Time Series
Next Article in Special Issue
A Compression-Based Method for Detecting Anomalies in Textual Data
Previous Article in Journal
The Topp-Leone Generalized Inverted Exponential Distribution with Real Data Applications
Previous Article in Special Issue
High Efficiency Continuous-Variable Quantum Key Distribution Based on ATSC 3.0 LDPC Codes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy Efficiency Optimization in Massive MIMO Secure Multicast Transmission

1
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
2
Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space, Ministry of Industry and Information Technology, Ministry of Industry and Information Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
3
Purple Mountain Laboratories, Nanjing 211100, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(10), 1145; https://doi.org/10.3390/e22101145
Submission received: 16 September 2020 / Revised: 9 October 2020 / Accepted: 10 October 2020 / Published: 12 October 2020
(This article belongs to the Special Issue Information Theoretic Security and Privacy of Information Systems)

Abstract

:
Herein, we focus on energy efficiency optimization for massive multiple-input multiple-output (MIMO) downlink secure multicast transmission exploiting statistical channel state information (CSI). Privacy engineering in the field of communication is a hot issue under study. The common signal transmitted by the base station is multicast transmitted to multiple legitimate user terminals in our system, but an eavesdropper might eavesdrop this signal. To achieve the energy efficiency utility–privacy trade-off of multicast transmission, we set up the problem of maximizing the energy efficiency which is defined as the ratio of the secure transmit rate to the power consumption. To simplify the formulated nonconvex problem, we use a lower bound of the secure multicast rate as the molecule of the design objective. We then obtain the eigenvector of the optimal transmit covariance matrix into a closed-form, simplifying the matrix-valued multicast transmission strategy problem into a power allocation problem in the beam domain. By utilizing the Minorize-Maximize method, an iterative algorithm is proposed to decompose the secure energy efficiency optimization problem into a sequence of iterative fractional programming subproblems. By using Dinkelbach’s transform, each subproblem becomes an iterative problem with the concave objective function, and it can be solved by classical convex optimization. We guarantee the convergence of the two-level iterative algorithm that we propose. Besides, we reduce the computational complexity of the algorithm by substituting the design objective with its deterministic equivalent. The numerical results show that the approach we propose performs well compared with the conventional methods.

1. Introduction

With the great development of network information technology and the continuous improvement of wireless communication technology, modern society puts forward higher requirements for the current communication transmission. With the extensive amount of research, there are a number of breakthrough technologies, such as the multiple-input multiple-output (MIMO) technology [1]. This technology has great potential to improve both the spectrum efficiency and the energy efficiency of the system, which is the development direction of future 5G/B5G wireless communication systems [2,3]. In the long-term evolution (LTE) standard, the wireless multicast transmission is also widely studied. In wireless multicast transmission, one base station (BS) sends public information to multiple user terminals (UTs). That is to say, that the BS can effectively transmit group-oriented signals by utilizing an evolved multimedia broadcast multicast service (eMBMS) [4,5,6,7,8]. As a mature technology, wireless multicast technology has certain advantages in improving the network traffic and reducing the communication cost. The combination of wireless multicast and massive MIMO is widely concerned with improving the quality of service (QoS), owing to its performance of effectively shaping the multicast transmission signals [9,10,11,12].
Due to the openness of the wireless propagation media, security issues are critical indicators in wireless transmissions of all fields. To ensure the security of transmission, many works traditionally use key-based enciphering. However, this method meets its challenge for secure wireless communications with additional control signaling and feedback channel management. Therefore, the security and privacy of physical layer security in wireless channels have a wide range of research [13,14,15], thanks to its great ability to work in a keyless scenarios. In previous works, the physical layer security of massive MIMO unicast transmission has been studied [16,17,18,19]. Meanwhile, in some existing works, the physical layer security of multicast transmission is also considered. For example, secure multicast precoding has been investigated [20,21,22]. Besides, some works have studied the security by introducing artificial noise into the multicast transmission, e.g., in [23,24].
Energy efficiency is another important indicator of performance in designing wireless transmission, which has been widely concerned by both academia and industry [25,26]. About 5% of the energy consumption of the whole world is produced by information and communication technologies, owing to its connected devices and infrastructure constantly being consumed [27]. In the future of 5G/B5G development, energy demand will soon become unmanageable. Therefore, a promising answer to this issue is to find considerable metrics which can limit energy consumptions but meet the needs of secure and reliable communication. However, most of the works on secure multicast transmission are limited to optimizing the secure rate, and almost no energy efficiency issues are considered. Some existing works have investigated the energy efficiency of unicast transmission instead of multicast transmission [28,29,30]. In some previous works, the energy efficiency multicast transmission was investigated [31,32], but the issues of security were not solved well.
In some works, it is assumed that the legitimate UTs’ instantaneous channel state information (CSI) is known [17,21,22,23,33]. However, due to CSI’s capture/feedback overhead in frequency division duplex MIMO systems, there are some difficulties in obtaining instantaneous CSI at the BS. It is the reason why most of the previous work has assumed this. On the other hand, statistical CSI has enormous advantages over instantaneous CSI for BS to obtain. Because of its slower change, BS can get statistical CSI accurately [34]. Therefore, statistical CSI is more suitable for wireless transmission design in high mobility scenarios. Besides, as a vast antenna array with high spatial resolution, massive MIMO channel typically exhibits new statistical characteristics [35,36].
We study the energy efficiency of massive MIMO secure multicast transmission with the assumption that only the statistical CSI of legal UTs and the eavesdropper can be obtained at the BS. We summarize the contributions of the current paper as follows.
  • We first considered a secure multicast transmission scenario, in which the BS can only obtain the statistical CSI of the legitimate UTs and eavesdropper, and formulate our energy efficiency maximization problem. A tight lower bound rate of secure multicast is presented to simplify the optimization objective. Therefore, our problem is transformed into finding the optimal solution of this equivalent problem.
  • Via making the transmit signaling directions into a closed-form, we simplify the energy efficiency optimization of matrix-valued strategy design to a beam domain power allocation problem, reducing the optimization variables significantly.
  • By invoking the Minorize–Maximize (MM) method and Dinkelbach’s transform, we propose a two-level iterative algorithm to solve the equivalent problem. In the outer iteration, we decompose the original problem into several fractional programming subproblems, where the numerator is concave and the denominator is linear. In the inner iteration, we introduce related variables to remove the denominator and transform each subproblem into a common convex optimization problem to obtain the optimal solution of the equivalent problem. Our simulation results reveal that this solution is almost equal to the original problem.
  • According to the large-dimensional random matrix theory, we use the deterministic equivalent of the secure transmit rate instead of massive sample averaging to reduce the computational complexity, which is proved to be almost the same as the original result.
The rest of this paper is arranged as follows. Section 2 presents the massive MIMO channel model. In Section 3, we divide the algorithm into three parts. The energy efficiency of secure multicast transmission is investigated. The optimal energy efficiency multicast transmit covariance matrix is decomposed into eigenvectors and eigenvalues as pretreatment. We propose an iterative algorithm for some fractional programming subproblems. Each subproblem is also solved by the inner iterative algorithm of sequential beam domain power allocation. The last part is to simplify the complexity of the problem. In Section 4, numerical simulation results are given. Finally, we summarize the full work in Section 5.
In our work, the use of symbols is also an important part. The main adopted symbols are as follows.
  • C M × N denotes M × N dimensional complex-valued vector space and R M × N denotes M × N dimensional real-valued vector space.
  • [ A ] m , n denotes the ( m , n ) th element of matrix A .
  • det { · } denotes the matrix determinant operation, tr { · } denotes the matrix trace operation, and diag { · } denotes the diagonalization of the matrix, respectively.
  • E · denotes the expectation operation and x + denotes max x , 0 .
  • ( · ) T , ( · ) * , ( · ) H and ( · ) 1 denote the matrix transpose, conjugate, conjugate-transpose and inverse, respectively.
  • ⊙ denotes the Hadamard product.
  • X 0 denotes that X is a positive semidefinite matrix.

