Realizing Efficient Security and Privacy in IoT Networks

In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.


Introduction
With the recent swift advancement of wireless communication networks and the advent of the fifth generation (5G) cellular network, interconnected devices are embedded into the environment through the IoT paradigm to enhance constant quality of service (QoS) and connectivity [1]. However, security of wireless transmissions has become a vital concern [2]. Unfortunately, in wireless technology, security risks are unavoidably inherent. Recently, network intrusion and eavesdropping, known as Eves, has become in wiretap channels under multiple antennas networks [9][10][11]. Particularly, the authors of [11,12] described the performance capacity of privacy in a multiple-input, multiple-output (MIMO) wiretap transmission channel. However, the authors of [13] investigated a joint effect of multiple jamming signals and noise at the eavesdropper in a MIMO network by assuming the implementation of antenna selection technique by the transmitter, while both the eavesdropper and legitimate receiver make use of a maximal-ratio combining scheme to achieve spatial diversity in reception. Their results show the effects of imperfect feedback and other key system parameters on the secrecy performance.
Basically, security at the PHY layer guarantees an optimal level of transmission privacy against Eve's as well as establishing an anticipated reception standard and quality as expected by the receiver(s). This research area comprises both signal processing analysis and theoretical information study. Although the latter involves more bounds and asymptotical limits, the former inclines towards innovating primal designs of algorithms and architectures to tackle security issues in a wireless network. Therefore, the focus and motivations of this paper is wrapped around the former with respect to Eve's growing quantity of transmitting antennas on privacy.
All the above-mentioned studies, except for [10,11], failed to explore a MIMOME scenario wish illustrates the effects of Eve's growing quantity of transmitting antennas on privacy. Although the authors of [6,11,13] proposed proficient privacy, their technique is reliant only on the assumption of a scenario where several factors such as the quantity of Eve's antennas that are accessible for transmitter usage for artificial noise subspace, are constrained in a MIMO and MIMOME network. By implication, it is essential that Eve's multiple antenna usage needs be considered and addressed. In this research, this is believed to be an issue of importance, therefore these problems are first extensively described, then techniques to tackle such problems are investigated and proposed.The main contributions of this research are as follows. • A primal outlook into the investigation and optimization of wireless communications security with respect to IoT networks is presented. • Using a mathematical model, an analysis of a novel transmission system where the eavesdroppers attack is tackled by injecting artificial noise which is transmitted by the receiver who has full-duplex aptitude with the same frequency in the channel, which reduces Eve's reception quality.

•
Proposal of a new jamming mitigation technique and developed a sequential convex estimation and optimization (SCEO) algorithm for an optimized and enhanced privacy to solve the optimization problem in a three-node network where network users do not have knowledge of Eve's channel state information (CSI).

•
The vulnerability of the proposed privacy enhancing scheme to Eve's increasing number of antennas is characterized and explored, while the performance of the proposed algorithm in a three-node network is established. • Finally, because privacy capacity in a three-node network have been over-studied by several authors, this research is expanded to cover a MIMOME scenario, justifying its applicability in secured IoT network transmission.
The remainder of this paper is organized as follows. The privacy capacity model in wireless networks is described in Section 2. Review of recent works related to the research is presented in Section 3. System model is described in Section 4. Numerical analysis and results are provided in Section 5, and finally conclusions are outlined in Section 6.

Privacy Capacity Model in Wireless Networks
In this section, the privacy capacity model of the transmitting network is expressed. In the privacy capacity model of the network, it is assumed that the malicious node may eavesdrop the source as well as well as the receiver. However, in order to get a full use of the signals transmitted from the transmitter, the eavesdropper must be fully synchronized in the network. According to traditional privacy definitions in [8], the channel of communication can be modeled as a channel of broadcast in line with the wiretap channel as illustrated in Figure 1.

Tx Rx
Main Channel

Encoder Decoder
Wiretap Channel Considering the wiretap channel, the transmitting channel's message is represented as a n ∈ A n and is encoded and broadcasted as a codeword c m ∈ C m . The receiver (R x ) and eavesdropper (Eve) receive b m ∈ B m and e m ∈ E m , respectively. Eve's received information via her receiving signal is then modeled and described as in Equation (1), I (e m ; a n ) = g (a n ) − g (a n |e m ) (1) where I(e m ; a n ) represents the mutual information shared by the transmitter and the legitimate receivers, while g is considered as the entropy. As long as Eve cannot decode any bit of the transmitted information, then perfect privacy is achieved. Thus, Equation (2), I (e m ; a n ) = 0 ↔ g (a n ) = g (a n |e m ) (2) This implies that the quantity of uncertainty about Eve's private information is not altered after e m is received.
By definition, the probability of experiencing an error P i in the message estimation of message a n , andâ n is defined as the estimate of a n ; therefore, Eve's rate of uncertainty about message a n is term as the rate of equivocation and can be described as where 0 ≤ Q i ≤ g(a n )/m (5) Evidently, if Q i = g(a n )/m, then perfect privacy, which is related to perfect privacy rate Q s , is realized. For each ε > 0, a particular Q s is assumed to be realizable, and there is a sequence of (2 mQ s , m) codes such that for any m > m(ε) the following states are obtained.
The first state is the constraint for the realizable rate, whereas the second is the equivocation rate constraint which guarantees prefect privacy. In summary, privacy capacity S c is the optimal realizable rate of privacy in a network transmission. Thus, in [8], it is established that the difference between the main channel capacity C mc and the wiretap channel capacity C wc is the privacy capacity S c , in other words, as (.) + ∆ = max(0, .), where negative rate is meaningless. Although Wyner demonstrated this for the distinct no-memory channel, the principle that the capacity of privacy is the difference of the capacity of the legitimate channel and that of the eavesdropper's is established to be accurate for several systems like in multiple-input, multiple-output (MIMO) set-ups [12,13].

Notations
We denoted the column vectors and matrices by boldface letters (both at upper and lower cases), while the determinant, inverse of a matrix and column-wise vectorization of the matrix X are all represented as X H , X −1 , |X|, respectively. In a diagonal vectorization, Y is denoted as the column vector of y , whereas the random variable of y is represented as C y [.] and the probability of event occurrence is denoted as P{X}. Using the same probability space, we defined the random variables Y and Y m , if Y m converges to Y, we transposed Y m a.s → Y as m → ∞. We used I to represent the matrix identity of supplied size, as I(y; z) represents the information which is mutually and randomly transmitted between y and x variables.

Related Works
In a wireless network, jammers intentionally introduce radio frequency (RF) interference to distort wireless communications. This is achieved by occupying the transmitting channel and keeping it busy, thereby triggering the transmitter to withdraw each time it senses a busy wireless channel, or a tainted signal acknowledged at the receiver's end. In this section, in an attempt to understand the jamming attack on wireless networks, different kinds of jamming in wireless communications as proposed by several researchers are explored. Primarily, network jamming can occur in different ways based on the type of jammer. Therefore, different kinds of jammers and their jamming mechanisms are reviewed in this section.
Additionally, the theoretical information [30] forms guarantees defined by secrecy capacity of the communication channel; the nodes that legitimate can also assume active approaches to improve their communication secrecy. One important approach for improving the secrecy of wireless communication was developed in [31]. The approach proposes that the transmitter (Alice) injects artificial noise into legitimate channels null-space together with the data signal. This scheme is intended to actively reduce the reception quality of any Eve's presence without altering the quality of legitimate receivers (Bobs) channel. Several other works [32,33] have also investigated this approach. Equipping Bob with the capacities of full-duplex radio aptitude, which enables him broadcast jamming noise counter to Eve, while both Bob and Eve attempt to acquire information from Alice [34,35] is another approach. The combination of the aforementioned two jamming approaches is investigated in most part of this study to attain secrecy at higher levels. Moreover, this combination was examined in [36], as it proposed a cooperative optimization algorithm to generate decent parameters for the transmission. Separately, two different sets of antennas are considered for broadcasting and for full-duplex reception. Meanwhile, the research did not fully consider the residual self-interference at Bob. Further, several other works were interested with comparable systems in [37,38]. The system proposed in [39] presents a scenario with Alice and Bob communicating simultaneously and are furnished with full-duplex radio with full consideration of residual self-interference. The study target was to discover the maximum beamforming transmit trajectories for artificial noise and signal considering some constraints of quality of service (QoS) with Eve's CSI recognizable to users. With Eve's exact CSI unrecognizable to the user in [40], a closed-form lower bound on the ergodic rate of secrecy is realized. The authors of [41,42] considered a case of a single-antenna Bob and multiple antenna base station coupled with a colluding and non-colluding single-antenna Eves. As an alternative to beamforming, an antenna selection scheme is used by the study and it is of the research assumption that Eves are dispersed in accordance to the process of Poisson point.
For cooperative relaying networks, several authors have also investigated different techniques for the security of systems physical layers [43]. In cooperative relaying networks, even destinations or relays are used as assistants to offer jamming signals to complicate the eavesdropper's transmission. This method is known as cooperative jamming. The noise-forwarding approach which was introduced in [24], and applied in a channel comprising of four-terminal relay-eavesdropper also considered a full-duplex relay, which independently transmits secret messages codewords which are targeted at complicating the eavesdropper's transmission. The authors of [44] investigated a two-stage cooperative jamming scheme (TSCS) which involves multiple relay nodes acting as the single-antenna's source node extension. The relays in this study do not transmit the information signals as they only function as a helper. However, for a single-antenna relay network, the authors of [45] proposed three different cooperative communication methods. On the other hand, for the second hop, they attempted to optimize secrecy by deriving a power allocation approach and its corresponding relay weights. The study in [46] investigated a decode-and-forward (DF) relays performance based on an optimal beamforming strategy; however, the investigation is limited because it only considered a transmission where the Eve monitors just a single connection linking the transmission destination and relay. The investigation of [47] was based on different privacy enhancing technologies (PETs) for IoT devices which have resulted in a much efficiency and convenience to our daily life. Their survey claim to have identified current state of improvement of the PETs in several turfs and also analyzed how the current technologies adhere with the modern legal ideologies and privacy criteria in curtailing the threats to privacy. A secured IoT-based healthcare system, which operates through the body sensor networks (BSN) architecture, was examined by the authors of [48]. The main focus of their system is to concurrently realize system robustness of transmission and efficiency within publicly transmitting IoT-based communication networks. Utilizing a vigorous utilize crypto-primitives, they constructed two communication schemes to ensure confidentiality in transmission and support entity authentication among smart objects. As most of the IoT data is relevant to personal privacy, it is necessary to pay attention to data transmission security. The authors of [49] investigated an IoT-oriented offloading method (IOM) which is enclave with privacy preservation to solve the problem of privacy in Cloudlet-enabled Wireless Metropolitan Area Networks (CWMAN). Their research and that of [50] adopted the non-dominated sorting differential evolution algorithm (NSDE) in order to optimize the multi-objective problem.
By contrast to the works analyzed above, the work in [51] proposed a cooperative jamming approach for a half-duplex two-hop wireless MIMO relay scheme where the eavesdropper can bug the channels throughout the phases of transmission. The study investigation considered both single and multiple streams of data transmissions. However, for jamming support, due to the absence of an "outer" helpers, the relay, destination, and source must depend on themselves. Whether the eavesdropper is in proximity to the source or the destination, the strategy guarantees that it is jammed. In this strategy, both the source and the destination nodes perform as provisional assistants for transmitting jamming signals throughout the phases of transmission where they are generally inactive.
In summary, the event of optimizing privacy without the users recognizing Eve's CSI is sparsely contained in literature; however, a few works like [52][53][54][55][56][57] gave more attention to the use of only enough energy to authenticate a particular QoS for Bob and is this energy is estimated in terms of signal-to-interference-plus-noise-ratio (SINR). Using the remaining energy, artificial interference is generated to jam Eve not minding the effect of Eve's location. This process is implemented in place of making attempts to optimize the rate of secrecy, which is impossible without the users having a knowledge of Eve's CSI [58,59]. Furthermore, as new telecommunication technologies emerge, the use of several security and privacy techniques proposed earlier becomes over exploited and obsolete; therefore, it is vital to develop advanced state-of-the-art techniques and algorithms that can mitigate against network jamming and eavesdropping attacks and ensure constant quality of service (QoS) in the network. Considering that this is the optimal focus of this research, therefore, the relevance of this research to cutting-edge telecommunication technologies like the IoT and 5G cellular network cannot be underestimated.

System Model
In this section, the system model is described. There are similarities in the model to what was given in [8]. For the set-up, a three-node-based wireless transmission is illustrated in Figure 2. In the set-up, all three nodes are attached to a single transmitting antenna. The intention of the transmitter (Source) is to broadcast some private information to the receiver (Destination) while Eve (a passive eavesdropper) attempts to gain access to the sensitive private information. We assume that each link channel entails several M orthogonal subcarriers and each subcarrier fading is flat. Tackling eavesdropping attacks in this set-up entails that artificial noise is broadcasted by R x with the same frequency and in the same channel, which reduces Eve's reception quality. Considering that this jamming attack operates at the same frequency and time in which information is transmitted from T x to R x ; thus, it is assumed that R x has full-duplex aptitude. It is well known that there is no perfect full-duplex system, therefore R x always manifests some level of residual self-interference.
Considering y s (x) ∈ Mx1 is the signal vector independent and identically distributed (i.i.d) zero mean cyphers and unit variance that the T x will be transmitting while y d (x) ∈ Mx1 is assumed to be the jamming noise vector of i.i.d. zero mean cyphers and unit variance the transmitter (T x ) will be transmitting. Thus, the signal vectors R x and Eve received can be individually described, where Mx1 comprises the vector, g sd , g se , g de , and g dd are explicitly described in Figure 2, and p s and p d vectors, respectively, represent the power of transmission between the T x and R x . m d (x) ∈ Mx1 and m e (x) ∈ Mx1 are considered as the mean of independent white Gaussian noise of zero and unit variance, respectively. The multiplication and square root are used as element-wise operators, and δ represents the attenuation factor of self-interference.
Denoting the superscript (m) as a vector mth element, we formulate the respective signal-to-noise-ratios (SNRs) of the mth subcarrier at R x and Eve as where Recall that as stated earlier, Eve's CSI (C m and D m ∀m) is only supposed to be recognizable by legitimate users in this Section.
Thus, the privacy capacity of this model is defined as where

Formulated Optimization Problem
In this subsection, our objective is to boost the privacy capacity of the scheme using power and rate constraints with cooperative power distribution between T x (source) and R x (destination). As compared with the conventional physical layer security techniques, the proposed SCEO and swift privacy rate optimization algorithms are suitable for the Internet of Things, because the optimization algorithms are energy efficient; therefore, the low-energy consumption necessities of IoT is enormously satisfied. Specifically, in a wireless channel transmission scheme, intrinsic noise is deployed which degrades the quality of the eavesdropper's received signal; thus, privacy in transmission is guaranteed with no cost of supplementary power. In summary, the application of the proposed technique in IoT technologies is low power capable as it does not necessitated the use of additional energy to guarantee privacy in transmission. The authors in [38] attempted to solve this low power problem through the bisection approach by swapping the source and destination powers optimizations, iteratively. However, in this work, we provided an improved solution by jointly assigning source and destination powers, thereby formulating the first optimization problem as (13): where The privacy capacity of our system is considered as the objective function, and the approximation is performed over the privacy capacity of the group of subcarriers which warrants a positive capacity of ψ z . First, the rate constraint which guarantees the quality of service (QoS) of the network is considered. Although the techniques warrant data exchange or channel feedback between the authentic users, which can result in a slight rate performance degradation, typically IoT devices and applications have very low data rates. Therefore, this setback of low rate performance does not alter the adoption of the scheme in IoT operations. Second, the jamming mitigation power constraint which has its summation over the set of subcarriers ψ z is considered. This is due to the need to properly manage power so no power waste is experienced by subcarriers which might not guarantee a positive gain of privacy. Last, the third constraint which is the power constraint at Source is taken into consideration. Furthermore, the minimum expected rate is represented as C sd , whereas p s and p d are set to represent the optimal sum of powers at Source and Destination.
With the aim of exploring the Karush-Kuhn-Tucker (KKT) conditions, we formulated the Lagrangian function of the problem as Considering the KKT conditions as Equations (16)-(18) above are the derivations of the KKT conditions which the Lagrangian function of the problem must satisfy for optimal solution to be achieved.
Apparently, attempting to find solution to the source-to-destination KKT conditions, a two-dimensional (2-D) bisection search estimation is performed on parameters λ, ν, and µ as analyzed in Algorithm 1.
Perform search λ > 0 for every given ν to achieve the rate constraint until precision ζ is achieved.
Given each pair of λ and ν, y m ≥ 0 is achieved as the solution of (24) for every m ∈ ℵ. 6: revert y (meaning the rate constraint is achieved).

7: end if
Considering Algorithm 1 (bisection algorithm), the following set of equations which require solution will be encountered. These represent two nonlinear systems of equations: Finding solution for the KKT conditions which contains these two nonlinear equations appears to be unnerving; therefore, we consider applying the approach of sequential convex approximation.

Sequential Convex Approximation
In attempt to realize a sequential convex approximation, the rate constraint and the objective function which constitute the optimization problem formulated in (13) is rewritten as (20) below.
Evidently, f 1 and f 4 functions are concave while f 2 and f 3 functions are convex. Considering first-order Taylor series expansion of convex functions as the function's underestimator. By denoting the first-order Taylor series expansion of f 2 and f 3 around (y (h) , z (h) ) points and expressing them, respectively, asf 3 , the following was realized, Based on work done in [34] and assuming B m D m < 1 we further simplify Θ z and obtain Thus, following iteration h, we formulate the optimization problem as follows, It is observed that a convex optimization problem occurs at each point of iteration. This attempts to optimize a lower bound on the primal objective function and guarantees the rate constraint. As the iterative Algorithm reaches convergence, a decent approximation on the optimal values is expected. The optimization process is detailed in Algorithm 2.

Algorithm 2 Sequential Convex Estimation Optimization Algorithm for solving optimization problem.
Initialize: (A m , B m , C m , D m ) : ∀ m ∈ ℵ, p d , p s , C sd , ζ. Generate: Perform the convex optimization problem in (18) to realize y (t) ,

Optimization of Swift Privacy Rate in a MIMOME
Considering a network scenario where multiple eavesdroppers operate, the first assumption in realizing a swift privacy rate will be that Eve has full knowledge of her covariance matrix of noise and interference (M E ) just as she has full knowledge of all her entire CSIs (as earlier stated); then, she can make use of the optimal receiving antenna and her achievable rate would be derived as where Then, the swift realizable privacy rate would be expressed as However, for a multiple-input multiple-output multiple-antenna eavesdropping (MIMOME) system, assuming there is a constraint on the number of Eve's antenna (A E ), one major issue of the system will be on how can to optimize the parameters of the transmission in such a way that Eve's interference in the transmission is made difficult. This becomes our focus in this subsection.
In this MIMOME system, if there is great increase in of (A E ), the artificial noise does not have a significant impact on the rate of transmission between T x and Eve (R TE ). Therefore, the assumption in this subsection is that there is a constraint on Eve's maximum number of antennas; therefore, for the reason of optimization, a worst case is assumed, and thus this maximum number of antennas is considered as (A E ).
To achieve this optimization, T x and R x cannot utilize the swift CSI at Eve, so as earlier mentioned, P R is inappropriate for this optimization. From some previous research [6,13,18], it is observed that Eve's symptotic rate is a decent approximation to the tangible rate; thus, we adopted this fact in order to achieve optimization. Suppose that the we make no assumption on the realizable random parameter (r) and assuming that z r is a vector encompassing the transverse elements of Z r , and (A E ) is discreetly huge. Then, by rewriting (26), we obtained as K 3 and K 4 are expanded as Deriving from the approximation of R TE , an objective function which entails the approximation of P R is proposed. Note that the proposed objective function does not depend on the CSI of Eve; however, it considers the approximate swift rate of Eve. Likewise, as it is assumed that the transmitter and receiver has full knowledge of the null space (G), the receivers exact rate is applied but not in its asymptotic form. The objective function is expressed as follows, where M B implies that the receiver has full knowledge of her covariance matrix of noise and interference, , whileσ 3 andσ 4 are solutions to the formulated problem. In order to optimize the swift privacy rate, we proposed an optimization problem as stated below. min r min z r , P m , P B h (z r , P m , P B ) In the optimization problem above, the constraints are in their convex form; nevertheless, h(.) is yet to assume a convex form. We can achieve this by rewriting the function From Equation (33), we can linearize + ∑ NΘ 3 k=1 log (1 +σ 3 (Θ 3 )k, k), which is the convex form of h(.) at every iteration point of the optimization algorithm using the expansion method of first-order Taylor series. Similarly, we can resolve the reliance state of h(.) on theσ 3 ,σ 4 parameters by making them constant with respect to their values and the upgrading them at the end to achieve the following, note that j + 1 represents the parameter value at j + 1 iteration. Thus, we optimized the preceding convex function at j iteration, denoting y r = z J r , P m , P B J and f j (y r ) = log |M B | + Recall that terms that are constant were not used in (25) because they do not have any effect in the optimization. However, at this point, h(.) has assumed a convex function and we can then optimize it using the preceding optimization y j+1 r = arg min y r g j (y r ) Similarly, at this point, if any possible values of r is deployed, an optimal output will be recorded. The summary of our proposed optimization procedure can be seen in Algorithm 3. Although different optimization methods to tackle this kind of problem were proposed in [13,18] comparatively, these methods give almost similar outcome, nonetheless, our proposed Algorithm 3 significantly executes with minimal complexity. Our figures illustrate the efficiency and out-performance of our swift optimization algorithm as compared with nonoptimal parameters.

Numerical Analysis and Results
In this section, MATLAB simulation results based on our proposed SCEO algorithm and the Swift privacy rate optimization algorithm is presented. Our investigations show that the magnitudes of all transmission channels are distributed in a Rayleigh form with an even unit of mean square, while the attenuation factor of the transmission self-interference ρ is set to be 0.8, except where slight changes are required. The transmission power constraints were set at 20db except where otherwise stated.

Realized Privacy Capacity
We performed a transmission performance evaluation for a three-node transmission under power and rate constraints as shown in Figures 3 and 4. A comparison of three separate transmission scenarios with respect to the privacy capacity of their transmissions is shown in the experiment.     Figure 4 represents the data rate of the transmission between the source and destination (Source-to-Destination) specifically realizing for the entire A m < C m , ∀m ∈ ℵ. This clearly implies that, for the entire set of subcarriers, the Eve's channel is stronger from the Source (T x ) than the Destination (R x ) has from the Source.
For Transmission 1 (the first transmission scenario), at the Source and Destination terminals, data rate is optimized subject to power constraints. However, this occurs without the constraint for privacy capacity. The subsequent obtainable data rate is signified by C SOD,1 . On the other hand, as expected for this channel, the subsequent privacy capacity S c,1 is realized as zero.
For Transmission 2, the transmissions privacy capacity is optimized subject to power constraints at Source and Destination likewise a rate constraint of Source-to-Destination. Setting the lesser bound on the rate (i.e., the constrained rate) at C * SOD = 0.8C SOD,1 , the equivalent rate realized at the channel transmission is signified by C SOD,2 , as anticipated, the curve is vague from that of C * SOD . S c,2 represents the subsequent attained transmission privacy capacity and it is huge and quite close to Transmission 3.
In Transmission 3 (the third transmission scenario), the privacy capacity is optimized with only power constraint at Source and Destination without considering any rate constraint. Subsequently, we represented the privacy capacity as S c,3 while the data transmission rate is signified as C SOD,3 .
Considering the three transmission scenarios, it is observed that the result obtained at the second scenario (Transmission 2) outperform the other two transmission scenarios in terms of source-to-destination data rate trade-off and the transmission's privacy capacity.

Joint Power Assignment for Multiple Destinations
For a multiple transmission destinations scenario, we considered C n = χC * n , representing C * n as the optimal data rate attainable from Source to Destination when power p s N is assigned to Source for data broadcast to the nth destination. Considering χ = 0.8 and N = 4, Figures 5 and 6, respectively, represent the maximum attained privacy capacities and data rates from the source-to-destination. Likewise, the equivalent outputs with no rate constraint are represented in the two figures. It is observed that if rate constraints are applied, a small measure of privacy capacities is lost, however, significant data rates are gained and maintained. For both Figures 5 and 6, under rate constraint, both the achieved and constrained rates are separable.    Figure 6. Source-to-Destination data rate for multiple destinations transmission.

Joint Power Assignment for Multiple Sources
For a multiple transmission source scenario, considering the nth transmission source, we set the rate constraint as C n = χC * n , representing C * n as the optimal data rate attainable from Source to Destination when power p s,n = p s M is assigned to Destination for data broadcast from the nth Source. Figures 7 and 8 present the data rates and privacy capacities for all three different sources. The subsequent result shows that although a small measure of privacy capacity is lost in the absence of rate constraint, significant data rates are gained and maintained.   Figure 8. Source-to-Destination data rate for multiple sources transmission.

Performance Comparison of Difference Algorithms
In Figures 9 and 10, we compared our proposed sequential convex estimation optimization (SCEO), which is intended to mitigate the optimization problem in (15) against the Bisection method in [38] and the two-stage cooperative jamming scheme (TSCS) in [44]. A total of 60 transmitting antennas were selected for both experiments. For the rate constraints, about 0.8 of optimal attainable capacity (OAA) was selected for Figure 9, whereas for Figure 10, the power constraint (p s = p d = p) is set at 20 dB. Figure 9 indicates that mostly if the power constraints are low, our proposed SCEO technique is latent enough to obtain optimal values. Comparing the three different techniques in Figure 10 at different variations of rate constraint. Our technique is observed to outperform the other two compared techniques notwithstanding severe rate constraints. Moreover, as the rate constraints becomes more severe, convergence might be difficult for the TSCS and Bisection techniques but our algorithm converges almost seamlessly. TSCS in [44] Bisection Estimation in [38] Proposed SCEO Algorithm

Rate Constraint
Proposed SCEO Algorithm Bisection Estimation in [28] TSCS in [44]  Finally, the complexity analysis of our swift privacy rate optimization algorithm in a multiple transmission and multiple eavesdropper scenario is shown in Figure 11. We set the optimization parameters as A E = A Tx , β 1 = 6, P max n = P max B = 20 dB. From the result of our investigation, there were no evident patterns in the optimal values, in addition, the optimal parameters are dependent on the outputs of G. Nevertheless, P n can be assumed to be frequently and approximately distributed evenly among the channels. Finally, it is observed that as A E becomes larger, the minimal P B and r are respectively favored by the optimization. Optimal P n =P B =20dB P n =P B =30dB P n =30dB,P B =10dB Figure 11. Comparison ofĀ E versusĀ Tx with different parameters.

Conclusions
In this study, we explore the privacy capacity of wireless transmitting networks in several schemes relating to full-duplex jamming. Subject to both the transmission rate and power constraints, we considered and implemented an efficient power allocation optimization algorithm for enhancing privacy capacity in a three-node transmitting network and also in a real life MIMOME scenario. The applications of the resulting research and results can be applied to current wireless communication networks seen in rampant use in both IoT and 5G networks. Our experimental results showed that by using the sequential convex estimation optimization (SCEO) algorithm, a more optimal result and enhanced convergence is achieved.
However, due to possible challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm, which executes significantly with minimal complexity when compared with nonoptimal parameters. The use of the rate constraint together with self-interference of the full-duplex at the receiving node makes the performance of our technique outstanding from the recent studies reviewed. Furthermore, we extended our study to consider a scenario where multiple sources and multiple destinations are in use. Finally, our technique indicates that as the iterative algorithm reaches convergence, a decent approximation on the optimal values is achieved. In a future work, we intend to consider a stochastic optimization approach for privacy capacity with Eve's CSI Unknown to Users.