On the Secrecy Sum-Rate of Internet of Things Networks: Scheduling and Power Control †

: Physical-layer security (PLS) has attracted much attention in wireless communications and has been considered one of the main candidates for enhancing wireless security in future 6G networks. Recent studies in the PLS area have focused on investigating and analyzing the characteristics of secure transmissions in multiuser networks (e.g., the massive number of Internet of Things (IoT) devices in 6G networks). Due to the difficulty of obtaining the exact secrecy capacity region in wireless multiuser networks, several alternative methods are used to characterize the secrecy performance of multiuser networks. For example, we can analyze the secrecy sum-rate scaling in terms of the number of users based on multiuser diversity (MUD). In this paper, we propose an opportunistic user scheduling scheme that achieves optimal MUD gain, combined with a power control mechanism for reducing information leakage to multiple eavesdroppers in wireless networks. The proposed scheme considers multiuser transmissions in one scheduling time slot by adopting orthogonal random beamforming at the receiver to exploit the full degrees-of-freedom gain with an assumption that each user (or IoT device) is equipped with a single antenna, and base station and eavesdroppers have multiple antennas. The main contribution of this paper is to derive the analytic result of the achievable secrecy sum-rate scaling in a high signal-to-noise ratio (SNR) regime. We evaluate the performance of the proposed scheduling scheme with a power control mechanism through simulations with both internal and external eavesdropping scenarios. We further discuss the extensibility of our analysis to various applications such as satellite communications and IoT networks.