2. Channel Model

We consider a massive MIMO secure multicast downlink transmission system, in which public messages sent by the BS are transmitted to the legitimate UTs. There is one BS with M antenna transmits and K UTs, each with N r antennas. The public messages are secret to the eavesdropper with N e antennas.
x C M × 1 denotes the signal that is sent from the BS in multicast transmission. E x = 0 and E x x H = Q C M × M , where Q denotes the transmit covariance matrix. We model the signals received by legitimate UT k and the eavesdropper as
y k = H k x + n k C N r × 1 ,
y ev = H ev x + n ev C N e × 1 ,
respectively, where H k and H ev are defined as the channel matrices of BS-UT k and BS-eavesdropper, respectively.
We consider our MIMO channel model to follow jointly spatially correlated Rayleigh fading, which means there are joint correlation characteristics between the transmitter and the receivers [37]. Thus, the channel matrices H k and H ev in (1) and (2) can be expressed as
H k = U k G k V k H C N r × M ,
H ev = U ev G ev V ev H C N e × M ,
respectively, where G k C N r × M and G ev C N e × M are random matrices with zero mean and independent elements, which are defined as the channel matrices of BS-UT k and BS-eavesdropper in the beam domain, respectively [34,38]. U k C N r × N r , V k C M × M , U ev C N e × N e , and V ev C M × M are unitary matrices of transmitter and receivers, respectively. The statistics of the beam domain channels can be described as
Ω k = E G k G k * R N r × M ,
Ω ev = E G ev G ev * R N e × M ,
respectively. It can be proved that as the number of antennas in the BS, M, increases to infinity, the eigenvectors of the correlation matrices in (5) and (6) tend to be equal, which can be denoted by a deterministic unitary matrix V [38]. V is only effected by the topology of transmit array at the BS, which means the channel matrices can be rewritten as
H k = M U k G k V H ,
H ev = M U ev G ev V H ,
respectively. It has been widely used in previous works and shows considerable accuracy for a finite number of BS antennas [35,36]. Thus, we adopt the channel models in (7) and (8) in this paper.

