Next Article in Journal
On Finding the Right Sampling Line Height through a Parametric Study of Gas Dispersion in a NVB
Next Article in Special Issue
A Study of Features and Deep Neural Network Architectures and Hyper-Parameters for Domestic Audio Classification
Previous Article in Journal
The UWB Radar Application in the Aviation Security Systems
Previous Article in Special Issue
You Only Look Once, But Compute Twice: Service Function Chaining for Low-Latency Object Detection in Softwarized Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Power Allocation for Secrecy-Capacity-Optimization-Artificial-Noise Secure MIMO Precoding Systems under Perfect and Imperfect Channel State Information

1
School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin 150001, China
2
JushriTechnologies Inc., Shanghai 200335, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(10), 4558; https://doi.org/10.3390/app11104558
Submission received: 2 April 2021 / Revised: 5 May 2021 / Accepted: 13 May 2021 / Published: 17 May 2021

Abstract

:
In this paper, we consider the physical layer security problem of the wireless communication system. For the multiple-input, multiple-output (MIMO) wireless communication system, secrecy capacity optimization artificial noise (SCO−AN) is introduced and studied. Unlike its traditional counterpart, SCO−AN is an artificial noise located in the range space of the channel state information space and thus results in a significant increase in the secrecy capacity. Due to the limitation of transmission power, making rational use of this power is crucial to effectively increase the secrecy capacity. Hence, in this paper, the objective function of transmission power allocation is constructed. We also consider the imperfect channel estimation in the power allocation problems. In traditional AN research conducted in the past, the expression of the imperfect channel estimation effect was left unknown. Still, the extent to which the channel estimation error impacts the accuracy of secrecy capacity computation is not negligible. We derive the expression of channel estimation error for least square (LS) and minimum mean squared error (MMSE) channel estimation. The objective function for transmission power allocation is non-convex. That is, the traditional gradient method cannot be used to solve this non-convex optimization problem of power allocation. An improved sequence quadratic program (ISQP) is therefore applied to solve this optimization problem. The numerical result shows that the ISQP is better than other algorithms, and the power allocation as derived from ISQP significantly increases secrecy capacity.

1. Introduction

Secure transmission is a fundamental problem in wireless communications due to the broadcast nature of the wireless medium. Along with the rapid advancement of information technology, the higher information transmission rate has called for a stricter standard of information transmission security. For a long time, the primary method of guaranteeing the secure transmission of information has been via encryption technology. Encryption technology utilizes the limitation in computing speed to prevent the eavesdropper from deciphering all encrypted information in a limited time. However, as computer technology advances with faster computation, the decryption of information becomes more straightforward. In theory, no encrypted information is indecipherable if the computer’s calculation speed is fast enough. This indeed is the inherent flaw in the current information encryption technology. Therefore, the physical layer security technology has been proposed to solve the problems of secure information transmission.
The physical layer security technology differs substantially from the information encryption technology. Unlike encryption technology, which relies on the limitation in computation speed, the physical layer security technology has its basis in the randomness of the wireless communication channel. The physical layer security technology tries to prevent eavesdroppers from decoding information, regardless of the amount of time or the computing speed. One of the most innovative physical layer security technologies is artificial noise (AN). AN adds extra noise to the information. This noise solely impacts the eavesdropper’s channel but does not affect the legitimate receiver channel. That is, only the signal received by the eavesdropper is reduced in this method. The effectiveness of the physical layer technology is then evaluated by secrecy capacity.
The study of physical layer security begins from [1]. This paper proposes unconditional secure transmission as the ultimate goal of physical layer security technology study.
After [1,2] is the first paper to study the secure transmission of information from the perspective of information theory. In [2], wiretap communication model with the eavesdropping channel is proposed, and the aforementioned secrecy capacity was also first proposed in this paper. Paper [3] studies the physical layer security technology based on [2]. In [3], a broadcast channel model with confidential messages is proposed to extend Wyner’s work.
Currently, the physical layer security technology has not been at the center of public attention, primarily due to a strict restriction that the eavesdropper’s channel must be strictly worse than the legitimate channel. Considering the following cases: the eavesdropper is closer to the transmitter, or the eavesdropper has more antennas than the transmitter. These mentioned conditions will make the eavesdropper’s channel better than the legitimate channel and thus reduces the effectiveness of the physical layer security technology.
To help with the issue above, AN technology is introduced. The proposal of AN technology reduces the difficulty of applying the physical layer security technology in the multiple-input, multiple-output (MIMO) communication system [4]. AN is in the null space of the legitimate channel, which mean the legitimate channel is not affected. There is no need to employ any additional signal processing device to the legitimate receiver. Meanwhile, the eavesdropper’s channel capacity is reduced significantly. To show this result quantitatively, let A denote the channel capacity of the legitimate receiver and B denote the channel capacity of the eavesdropper. The principle of AN is to increase the difference A B by reducing B and keeping A constant.
There have been many outstanding works in the realm of AN technology. In [5,6], AN and the interference alignment technology are creatively merged to introduce AN featuring interference alignment. In [7], the lower bound on the secrecy capacity of artificial noise wireless communication systems subject to transmit power is proposed. Ref. [8] proposes the secrecy capacity expression with imperfect channel estimation. This expression is non-convex, so the gradient descent method cannot be used for this optimization problem. Therefore, it is impossible to get the optimal solution of the secrecy capacity expression. The study in [9,10,11,12] consider the effects of active eavesdropper. The active eavesdropper can interfere with pilot to reduce the secrecy capacity of the wire-tap system. This is something that hasn’t been explored in previous studies.
The past research on AN is summarized into two main aspects:
(1)
Research on AN noise technology under different communication modes [13,14,15,16,17,18,19,20,21]: examples include the AN power allocation problem in OFDM, GSM, and other communication modes [22] and the application of AN under intelligent reflecting surface [23]. The simplified communication model is Y = H X + e , where Y denotes the received signal, H denotes the channel, X denotes the transmitted signal, and e is the noise. The above researches focus on “H”.
(2)
Reshaping certain features of AN. For example, Ref. [24] designs an artificial noise that has interference alignment characteristics. The research focused on “X” from the equation above [25,26,27,28].
Still, there has been little to no research attention on redesigning the core of AN. Therefore, our research focus on creating a new kind of AN. Our research shows that our new artificial noise has a better performance compared to its traditional counterpart.
In [29], the secrecy capacity optimization artificial noise (SCO−AN) is proposed. The core of AN technology is to design a noise in the null space of the channel state information space. Unlike the traditional AN, which ignores the range space of the channel state information space, SCO−AN is located in that range space. While SCO−AN may slightly impact the channel capacity of the legitimate receiver, SCO−AN significantly reduces the channel capacity of the eavesdropper. Therefore, this method still increases the difference between the legitimate channel capacity and the eavesdropping channel capacity. SCO−AN is a tool to convert the noise immunity of communication systems into secrecy capacity.
As there is a limitation in the transmission power, it is critical to draw an optimization problem to maximize the secrecy capacity under that limitation. The power allocation problem becomes essential. Therefore, in this paper, we study the power allocation problem of SCO−AN. The Hessian matrix of the SCO−AN power allocation objective function is not positive definite, which means the objective function is non-convex. The maximum value of the SCO−AN power allocation function cannot be obtained by the gradient descent method. An improved sequential quadratic programming (ISQP) is proposed to solve this problem. With the effects of imperfect channel estimation considered, the objective power allocation function containing imperfect channel estimation parameters is constructed.
The main contributions of this paper are summarized as follows:
(1)
In reality, the secrecy capacity of a wireless communication system using SCO−AN is limited by transmission power. Considering this limitation, this paper constructs a power distribution function for SCO−AN and the information-bearing signal.
(2)
Since the power allocation objective function is non-convex, it is difficult to optimize the power distribution function using a power optimization scheme based on gradient descent. ISQP is then proposed to allocate power between SCO−AN and the information-bearing signal. ISQP improves the traditional iterative algorithm and reduces the computational complexity by simplifying the initial iterative matrix and improving computational efficiency.
(3)
Due to the influence of Gaussian white noise in the channel, there is an error in the channel estimation, resulting in an error in the SCO−AN design. The channel estimation error affects the accuracy of the power allocation optimization. This paper considers the imperfect channel state information for power allocation. The power allocation objective function of SCO−AN and the information-bearing signal containing channel estimation errors is constructed. The expression for the channel estimation errors is derived for the first time. This expression can then be applied to future physical layer security research examining imperfect channel estimation.The power allocation function is then converted to a function with only one variable–the SCO−AN–simplifying the function’s overall computational complexity.
This paper is structured as follows:
  • In Section 2, the system model and the framework are introduced.
  • In Section 3, the objective function for the power allocation between SCO−AN and the information-bearing signal, with and without considering imperfect channel estimation, is proposed. ISQP is then applied to optimize the power allocation. The algorithm flow of ISQP algorithm is constructed.
  • In Section 4, simulation results are shown and discussed.
  • In Section 5, the conclusion is drawn, and the suggestions for future work are presented.
In this paper, the following notations are used: Boldface upper case denotes matrices, boldface lower case denotes vectors, italics case denotes numbers; [ · ] T denotes the matrix transpose operation; [ · ] denotes the complex conjugate operation; [ · ] denotes the conjugate transpose operation (conjugate complex number) for the matrix (number) “·”; E { · } denotes the mathematical expectation; · denotes the norm of a vector; and · denotes the determinant of a matrix.