Introduction
The 6G networks have been expected to lead a significant leap forward in massive Internet-of-Things (IoT) connectivity [1].With enhanced requirements such as extremely high data rates, extremely low latency, and always-on broadband global network coverage, 6G is poised to revolutionize the current mobile networks including IoT applications [2].
In the 6G era, information security has become more important than ever [3].However, unfortunately, wireless communication systems are prone to eavesdropping attacks due to the broadcasting nature of radio signals.Traditionally, for information protection, an encryption/decryption such as AES (Advanced Encryption Standard) has been generally used in upper layers (e.g., transport layer) in wireless communication systems.Recently, the notion of achieving information theoretic secrecy in wireless networks, so-called physicallayer security (PLS), has attracted much attention.The physical-layer security exploits the randomness of the wireless channel, instead of using computational hardness commonly used in conventional cryptographic approaches, to guarantee confidentiality [4].Further, the PLS technologies have been considered as one of the possible candidates for the nextgeneration 6G communication systems [3].
The fundamental notions of physical-layer security have been established by Shannon [5] and Wyner [6].Since then, there have been many efforts to investigate informationtheoretic secrecy at the physical-layer in wireless communication systems [7][8][9][10][11][12].Among many topics related to physical-layer security, we seek to investigate characteristics of secure transmissions in wireless multiuser networks (e.g., the massive number of IoT devices in the networks).Specifically, we focus on analyzing the characteristics of the secrecy rate, which is one of the challenging problems when we consider wireless multiuser wiretap networks.There have been several studies which investigate various aspects of the secrecy rate in multiuser wiretap networks, such as secure degrees-of-freedom [13,14], secrecy diversity [15][16][17][18], and secrecy rate scaling [19][20][21][22][23].
Koyluoglu et al. investigated secure degrees-of-freedom (DoF) under two distinct models, namely the interference channel with confidential messages and the interference channel with an external eavesdropper [13].Xie and Ulukus further studied secure DoF regions of the multiple access channel and the multiuser interference channel under several secrecy constraints [14].Like the notion of DoF is readily modified to the secure DoF, secrecy diversity order, similar to the definition of traditional diversity order, is a notion to indicate diversity gain when we consider the secrecy outage probability, and it has been investigated from various perspectives [15][16][17][18].
Chae et al. investigated secrecy outage probability in multiple-input and multipleouput (MIMO) wiretap channels [15].Particularly, Zou et al. investigated the effects of various user scheduling schemes on secrecy diversity order, in terms of intercept probability and secrecy outage probability, considering multiple users in cognitive radio networks, respectively, [16,17].In other words, multiuser diversity (MUD), i.e., the number of users, can contribute to enhancing secrecy in wireless networks.Differently from [16,17], authors of [19][20][21][22][23] investigated opportunistically exploiting multiple users in networks to achieve optimal MUD gain in terms of secrecy rate scaling.Jin et al. first introduced the notion of secrecy rate scaling in terms of the number of users to characterize the secrecy rate in a single-cell environment, instead of the exact secrecy rate analysis impossible at most of the multiuser network settings [19].Subsequently, the secrecy rate scaling has been analyzed in various network environments such as multi-cell [20], multiple receive antenna [21,22], and artificial noise [23] settings.Further, secrecy rate scaling has been investigated combined with recent advanced techniques such as reconfigurable intelligent surface and massive MIMO with one-bit feedback [24,25].The authors of [24] derived the ergodic secrecy rate of a RIS-assisted communication system against multiple eavesdroppers.Both non-colluding and colluding scenarios were investigated and finally scaling law in terms of the number of RIS elements was analyzed.Teeti investigated the impact of the power-scaling law on the secrecy rate when the massive MIMO with one-bit feedback is considered [25].
Interestingly, in multiuser networks, instead of single user transmission in one time slot, multiuser transmissions in one time slot can be exploited to achieve full degrees-offreedom gain from the perspective of the system.It still remains one of the open issues to study multiuser transmissions in terms of secrecy sum-rate scaling with respect to the number of users in the system whereas there have been several studies on multiuser transmissions in conventional network settings without eavesdroppers.Adopting multiple antennas at the receiver requires a proper post-processing technique such as zero-forcing or minimum-mean-square-estimation (MMSE) receivers [26,27].In multiuser networks, orthogonal random beamforming [28] is also widely used for multiuser transmissions since it achieves the optimal rate scaling by fully exploiting MUD gain.In wireless secure communications, orthogonal random beamforming was utilized with opportunistic scheduling to improve the secrecy performance [29].The authors of [29] considered downlink multiuser networks (i.e., broadcast channel) since orthogonal random beamforming was originally proposed for a transmitter.According to the uplink (i.e., multiple access channel) and downlink duality, orthogonal random beamforming can also be applied at the receiver.Analyzing the sum-rate scaling in uplink networks was previously investigated in [30] by adopting orthogonal random beamforming at receivers in conventional wireless multiuser networks.However, to the best of our knowledge, it is the first trial to study the secrecy sum-rate scaling in wireless multiuser uplink networks where independent multiple eavesdroppers exist.Thus, studying wireless secure communications by adopting orthogonal random beamforming at receiver represents an interesting problem.
The development of 6G networks promises many opportunities and advancements.One of the main features of 6G networks is the massive number of devices and enhanced security and privacy protection.Accordingly, in this paper, we tackle a PLS problem considering wireless multiuser networks which consist of N transmitters (users or IoT devices), a single desired receiver (base station), and M eavesdroppers.To be specific, we characterizes the asymptotic behavior of secrecy sum-rate scaling in multiuser networks, applicable to future 6G applications such as massive IoT scenarios and military satellite communications.Our main contributions are summarized as follows:

•
We propose an opportunistic user scheduling scheme, which achieves optimal MUD gain, combined with a power control mechanism for reducing information leakage to eavesdroppers in wireless multiuser networks; • We prove that the achievable secrecy sum-rate scales as M log(SNR log N) when the number of users scales as SNR for a constant ϵ 0 > 0 in high signal-tonoise ratio (SNR) regime when we consider M antennas at the receiver and each eavesdropper, respectively; • We evaluate our analytic result of the proposed scheduling scheme with a power control mechanism through simulations in two eavesdropping scenarios: internal and external eavesdropping environments; • We further discuss the extensibility of our analysis to various applications such as massive IoT scenarios and military satellite communications in future 6G networks.
The rest of this paper is organized as follows.In Section 2, the overall system model is presented.Our proposed scheduling procedure and power control mechanism are described in Section 3. Secrecy sum-rate scaling of the proposed scheduling scheme is analyzed in Section 4. The performance of the proposed scheduling scheme is verified through simulations in Section 5. Finally, conclusive remarks and future work are provided in Section 7.
Notations: Throughout the paper, we use the following notations.≜ stands for "is defined as".|•| represents a cardinality when it applies to the set or an absolute value when it applies to the scalar value.I M represents an M by M identity matrix.[x] + denotes max(x, 0).(•) T is transpose operator.Similarly, (•) H denotes conjugate transpose.det(•) and ∥•∥ denote determinant of a matrix and Euclidean norm, respectively.We also consider complexity analysis notations.f (x) = O(g(x)) indicate that there exist constants C and [31].

System Model
In this section, we introduce system parameters, basics of random beamforming, and two eavesdropping scenarios.

System Parameters
As illustrated in Figure 1, we consider a time-division duplexing (TDD) uplink multiuser network which consists of N transmitters (users or IoT devices), a single desired receiver (base station: BS), and K independent eavesdroppers.We assume that each transmitter is equipped with a single antenna, and base station and each eavesdropper have M antennas, respectively.We consider a block-fading channel model, where the channel is constant within a single block and independently varying in the next block.During one symbol time, S transmitters are scheduled for data transmission.Thus, it can be modeled by a single-input and multiple-output (SIMO) multiple access channel (MAC).The term α n h n ∈ C M×1 denotes the channel vector from the n-th transmitter to the base station, where α n and h n for n ∈ {1, • • • , N} represent the large-scale and smallscale fading components, respectively.Similarly, the term β nk g nk ∈ C M×1 denotes the channel vector from the n-th transmitter to the k-th eavesdropper, where β nk and g nk for k ∈ {1, • • • , K} represent the large-scale and small-scale fading components, respectively.Each element of h n and g nk is assumed to be an independent and identically distributed (i.i.d) complex Gaussian random variable with zero mean and unit variance.The term N S denotes a selected user index set with |N S | = S.

Random Beamforming at Receiver
We adopt random beamforming at a desired receiver for decoding the signal from the selected S users [28].For each time slot, the base station constructs beamforming vectors represented by an M × S matrix, where u [l] ∈ C M×1 is the l-th orthonormal random vector and generated according to the isotropic distribution for l ∈ {1, • • • , S}.The information of generated beamforming vectors is broadcasted to all transmitters for scheduling process.The detailed scheduling procedure will be explained in Section 3.

Achievable Secrecy Sum-Rate
It is difficult to accurately analyze an individual secrecy capacity region in wireless multiuser networks.Instead, we consider secrecy sum-rate as in [29].Specially, we use a lower bound of the achievable secrecy sum-rate.For analytical simplicity, we assume that α n = 1 and β nk = 1 for all n and k.Then, the received signals at the base station, y ∈ C M×1 , and at the k-th eavesdropper, y k ∈ C M×1 , are expressed, respectively, as where x s denotes the desired data symbol for the s-th transmitter among selected S transmitters (i.e., s ∈ N S ), each of which meets the average power constraint P 0 , and z and z k denote the independent and identically distributed and circularly symmetric complex additive white Gaussian noise vectors with zero mean and covariance of σ 2 0 I M and σ 2 e I M , respectively.For analytical tractability, we assume σ 2 0 = σ 2 e .Note that the achievable secrecy sum-rate is obtained based on the sum of secrecy rates between main channel (transmitters and base station) and wiretap channel (transmitters and eavesdroppers).Thus, the achievable secrecy sum-rate can be different depending on the post-processing at base station and eavesdroppers.
For the main channel, the desired base station decodes received signal in Equation ( 2) by using receive random beamforming based on Equation ( 1) and, the achievable rate of each transmitter and base station pair in the main channel is given by where u [s] 0 represents s-th receive random beamforming vector defined in Equation ( 1).Here, subscript zero in u [s] 0 indicates receive random beamforming vectors at the desired base station., π s denotes scheduled transmitter index for the beam u [s] 0 , and ρ is the transmit SNR defined as ρ ≜ P 0 σ 2 .Note that all signals except the desired signal of the scheduled transmitter for a beam index s in Equation ( 2) are considered interference and, thus, it is represented as denominators in the logarithm function in Equation ( 4).
For the wiretap channel, we consider two eavesdropping scenarios: internal and external eavesdropping scenarios [32].Depending on eavesdropping scenarios, the achievable secrecy sum-rate is differently defined, discussed in the next subsection.

Internal Eavesdropping Scenario
Eavesdroppers are assumed to be internal nodes such as compromised base stations.Thus, we assume that eavesdroppers operate same as the base station and thus use the receive random beamforming technique.Similar to the desired base station, each eavesdropper independently decodes its received signal in (3) by using receive random beamforming based on (1).From the perspective of s-th receive random beamforming, information leakage by all eavesdroppers (i.e., the achievable rate by eavesdroppers) is given by where subscript 'Int' indicates an internal eavesdropping scenario, K denotes eavesdropper index set (i.e., K ≜ k represents s-th receive random beamforming vector defined in (1), and subscript k in u [s] k indicates receive random beamforming vectors at k-th eavesdropper.( 5) is represented as maximum of each eavesdropper's achievable rate among K eavesdroppers since we assume each eavesdropper operates independently.
Therefore, for internal eavesdropping, the achievable secrecy sum-rate is given by where r [s]

External Eavesdropping Scenario
Eavesdroppers are assumed to be external nodes and their receiving operations are not restricted to the receive random beamforming technique.Generally, we consider the worst case (i.e., the best performance at the eavesdroppers) when the eavesdroppers' capabilities are not specifically revealed.Thus, we assume that the eavesdroppers exploit an ideal receiving signal processing (i.e., a theoretically optimal receiver) and achieve their channel capacity to intercept the information from desired transmitters.In this case, information leakage by all eavesdroppers (i.e., the achievable rate by eavesdroppers) is given by where subscript 'Ext' indicates an external eavesdropping scenario.Similar to internal eavesdropping, the achievable secrecy sum-rate in the case of external eavesdropping is given by where r [s] BS and r

Opportunistic User Scheduling with Information-Hiding Power Control
In this section, we define the scheduling parameters and describe the overall procedure of the proposed opportunistic scheduling scheme with information-hiding power control.

Scheduling Parameters
For n-th transmitter and its expected scheduling beam index l * ∈ {1, • • • , S}, we define following scheduling metrics: where η , and η L indicate a normalized signal quality in main channel, a normalized generating interference of n-th transmitter at the desired base station, and a maximum of normalized information leakage in the wiretap channel, respectively.Additionally, we devise pre-determined positive threshold values, η ⋆ I and η ⋆ L , which represent for the maximum of allowable generating interference and information leakage, respectively.
If we assume the internal eavesdroppers are compromised base stations in the network, it is feasible to acquire channel state information (CSI) of the eavesdroppers.However, it is hard for each user to acquire CSI of the eavesdroppers if eavesdroppers are external nodes.Even in this case, assuming CSI of the eavesdroppers at each user is still meaningful since it provides the theoretical intuitions on the achievable secrecy sum-rate.Including [19,22,29], lots of previous studies assumed the perfect CSI of eavesdroppers.

Note that η [n]
L in (9c) only depends on transmitter index n since the expected scheduling beam index l * in main channel does not affect information leakage in wiretap channel.In addition, regardless of eavesdropping scenarios, we consider the same scheduling metric for information leakage in wiretap channel.Further, the optimal values of η ⋆ I and η ⋆ L can be obtained through simulation based on system parameters such as N, K, M, and S.

Overall Scheduling Procedure
The entire procedure of proposed scheduling and power control mechanism is described in Figure 2. The base station first constructs S orthogonal random vectors, i.e., U 0 = u and broadcasts the information of U 0 , η ⋆ I and η ⋆ L to all transmitters (users or IoT devices).

Stage 1 (Information-Hiding Power Control Based on Scheduling Parameters & Feedback Information)
For given an expected scheduling beam index l * , each transmitter estimates its scheduling parameters in (9) and compares them with η ⋆ I and η ⋆ L .If estimated generating interference or information leakage exceeds the maximum allowable level of the system, i.e., L ≥ η ⋆ L , transmitter adjusts its transmit power for satisfying the threshold values (η ⋆ I and η ⋆ L ).Therefore, for n-th transmitter with an expected scheduling beam index l * , its transmit power is determined as Note that the main objective of power control in (10) is to hide transmitter's information to other receive beams and eavesdroppers by decreasing transmit power which is upper bounded by the maximum transmit power P 0 .The concept of using power control in the opportunistic user scheduling was introduced in [33] without considering eavesdroppers (i.e., conventional wireless multiuser networks).
The effective SNR of l * -th receive beam for n-th user is defined as which is fed back from each transmitter to the base station as a scheduling metric.For each user, feedback information in (11) can be calculated for all beam indices to provide accurate scheduling metrics or for some selected beam indices to reduce feedback overhead.Proper beam indices can be selected by using pre-determined positive threshold value (e.g., η ⋆ Q ) which is determined at the base station for guaranteeing the minimum signal quality.Each

Stage 2 (User Selection)
After receiving N transmitter's feedback information, the base station selects the best S transmitters corresponding to S receive vectors and broadcast scheduling transmitter index set to all transmitters.The Hungarian method [34] is one of the possible candidate algorithms for assigning the best transmitters to the receive beams.

Stage 3 (Uplink Communication and Post-Processing at Receiver)
S selected transmitters simultaneously transmit their data to the base station.The base station receives the signals and decodes the desired data using the receive beamforming vectors.

Secrecy Sum-Rate Scaling Analysis
Now, we analyze the secrecy performance of proposed scheduling algorithm in terms of secrecy sum-rate scaling.We show that the proposed scheme asymptotically achieves the optimal secrecy sum-rate scaling (It means optimal degree-of-freedom gain M and multiuser diversity gain log log N can be achieved.),where the secrecy sum-rate scales as M log(ρ log N) when the number of users (N) increases with SNR (ρ).In other words, we analyze how N scales with ρ to achieve the optimal secrecy sum-rate scaling.
We investigate a lower bound of the achievable secrecy sum-rate and prove the optimal secrecy sum-rate scaling using the lower bound.Note that we have R sec Int ≥ R sec Ext since we do not limit eavesdroppers' capability in the case of the external eavesdropping scenario.Further, the lower bound of R sec Ext is given by where C sum Ext denotes max k∈K log det I M + ρ ∑ s∈N S g sk g H sk and R sum BS and R sum Ext denote ∑ S s r [s] BS and ∑ S s r [s] Ext , respectively.In (12), the first and the third inequalities hold due to characteristics of [•] + function and the second inequality holds since we have C sum Ext ≥ R sum Ext .Thus, we consider R sum BS − C sum Ext instead of R sec Ext during the main proof.Next, we consider a slightly modified version of the proposed scheduling algorithm to prove the achievability of the optimal secrecy sum-rate scaling.We do not consider power control mechanism in the modified version.Instead, the modified scheduling scheme only utilizes the information of transmitter index n and beam index l * satisfying the following scheduling criteria: where η , and η [n] L are defined in (9).Definitely, the modified scheduling scheme shows degraded performance compared with the original proposed scheduling scheme since the modified version does not utilize all transmitters in the system.Therefore, the proof for the achievability of the modified scheduling scheme is enough to show the achievability of the proposed scheme.To prove the achievability, we first show that there exists at least one transmitter satisfying all criteria in (13) with high probability and next verify the optimal secrecy sum-rate scaling.We introduce the following lemma in order to prove our main theorem finite, then there exists a constant c 3 > 0 such that x f (x) < c 3 for any x ≥ 0. We then have which completes the proof.
Let p [l * ] denote a probability that at least one transmitter satisfying all criteria in (13) for l * -th beam.To analyze p [l * ] , we characterize the probability that each criterion is satisfied for a certain transmitter (i.e., Pr(C1), Pr(C2), and Pr(C3)).Hereafter, we omit the transmitter index n and the beam index l * for representing each probability since we assume i.i.d.channel vectors.In other words, Pr(C1), Pr(C2), or Pr(C3) are the same regardless of the transmitter index n ∈ {1, • • • , N} and beam index l * ∈ {1, • • • , M}.First, Pr(C1) is given by since the receive beam u is assumed to be isotropically distributed and thus |u Second, Pr(C2) is given by where Γ(z) = ∞ 0 t z−1 e −t dt is the Gamma function and γ(z, x) = x 0 t z−1 e −t dt is the lower incomplete Gamma function.In (15), the last equality holds due to the fact that |u [l]T exponentially distributed and the sum of S − 1 independent exponential random variables is distributed according to the chi-square distribution with 2(S − 1) degrees-of-freedom [35].
Third, Pr(C3) is given by Pr(C3) ≜ Pr max since the term ∥g nk ∥ 2 is the sum of M independent exponential random variables and thus it is distributed according to the chi-square distribution with 2M degrees-of-freedom (i.e., ).Therefore, according to [35], the term max k∈K ∥g nk ∥ 2 is distributed as Additionally, Pr(C2) and Pr(C3) can be lower-bounded by using the following lemma.Lemma 2. For any 0 ≤ x < 1 and z > 0, the lower incomplete Gamma function γ(z, x) is lower-bounded by Proof.The inequality in ( 17) holds since which completes the proof.
Proof.We consider the modified scheduling scheme instead of the proposed scheduling scheme for the proof.First, we focus on the probability that at least one transmitter satisfying all criteria in (13) for l * -th beam, i.e., p [l * ] .Using the probability Pr(C1), Pr(C2), and Pr(C3), p [l * ] is lower-bounded by where we define Using Lemma 2, F C2 (η ⋆ I ) and F C3 (η ⋆ L ) are lower bounded as follows, respectively: where . Thus, by using (20), the term in ( 19) can be lower-bounded by which tends to infinity when N scales as ρ . Therefore, the probability It remains to be shown that the achievable secrecy sum-rate scales Θ(M log(ρ log N)).From ( 12), a lower bound of the sum-rate of the main channel is given by Similarly, from (12), an upper bound of the sum-rate of wiretap channel with external eavesdropping is given by Therefore, secrecy sum-rate is lower-bounded by which achieves full degree-of-freedom gain M and optimal MUD gain log log N as N tends to infinity.This completes the proof of the theorem.
Remark 1. Regardless of eavesdropping scenario, our proposed scheme achieves secrecy sumrate scaling as Θ(M log(ρ log N)) since we consider max k∈K ∥g nk ∥ 2 as a scheduling metric for restricting the maximum information leakage level.However, the actual performance will be different depending on eavesdropping scenarios because secrecy sum-rate scaling is an asymptotical analysis metric as N tends to infinity.It will be verified through simulation results in Section 5.
Remark 2. When M = 1, our system model is reduced to single-input and single-output (SISO) system with multiple single antenna equipped eavesdroppers.Thus, our scaling law is reduced by . This result exactly agrees with the previous result in [19] (i.e., ρ K 1−ϵ 0 ).Therefore, our result generalizes the conventional scaling law in [19].

Numerical Results
In this section, we evaluate the performance of our proposed schemes in terms of the achievable secrecy sum-rate through simulations for two different eavesdropping scenarios: internal eavesdropping and external eavesdropping scenarios.To observe the effect of the power control mechanism on the secrecy sum-rate, we also consider the proposed scheme without adopting the power control mechanism.Our proposed schemes refer to IHPC for the proposed scheme with the power control mechanism (IHPC: Information Hiding Power Control) and TOS for the proposed scheme without the power control mechanism (TOS: Threshold-based Opportunistic Scheduling), respectively.Additionally, we consider three conventional user scheduling schemes as references: MaxSNR, MinGI, and OS-MRC.MaxSNR indicates a user scheduling scheme that selects the transmitters having the maximum desired signal strength to each beam.Contrary to MaxSNR, MinGI is a user scheduling scheme that selects the transmitters generating a minimum amount of interference to other beams.OS-MRC represents a threshold-based opportunistic scheduling with a maximum ratio combining scheme instead of random beamforming at the receiver, as proposed in [21].Note that although some recent studies in PLS [24] show a higher achievable secrecy rate than our proposed scheme, direct comparison with our scheme is difficult since those studies consider additional system elements such as RIS elements.Remark 3. Similarly to the proposed schemes, MaxSNR and MinGI select multiple transmitters by adopting random beamforming at receiver (i.e., S = M).However, OS-MRC selects only one user in one time slot (i.e., S = 1).Additionally, metrics for scheduling and power control criteria (i.e., η ⋆ I and η ⋆ L ) is optimized for the given system parameters M, N and K.

Results in Internal Eavesdropping Scenario
In an internal eavesdropping scenario, eavesdroppers are assumed to be internal nodes such as compromised base stations.Thus, we assume that the eavesdroppers operate in the same way as the base station does.Except for the case of OS-MRC, eavesdroppers are assumed to use receive random beamforming at receivers.In case of OS-MRC, we assume eavesdroppers adopt MRC at the receivers.
Figure 3 shows the average achievable secrecy sum-rate for varying the number of users, where system parameters are set as M = 2, K = 2, and ρ = 10 dB.Both IHP and TOS outperform conventional schemes.Comparing IHP with TOS, the performance gain for using power control is very marginal.This indicates that there are enough users satisfing (13) without using power control.In addition, MaxSNR and MinGI show degraded secrecy performance compared to the proposed schemes since they do not fully utilize channel information for user scheduling.Even though OS-MRC adopts threshold-based opportunistic scheduling, there is a significant performance gap between the proposed schemes and OS-MRC since it is hard for eavesdroppers to obtain desired users' information when the eavesdroppers use the receive random beamforming technique.Figure 4 shows the average achievable secrecy sum-rate for varying SNR, where system parameters are set as M = 2, N = 100, and K = 2. Similar to the result of Figure 3, the proposed schemes outperform conventional schemes.Interestingly, MinGI shows good secrecy performance in a high SNR regime whereas the secrecy sum-rate of MaxSNR is saturated as SNR increases.It indicates that inter-beam interference at desired receiver is dominant factor to determine secrecy sum-rate when the eavesdroppers use random beamforming at the receiver.In addition, when eavesdroppers are assumed to adopt MRC at receivers (OS-MRC), information leakage to the eavesdroppers is also a main factor in restricting secrecy rate of the OS-MRC.Remark 4. In an internal eavesdropping scenario, the secrecy sum-rate depends on the operations of eavesdroppers.When eavesdroppers use random beamforming at receivers, the amount of information leakage is small since it is hard for eavesdroppers to obtain desired users' information.Thus, a main factor that affects the secrecy sum-rate is inter-beam interference at desired receiver.However, when eavesdroppers are assumed to adopt MRC at receivers (results of OS-MRC), there is no inter-beam interference (S = 1) and information leakage is a key factor to restrict secrecy rate.

Results in External Eavesdropping Scenario
In an external eavesdropping scenario, eavesdroppers are assumed to be external nodes and their receiving operations are not restricted to the receive random beamforming technique.Thus, we assume that eavesdroppers could achieve their channel capacity for intercepting the information from desired users.
Figure 5 shows the average achievable secrecy sum-rate for varying the number of users, where system parameters are set as M = 2, K = 2, and ρ = 10 dB.Differently from the results of internal eavesdropping scenario, compared to OS-MRC, the secrecy performance of the proposed schemes is not good when the number of users is small.In addition, a significant performance gap is shown between IHP and TOS.These results come from the fact that information leakage is significant in case of external eavesdropping scenario since we assume that eavesdroppers achieve the channel capacity.However, by comparing the slopes of proposed schemes and OS-MRC, we observe that proposed schemes still achieve full degrees-of-freedom gain.Figure 6 shows the average achievable secrecy sum-rate for varying SNR, where system parameters are set as M = 2, N = 200, and K = 2. Interestingly, all schemes except for OS-MRC, which selects single users (S = 1), show performance degradation as SNR increases and secrecy sum-rate finally converges to zero whereas the performance of OS-MRC is saturated.Since we assume that eavesdroppers achieve the channel capacity, the capacity between eavesdroppers and users scales as log(ρ) whereas the sum-rate between users and desired receiver is limited by inter-beam interference.Although both proposed schemes and OS-MRC are effectively utilizing multiuser diversity to improve secrecy performance, the proposed schemes require a large number of users than OS-MRC since they have to select users having a small amount of information leakage and inter-beam interference at the same time.Specifically, for the proposed schemes, the required number of users to fully exploit the multiuser diversity scales as Θ ρ M(K−1)+1 1−ϵ 0 ≈ ρ 3 whereas it scales as ρ 2 in the case of OS-MRC.Thus, the proposed schemes show better secrecy performance than OS-MRC only in a low SNR regime since we consider a finite number of users (i.e., N = 100).Remark 5.In an external eavesdropping scenario, differently from an internal eavesdropping scenario, the information leakage from the desired user to the eavesdroppers is significant since we assume that eavesdroppers achieve the channel capacity.It results in the severe performance degradation of the proposed schemes compared to OS-MRC.However, the proposed schemes still can achieve the secrecy sum-rate scaling as Θ(M log(ρ log N)) as the number of users increases.

Discussion
In this section, we discuss the possible extensibility of our analysis and proposed scheme to various applications such as satellite communications and IoT networks.

IoT Networks
The development of 6G networks promises many opportunities and advancements, particularly in the IoT networks.A massive number of IoT devices and enhanced security and privacy protection are the main features of 6G IoT networks [1,2].Fortunately, our analysis and proposed opportunistic scheduling schemes can provide wireless network security against eavesdropping attacks by exploiting physical-layer security techniques.Further, the proposed scheme that opportunistically selects multiple transmitters can achieve improved secrecy performance with a high probability when the number of IoT devices increases.

Satellite Communications
The evolution of wireless communication systems, exemplified by the current 5G technology and the forthcoming 6G advancements, should fulfill significant milestones in terms of enhanced performance, including data rate, latency, reliability, and connectivity.In recent years, satellite communications have been expected to play a crucial role in 5G and 6G networks by offering expansive coverage in several applications such as broadcasting, navigation, and military operations [36].However, wireless communications, including satellite communication, remain vulnerable to eavesdropping by malicious attackers.Consequently, security and privacy are among the most important design factors in 6G satellite communication systems [37].
Traditionally, advanced encryption algorithms, secure key management protocols, and authentication mechanisms have been studied to safeguard satellite transmissions.Furthermore, in addition to cryptology-based security measures, physical-layer security can significantly bolster the security of satellite communications.Accordingly, our proposed scheduling scheme aims to enhance the secrecy performance of satellite communications by minimizing information leakage to unauthorized nodes.It is worth noting that our proposed scheme is particularly effective as the number of nodes increases.

Conclusions
In this paper, we proposed threshold-based opportunistic user scheduling with an information hiding power control mechanism, which achieves secrecy sum-rate scaling as M log(ρ log N) when the number of users scales as ρ M(K−1)+1 1−ϵ 0 for a constant ϵ 0 > 0 in a high SNR regime.The secrecy performance of the proposed schemes has been evaluated through simulations in two eavesdropping scenarios: internal and external eavesdropping environments.Although the average achievable secrecy sum-rates of the proposed schemes are different depending on the eavesdropping scenario, simulation results show that the proposed schemes achieve the secrecy sum-rate scaling as Θ(M log(ρ log N)) regardless of the eavesdropping scenario when the number of users is sufficiently large.Further, we discussed the possible extensibility of our analysis and proposed scheme to various applications such as satellite communications and IoT networks.In this work, we focused on multiuser SIMO channels in a single-cell environment.The analysis for secrecy sum-rate scaling in various system models (multiuser SIMO channel in a multi-cell environment or multiple-input and multiple-output (MIMO) channel in a single-cell environment) remains for future work.
tr a n sm is si o n Inf or m at ion lea ka ge

Figure 1 .
Figure 1.An uplink multiuser network consisting of N users (S scheduled transmitters for data), a single base station and K eavesdroppers: the SIMO MAC model.

Figure 2 .
Figure 2. The overview of the proposed scheduling process and power control mechanism.3.2.1.Initialization (Broadcast Receive Random Vectors & Pre-Determined Threshold Values)