3. Energy Efficiency Optimization of Secure Multicast Transmission

We study the energy efficiency multicast optimization of secure massive MIMO in this section. We assume that the BS can only capture the statistical CSI of all legitimate UTs and the eavesdropper [34]. Besides, legitimate UTs and the eavesdropper can obtain the instantaneous CSI. Before constructing the energy efficiency model, we first analyze the secure transmit rate. The received signal transmission rate needs to be higher for any user terminal than that received by the eavesdropper. Focusing on delay-tolerant scenarios [39], the ergodic secure multicast rate can be expressed as
R se R mc R ev + ,
where the ergodic multicast rate R mc is expressed as
R mc = min k E log det I N r + H k Q H k H = min k E log det I N r + G k V H Q V G k H ,
and the ergodic rate for eavesdropper R ev is expressed as
R ev = E log det I N e + H ev Q H ev H = E log det I N e + G ev V H Q V G ev H .
In (10) and (11), we exploit the identity det I + A B = det I + B A .
Meanwhile, we adopt a model of power consumption as follows. For large-scale MIMO systems, most of the power is consumed by the BS, we then focus mainly on the power consumption of the BS. Besides, the static and dynamic power consumption of the radio frequency chains is considered. Specifically, our power consumption model is adopted as
P ( Q ) ζ tr Q + M P c + P s ,
where tr Q denotes the transmit power of multicast transmission. Note that the coefficient ζ 1 is the reciprocal of the transmit amplifier drain efficiency, P s and P c are the static power consumption and the hardware dissipated power of the BS, respectively.
We denote W by the bandwidth of secure transmission, the energy efficiency of massive MIMO secure multicast transmission is formulated by the ratio of secure transmit rate to power consumption as follows,
EE se = W R se P .
Our aim is optimizing the transmit covariance matrix Q , leading to maximizing the EE se of downlink secure multicast in (13). The problem is addressed as
arg max Q W R se P , s . t . tr Q P max , Q 0 ,
where P max denotes the maximum multicast power budget at the transmitter.
R ev in (11) can get its upper bound via using Jensen’s inequality, which is expressed as follows,
R ev R ev , ub log det I N e + E G ev V H Q V G ev H A ev V H Q V ,
where A ev X E G ev X G ev H C N e × N e denotes a function of matrix-valued form, which can output a diagonal matrix. Its ith diagonal element can be expressed as
A ev X i , i = tr diag Ω ev i , : T X .
By employing the function in (15), the secure multicast rate in (9) can obtain its lower bound as
R se R se , lb R mc R ev , ub + .
For a vast region of signal-to-noise-ratio (SNR), the lower bound of secure multicast rate in (17) is very tight, and has little influence on the energy efficiency of the original problem, which can be seen in Section 4. Therefore, we can reduce the computational complexity while obtaining very approximate solutions of the original problem. The equivalent problem is approximately substituted for the original problem as follows,
arg max Q W R mc R ev , ub + P ,
s . t . tr Q P max , Q 0 .
The feasible solution Q = 0 leads the value of R se , lb to zero. Therefore, all other feasible solutions leading to negative secure multicast rate are not the optimal solutions of the problem in (18). Besides, SNR is defined as P max in this paper. As a result, we omit the operator · + without loss of any optimality, leading the problem equivalent to follows,
arg max Q W ( R mc R ev , ub ) P ,
s . t . tr Q P max , Q 0 .
We decompose the covariance matrix as Q = Φ Λ Φ H . The columns of Φ and diagonal elements of Λ , respectively, denote the eigenvectors and the eigenvalues of Q , which indicates the multicast signaling directions and the powers allocation. We investigate the eigenvectors of the covariance matrix in Theorem 1.
Theorem 1.
Columns of V are expressed as the eigenvectors of the transmit covariance matrix Q opt in (20) as follows,
Q opt = V Λ V H .
Proof. 
Please refer to the Appendix A. □
According to Theorem 1, we can indicate that the energy efficiency oriented secure multicast transmit signal directions are consistent with the eigenvector of the BS transmission correlation matrix. Therefore, the optimal problem for maximizing the system energy efficiency of secure downlink multicast transmission can be simplified into a beam domain power allocation problem. In particular, the precoding optimization problem of energy efficiency multicast transmission in (20) can be simplified to the following question without loss of optimality,
arg max Λ W ( R mc Λ R ev , ub Λ ) P ( Λ ) , s . t . tr Λ P max , Λ 0 , Λ diagonal ,
where
R mc Λ min k R k Λ ,
R k Λ E log det I N r + G k Λ G k H ,
R ev , ub Λ log det I N e + A ev Λ ,
P Λ ζ tr Λ + M P c + P s .
In (24), we adopt the minimum transmission rate received by legitimate users into our model to meet the requirement of confidentiality.

3.1. Minorize–Maximize Method

We note that function R mc Λ R ev , ub Λ in (23) is the subtraction of two concave functions. The function is defined as the difference of convex functions (d.c.), which can not be solved by convex optimization directly. Via using the MM method, we adopt an iterative algorithm to deal with it [40,41]. The basic idea is to approximate R ev , ub Λ by the first-order Taylor series expansion and transform it into a linear function. We can solve the subproblem with further algorithm and get the next iteration. The iterative subproblem is as follows,
Λ + 1 = arg max Λ W R mc Λ tr Λ R ev , ub Λ T Λ P ( Λ ) , s . t . tr Λ P max , Λ 0 , Λ diagonal ,
where denotes the iteration index. Note that the gradient of R ev , ub Λ over Λ can be proved to be a diagonal matrix. We can get its kth diagonal element as follows,   
Λ R ev , ub Λ k , k = i = 1 N e Ω ev i , k 1 + j = 1 M Ω ev i , j Λ j , j ,
where Λ = 0 is by the MM method in (28), which can converge to a locally optimal solution of the original problem in (20) [42]. Therefore, our next step is to solve the subproblem of each iteration.