2. Related Work and System Model

2.1. Related Work–Wireless Communication Model with Eavesdroppers

In this section, we review the artificial noise technology and the method of SCO−AN. Moreover, the effects of imperfect channel estimation are analyzed in detail.
Figure 1 shows a wireless communication system model with an eavesdropper. In this model, Alice is the transmitter of the message, Bob is the legitimate receiver, and Eve is the eavesdropper. Alice has N A antennas, Bob has N B antennas and Eve has N E antennas. H represents the channel state information (CSI) of the legitimate channel (Alice to Bob), while G represents the CSI of the eavesdropper channel (Alice to Eve). H k and G k represent the CSI of H and G at time k respectively. The element h i , j (or g i , j ) in H (or G) is the channel gain coefficient between the i t h transmitter antenna and the j t h receiver’s (or eavesdropper’s) antenna. x k C N A represents the signal transmitted by Alice at time k; y k C N E represents the signal received by Bob at time k; and z k C N B represents the signal received by Eve at time k.
z k = H k x k + n k ,
y k = G k x k + e k ,
where n k and e k are independent and identically distributed (i.i.d) additive Gaussian white noise (AGWN) with the variance of σ n 2 and σ e 2 respectively. For the convenience of discussion, we assume that the CSI of G and H can be obtained by Alice without delay. The maximum transmitting power is assumed to be P, where E [ x k x k ] P .

2.2. Related Work–The Artificial Noise

Located in the null space of legitimate channel (i.e., Bob’s channel), AN does not affect Bob’s reception of information. For Eve, however, AN reduces Eve’s channel capacity significantly. Alice sends AN simultaneously while sending the information-bearing signal; that is,
x k = w k + s k ,
In (3), w k C N A denotes AN; s k C N A denotes the information-bearing signal; and w k is artificial noise, which is located in the null space of H k , such that H k w k = 0. Let Z k be a standard orthonormal basis for H k and v k be a complex random variable with the variance of σ v 2 such that w k = Z k v k and Z k Z k = I . Then, the signals received by Bob and Eve are:
z k = H k x k + n k = H k w k + H k s k + n k = H k s k + n k ,
y k = G k s k + G k w k + e k ,
where y k is the signal received by Eve, and z k is the signal received by Bob. y k and z k are Gaussian vectors. As w k is in the null space of H k , we have H k w k = 0 and the term with w k vanishes in (4). That is, the artificial noise does not impact Bob, while Eve is affected.
In [4], the transmitted signal is chosen as s k = p k u k , where u k is the information signal with the variance of σ u 2 and p k obeys the independent Gaussian distribution. Here, p k is chosen such that: (a) H k p k 1 , and (b) p k = 1 .
In [4], Goel considers two scenarios:
(a)
A single-input, single-output (SISO) wireless communication system where the transmitter, the receiver, and the eavesdropper equip one antenna each, i.e., N A = N B = N R = 1 ; and
(b)
A MIMO wireless communication system where the the transmitter, the receiver, and the eavesdropper each equip multiple antennas, i.e., N A = N B = N R > 1 .
For scenario a, the variables in (4)–(6) are Gaussian complex variables. log e ( ) is used to calculate entropy, so the lower bound on secrecy capacity after adding artificial noise is given by:
C s e c a = I ( Z ; S ) I ( Y ; S ) = log 1 + | H k p k | 2 σ u 2 σ n 2 log 1 + | G k p k | 2 σ u 2 E | G k w k | 2 + σ e 2 ,
where E G k w k 2 = ( G k Z k Z k G k ) σ k 2 . C s e c a denotes the secrecy capacity after adding artificial noise, and I ( A ; B ) denotes mutual information entropy of A and B.
For scenario b, G k and H k are Gaussian complex matrices. The elements in G k and H k are Gaussian complex variables. The other variables in (4)–(6) are Gaussian vectors. It then follows that the lower bound on secrecy capacity after adding artificial noise is given by:
C sec a = I ( Z ; S ) I ( Y ; S ) = log I σ n 2 + H k E [ s k s k ] H k log | G k Z k Z k G k σ v 2 + G k E [ s k s k ] G k | | G k Z k Z k G k σ v 2 + I σ e 2 | .

2.3. Related Work–SCO−AN: Perfect Channel Estimation

SCO−AN is proposed in [29]. In this section, SCO−AN is introduced in detail.
The goal of physical layer security is to maximize the secrecy capacity of a communication system. In the wireless wiretap communication model, it is not possible to increase the channel capacity of the legitimate receiver. AN is then proposed to reduce the eavesdropper’s channel capacity while the legitimate receiver’s channel capacity remains intact. Inspired by AN, the secrecy capacity optimization artificial noise (SCO−AN) is proposed in [29]. Unlike the traditional AN, SCO−AN has a slight impact on the legitimate receiver’s channel capacity but reduces the capacity of eavesdropping channels much more significantly. Hence, the system’s overall secrecy capacity increases.
Next, we compute the analytical expression of using SCO−AN, in a manner parallel to our computations of AN above. Alice adds SCO−AN to the transmission signal:
x k = w g + s k ,
In [29], the transmitted signal is s k = p k u k , where u k is the information-bearing signal with variance of σ u 2 and p k obeys the Gaussian distribution. p k satisfies the following conditions: (a) H k p k 1 ; and (b) p k = 1 . w g C N A denotes the SCO−AN. To facilitate calculations, we assume that w g = Z k v g , where Z k is a standard orthonormal basis of H k and v g is a complex random variables with variance σ g 2 . The signals received by the Bob and Eve are:
z k = H k s k + H k w g + n k ,
y k = G k s k + G k w g + e k ,
where z k denotes the signal received by Bob and y k denotes the signal received by Eve.
For the SISO wireless communication system, all the elements in (8)–(10) are complex variables. So the lower bound on secrecy capacity after adding SCO−AN is:
C sec g = I ( Z ; S ) I ( Y ; S ) = log 1 + | H k p k | 2 σ u 2 E | H k w g | 2 + σ n 2 log 1 + | G k p k | 2 σ u 2 E | G k w g | 2 + σ e 2 ,
where E H k w g 2 = ( H k Z k Z k H k ) σ g 2 , and E G k w g 2 = ( G k Z k Z k G k ) σ g 2 . C s e c g denotes the secrecy capacity after adding SCO−AN. In (11), C sec g is a non-convex function about σ g 2 .
For the MIMO wireless communication system, H k and G k are gaussian complex martixs, x k , w g , s k , n k and e k are gaussian vectors. So the lower bound on secrecy capacity after adding SCO−AN is:
C sec g = I ( Z ; S ) I ( Y ; S ) = log | ( H k Z k Z k H k ) σ g 2 + I σ n 2 + H k Z k Z k H k σ u 2 | | ( H k Z k Z k H k ) σ g 2 + I σ n 2 | log | ( G k Z k Z k G k ) σ g 2 + I σ e 2 + G k Z k Z k G k σ u 2 | | ( G k Z k Z k G k ) σ g 2 + I σ e 2 |
(12) is a function of σ g 2 .
For the convenience of discussion, C sec k represents the change of secrecy capacity after adding the SCO−AN when compared to simply adding traditional AN. For the case of SCO−AN, to ensure the effectiveness of physical security, (13) must be guaranteed.
C sec k = C sec g C sec a > 0 ,
In (13), for the SISO communication system, C sec a is given by (6) and C sec g is given by (11). For the MIMO communication system, C sec a is given by (7) and C sec g is given by (12).
In Figure 2, the dashed line represents the secrecy capacity of AN calculated by (7), and the solid line is the secrecy capacity of SCO−AN calculated by (12). The legitimate channel H and the eavesdropper channel G are Rayleigh fading channels. The signal x k is a complex covector. Figure 2 shows that SCO−AN provides more secrecy capacity than AN does. The noise in H and G are Gaussian white noise. The secrecy capacity increases with higher SNR.

2.4. SCO−AN: Imperfect Channel Estimation

The Gaussian white noise causes the error of channel estimation. The effect of the imperfect channel estimation should be considered.
For the SISO communication system, H e o denotes channel estimation error. The channel state information received by Alice is H ˜ :
H k = H e o + H ˜ ,
The signal received by Bob after adding SCO−AN is:
z k = ( H e o + H ˜ ) s k + ( H e o + H ˜ ) w g + n k ,
For MIMO communication system, H e o denotes channel estimation error. The channel state information received by Alice is H ˜ :
H k = H e o + H ˜ ,
The signal received by Bob after adding SCO−AN is:
z k = ( H e o + H ˜ ) s k + ( H e o + H ˜ ) w g + n k ,
We assume that the channel estimation of G is perfect.
For the SISO communication system, H e o , H ˜ , and Z k are independent. Therefore, H e o Z k 2 = H e o 2 Z k 2 , H ˜ Z k 2 = H ˜ 2 Z k 2 . The lower bound on secrecy capacity after adding SCO−AN under imperfect channel estimation is:
C s e c , e o g = I ( Z ; S ) I ( Y ; S ) = log 1 + H ˜ p k 2 σ u 2 σ n 2 + H e o p k 2 σ u 2 + E H ˜ w g 2 + E H e o w g 2 log 1 + G k p k 2 σ u 2 E | G k w g | 2 + σ e 2 = log 1 + H ˜ p k 2 σ u 2 σ n 2 + H e o p k 2 σ u 2 + H ˜ Z k 2 σ g 2 + H e o Z k 2 σ g 2 log 1 + G k p k 2 σ u 2 G k Z k 2 σ g 2 + σ e 2 = log 1 + H ˜ p k 2 σ u 2 σ n 2 + H e o p k 2 σ u 2 + H ˜ 2 Z k 2 σ g 2 + H e o 2 Z k 2 σ g 2 log 1 + G k p k 2 σ u 2 G k 2 Z k 2 σ g 2 + σ e 2
In (18), we see that the channel estimation error will affect the channel capacity of the legitimate channel. Meanwhile, the secrecy capacity of the wireless communication system is reduced.
For the MIMO system, the lower bound on secrecy capacity after adding SCO−AN under imperfect channel estimation is:
C sec , e o g = I ( Z ; S ) I ( Y ; S ) = log | K H + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) σ u 2 | | K H | log | K G + G k Z k Z k G k σ u 2 | | K G |
In (19), K H = ( ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) ) σ g 2 + I σ n 2 and K G = ( G k Z k Z k G k ) σ g 2 + I σ e 2 .

2.5. Comprison of AN and SCO−AN

The artificial noise must be in the null space of the CSI matrix, this condition makes the artificial noise design very challenging. Artificial noise is the solution of homogeneous linear equations H k w k = 0 . If the rank of the matrix H k is r and the dimension is n × m ( n m ) , only when r < m , the homogeneous linear equation system H k w k = 0 has no solutions, when r = m , the homogeneous linear equations have only zero solutions. In the environment of natural communication, the probability of occurrence of r = m is almost zero, that is to say, in the conditions of natural communication, the design of artificial noise is almost impossible.
For example, in MIMO, when the number of transmitting antennas is less than the number of eavesdropping antennas, artificial noise cannot be designed; when the number of transmitting antennas is equal to the number of eavesdropping antennas, artificial noise can be designed under the condition H = 0 . When the number of transmitting antennas is greater than the number of eavesdropping antennas, artificial noise cannot be designed. This is exactly the opposite of the original intention of AN. AN is designed to solve the condition that the eavesdropping channel must be a weaken version of the legitimate channel.
Therefore, the previous researches discussed some of the characteristics of AN theoretically and ignored its applicability.
For SISO, H k is a constant and w k is a constant as well. If H k W k = 0 has a non-zero solution, H = 0 must be guaranteed. Therefore, AN is not applicable in SISO wireless communication system.
SCO−AN is located in the range space of the legitimate CSI space, so, H k w g 0 .
There are countless non-zero solutions to w g , so we don’t worry about to design w g .
We try to design AN under the condition of Rayleigh fading channels, and carry out a total of 1000 experiments, and all experiments fail. When we try to design SCO−AN, all experiments are successful.
In Table 1, we compare SCO−AN and AN in detail, and briefly summarize the characteristics and applicability of SCO−AN and AN. It can be seen that SCO−AN is better than AN in every aspect.

3. Power Allocation of SCO−AN

The transmission power of the wireless communication system is limited. It is essential to allocate secrecy capacity under limited transmission power.

3.1. Objective Function of Power Allocation

3.1.1. Objective Function of Power Allocation for SISO Communication System

p k 2 = 1 and Z k is a standard orthonormal basis for H k , which means Z k Z k = I for MIMO and Z k Z k = 1 for SISO. We assume that the transmission power is P.
σ g 2 + σ u 2 P .
We use x instead of σ u 2 and y instead of σ g 2 . The initial states of x and y are x 0 and y 0 respectively. For the SISO communication system, the secrecy capacity before power allocation is C s e c 0 . Therefore:
log 1 + H k 2 x 0 σ n 2 + H k 2 y 0 log 1 + G k 2 x 0 G k 2 y 0 + σ e 2 = C s e c 0 .
There are no variables except x 0 and y 0 in (21). The power allocation problem of SCO−AN for SISO is written as:
min log 1 + G k 2 x G k 2 y + σ e 2 log 1 + H k 2 x σ n 2 + H k 2 y s . t . log 1 + H k 2 x σ n 2 + H k 2 y log 1 + G k 2 x G k 2 y + σ e 2 > C s e c 0 log H k 2 x σ n 2 + H k 2 y K x + y P x > 0 y > 0
In (22), a restricted condition log 1 + H k 2 x σ n 2 + H k 2 y log 1 + G k 2 x G k 2 y + σ e 2 > C s e c 0 is added to make sure that the optimal direction is correct. SCO−AN is an extra noise for Bob the receiver as well. K is the minimum signal-to-noise ratio (SNR) for normal communication. We add another restricted condition log 1 + H k 2 x σ n 2 + H k 2 y K to ensure normal communication. The value of K varies among different communication systems.
The objective function in (22) is log 1 + G k 2 x G k 2 y + σ e 2 log 1 + H k 2 x σ n 2 + H k 2 y . The Hessian matrix of the objective function in (22) is not positive definite, so the extremum of the objective function cannot be obtained by the partial derivative method. An improved sequence quadratic program (ISQP) is adopted to optimize power allocation. The basic idea of ISQP is that, at each iterative step, a quadratic programming problem is solved to establish a descent direction, which reduces the value function to obtain compensation. The iterative steps are repeated until the solution of the original problem is obtained.
The Lagrange function of (22) is:
L ( x , y , μ , λ ) = f ( x , y ) μ 1 h 1 ( x , y ) j = 1 , 2 , 3 , 4 λ j g j ( x , y ) ,
where
f ( x , y ) = log 1 + H k 2 x σ n 2 + H k 2 y + log 1 + G k 2 x G k 2 y + σ e 2 g 1 ( x , y ) = log 1 + H k 2 x σ n 2 + H k 2 y log 1 + G k 2 x G k 2 y + σ e 2 C s e c 0 g 2 ( x , y ) = x g 3 ( x , y ) = y g 4 ( x , y ) = log H k 2 x σ n 2 + H k 2 y K h 1 ( x , y ) = x + y P .
For the case of imperfect channel estimation, the initial states of x and y are x 0 and y 0 respectively. The initial secrecy capacity is C s e c e o .
log 1 + H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y log 1 + G k 2 x 0 G k 2 y 0 + σ e 2 = C s e c e o
The power allocation problem of SCO−AN for SISO under imperfect channel estimation is written as:
min log 1 + H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y + log 1 + G k 2 x G k 2 y + σ e 2 s . t . log 1 + H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y log 1 + G k 2 x G k 2 y + σ e 2 > C s e c e o log 1 + H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y K x + y P x > 0 y > 0
The Lagrange function of (26) is:
L ( x , y , μ , λ ) = f ( x , y ) μ 1 h 1 ( x , y ) j = 1 , 2 , 3 , 4 λ j g j ( x , y ) ,
where
f ( x , y ) = log 1 + H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y + log 1 + G k 2 x G k 2 y + σ e 2 g 1 ( x , y ) = log 1 + H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y log 1 + G k 2 x G k 2 y + σ e 2 C s e c e o g 2 ( x , y ) = x g 3 ( x , y ) = y g 4 ( x , y ) = log H ˜ 2 x σ n 2 + H e o 2 x + H ˜ 2 y + H e o 2 y K h 1 ( x , y ) = x + y P ,
The most frequently used methods for channel estimation are least square (LS) channel estimation and minimum mean square error (MMSE) channel estimation.
LS channel estimation is a classic algorithm for non-blind channel estimation. The pilot symbols are used to estimate the channel.
The LS channel estimation is given as:
H ˜ L S = z k ( x k ) 1 .
For the MIMO communication system, the LS channel estimation is:
H e o L S 2 = H H ˜ L S 2 = ( z k n ) x k 1 x k x k 1 2 = n x k 1 2 .
In (30), H e o L S denotes the error of LS channel estimation and H e o L S 2 denotes the second norm of the LS channel estimation error. H e o L S 2 is in proportion to the SNR of the legitimate channel.
For the SISO communication system, the LS channel estimation is:
H e o L S 2 = H H ˜ L S 2 = n x k 1 2 .
For the MIMO communication system, similar to LS estimation, it is easy to obtain (32):
H e o M M S E 2 = H H ˜ MMSE 2 = H R H H ˜ ( R H H + σ n 2 σ x 2 I ) 1 H ˜ L S 2 = H R H H ˜ ( R H H + σ n 2 σ x 2 I ) 1 y k x k 1 2 ,
where H e o M M S E denotes the error of MMSE channel estimation and R AB denotes the cross-correlation matrix of A and B.
For SISO communication system, R A B denotes the cross-correlation coefficient of A and B.
H e o M M S E 2 = H H ˜ M M S E 2 = H R H H ˜ ( R H H + σ e 2 σ x 2 ) 1 H ˜ L S 2 = H R H H ˜ ( R H H + σ n 2 σ x 2 ) 1 y k x k 1 2 .
For the SISO communication system, according to the analysis above, every parameter in (18) except σ g 2 is available. (31) and (33) are applicable conclusions. However, for MIMO communication system, the expansion of matrices is too complex, rendering (30) and (32) inapplicable.

3.1.2. Objective Function of Power Allocation for MIMO Communication System

For the MIMO communication system, the power for each transmission is P 0 , m . Therefore,
σ g 2 + σ u 2 P 0 , m .
The initial secrecy capacity is C s e c 0 , m . For the perfect channel estimation, the initial secrecy capacity is given by:
log I σ n 2 + H k Z k Z k H k x 0 log | G k Z k Z k G k y 0 + I σ e 2 + G k Z k Z k G k x 0 | | G k Z k Z k G k y 0 + I σ e 2 | = C s e c 0 , m .
The power allocation problem of SCO−AN for MIMO is written as:
min log | ( G k Z k Z k G k ) y + I σ e 2 + G k Z k Z k G k x | | ( G k Z k Z k G k ) y + I σ e 2 | log | ( H k Z k Z k H k ) y + I σ n 2 + H k Z k Z k H k x | | ( H k Z k Z k H k ) y + I σ n 2 | s . t . log | ( G k Z k Z k G k ) y + I σ e 2 + G k Z k Z k G k x | | ( G k Z k Z k G k ) y + I σ e 2 | log | ( H k Z k Z k H k ) y + I σ n 2 + H k Z k Z k H k x | | ( H k Z k Z k H k ) y + I σ n 2 | > C s e c 0 , m log | ( H k Z k Z k H k ) y + I σ n 2 + H k Z k Z k H k x | | ( H k Z k Z k H k ) y + I σ n 2 | > K x + y P 0 , m x > 0 y > 0
The Lagrange function of (36) is:
L ( x , y , μ , λ ) = f ( x , y ) μ 1 h 1 ( x , y ) j = 1 , 2 , 3 , 4 λ j g j ( x , y ) ,
where
f ( x , y ) = log | ( G k Z k Z k G k ) y + I σ e 2 + G k Z k Z k G k x | | ( G k Z k Z k G k ) y + I σ e 2 | log | ( H k Z k Z k H k ) y + I σ n 2 + H k Z k Z k H k x | | ( H k Z k Z k H k ) y + I σ n 2 | g 1 ( x , y ) = log | ( H k Z k Z k H k ) y + I σ n 2 + H k Z k Z k H k x | | ( H k Z k Z k H k ) y + I σ n 2 | log | ( G k Z k Z k G k ) y + I σ e 2 + G k Z k Z k G k x | | ( G k Z k Z k G k ) y + I σ e 2 | C s e c 0 , m g 2 ( x , y ) = log | ( H k Z k Z k H k ) y + I σ n 2 + H k Z k Z k H k x | | ( H k Z k Z k H k ) y + I σ n 2 | K g 3 ( x , y ) = x g 4 ( x , y ) = y h 1 ( x , y ) = x + y P 0 , m .
For the imperfect channel estimation, the initial secrecy capacity is C s e c , e o 0 , m . For the imperfect channel estimation, the initial secrecy capacity is given by:
log K H , 0 e o + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x 0 K H , 0 e o log K G + G k Z k Z k G k x 0 K G = C s e c , e o 0 , m ,
In (39), K H , 0 e o = ( ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) ) y 0 + I σ n 2 . We use x instead of σ u 2 , y instead of σ g 2 and the initial states of x and y are x 0 and y 0 respectively.
For the imperfect channel estimation, the power allocation problem of SCO−AN is written as:
min log K H + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x K H log K G + G k Z k Z k G k x K G s . t . log K H + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x K H log K G + G k Z k Z k G k x K G ) > C s e c , e o 0 , m log ( ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) ) y + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x K H K x + y P 0 , m x > 0 y > 0
The Lagrange function of (40) is:
L ( x , y , μ , λ ) = f ( x , y ) μ 1 h 1 ( x , y ) j = 1 , 2 , 3 , 4 λ j g j ( x , y ) ,
where
f ( x , y ) = log K H + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x K H + log K G + G k Z k Z k G k x K G g 1 ( x , y ) = log K H + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x K H log K G + G k Z k Z k G k x K G C s e c , e o 0 , m g 2 ( x , y ) = log ( ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) ) y + ( H e o + H ˜ ) Z k Z k ( H e o + H ˜ ) x K H K g 3 ( x , y ) = x g 4 ( x , y ) = y h 1 ( x , y ) = x + y P 0 , m

3.1.3. Objective Function of Power Allocation for SIMO Communication System with Active Eavesdroppers

In this paper, we discussed the case of the passive eavesdropper. Recently, the proposed pilot spoofing attack technology maked EVE to have the ability to attack Alice. Therefore, we will discuss the influence of active eavesdroppers.As shown in Figure 3, in the SIMO wire-tap communication system, Alice equips with N transmit antenna, N one-antenna receivers (Bobs) equip with N one-antenna Eves. Let P N denotes the pilot symbol. P N is known to Eve, which concurrently send the same pilot in the training phase withe average transmission power P e and Alice has a perfect knowledge of P N . The relevant knowledge [30] of pilot frequency has been introduced in this paper and will not be repeated.
According to ([9]), for the LS estimatior,
h L S = ( K B H K B ) 1 K B H z
where h L S denotes the estimate of h with LS Estimator and K B H = Δ P B A B .
A B = Δ 1 L B a ( θ B , 1 , m ) , a ( θ B , 2 , m ) , , a ( θ B , L B , m )
A B = Δ 1 L B a ( θ B , 1 , m ) , a ( θ B , 2 , m ) , , a ( θ B , L B , m )
a ( θ B , l , m ) = 1 , e j 2 π d λ c cos ( θ B , l , m ) , e j 4 π d λ c cos ( θ B , l , m ) , , e j 2 n π d λ c cos ( θ B , l , m ) T N
L B is the number of paths between the transmitter and Alice.
For the MMSE estimatior,
h M M S E = ( I L B + K B H R d d 1 K B ) 1 K B H R d d 1 z ,
where h M M S E denotes the estimate of h with MMSE Estimator and R d d = Δ K E K E H + σ v 2 I N The power allocation problem of SCO−AN for SIMO with active eavesdropper is written as:
min log K H + ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) x K H log K G + G k Z k Z k G k x K G s . t . log K h + ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) x K H log K G + G k Z k Z k G k x K G ) > C s e c , e o 0 , m log ( ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) ) y + ( h e o + h ˜ ) Z k Z k ( h e o + H ˜ ) x K H K x + y P 0 , m x > 0 y > 0
For SIMO communication system with active eavesdroppers, h e o = h h ˜ in (48). h ˜ denotes h ˜ LS when LS estimator is used and denotes h ˜ MMSE when MMSE estimator is used.
The Lagrange function of (48) is:
L ( x , y , μ , λ ) = f ( x , y ) μ 1 h 1 ( x , y ) j = 1 , 2 , 3 , 4 λ j g j ( x , y ) ,
where
f ( x , y ) = log K H + ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) x K H + log K G + G k Z k Z k G k x K G g 1 ( x , y ) = log K H + ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) x K H log K G + G k Z k Z k G k x K G C s e c , e o 0 , m g 2 ( x , y ) = log ( ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) ) y + ( h e o + h ˜ ) Z k Z k ( h e o + h ˜ ) x K H K g 3 ( x , y ) = x g 4 ( x , y ) = y h 1 ( x , y ) = x + y P 0 , m
The power allocation problems of SCO−AN with perfect channel estimation, imperfect channel and active eavesdropper are similar. Therefore, we use the same algorithm to solve the problem.

3.2. SQP and ISQP Algorithm

μ and λ are Lagrange multipliers. To optimize the problems above, the following conditions must be satisfied:
L X x = x = 0 ( a ) λ j 0 , ( b ) u k 0 , ( c ) u k g k ( x ) = 0 , ( d ) h i ( x ) = 0 i = 1 ( e ) g j ( x ) = 0 , j = 1 , 2 , 3 , 4 ( f )
(51) are Karush-Kuhn-Tucker conditions (KKT conditions). (a) is a necessary condition when the extreme value of Lagrange function is taken; (b) is a Lagrange coefficient constraint; (c) is an inequality constraint case; (d) is the complementary relaxation condition; (e) and (f) are the original constraints.
The KKT condition is a necessary condition for the optimal solution.
Condition (c) constructs the L ( x , λ , μ ) function and the condition L ( x , λ , μ ) f ( x ) should be satisfied. In L ( x , λ , μ ) , μ is 0, so λ is less than or equal to 0.
A quadratic polynomial is used to approximate f ( x , y ) . By expanding the quadratic polynomial into a positive definite quadratic form, the following quadratic programming subproblem is obtained:
min 1 2 d T B k d + f ( x k , y k ) T d s . t h ( x k , y k ) + A k ε d = 0 g ( x k , y k ) + A k Γ d 0 ,
where A k ε = h ( x k , y k ) , A k Γ = g ( x k , y k ) , t k is a positive definite matrix, and d k is optimal solution of quadratic programming subproblems.
Let x denote the KKT point of the optimization constraint problem and λ , μ 0 be its corresponding Lagrange multiplier vectors. For x , the following conditions should be satisfied:
  • The Jacobi matrix of L ( x , λ , μ ) is row full rank.
  • The strict complementary relaxation condition should be satisfied; that is, g i ( x ) 0 , λ i 0 , g i ( x ) λ i = 0 , and g i ( x ) + λ i > 0 .
  • A sufficient second-order optimality condition should be satisfied, that is, for any vector d 0 that satisfies A ( x ) d = 0 , the following condition is satisfied:
    d T B ( x , y , μ , λ ) d > 0 ,
    where B ( x , y , μ , λ ) is a positive definite matrix, at the beginning of the iteration, B ( x , y , μ , λ ) is usually set as the identity matrix.
If ( x k , y k , μ k , λ k ) is close to ( x , y , μ , λ ) sufficiently, the quadratic programming sub-problem of (53) has a local minimum point d . The corresponding effective constraint index set is the same as the effective constraint index set of the original problem at ( x , y ). Using the KKT conditions, (52) is equivalent to:
H 1 ( d , μ , λ ) = B k ( A k ε ) T μ ( A k Γ ) T λ + f ( x k , y k ) ,
H 2 ( d , μ , λ ) = h ( x k , y k ) + ( A k ε ) T d ,
λ 0 , g ( x k , y k ) + A k Γ d 0 , λ [ g ( x k , y k ) + A k Γ d ] = 0 ,
Note that Formula (20) and (23) are linear complementarity problems. We define smooth FB-function:
φ ( ε , a , b ) = a + b a 2 + b 2 + 2 ε 2 ,
where ε > 0 is a smooth parameter, and
Φ ( ε , d , λ ) = ( φ 1 ( ε , d , λ ) , φ 2 ( ε , d , λ ) φ m ( ε , d , λ ) ) T ,
in (32),
φ i ( ε , d , λ ) = λ i + [ g i ( x k , y k ) + ( A k Γ ) i d ] λ i 2 + [ g i ( x k , y k ) + ( A k Γ ) i d ] 2 + 2 ε 2 ,
where ( A k Γ ) i is the i-th row of A k Γ . (18) and (19), (21) and (22) are equivalent to
H ( z ) : = H ( ε , d , μ , λ ) = ε H 1 ( d , μ , λ ) H 2 ( d , μ , λ ) Φ ( ε , d , λ ) = 0 ,
The Jacobian matrix of ( H z ) is
H ( z ) = 1 0 0 0 0 B k ( A k ε ) T ( A k Γ ) H 0 A k ε 0 0 ν D 2 ( z ) A k Γ 0 D 1 ( z ) ,
where ν = ε Φ ( ε , d , λ ) = ( ν 1 , ν 2 , , ν m ) T and
ν i = 2 ε λ i 2 + [ g i ( x k , y k ) + ( A k Γ ) i d ] 2 + 2 ε 2 ,
D 1 ( z ) = d i a g ( a 1 ( z ) , a 2 ( z ) , , a m ( z ) ) , D 2 ( z ) = d i a g ( b 1 ( z ) , b 2 ( z ) , , b m ( z ) ) ,
where
a i ( z ) = 1 λ i λ i 2 + [ g i ( x k , y k ) + ( A k Γ ) i d ] 2 + 2 ε 2 , b i ( z ) = 1 g i ( x k , y k ) + ( A k Γ ) i d λ i 2 + [ g i ( x k , y k ) + ( A k Γ ) i d ] 2 + 2 ε 2 ,
here, we make γ ( 0 , 1 ) and a non-negative functions ψ ( z ) is
ψ ( z ) = γ H ( z ) min { 1 , H ( z ) } .
Sequence quadratic program (SQP) is an iterative algorithm, the basic idea of SQP is to apply approximate Newton method to the first-order optimality condition of constrained optimization problem. In each iteration step, a quadratic programming problem with the quadratic approximation of Lagrange function as the objective function and the linearization of the original constraint as the constraint condition are solved.
The full SQP is shown as follows:
Algorithm 1 SQP
  • Step 0: Set β = 0.5 , σ = 0.2 , ε = 1 × 10 6 , the initial vector d 0 = ( 1 , 1 , 1 ) T , μ 0 = 0 , λ 0 = ( 0 , 0 , 0 ) T , z 0 = ( ε 0 , d 0 , μ 0 , λ 0 ) , z ¯ 0 = ( ε 0 , 0 , 0 , 0 ) , i = 0
  • Step 1: If H ( z i ) 0 , stop iteration, else, ψ i = ψ ( z i ) , ψ i is shown in (37), H ( z i ) is shown in (32).
  • Step 2: Solve the equations H ( z i ) + H ( z i ) Δ z i = ψ z ¯ 0 and then get the solution of the equations: Δ z i = ( Δ ε i , Δ d i , Δ μ i , Δ λ i )
  • Step 3: Let m be the smallest non-negative integer m that satisfies the following inequality:
    H ( z i + β m Δ z i ) [ 1 σ ( 1 γ ε 0 ) β m ) ] H ( z i ) where α i = ρ m i , z i + 1 = z i + α i Δ z i
  • Step 4: i = i + 1 , go to step1
We adopt a improved sequence quadratic program (ISQP) which is based on improvements from sequence quadratic program. At the beginning of the iteration, the initial matrix in (52), B ( x , μ , λ ) is set as the identity matrix in ISQP. In SQP, the initial matrix is designed as W ( x , y , u , λ ) = 2 ( f ( x , y ) ) i = 1 l u i × 2 ( h i ( x , y ) ) i = 1 m λ i × 2 ( g i ( x , y ) ) , 2 ( ) denotes the Hessian matrix of ( ) . A second order partial derivative should be calculated in each iteration of SQP. The complexity of W ( x , y , u , λ ) = 2 ( f ( x , y ) ) i = 1 l u i × 2 ( h i ( x , y ) ) i = 1 m λ i × 2 ( g i ( x , y ) ) trivially is much larger than that of B ( x , y , μ , λ ) .

3.3. Complexity Analysis

In this section, we assert the superiority of ISQP by comparing the complexity of the three algorithms: ISQP, SQP, BPA and COCOA [31]. ISQP and SQP have been introduced in detail in previous sections. The BPA algorithm is a traversal algorithm which searches all directions in each iteration and then selects the best direction. The complexity of BPA algorithm is high and the search direction is greatly affected by the step size. BPA is also likely to search in the wrong direction. The complexity of ISQP, SQP, and BPA are shown as follows. The change of angle for BPA is set as 5 so 36 rounds of calculation are needed for just one iteration. The entries in the tables indicate the calculated amount required for one iteration.
In Table 2, Table 3, Table 4 and Table 5, N H 1 denotes derivative of g 1 ( x , y ) , and N H 2 denotes derivative of g 2 ( x , y ) . The amounts of computation for derivative of g 1 ( x , y ) in SISO and MIMO are different, so we use N H 1 in place of the amounts of computation for derivative of g 1 ( x , y ) . Similarly, N f 1 denotes derivative of the objective function, and N f 2 denotes second derivative of the objective function. Four times of calculation are needed for the second second derivative of the objective function. The objective function is a composite function, so N f 2 is much larger than N f 1 .

4. Simulation Results

4.1. Simulation Environment and Discussion

In the simulation experiment for the MIMO communication system, there are two transmitting antennas, two receiving antennas, and two eavesdropping antennas, i.e., N A = N B = N E = 2 . H and G are 2 × 2 Rayleigh fading channels. The distributions of H and G both have a mean value of 0 and a variance of 0.5. The information-bearing signals are random complex vectors. The transmission power is 10 (i.e., P = 10 ). The Gaussian noise in the channel changes with the SNR. The SNR of H increases from 0 to 30, while the SNR of G is 5 dB. All Parameters are shown in Table 6.
For the SISO communication system, N A = N R = N E = 1 by definition. The information-bearing signals are a random complex number. The SNR of H increases from 0 to 30, while the SNR of G is 5 dB and P = 10 .

4.2. Numerical Simulation and Discussion

Table 7 shows the increase of secrecy capacity after one iteration for SISO under perfect channel estimation. The base value of the iteration step is β = 0.5 . The imperfect channel estimation is not considered here. The secrecy capacity increases the most after one iteration of ISQP, followed closely by SQP. The secrecy capacity of the BPA algorithm has the least increase. The COCOA algorithm, another typical iterative algorithm, is also compared in Table 7 and Table 8.
Table 8 shows the complexity comparison of algorithms for SISO under the perfect channel estimation. BPA leads to the largest calculated amount of computation and the worst optimization result. Such poor performance is owing to the lack of clear search directions for BPA. On the contrary, ISQP has the smallest calculated amount of computation and the best optimization result due to the simplicity of the initial matrix.
According to Table 7 and Table 8, the optimization performance of ISQP is similar to that of SQP. However, ISQP requires much less computation. Therefore, we conclude that ISQP is a more effective and thus more desirable algorithm. ISQP and SQP requires fewer iterations than COCOA when ε = 1 × 10 6 . The expression ε = 1 × 10 6 refers to the two-norm of the gradient rate for BPA and COCOA. Again, BPA requires the most iterations.
Table 9, Table 10 and Table 11 show the influence of the initial point on the optimization of secrecy capacity. The results are similar across different algorithms. The even distribution of transmission between information-bearing and SCO−AN seems to be the optimal distribution scheme. This result paves the way to an exciting field for future research.
Figure 4 shows the performance comparison of different algorithms. Figure 4 contains four subfigures, each showing a similar trend in the results. Subfigure (a) shows the optimization performance of SISO under perfect channel estimation versus different SNR. Subfigure (b) shows the optimization performance of SISO under imperfect channel estimation versus different SNR. Subfigure (c) shows the optimization performance of MIMO under perfect channel estimation versus different SNR. Subfigure (d) shows the optimization performance of MIMO under imperfect channel estimation versus different SNR. According to Section 3, BPA requires the most computation and has the worst optimization performance. While SQP and ISQP have similar performance, SQP requires 15 % more calculated amounts than ISQP. The optimization performance of COCOA is slightly better than that of BPA, but COCOA is not an excellent iterative algorithm due to the lack of efficacy.
Figure 5 shows SCO−AN’s secrecy capacity with and without allocation versus different SNR. The effects of perfect and imperfect channel estimation are also considered. The SNR of H increases from 2 to 30, while the SNR of G is 5 dB. ISQP allocates all the transmission power. In this figure, the solid line shows the lower bound on optimized secrecy capacity. The dashed line shows the lower bound on secrecy capacity without power allocation. The results in Figure 5 are computed according to (6) and (12), and the ISQP algorithm. The results show that the lower bound on secrecy capacity increases with power allocation, implying the high effectiveness of the ISQP algorithm. The secrecy capacity increases with SNR for H ; that is, a low noise level improves secrecy capacity. The lower bound on the secrecy capacity of SCO−AN decreases when the effect of imperfect channel estimation is taken into consideration. The lower bound on the secrecy capacity with MMSE channel estimation is greater than the lower bound on that with LS channel estimation. We then reach that the higher channel estimation accuracy enhances secrecy capacity.
Figure 6 shows SCO−AN’s secrecy capacity with and without active eavesdropper versus different SNR. The effects of different kinds of channel estimation are also considered. The SNR of H increases from 2 to 30, while the SNR of G is 5 dB. ISQP allocates all the transmission power. In this figure, the solid line shows the lower bound on optimized secrecy capacity. The results in Figure 6 are computed according to (43), (47) and (48) and the ISQP algorithm. The results show that the lower bound on secrecy capacity increases with power allocation, implying the high effectiveness of the ISQP algorithm. The secrecy capacity increases with SNR for H ; that is, a low noise level improves secrecy capacity. The lower bound on the secrecy capacity of SCO−AN decreases when the effect of active eavesdropper is taken into consideration. The lower bound on the secrecy capacity with MMSE channel estimation is greater than the lower bound on that with LS channel estimation.
Figure 7 shows SCO−AN’s secrecy capacity with active eavesdropper versus different P E . The effects of different kinds of channel estimation are also considered. The power of P E increases from 1 to 10, while the P B is unchanged. ISQP allocates all the transmission power. The results show that the lower bound on secrecy capacity increases with power allocation, implying the high effectiveness of the ISQP algorithm. The secrecy capacity decreases with P E ; that is, a low P E improves secrecy capacity. The lower bound on the secrecy capacity with MMSE channel estimation is greater than the lower bound on that with LS channel estimation.

5. Conclusions and Future Work

In this paper, we study the power allocation problems of SCO−AN under perfect and imperfect CSI. First, the power allocation model of SCO−AN with perfect channel estimation is constructed. Then, the effect of the imperfect channel estimation error is examined. The power allocation model of SCO−AN is constructed for the first time in this paper, along with the expression of the imperfect channel estimation’s effect on power allocation. The power allocation optimization problem is a crucial contribution to optimizing secrecy capacity under imperfect channel estimation. The power allocation problem’s objective function is non-convex, which poses challenges to the solving process. Therefore, we solve this problem by adopting the ISQP algorithm. We compare ISQP with the other three algorithms–SQP, BPA, and COCOA. Although ISQP is slightly worse than SQP in terms of the optimization effect, the ISQP algorithm far exceeds other algorithms. Moreover, ISQP requires the least complex computation. Therefore, we decide to choose the ISQP algorithm. Our simulation results show that the secrecy capacity of SCO−AN wireless communication system increases the most under ISQP algorithm. We then conclude that the ISQP algorithm is the most effective for this purpose.
There is much room for future research. For any optimization problem, there is an upper bound to be reached. What is the upper bound on secrecy capacity for SCO−AN under a specific power? This question lays an exciting background for future research directions. Since 2019, the research on the physical layer security of reflective intelligence surfaces has become a research hotspot. The application of SCO−AN in intelligent reflector technology is one of our future research contents as well. As inspired by many papers, the features of mixing other SCO−AN signals also pose a meaningful research question, such as SCO−AN with interference alignment characteristics and SCO−AN with channel coding characteristics. Among these proposed topics for future studies, we will first study the secrecy capacity’s upper bound of SCO−AN.

Author Contributions

Y.G. proposed the framework of the whole algorithm. B.H. handled all the simulations and made all figures and tables in the manuscript. Z.W. was a major contributor in writing the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The research in this article is supported by “the National Natural Science Foundation of China” Grant nos. 61571167, 61471142, 61102084 and 61601145).

Institutional Review Board Statement

The study was conducted according to the guidelines of the Declaration of Helsinki, and approved by the Institutional Review Board (or Ethics Committee) of NAME OF INSTITUTE (protocol code XXX and date of approval.)

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Conflicts of Interest

The authors declear that they have no competing interests.

Abbreviations

ANArtificial Noise
SCO−ANSecrecy Capacity Optimization Artificial Noise
GANGlobal Artificial Noise
MIMOMultiple-Input Multiple-Output
SQPSequence Quadratic Program
CSIChannel State Information
KKTKarush–Kuhn–Tucker
SNRSignal-to-Noise Ratio

References

  1. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 142–149. [Google Scholar] [CrossRef]
  2. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Csiszar, I.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 2003, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  4. Negi, R.; Goel, S. Secret communication using artificial noise. In Proceedings of the IEEE Vehicular Technology Conference, Dallas, TX, USA, 25–28 September 2005. [Google Scholar]
  5. Goel, S.; Negi, R. Secret communication in presence of colluding eavesdroppers. In Proceedings of the IEEE Military Communications Conference, Atlantic City, NJ, USA, 17–19 November 2005. [Google Scholar]
  6. Dreschler, W.A.; Verschuure, H.; Ludvigsen, C.; Westermann, S. Icra noises: Artificial noise signals with speech-like spectral and temporal properties for hearing instrument assessment. Int. Audiol. 2001, 40, 148–157. [Google Scholar] [CrossRef]
  7. Goeckel, D.; Vasudevan, S.; Towsley, D.; Adams, S.; Ding, Z.; Leung, K. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE J. Sel. Areas Commun. 2001, 29, 2067–2076. [Google Scholar] [CrossRef]
  8. Rezki, Z.; Ashish, K.; Mohamed, A. On the secrecy capacity of the wiretap channel with imperfect main channel estimation. IEEE Trans. Commun. 2014, 62, 3652–3664. [Google Scholar] [CrossRef] [Green Version]
  9. Darsena, D.; Gelli, G.; Iudice, I.; Verde, F. Design and performance analysis of channel estimators under pilot spoofing attacks in multiple-antenna systems. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3255–3269. [Google Scholar] [CrossRef]
  10. Zhou, X.; Maham, B.; Hjorungnes, A. Pilot contamination for active eavesdropping. IEEE Trans. Wirel. Commun. 2012, 11, 903–907. [Google Scholar] [CrossRef]
  11. Tugnait, J.K. Pilot spoofing attack detection and countermeasure. IEEE Trans. Commun. 2018, 66, 2093–2106. [Google Scholar] [CrossRef]
  12. Wang, H.M.; Huang, K.W.; Tsiftsis, T.A. Multiple antennas secure transmission under pilot spoofing and jamming attack. IEEE J. Sel. Areas Commun. 2018, 36, 860–876. [Google Scholar] [CrossRef] [Green Version]
  13. Zhou, X.Y.; Matthew, R.M. Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Trans. Veh. Technol. 2010, 59, 3831–3842. [Google Scholar] [CrossRef] [Green Version]
  14. Ciuonzo, D.; Augusto, A.; Vincenzo, C. Rician MIMO channel-and jamming-aware decision fusion. IEEE Trans. Signal Process. 2017, 65, 3866–3880. [Google Scholar] [CrossRef] [Green Version]
  15. Cui, M.; Zhang, G.; Zhang, R. Secure wireless communication via intelligent reflecting surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar] [CrossRef] [Green Version]
  16. Zhou, F.; Chu, Z.; Sun, H.; Hu, R.Q.; Hanzo, L. Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT. IEEE J. Sel. Areas Commun. 2018, 36, 918–931. [Google Scholar] [CrossRef]
  17. Jiang, Y.; Zou, Y.; Guo, H.; Zhu, J.; Gu, J. Power allocation for intelligent interference exploitation aided physical-layer security in ofdm-based heterogeneous cellular networks. IEEE Trans. Veh. Technol. 2020, 69, 3021–3033. [Google Scholar] [CrossRef]
  18. Zhao, N.; Yu, F.R.; Li, M.; Leung, V.C. Anti-eavesdropping schemes for interference alignment (IA)-based wireless networks. IEEE Trans. Wirel. Commun. 2016, 15, 5719–5732. [Google Scholar] [CrossRef]
  19. Cao, Y.; Zhao, N.; Yu, F.R.; Chen, Y.; Liu, X.; Leung, V.C. An anti-eavesdropping interference alignment scheme with wireless power transfer. In Proceedings of the IEEE International Conference on Communication Systems (ICCS), Shenzhen, China, 14–16 December 2016. [Google Scholar]
  20. Wei, L.; Mounir, G.; Bin, C. Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis. IEEE Commun. Lett. 2012, 16, 1628–1631. [Google Scholar]
  21. Bai, J.; Dong, T.; Zhang, Q.; Wang, S.; Li, N. Coordinated Beamforming and Artificial Noise in the Downlink Secure Multi-Cell MIMO Systems Under Imperfect CSI. IEEE Wirel. Commun. Lett. 2020, 9, 1023–1026. [Google Scholar] [CrossRef]
  22. Liao, W.C.; Chang, T.H.; Ma, W.K.; Chi, C.Y. Qos-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Trans. Signal Process. 2011, 59, 1202–1216. [Google Scholar] [CrossRef]
  23. Hong, S.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. Artificial-noise-aided secure MIMO wireless communications via intelligent reflecting surface. IEEE Trans. Commun. 2020, 68, 7851–7866. [Google Scholar] [CrossRef]
  24. Zhang, X.; Guo, D.; An, K.; Ma, W.; Guo, K. Secure transmission and power allocation in multiuser distributed massive MIMO systems. Wirel. Netw. 2020, 26, 941–954. [Google Scholar] [CrossRef]
  25. Ding, Q.; Xi, T.; Lian, Y. Joint Power Allocation Scheme for Distributed Secure Spatial Modulation in High-Speed Railway. IEEE Syst. J. 2020. [Google Scholar] [CrossRef]
  26. Niu, H.; Lei, X.; Xiao, Y.; Liu, D.; Li, Y.; Zhang, H. Power Minimization in Artificial Noise Aided Generalized Spatial Modulation. IEEE Commun. Lett. 2020, 24, 961–965. [Google Scholar] [CrossRef]
  27. Meng, L.; Wang, Q.; Ji, Z.; Nie, M.; Ji, B.; Li, C.; Song, K. Resource allocation on secrecy energy efficiency for C-RAN with artificial noise. Wirel. Netw. 2020, 26, 639–650. [Google Scholar] [CrossRef]
  28. Singh, P.; Trivedi, A. NOMA and massive MIMO assisted physical layer security using artificial noise precoding. Phys. Commun. 2020, 39, 100977. [Google Scholar] [CrossRef]
  29. Gu, Y.; Wu, Z.; Yin, Z.; Zhang, X. The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System. IEEE Access 2019, 7, 58353–58360. [Google Scholar]
  30. Mo, D.; Duarte, M.F. Multi-Branch Binary Modulation Sequences for Interferer Rejection. In Proceedings of the IEEE Statistical Signal Processing Workshop (SSP), Freiburg, Germany, 10–13 June 2018. [Google Scholar]
  31. Bidabadi, S.; Omidi, M.J.; Kazemi, J. Energy efficient power allocation in downlink OFDMA systems using SQP method. In Proceedings of the Iranian Conference on Electrical Engineering, Shiraz, Iran, 10–12 May 2016. [Google Scholar]
Figure 1. Wireless communication model with eavesdropper.
Figure 1. Wireless communication model with eavesdropper.
Applsci 11 04558 g001
Figure 2. Secrecy capacity comparison of the AN and SCO−AN versus different SNR.
Figure 2. Secrecy capacity comparison of the AN and SCO−AN versus different SNR.
Applsci 11 04558 g002
Figure 3. Single-antenna eavesdroppers launch pilot spoofing attack.
Figure 3. Single-antenna eavesdroppers launch pilot spoofing attack.
Applsci 11 04558 g003
Figure 4. Comparison of Optimization Performance under Perfect and Imperfect Channel Estimation versus Different SNR.
Figure 4. Comparison of Optimization Performance under Perfect and Imperfect Channel Estimation versus Different SNR.
Applsci 11 04558 g004
Figure 5. SCO−AN’s Secrecy Capacity Before and After Power Allocation versus Different SNR and Channel Estimation Algorithm.
Figure 5. SCO−AN’s Secrecy Capacity Before and After Power Allocation versus Different SNR and Channel Estimation Algorithm.
Applsci 11 04558 g005
Figure 6. SCO−AN’s Secrecy Capacity Before and After Power Allocation versus Different SNR and Channel Estimation Algorithm with and without active eavesdropper.
Figure 6. SCO−AN’s Secrecy Capacity Before and After Power Allocation versus Different SNR and Channel Estimation Algorithm with and without active eavesdropper.
Applsci 11 04558 g006
Figure 7. SCO−AN’s Secrecy Capacity Before and After Power Allocation versus Different P E and Channel Estimation Algorithm.
Figure 7. SCO−AN’s Secrecy Capacity Before and After Power Allocation versus Different P E and Channel Estimation Algorithm.
Applsci 11 04558 g007
Table 1. Comprison of AN and SCO−AN.
Table 1. Comprison of AN and SCO−AN.
MethodDesign DifficultySecrecy Capacity ImprovementApplicationConnection with HConnection with G
ANtoughnormalnormalin null spacein range space
SCO−ANeasygoodgoodin range spacein range space
Table 2. Complexity Analysis for SISO under Perfect Channel Estimation.
Table 2. Complexity Analysis for SISO under Perfect Channel Estimation.
AlgorithmComplexity for Each Iteration
ISQP 16 ( N H 1 + N H 2 ) + N f 1 + 137
SQP122 + 16 ( N H 1 + N H 2 ) + N f 1 + N f 2
BPA36 N f 2 + 144
Table 3. Complexity Analysis for SISO under Imperfect Channel Estimation.
Table 3. Complexity Analysis for SISO under Imperfect Channel Estimation.
AlgorithmComplexity for Each Iteration
ISQP16 ( N H 1 + N H 2 ) + N f 1 + 186
SQP157 + 16 ( N H 1 + N H 2 ) + N f 1 + N f 2
BPA36 N f 2 + 186
Table 4. Complexity Analysis for MIMO under Perfect Channel Estimation.
Table 4. Complexity Analysis for MIMO under Perfect Channel Estimation.
AlgorithmComplexity for Each Iteration
ISQP16 ( N H 1 + N H 2 ) + N f 1 + 167
SQP142 + 16 ( N H 1 + N H 2 ) + N f 1 + N f 2
BPA36 N f 2 + 166
Table 5. Complexity Analysis for MIMO under Imperfect Channel Estimation.
Table 5. Complexity Analysis for MIMO under Imperfect Channel Estimation.
AlgorithmComplexity for Each Iteration
ISQP16 ( N H 1 + N H 2 ) + N f 1 + 216
SQP192 + 16 ( N H 1 + N H 2 ) + N f 1 + N f 2
BPA36 N f 2 + 234
Table 6. Simulation Parameters for MIMO.
Table 6. Simulation Parameters for MIMO.
ParameterValue
Number of Transmitting Antennas2
Number of Receiving Antennas2
Number of Eavesdropping Antennas2
Transmission Power10
Mean of Channel H and G 0
Variance of Channel H and G 0.5
Table 7. Secrecy Capacity Comparison for SISO under Perfect Channel Estimation.
Table 7. Secrecy Capacity Comparison for SISO under Perfect Channel Estimation.
AlgorithmIntial Secrecy CapacityOptimized Secrecy Capacity ( β = 0.5 , One Step)
ISQP0.36430.4243
SQP0.36430.4256
BPA0.36430.3821
COCOA0.36430.4109
Table 8. Complexity Comparison for SISO under Perfect Channel Estimation.
Table 8. Complexity Comparison for SISO under Perfect Channel Estimation.
AlgorithmAmount of Computation for Each IterationNumber of Iterations
ISQP7325
SQP8975
BPA662413
COCOA9337
Table 9. Influence of the Initial Point on Secrecy Capacity (ISQP).
Table 9. Influence of the Initial Point on Secrecy Capacity (ISQP).
Algorithm( x 0 , y 0 )Intial Secrecy CapacityOptimized Secrecy Capacity
ISQP(5, 5)0.56120.6312
ISQP(3, 7)0.47850.5322
ISQP(1, 9)0.38210.4329
Table 10. Influence of the Initial Point on Secrecy Capacity (SQP).
Table 10. Influence of the Initial Point on Secrecy Capacity (SQP).
Algorithm( x 0 , y 0 )Intial Secrecy CapacityOptimized Secrecy Capacity
SQP(5, 5)0.56120.6375
SQP(3, 7)0.47850.5364
SQP(1, 9)0.38210.4357
Table 11. Influence of the Initial Point on Secrecy Capacity (BPA).
Table 11. Influence of the Initial Point on Secrecy Capacity (BPA).
Algorithm( x 0 , y 0 )Intial Secrecy CapacityOptimized Secrecy Capacity
BPA(5, 5)0.56120.5924
BPA(3, 7)0.47850.4922
BPA(1, 9)0.38210.4012
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gu, Y.; Huang, B.; Wu, Z. Power Allocation for Secrecy-Capacity-Optimization-Artificial-Noise Secure MIMO Precoding Systems under Perfect and Imperfect Channel State Information. Appl. Sci. 2021, 11, 4558. https://doi.org/10.3390/app11104558

AMA Style

Gu Y, Huang B, Wu Z. Power Allocation for Secrecy-Capacity-Optimization-Artificial-Noise Secure MIMO Precoding Systems under Perfect and Imperfect Channel State Information. Applied Sciences. 2021; 11(10):4558. https://doi.org/10.3390/app11104558

Chicago/Turabian Style

Gu, Yebo, Bowen Huang, and Zhilu Wu. 2021. "Power Allocation for Secrecy-Capacity-Optimization-Artificial-Noise Secure MIMO Precoding Systems under Perfect and Imperfect Channel State Information" Applied Sciences 11, no. 10: 4558. https://doi.org/10.3390/app11104558

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop