Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays

In this article, we first investigate secure communications for a two-hop interference channel relay system with imperfect channel estimation in the wireless Internet of Things (IoT), where K source-destination pairs communicate simultaneously when an eavesdropper exists. We jointly conceive source, relay and destination matrices upon minimizing total mean-squared error (MSE) of all legitimate destinations while keeping the MSE at eavesdropper above a given threshold. We illuminate that the design of the source, relay and destination matrices is subject to both transmit power constraints and secrecy requirements. More specifically, we propose an efficient robust iterative distributed algorithm to simplify the process of the joint design for optimal source, relay and destination matrices. Furthermore, the convergence of the iterative distributed algorithm is described. Additionally, the performances of our proposed algorithm, such as its secrecy rate and MSE, are characterized in the form of simulation results. The simulation results reveal that the proposed algorithm is superior to the traditional approach. As a benefit, secure communications can be ensured by using the proposed algorithm for the multiple input multiple output (MIMO) interference relay IoT network in the presence of an eavesdropper.

the networks. However, nearly all upper-layer security approaches for IoT believe that the opponent or eavesdropper can obtain entirely control over a sensor or node by way of decoding cryptographic scheme [14]. Physical layer security technology, which comes from information theory to achieve perfect security [15][16][17], is found to be more robust than upper-layer security approaches for the IoT with multi-hop relay connectivity [13].
The physical layer security of the traditional close-range wireless systems mainly considers that the eavesdropper wiretaps the messages between sources and legitimate destinations. However, the security of long-range relays system considers that the eavesdropper wiretaps not only the messages between sources and relays but also the messages between relays and legitimate destinations. Therefore, the security of long-range relays system become more complexity than that of traditional wireless systems for close-range communication [18,19].
Physical layer security has been focused for multi-hop relay networks to combat eavesdropping for IoT [20][21][22][23][24][25]. In Reference [13], both channel aware encryption and precoding strategies are discussed in multi-hop IoT to achieve secrecy communication subject to resource constraints. In References [20,21], the authors select the optimal relay to improve security by joint relay and jammer selection algorithm, which may not fully take advantage of all relay nodes. In Reference [22], the problem of secure resource allocation for a two-way single relay wireless network is investigated, which is designed under schemes of applying and not applying cooperative jamming in the case of an eavesdropper. Security enhancement algorithm for IoT communication exposed to eavesdroppers has been forced on transmission design [23]. The authors in Reference [24] study the problem of improving security for the important data collection in IoT, where eavesdroppers can decode the signal extremely by combining their observations. The precoding matrices are optimized to satisfy that the MSEs at legitimate receivers are small and the MSE at eavesdropper is large in a relay aided cellular interference IoT system [25]. There are also some other schemes of achieving security, which are worth investigating. For instance, artificial noise has played an important role in enhancing the wireless communication physical layer secrecy in a two-hop relay network [26]. Furthermore, transmit beamforming is employed in an Amplify-and-Forward MIMO relay system, in order to obtain the maximum secrecy rate [27].
Although physical layer security for multi-hop relay IoT networks has been studied well, the resultant problem for secure communications still remains a significant challenge when the relay networks are faced with interferences and imperfect channel estimation. Some literature considers physical layer security problem just in interference channels. In Reference [28], a joint power control and beamforming algorithm is proposed for minimizing the total transmitted power, while keeping the signal-to-interference-plus-noise ratio (SINR) at each receiver over an expected threshold. An iterative distributed algorithm is used to design transmit precoding matrices and receive filter matrices for secure communications over the MIMO interference channels with an eavesdropper [29]. Other literatures just consider imperfect channel estimation. In Reference [30], an efficient beamforming approach has been proposed to combat eavesdropper with imperfect channel estimation. Secrecy outage analysis over a multiplicative composite channel model has been investigated with imperfect channel estimation [31].
To the best of our knowledge, the works on interference relay networks analysis and design for physical layer security in IoT system under imperfect channel estimation are still absent. Motivated by this challenge, we aim to provide secure communications for a two-hop relay system in future IoT with power supply strategy in this paper, where multiple source-destination pairs communicate simultaneously over the relay-interference channel in the presence of an active eavesdropper. In our article, we use MSE as the main performance metric. The system-wide minimum MSE (MMSE) has been considered in many works. In Reference [32], MMSE performance metric has been considered in a multiuser MIMO system where a distributed iterative algorithm and interference alignment are presented. In Reference [33], a weighted-MMSE method is proposed to apply in the optimization problems of sum-rate maximization, sum-MSE minimization and sum SINR maximization, respectively. However, the security problem of relays system is not considered in References [32,33]. To guarantee security in the relays system for IoT, we design an optimization scheme in order to minimize the total MSE estimated at legitimate destinations and keep the MSE at eavesdropper above an expected threshold, which is subject to the transmission power constrains at relay nodes and source nodes. To implement this optimization scheme, the source, relay and destination matrices must be jointly designed. Nevertheless, there exists a huge problem to design these matrices mentioned above, because the optimization scheme is too complicated to achieve the closed form solution or numerical solution of these matrices.
To conquer the above problem, we proposed an iterative distributed algorithm to simplify the optimization scheme. Specifically, for the sake of achieving the source, relay and destination matrices, we circularly calculate one of them by using the other two matrix variables obtained from previous iterations. Furthermore, Kronecker product is employed to facilitate the process of solving these matrix variables. Consequently, the acquisition of the numerical solution of the source, relay and destination matrices are much easier. Additionally, our simulation results demonstrate that the proposed iterative distributed algorithm will converge to a constant after several iterations. We also reveal that our proposed algorithm is superior to the traditional approach.
The remainder of the article is organized as follows. In Section 2, we describe the system model and propose the optimization problem. In Section 3, we propose an iterative distributed algorithm for dividing the non-convex optimization problem into three sub-problems. In Section 4, we demonstrate the convergence of the proposed algorithm. In Section 5, the simulation results are presented. In Section 6, the conclusions are summarized.
Notation: In this article, we use (.) H to represent Hermitian transpose, Tr(.) to represent the trace of a matrix, E{.} to represent the expectation, I to represent the identity matrix, 0 to represent a matrix or vector whose all element are zeros, Y ∼ CN µ, σ 2 to represent Y following the complex normal distribution with mean µ and variance σ 2 . bd(.) to represent a block-diagonal matrix, vec(.) to represent stack columns of a matrix on top of each other into a single vector, . to represent 2-norm of a vector, to represent Kronecker product and C to represent the complex field.

System Model and Methods
In this article, we investigate secrecy communication over the MIMO interference channels in two-hop relay system for the wireless IoT [34,35]. As shown in Figure 1, K source nodes transmit data to corresponding destination nodes by employing M IoT relay nodes. Meanwhile, an eavesdropper tries to wiretap the data from source. Assuming that the sophisticated eavesdropper can calculate its optimal receive matrix relying on minimizing its own total MSE [36]. Considering the path loss and transmission power constrains, the direct links between sources and destinations are negligible. According to previous related study [18,19], we assume that the eavesdropper is near by the relay and far away from the source. Therefore, the eavesdropper wiretapping the messages from both the sources and the relays simultaneously is difficult. Hence, we only consider the links from relay to eavesdropper and ignore the links from source to eavesdropper. The interference channels exist in the system when one of the source nodes transmits signal to corresponding destination while the others source nodes transmit signals synchronously.
According to previous related study [18,19], we assume that the eavesdropper is near by the relay and far away from the source. Therefore, the eavesdropper wiretapping the messages from both the sources and the relays simultaneously is difficult. Hence, we only consider the links from relay to eavesdropper and ignore the links from source to eavesdropper. The interference channels exist in the system when one of the source nodes transmits signal to corresponding destination while the others source nodes transmit signals synchronously.   More generally, the eavesdropper is denoted as E. Furthermore, S k , R m , D k and eavesdropper are equipped with T k , Q m , N k and N e antennas. We consider that the channels undergo slow varying flat Rayleigh fading. We also assume that the noise at all receiving nodes is additive white Gaussian noise (AWGN) with zero mean and variance σ 2 [37]. We denote H km , G mk and G me as the actual channel matrices of The relays work in half-duplex model with amplify and forward (AF) strategy. So there needs two time slots to complete the data exchange between source and destination. In the first time slot, S k transmits data s k to R m , then the R m receives the incoming signal with its receiving antennas and transmits y r m to D k and eavesdropper in the second time slot. The received signals at R m , D k and eavesdropper can be denoted as follows where y r m ∈ C Q m ×1 is the received signal vector at relay R m ; y d k ∈ C N k ×1 is the received signal vector at destination D k ; y e ∈ C N e ×1 is the received signal vector at the eavesdropper E; H km ∈ C Q m ×T k is denoted as channel gain between source S k and relay R m ; G mk ∈ C N k ×Q m is denoted as channel gain between relay R m and destination D k ; G me ∈ C N e ×Q m is denoted as channel gain between relay R m and eavesdropper E; and n e ∈ C N e ×1 are AWGN vectors at R m , D k and eavesdropper with zero mean and covariance matrix σ 2 r m I Q m , σ 2 d k I N k and σ 2 e I N e . To minimize total MSE at destinations and achieve secure communication, we jointly design transmit precoding matrices at source and relay and linear receive matrices at destinations and eavesdropper, which are subject to transmission power constrains at source and relay. For the sake of seeking optimum solution about above matrices, we scheme an iterative distributed algorithm.
Before transmitting the data s k , we utilize transmit precoding matrix U k to encode the data s k at source S k . Similarly, we utilize transmit precoding matrix V m to encode the data y r m at relay R m . The received signals at R m , D k and eavesdropper are as follows In most scenarios, perfect channel estimation is considered. However, channel estimation is far from being perfect in realistic practical system. Hence, we assume imperfect channel estimation in our article. Here, P sk and P rm denote the maximum transmission power at S k and R m . N p denotes the number of channel estimation pilot symbols. ConsideringĤ km ,Ĝ mk andĜ me as the estimated channel matrices and E h,km , E r,mk , and E e,me as the MMSE estimation error matrices, respectively, we obtain the relationship of the estimated and actual channel matrices as H km =Ĥ km + E h,km , and SNR e = P rm /σ 2 e . Finally, both destination D k and the eavesdropper employ linear receive matrix W k and W e,k respectively to receive the transmitted signals. Assuming imperfect channel estimation above mention, the estimate of the data s k at D k and the eavesdropper can be denoted as followŝ where W k and W e,k are the T k × N k and T k × N e,k receive weight matrices. We assume that E s k s H k = I T k is the covariance matrix of the data s k at S k . From Equation (7), the MSE of estimating s k at D k can be calculated as Similarly, we can get the MSE of estimating s k at eavesdropper as follows The transmission power constraints at source S k and relay R m are as follows where P sk and P rm denote the maximum transmission power at S k and R m . Without eavesdropper, the K legitimate communication pairs can achieve their maximum communication rates and the transmission is secure and reliable. However, when there exists an eavesdropper, the signals from source may be leaked out to the eavesdropper.
In order to elaborate more specifically and clearly, we assume a worst-case situation, namely in the presence of a sophisticated eavesdropper which can obtain the channel state information and our proposed algorithm, the eavesdropper calculates its linear receive matrix W e,k to minimize its own MSE e,k . To prevent this, we exploit the assumption to conceive the precoding/receive matrices for legitimate system at source or relay.
The solution of the source matrices {U k }, relay matrices {V m } and destination matrices {W k } is vital. The solution of the problem is to utilize the source, relay and destination matrices to minimize the total MSE of all legitimate destination nodes and keep the MSE e,k above an expected threshold ε k (k = 1, . . . , K), while subjecting to the transmission power constrains at source and relay. The solution is denoted as follows where {U k }, {V m } and {W k } are the solution obtained.

The Iterative Distributed Algorithm of Solving Source, Relay, Destination and Eavesdropper Matrices
Due to the non-convex problem (13) with matrix variables, so we are facing an uphill battle to obtain the optimum solution of the joint design matrices. To deal with the solution, we design an iterative distributed algorithm to jointly design the optimal solution of the source matrices {U k }, relay matrices {V m } and destination matrices {W k }. The whole solving process of the three matrix variables is divided into three steps. We circularly calculate one of them by using the other two matrix variables obtained from previous iterations, the non-convex problem (13) is transformed into three sub-problems in each step.
The objective function of (13) can be denoted by total MSE (TMSE) as follows

Solution of Destination Matrices {W k }
In the first iteration of our proposed algorithm, we set the initial value of {U k } and {V m }, then calculate the optimal solution of {W k }. Thus, at the following iteration of the algorithm, we calculate the optimal {W k } by utilizing previously obtained {U k } and {V m }.
It is obvious from (13) that {W k } are independent with transmission power constrains of source and relay. Therefore, we can obtain the optimal linear receive matrices {W k } to minimize the total MSE at destination by the well-known linear MMSE receiver [38], which can be formulated as Assuming that the eavesdropper employs the above well-known linear MMSE method to calculate its linear receive matrix W e,k ., which can be formulated as

Solution of Source Matrices {U k }
After obtaining the optimal matrices {W k }, we can calculate the transmit precoding matrices {U k } with {W k } obtained from current iteration and {V m } obtained from the previous iteration. For further analysis, the TMSE of (14) can be specifically written as (17) can be written as Define P k,m = [P k,m,1 , P k,m,2 , . . . , P k,m,K ],P k,k = ∑ M m=1 P k,m,k , U = bd(U 1 , U 2 , . . . , U K ).
γ is independent with {U k }, so it can be ignored in the solving process. LetP = bd P 1,1 ,P 2,2 , . . . ,P K,K , from (19) we can get To solve the above problems simplistically, we introduce some important formulas of Reference [39]  And define u vec(U) and We can further simplify Formula (20) as follows where τ = bd I T 1 , I T 2 , . . . , I T K , ω = ∑ K k=1 ∑ M m=1 τ P H k,m P k,m , ψ = vec P H H . In the same way, we can obtain the simplified formula of MSE e,k as follows where , P e,k,m = [P e,k,m,1 , P e,k,m,2 , . . . , P e,k,m,K ],P e,k,k = ∑ M m=1 P e,k,m,k , ω e,k = ∑ M m=1 τ P H e,k,m P e,k,m , Because of E s k s H k = I T k , the transmission power constrains (11) can be rewritten as Then we obtain (24) u H ρu ≤ P sk , k = 1, . . . , K, where ρ = t H k t k ⊗ t H k t k . From (21), (22) and (24), the source matrices optimization problem is denoted as The source matrices optimization problem (25) is a quadratic constrained quadratic programming (QCQP) problem [40]. Compared with the non-convex problem (13), the (25) will be solved by the CVX of MATLAB toolbox [41].

Solution of Relay Matrices {V m }
Since {W k }, W e,k and {U k } are already obtained, the TMSE can be rewritten as where Then the TMSE can be simplified as Let us introduce v = vec(V), then we obtain the TMSE as where In the same way, we can obtain the simplified formula of MSE e,k as follows where The transmission power constrains at relay can be (28), (29) and (30), the relay matrices optimization problem is denoted as The relay matrices optimization problem (31) is a QCQP problem [40]. Compared with the non-convex problem (13), the (31) will be solved by utilizing the CVX of MATLAB toolbox [41]. The solving process of optimization matrices {W k }, {U k } and {V m } by employing iterative distributed algorithm is summarized in Table 1 and variable n denotes the nth iteration.  (13).
Step 2 Calculate obtained from previous iteration.
At last, we introduce the communication rate and secrecy rate in this system model. The communication rate at destinations and eavesdropper are as follows [42], The secrecy rate at each destination can be obtained [43].

The Convergence of the Proposed Algorithm
In this part, the convergence of our proposed algorithm is proved [44]. Since the {U k } and {V m } are updated at each iteration by minimizing the TMSE, the TMSE is reduced gradually after each iteration. Furthermore, it is obvious that the TMSE has a lower limit which is at least greater than 0. This implies that the proposed algorithm is convergence. The convergence of the proposed algorithm can be proved exactly as follows. According to Section 3, we can obtain the objective function is The solution of {W k } can be ignored in the proof of convergence, because it is calculated by obtained {U k } and {V m } rather than utilize optimal scheme. For the obtained {V m }, the optimal solution can be denoted as follows.
Therefore, we can get ∑ K k=1 MSE k (U k (n + 1), V m (n)) ≤ ∑ K k=1 MSE k (U k (n), V m (n)). Similarly, for the obtained {U k }, the optimal solution can be denoted as follows.
Hence, we can deduce ∑ K k=1 MSE k (U k (n + 1), V m (n + 1)) ≤ ∑ K k=1 MSE k (U k (n + 1), V m (n)). Furthermore, we get ∑ K k=1 MSE k (U k (n + 1), V m (n + 1)) ≤ ∑ K k=1 MSE k (U k (n), V m (n)). According to the mentioned above, we conclude that the TMSE is decreasing gradually with the updated {U k } and {V m } after each iteration. The TMSE converges to a constant after several iterations, which is also demonstrated by the Figure 2 of the Numerical Results part.

Numerical Results
In this part, we provide numerical results to examine the effectiveness of the optimization iterative distributed algorithm for secure transmission in interference channels MIMO relay system with eavesdropping. Assuming that all nodes have the same antennas, T k = Q m = N k = N e = 3 and all channel matrices are independently distributed Gaussian channel matrices with zero mean and unit variance. The noises at all receiving nodes are assumed as AWGN with σ 2 d k = σ 2 r m = σ 2 e = 1. The transmission power constrains at sources and relays are assumed as P s k = P r m = 20 dB. Assuming that the eavesdropper knows the channel state information of the links between relay and itself. In addition, the threshold of eavesdropper's MSE are ε k = 2.2, k = 1, . . . , K. All figures are averaged over 1000 independent test. Figure 2 depicts the convergence of proposed iterative distributed algorithm, where we have K = 2 or 6, M = 3, N p = 100, as well as P s k = P r m = 20 dB. As can be seen in Figure 2, TMSE decreases gradually until convergence when the number of iterations increases. It can be observed in both Figure 2a,b, as the system scale increases (i.e., increasing K), the convergence speed decreases and TMSE increases. This is because more legitimate source-destination pairs increase both the system complexity and the interferences between each legitimate source-destination pair and they lead to more iterations to approximate convergence and the increasement of TMSE.   Figure 3a, both TMSE of all destinations and MSE at different destinations decrease gradually as the SNR increases. It can also be observed in Figure 3a that MSEs at different destinations are very similar, statistically there is the nearly the same of the three legitimate links. Obviously, the TMSE of all legitimate destinations is much lower than the TMSE-e. It means that the system can be achieved a better transmission performance by employing our proposed algorithm against the eavesdropper. Additionally, Figure 3b shows that the TMSE of all destinations decreases when increases. The reason is that the reduction of causes the increasement of channel estimation errors, which in turn leads to the increasement of the TMSE.   Figure 3 shows the changes of TMSE and MSEs at different destinations versus signal to noise ratio (SNR) with different N p , where we have K = 3, M = 3, TMSE-e denotes the ∑ K k=1 MSE e,k . As shown in Figure 3a, both TMSE of all destinations and MSE at different destinations decrease gradually as the SNR increases. It can also be observed in Figure 3a that MSEs at different destinations are very similar, statistically there is the nearly the same of the three legitimate links. Obviously, the TMSE of all legitimate destinations is much lower than the TMSE-e. It means that the system can be achieved a better transmission performance by employing our proposed algorithm against the eavesdropper. Additionally, Figure 3b shows that the TMSE of all destinations decreases when N p increases. The reason is that the reduction of N p causes the increasement of channel estimation errors, which in turn leads to the increasement of the TMSE. are very similar, statistically there is the nearly the same of the three legitimate links. Obviously, the TMSE of all legitimate destinations is much lower than the TMSE-e. It means that the system can be achieved a better transmission performance by employing our proposed algorithm against the eavesdropper. Additionally, Figure 3b shows that the TMSE of all destinations decreases when increases. The reason is that the reduction of causes the increasement of channel estimation errors, which in turn leads to the increasement of the TMSE.   Figure 4 depicts the values of secrecy rate and communication rate versus transmission power constrains with different , when = 3, = 3, which is in the same background with Figure 3. As shown in Figure 4a, compared to the traditional approach, the proposed algorithm can support a positive secrecy rate and secrecy rate gradually improves with the SNR increasing. In other word, our proposed algorithm guarantees secure communications for the system. According to Reference [45], when the communication rate of legitimate transmitter-receiver link is lower than that of the transmitter-eavesdropper link, we define the secrecy rate as "0"; when the communication rate of legitimate transmitter-receiver link is larger than that of the transmitter-eavesdropper link, we define secrecy rate as the difference between the communication rate of legitimate transmitter-receiver link and that of the transmitter-eavesdropper link (as shown in (32)). The traditional approach does not  Figure 4 depicts the values of secrecy rate and communication rate versus transmission power constrains with different N p , when K = 3, M = 3, which is in the same background with Figure 3. As shown in Figure 4a, compared to the traditional approach, the proposed algorithm can support a positive secrecy rate and secrecy rate gradually improves with the SNR increasing. In other word, our proposed algorithm guarantees secure communications for the system. According to Reference [45], when the communication rate of legitimate transmitter-receiver link is lower than that of the transmitter-eavesdropper link, we define the secrecy rate as "0"; when the communication rate of legitimate transmitter-receiver link is larger than that of the transmitter-eavesdropper link, we define secrecy rate as the difference between the communication rate of legitimate transmitter-receiver link and that of the transmitter-eavesdropper link (as shown in (32)). The traditional approach does not consider the eavesdropper and the eavesdropper is so "sophisticated" (it knows our security algorithm) that the communication rate of legitimate transmitter-receiver link is lower than that of the transmitter-eavesdropper link. Consequently, no matter how large the SNR is, the secrecy rate is always zero. That communication rates of three links are similar, the situation of the secrecy rates is the same. Moreover, the achievable secrecy rates are lower than communication rates, because the proposed algorithm sacrifices a part of communication rate to realize a positive secrecy rate. Additionally, it can be observed in Figure 4b that the secrecy rate improves with the increasing of N p . This is because the increasement of N p causes the reduction of channel estimation errors, which in turn leads to the increasement of secrecy rates. always zero. That communication rates of three links are similar, the situation of the secrecy rates is the same. Moreover, the achievable secrecy rates are lower than communication rates, because the proposed algorithm sacrifices a part of communication rate to realize a positive secrecy rate. Additionally, it can be observed in Figure 4b that the secrecy rate improves with the increasing of . This is because the increasement of causes the reduction of channel estimation errors, which in turn leads to the increasement of secrecy rates.  Furthermore, in Figure 5 we depict the variation of the TMSE as a function of the number of iterations and the transmission power constrains, where we have = 3, = 3 and = 100 As shown in Figure 5, the TMSE of all destinations decreases when the SNR or the number of iterations increases. In addition, it also be depicted in Figure 5 that the TMSE decreases quickly at the beginning of the iteration process. And that means the proposed algorithm converges quickly.

Conclusions
In this article, we first investigate secure communication in MIMO interference relay IoT network in the presence of an active eavesdropper. A robust iterative distributed algorithm which Furthermore, in Figure 5 we depict the variation of the TMSE as a function of the number of iterations and the transmission power constrains, where we have K = 3, M = 3 and N p = 100 As shown in Figure 5, the TMSE of all destinations decreases when the SNR or the number of iterations increases. In addition, it also be depicted in Figure 5 that the TMSE decreases quickly at the beginning of the iteration process. And that means the proposed algorithm converges quickly. the same. Moreover, the achievable secrecy rates are lower than communication rates, because the proposed algorithm sacrifices a part of communication rate to realize a positive secrecy rate. Additionally, it can be observed in Figure 4b that the secrecy rate improves with the increasing of . This is because the increasement of causes the reduction of channel estimation errors, which in turn leads to the increasement of secrecy rates.  Furthermore, in Figure 5 we depict the variation of the TMSE as a function of the number of iterations and the transmission power constrains, where we have = 3, = 3 and = 100 As shown in Figure 5, the TMSE of all destinations decreases when the SNR or the number of iterations increases. In addition, it also be depicted in Figure 5 that the TMSE decreases quickly at the beginning of the iteration process. And that means the proposed algorithm converges quickly.

Conclusions
In this article, we first investigate secure communication in MIMO interference relay IoT network in the presence of an active eavesdropper. A robust iterative distributed algorithm which

Conclusions
In this article, we first investigate secure communication in MIMO interference relay IoT network in the presence of an active eavesdropper. A robust iterative distributed algorithm which jointly optimizes the source, relay and destination matrices has been proposed under the imperfect channel estimation. It aims to minimize the TMSE of all legitimate destinations subject to transmission power constrains while keeping MSE at eavesdropper above a certain threshold. The convergence of the proposed algorithm has also been proved. In addition, the performances of our proposed algorithm, such as its secrecy rate and MSE, are characterized in the form of simulation results. The simulation results reveal that our proposed algorithm is superior to the traditional approach. In other word, security can be ensured by using the proposed algorithm in the interference channel MIMO relay IoT network when there exists an eavesdropper.