3.2. Dinkelbach’s Transform

At the th iteration of subproblem in (28), the fractional function of the objective is still difficult to solve with convex optimition directly. We have R ee Λ = R mc Λ tr Λ R ev , ub Λ T Λ , which is a concave-minus-linear function. Thus, R ee Λ is a concave functions with respect to Λ . Meanwhile, P ( Λ ) is a linear function. Dinkelbach’s transform is usually used to approach such concave-linear fractional program, whose advantage is that it does not have to include additional constraints. It has been proved that this algorithm possessed superlinear convergence [43,44]. Besides, Dinkelbach’s transform We express the powers allocation Λ solved in (28) as Γ . Via invoking Dinkelbach’s transform, we can solve the subproblem of each energy efficiency secure multicast optimization in (28) by iteratively solving the sequence of convex optimization problem as follows,
Γ t + 1 = arg max Γ W R mc Γ W tr Λ R ev , ub Λ T Γ η ( t ) P ( Γ ) , s . t . tr Γ P max , Γ 0 , Γ diagonal ,
where t denotes the iteration index. Λ ( ) is the solution of the th outer iteration of the MM method. Note that it is treated as a constant and will not update in the inner iteration in (30). η ( t ) denotes an auxiliary variable introduced by Dinkelbach’s transform, which can be updated as follows,
η ( t ) = W R mc Γ ( t ) tr Λ R ev , ub Λ T Γ ( t ) P ( Γ ( t ) ) .
By optimizing Γ and η alternately, the generated solution sequence Γ t t = 0 in (30) is also proved to converge and get the optimal solution of the subproblem in (28).

3.3. Deterministic Equivalent

Due to a large number of samples need to be averaged during the expectation operation in (30), the optimization complexity is still high, although each subproblem in (28) is a concave program. Thus, without using Monte Carlo averaging channel realizations, we calculate the deterministic equivalent of the secure transmit rate by adopting the large-dimensional random matrix theory, which can reduce the implementation complexity [45,46]. Note that the method of deterministic equivalent can keep the convexity of the transmission rate [47]. Therefore, the concave subproblem in (28) is given as
Γ t + 1 = arg max Γ min k W R ¯ k Γ W tr Λ R ev , ub Λ T Γ η ( t ) P ( Γ ) , s . t . tr Γ P max , Γ 0 , Γ diagonal .
In (32), R ¯ k Γ denotes the deterministic equivalent expression of R k Γ , which is expressed as
R ¯ k Γ = log det I M + Ξ k Γ + log det Φ ˜ k tr Ξ ˜ k Φ ˜ k 1 ,
where Ξ k C M × M , Ξ ˜ k C N r × N r , and Φ ˜ k C N r × N r can be obtained by solving the following three fixed-point equations,
Ξ k = B k Φ ˜ k 1 ,
Ξ ˜ k = C k Γ I M + Γ Ξ k 1 ,
Φ ˜ k = I N r + Ξ ˜ k ,
where B k X E G k H X G k C M × M and C k X E G k X G k H C N r × N r are matrix-valued functions, which can output matrices in diagonal forms, the corresponding ith diagonal elements are respectively obtained by
B k X i , i = tr diag Ω k : , i X ,
C k X i , i = tr diag Ω k i , : T X .
Via the deterministic equivalent approach instead of exhaustive averaging, the expression R ¯ k Γ is efficiently calculated by adopting the channel statistics Ω k in a small number of fixed-point iterations. As a result, the computational complexity to optimize the convex program in (28) can be reduced significantly.

3.4. Discussion

In the case of small numbers of antennas, the deterministic equivalent expression R ¯ k Γ and R k Γ are approximately equal [45,46]. Besides, with respect to Γ , R ¯ k Γ is still observed to be concave from (33). Thus, each subproblem in (32) does not change the convexity and still guarantees the convergence. Finally, we obtain our algorithm by two-level iteration. The optimal power allocation is obtained by the inner iteration and assigned to the outer iteration. Then, the initial power allocation of the inner layer is updated after the outer iteration. The proposed energy efficiency optimization algorithm of massive MIMO secure multicast transmission is described in detail in Algorithm 1.
Algorithm 1 Energy Efficiency Optimization Algorithm for Secure Multicast Transmission
Input: The beam domain channel transmit statistics CSI Ω k and Ω ev , initial power allocation Λ 0 , the threshold ϵ
Output: Optimal power allocation matrix Λ
1: Initialization: = 0
2: Calculate Λ ( 0 ) using (26), (27), and (33)
3: repeat
4:    Update + 1
5:    Initialization: t = 0 , Γ ( 0 ) = Λ ( 1 ) , η 0 using (31)
6:    repeat
7:     Update t t + 1
8:     Calculate Γ t by using (30) with η t 1
9:     Update η t using (31)
10:    until Γ ( t ) Γ ( t 1 ) ϵ
11:    Return Λ = Γ t
12: until Λ ( ) Λ ( 1 ) ϵ
13: Return Λ = Λ

4. Simulation Results

To illustrate the performance of the energy efficiency optimization for massive MIMO secure multicast transmission with known statistical CSI. A series of assumptions about the simulation environment, transmission channel and antenna configuration are made in our work [48]. The major parameters related to simulation, such as the power consumption, are listed in Table 1.
First of all, we evaluate our proposed algorithm convergence performance. In order to observe the convergence of the whole algorithm, we choose the outer iteration to draw Figure 1, which plots energy efficiency versus the number of iterations under different SNR. From Figure 1, it can be observed that our algorithm exhibits fast convergence performance. Besides, the lower the SNR regime is, the quicker the iteration converges. Thus, we can indicate that power allocation might perform better under the high SNR regime on optimizing secure multicast energy efficiency. In the regime of Figure 1, with the SNR increasing, the gain of energy efficiency increases faster, which shows that the secure multicast rate is growing rapidly.
Next, we evaluate the energy efficiency performance of the proposed algorithm with a lower bound of secure multicast rate and the original optimization problem with the secure rate obtained by the Monte Carlo Method. It is shown in Figure 2 that the solutions of the two are quite tight. Therefore, we can handle the approximation problem to obtain the desired energy efficiency but significantly reduce the algorithm complexity. Then, we compare the energy efficiency performance optimized by the proposed algorithm with the traditional rate maximization one. In addition, the deterministic equivalent results are compared with those of the Monte Carlo method. According to Figure 2, it is not difficult to find that the gap between the deterministic equivalent and the Monte Carlo methods is almost zero. Besides, under the low transmit power regime, our proposed energy efficiency maximization and the traditional rate maximization algorithms have similar energy efficiency performance. It is also proved that the inference in Figure 1 is correct. However, under the high transmit power regime, the energy efficiency maximization algorithm is obviously superior to the traditional rate maximization one. It also shows that we can find a compromise power allocation to meet the two requirements at the same time in the goal of maximum rate and maximum energy efficiency for massive MIMO secure multicast transmission.
Finally, we study the energy efficiency performance of our algorithm versus the numbers of antennas at the BS and show the results in Figure 3. With the number of BS antennas increasing, the change of energy efficiency performance tends to be flat, which shows that the power consumption dominates the performance of energy efficiency when the number of BS antennas is large. Besides, it can be indicated that we can find a suitable power allocation to meet our requirement of high energy efficiency. At the same time, we can also find that the energy efficiency does not increase with the number of antennas. This is because under large antennas and low power constraint, the secure rate changes faster than power consumption at the BS with the increase of the maximum power constraint, while the dynamic power consumption of the BS antennas increases rapidly under the high power constraint, leading the situation on the contrary. Finally, when the number of antennas increases, the system needs more power to reach better energy efficiency. Besides, the energy efficiency performance of the Monte Carlo method is quite close to the proposed one, which confirms the accuracy of the analysis.

5. Conclusions

We studied the energy efficiency optimization problem in downlink secure multicast transmission for massive MIMO with known statistical CSI in this paper. The energy efficiency maximization problem was formulated as maximizing the ratio of the secure multicast rate to the power consumption. We then obtained the secure multicast rate by introducing its lower bound to simplify the objective problem. Via making the transmit signaling directions into a closed-form, we simplified the energy efficiency optimization of matrix-valued strategy design to a beam domain power allocation problem. Next, we designed an algorithm including two-level iteration in the beam domain, and guaranteed the algorithm to converge to a locally optimal point based on the MM method and Dinkelbach’s transform. In addition, via substituting the multicast rate for its deterministic equivalent, the complexity of computational was significantly reduced. We made extensive simulations to verify the effectiveness of our algorithm. A large number of simulation results showed that the algorithm has fast convergence and low complexity. Compared with the rate maximization method, the proposed algorithm had more efficient and stable performance under the high transmission power constraint.

Author Contributions

Writing, B.J., L.Y., Y.H., and L.Q.; software, B.J. and L.Q. review and proofreading, Y.Z., L.Y., and W.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61761136016, in part by the Open Research fund of the Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space, Ministry of Industry and Information Technology, Nanjing University of Aeronautics and Astronautics, under Grant KF20202107, and in part by the Fundamental Research Funds for the Central Universities.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 1

We can observe that the upper bound of the eavesdropper transmit rate R ev , ub in (15) is irrelevant to the off-diagonal elements of V H Q V . Then, we define Q ˜ = V H Q V . The multicast rate of UTs R se in (20) can be expressed as follows,
R se = min k E log det I N r + G k Q ˜ G k H R ev , ub ( Q ˜ ) ,
Following a similar line of reasoning of the proof in [49], define D r R N r × N r as a diagonal matrix whose diagonal entries are all 1 except the ( r , r ) th entry being 1 . Please note that the matrix D r is an unitary matrix, which means G k D r has the same distribution as G k [49], thus
R se D r Q ˜ D r H = min k E log det I N r + G k D r Q ˜ D r H G k H R ev , ub ( D r Q ˜ D r H ) = min k E log det I N r + G k Q ˜ G k H R ev , ub ( Q ˜ ) = R se Q ˜ .
Here, Q ˜ is equal to D r Q ˜ D r H expect for the off-diagonal entries in the rth row and the rth column, whose signs are reverse. We want to prove that nulling all the off-diagonal entries of Q ˜ in the r-th row and the r-th column will not decrease the transmit rate with respect to Q ˜ . We invoke Jensen’s inequality to prove it.
R se 1 2 Q ˜ + D r Q ˜ D r H = min k E log det I N r + 1 2 G k Q ˜ + D r Q ˜ D r H G k H R ev , ub ( 1 2 Q ˜ + D r Q ˜ D r H ) min k 1 2 E log det I N r + G k Q ˜ G k H 1 2 R ev , ub ( Q ˜ ) + min k 1 2 E log det I N r + G k D r Q ˜ D r H G k H 1 2 R ev , ub ( D r Q ˜ D r H ) = 1 2 R se Q ˜ + 1 2 R se D r Q ˜ D r H = R se Q ˜ .
We repeat the r for 1 to N r , and find that the numerator of the problem is maximized when Q ˜ is diagonal. Meanwhile, the consumed power P ζ tr Q + M P c + P s is irrelevant to the off-diagonal elements of V H Q V . Thus, the objective problem in (20) is maximized when Q ˜ = V H Q V = V H Φ Λ Φ H V is diagonal. This concludes the proof.

References

  1. Larsson, E.G.; Edfors, O.; Tufvesson, F.; Marzetta, T.L. Massive MIMO for Next Generation Wireless Systems. IEEE Commun. Mag. 2014, 52, 186–195. [Google Scholar] [CrossRef] [Green Version]
  2. Guariglia, E. Harmonic Sierpinski Gasket and Applications. Entropy 2018, 20, 714. [Google Scholar] [CrossRef] [Green Version]
  3. Marzetta, T.L. Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE Trans. Wirel. Commun. 2010, 9, 3590–3600. [Google Scholar] [CrossRef]
  4. Lecompte, D.; Gabin, F. Evolved multimedia broadcast/multicast service (eMBMS) in LTE-advanced: Overview and Rel-11 enhancements. IEEE Commun. Mag. 2012, 50, 68–74. [Google Scholar] [CrossRef]
  5. Zhang, S.Q.; Wu, Q.Q.; Xu, S.G.; Li, G.Y. Fundamental Green Tradeoffs: Progresses, Challenges, and Impacts on 5G Networks. IEEE Commun. Surv. Tutor. 2017, 19, 33–56. [Google Scholar] [CrossRef] [Green Version]
  6. Wang, W.; Liu, A.; Zhang, Q.; You, L.; Gao, X.Q.; Zheng, G. Robust multigroup multicast transmission for frame-based multi-beam satellite systems. IEEE Access 2018, 6, 46074–46083. [Google Scholar] [CrossRef]
  7. Li, Y.; Liu, A.; Wang, W.; Gao, X.Q. Outage constrained robust multigroup multicast beamforming for multi-beam satellite communication systems. IEEE Wirel. Commun. Lett. 2018, 6, 46074–46083. [Google Scholar]
  8. Jiang, C.; Wu, W.; Ding, Z. LTE Multimedia Broadcast Multicast Service Provisioning Based on Robust Header Compression. IEEE Trans. Wirel. Commun. 2018, 17, 1161–1172. [Google Scholar] [CrossRef]
  9. Xiang, Z.; Tao, M.; Wang, X. Massive MIMO multicasting in noncooperative cellular networks. IEEE J. Sel. Areas Commun. 2014, 32, 1180–1193. [Google Scholar] [CrossRef] [Green Version]
  10. Sadeghi, M.; Björnson, E.; Larsson, E.G.; Yuen, C.; Marzetta, T.L. Max-min fair transmit precoding for multi-group multicasting in massive MIMO. IEEE Trans. Wirel. Commun. 2018, 17, 1358–1373. [Google Scholar] [CrossRef]
  11. Sadeghi, M.; Björnson, E.; Larsson, E.G.; Yuen, C.; Marzetta, T.L. Joint unicast and multi-group multicast transmission in massive MIMO systems. IEEE Trans. Wirel. Commun. 2018, 17, 6375–6388. [Google Scholar] [CrossRef] [Green Version]
  12. Zhang, X.; Sun, S.; Qi, F.; Bo, R.; Qian, Y. Massive MIMO Based Hybrid Unicast/Multicast Services for 5G. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016. [Google Scholar]
  13. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  14. Kapetanović, D.; Zheng, G.; Rusek, F. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 2015, 53, 21–27. [Google Scholar] [CrossRef] [Green Version]
  15. Deepanramkumar, P.; Karuppiah, M.; Islam, S.K.H.; Obaidat, M.S. Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO. Int. J. Commun. Syst. 2018, 31, e3805.1–e3805.15. [Google Scholar]
  16. Wang, J.; Wang, J.; Lu, K.; Qian, Y.; Gu, N. On the Optimal Linear Network Coding Design for Information Theoretically Secure Unicast Streaming. IEEE Trans. Multimedia 2016, 18, 1149–1162. [Google Scholar] [CrossRef]
  17. Wu, Y.; Schober, R.; Ng, D.W.K.; Xiao, C.; Caire, G. Secure massive MIMO transmission with an active eavesdropper. IEEE Trans. Inf. Theory 2016, 62, 3880–3900. [Google Scholar] [CrossRef] [Green Version]
  18. Wu, W.; Gao, X.Q.; Wu, Y.; Xiao, C. Beam domain secure transmission for massive MIMO communications. IEEE Trans. Veh. Technol. 2018, 67, 7113–7127. [Google Scholar] [CrossRef] [Green Version]
  19. Lv, T.; Gao, H.; Yang, S. Secrecy transmit beamforming for heterogeneous networks. IEEE J. Sel. Areas Commun. 2015, 33, 1154–1170. [Google Scholar] [CrossRef] [Green Version]
  20. You, L.; Wang, J.; Wang, W.; Gao, X. Secure Multicast Transmission for Massive MIMO With Statistical Channel State Information. IEEE Signal Process. Lett. 2019, 26, 803–807. [Google Scholar] [CrossRef]
  21. Liu, X.; Gao, F.; Wang, G.; Wang, X. Joint beamforming and user selection in multicast downlink channel under secrecy-outage constraint. IEEE Commun. Lett. 2014, 18, 82–85. [Google Scholar] [CrossRef]
  22. Hanif, M.F.; Tran, L.N.; Juntti, M.; Glisic, S. On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks. IEEE Trans. Signal Process. 2014, 62, 3536–3551. [Google Scholar] [CrossRef]
  23. Wang, B.; Mu, P. Artificial noise-aided secure multicasting design under secrecy outage constraint. IEEE Trans. Commun. 2017, 65, 5401–5414. [Google Scholar] [CrossRef]
  24. Hu, J.; Cai, Y.; Yang, N.; Zhou, X.; Yang, W. Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead. IEEE Trans. Wirel. Commun. 2017, 16, 193–205. [Google Scholar] [CrossRef]
  25. Zappone, A.; Jorswieck, E. Energy efficiency in wireless networks via fractional programming theory. Found. Trends Commun. Inf. Theory 2015, 11, 185–296. [Google Scholar] [CrossRef]
  26. You, L.; Wang, W.; Gao, X. Energy-Efficient Multicast Precoding for Massive MIMO Transmission with Statistical CSI. Energies 2018, 11, 3175. [Google Scholar] [CrossRef] [Green Version]
  27. Auer, G.; Giannini, V.; Desset, C.; Godor, I.; Skillermark, P.; Olsson, M.; Imran, M.A.; Sabell, D.; Gonzalez, M.J.; Blume, O.; et al. How much energy is needed to run a wireless network? IEEE Wirel. Commun. 2012, 18, 40–49. [Google Scholar] [CrossRef]
  28. Ru, G.; Li, H.; Liu, L.; Hu, Z.; Gan, Y. Energy Efficiency of Hybrid Cellular With Heterogeneous QoS Provisions. IEEE Commun. Lett. 2014, 18, 1003–1006. [Google Scholar] [CrossRef]
  29. Ng, D.W.K.; Lo, E.S.; Schober, R. Energy-Efficient Resource Allocation in OFDMA Systems with Large Numbers of Base Station Antennas. IEEE Trans. Wirel. Commun. 2012, 11, 3292–3304. [Google Scholar] [CrossRef]
  30. Björnson, E.; Sanguinetti, L.; Hoydis, J.; Debbah, M. Optimal Design of Energy-Efficient Multi-User MIMO Systems: Is Massive MIMO the Answer? IEEE Trans. Wirel. Commun. 2015, 14, 3059–3075. [Google Scholar] [CrossRef] [Green Version]
  31. He, S.; Huang, Y.; Jin, S.; Yang, L. Energy Efficient Coordinated Beamforming Design in Multi-Cell Multicast Networks. IEEE Commun. Lett. 2015, 19, 985–988. [Google Scholar] [CrossRef]
  32. Tervo, O.; Tran, L.; Pennanen, H.; Chatzinotas, S.; Ottersten, B.; Juntti, M. Energy-Efficient Multicell Multigroup Multicasting With Joint Beamforming and Antenna Selection. IEEE Trans. Signal Process. 2018, 66, 4904–4919. [Google Scholar] [CrossRef] [Green Version]
  33. Wang, J.; Lee, J.; Wang, F.; Quek, T.Q.S. Jamming-aided secure communication in massive MIMO Rician channels. IEEE Trans. Wirel. Commun. 2015, 14, 6854–6868. [Google Scholar] [CrossRef]
  34. Sun, C.; Gao, X.Q.; Jin, S.; Matthaiou, M.; Ding, Z.; Xiao, C. Beam division multiple access transmission for massive MIMO communications. IEEE Trans. Commun. 2015, 63, 2170–2184. [Google Scholar] [CrossRef]
  35. You, L.; Gao, X.Q.; Xia, X.G.; Ma, N.; Peng, Y. Pilot reuse for massive MIMO transmission over spatially correlated Rayleigh fading channels. IEEE Trans. Wirel. Commun. 2015, 14, 3352–3366. [Google Scholar] [CrossRef] [Green Version]
  36. You, L.; Gao, X.Q.; Swindlehurst, A.L.; Zhong, W. Channel acquisition for massive MIMO-OFDM with adjustable phase shift pilots. IEEE Trans. Signal Process. 2016, 64, 1461–1476. [Google Scholar] [CrossRef]
  37. Gao, X.Q.; Jiang, B.; Li, X.; Gershman, A.B.; McKay, M.R. Statistical eigenmode transmission over jointly correlated MIMO channels. IEEE Trans. Inf. Theory 2009, 55, 3735–3750. [Google Scholar] [CrossRef]
  38. You, L.; Gao, X.Q.; Li, G.Y.; Xia, X.G.; Ma, N. BDMA for millimeter-wave/Terahertz massive MIMO transmission with per-beam synchronization. IEEE J. Sel. Areas Commun. 2017, 35, 1550–1563. [Google Scholar] [CrossRef] [Green Version]
  39. Pei, M.; Swindlehurst, A.L.; Ma, D.; Wei, J. Adaptive limited feedback for MISO wiretap channels with cooperative jamming. IEEE Trans. Signal Process. 2014, 62, 993–1004. [Google Scholar] [CrossRef]
  40. Chouzenoux, E.; Moussaoui, S.; Idier, J. Majorize-minimize linesearch for inversion methods involving barrier function optimization. Inverse Probl. 2012, 28, 065011. [Google Scholar] [CrossRef]
  41. Sun, Y.; Babu, P.; Palomar, D.P. Majorization-Minimization Algorithms in Signal Processing, Communications, and Machine Learning. IEEE Trans. Signal Process. 2016, 65, 794–816. [Google Scholar] [CrossRef]
  42. Sriperumbudur, B.K.; Lanckriet, G.R.G. A proof of convergence of the concave-convex procedure using Zangwill’s theory. Neural Comput. 2012, 24, 1391–1407. [Google Scholar] [CrossRef] [PubMed]
  43. Dinkelbach, W. On Nonlinear Fractional Programming. Manag. Sci. 1967, 13, 492–498. [Google Scholar] [CrossRef]
  44. Zappone, A.; Bjornson, E.; Sanguinetti, L.; Jorswieck, E. Globally Optimal Energy-Efficient Power Control and Receiver Design in Wireless Networks. Trans. Sig. Proc. 2017, 65, 2844–2859. [Google Scholar] [CrossRef] [Green Version]
  45. Couillet, R.; Debbah, M. Random Matrix Methods for Wireless Communications; Cambridge Univ. Press: New York, NY, USA, 2011. [Google Scholar]
  46. Lu, A.A.; Gao, X.Q.; Xiao, C. Free deterministic equivalents for the analysis of MIMO multiple access channel. IEEE Trans. Inf. Theory 2016, 62, 4604–4629. [Google Scholar] [CrossRef] [Green Version]
  47. Wen, C.K.; Jin, S.; Wong, K.K. On the Sum-Rate of Multiuser MIMO Uplink Channels with Jointly-Correlated Rician Fading. IEEE Trans. Commun. 2011, 59, 2883–2895. [Google Scholar] [CrossRef]
  48. Salo, J.; Del Galdo, G.; Salmi, J.; Kyösti, P.; Milojevic, M.; Laselva, D.; Schneider, C. MATLAB Implementation of the 3GPP Spatial Channel Model (3GPP TR 25.996). January 2005. Available online: http://www.mweda.com/img/smqh/tongxin/tongxin-3300qsdyezswos.pdf (accessed on 10 October 2020).
  49. Lapidoth, A. The capacity of a MIMO Ricean channel is monotonic in the singular values of the mean. In Proceedings of the 5th International ITG Conference on Source and Channel Coding (SCC), Erlangen, Germany, 14–16 January 2004; pp. 1–5. [Google Scholar]
Figure 1. The convergence performance of outer iteration of Algorithm 1 under different signal-to-noise-ratios (SNRs).
Figure 1. The convergence performance of outer iteration of Algorithm 1 under different signal-to-noise-ratios (SNRs).
Entropy 22 01145 g001
Figure 2. The lower bound of energy efficiency by energy efficiency maximization and rate maximizations algorithm via using the deterministic equivalent and Monte Carlo methods, compared with the original energy efficiency.
Figure 2. The lower bound of energy efficiency by energy efficiency maximization and rate maximizations algorithm via using the deterministic equivalent and Monte Carlo methods, compared with the original energy efficiency.
Entropy 22 01145 g002
Figure 3. The energy efficiency performance of the proposed algorithm and Monte Carlo method with the numbers of BS antennas varying from M = 16 to M = 128 .
Figure 3. The energy efficiency performance of the proposed algorithm and Monte Carlo method with the numbers of BS antennas varying from M = 16 to M = 128 .
Entropy 22 01145 g003
Table 1. Major simulation parameters of massive multiple-input multiple-output (MIMO) secure multicast transmission.
Table 1. Major simulation parameters of massive multiple-input multiple-output (MIMO) secure multicast transmission.
ParameterValue
Channel model3GPP SCM
Array topologyULA with half wavelength antenna spacing
Propagation scenarioSuburban macro-cell
The numbers of BS antennasM = 64
The numbers of UTsK = 8
The numbers of UTs antennas N r = 4 ( k )
The numbers of eavesdropper antennas N e = 4
BandwidthW = 10 MHz
Amplifier inefficiency factor ξ = 5
Static power consumption P s = 40 dBm
Hardware dissipated power per antenna P c = 30 dBm

Share and Cite

MDPI and ACS Style

Jiang, B.; Qu, L.; Huang, Y.; Zheng, Y.; You, L.; Wang, W. Energy Efficiency Optimization in Massive MIMO Secure Multicast Transmission. Entropy 2020, 22, 1145. https://doi.org/10.3390/e22101145

AMA Style

Jiang B, Qu L, Huang Y, Zheng Y, You L, Wang W. Energy Efficiency Optimization in Massive MIMO Secure Multicast Transmission. Entropy. 2020; 22(10):1145. https://doi.org/10.3390/e22101145

Chicago/Turabian Style

Jiang, Bin, Linbo Qu, Yufei Huang, Yifei Zheng, Li You, and Wenjin Wang. 2020. "Energy Efficiency Optimization in Massive MIMO Secure Multicast Transmission" Entropy 22, no. 10: 1145. https://doi.org/10.3390/e22101145

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop