Beamforming Optimization for Physical Layer Security in MISO Wireless Networks

A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas, while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of wireless channel knowledge, the problem of interest is beamforming to optimize the users’ quality-of-service (QoS) in terms of their secrecy throughputs or maximize the network's energy efficiency under users’ QoS. All these problems are seen as very difficult optimization problems with many nonconvex constraints and nonlinear equality constraints in beamforming vectors. The paper develops path-following computational procedures of low complexity and rapid convergence for the optimal beamforming solution. Their practicability is demonstrated through numerical examples.

[1]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[2]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[3]  Inkyu Lee,et al.  Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.

[4]  Zhengang Pan,et al.  Toward green and soft: a 5G perspective , 2014, IEEE Communications Magazine.

[5]  Symeon Chatzinotas,et al.  Secrecy energy efficiency optimization for MISO and SISO communication networks , 2015, 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[6]  Wei-Chiang Li,et al.  Multicell Coordinated Beamforming With Rate Outage Constraint—Part II: Efficient Approximation Algorithms , 2014, IEEE Transactions on Signal Processing.

[7]  Ha H. Nguyen,et al.  Joint Optimization of Source Precoding and Relay Beamforming in Wireless MIMO Relay Networks , 2014, IEEE Transactions on Communications.

[8]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[9]  H. Vincent Poor,et al.  Outage Probability and Outage-Based Robust Beamforming for MIMO Interference Channels with Imperfect Channel State Information , 2012, IEEE Transactions on Wireless Communications.

[10]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[11]  H. Vincent Poor,et al.  MIMO Beamforming for Secure and Energy-Efficient Wireless Communication , 2017, IEEE Signal Processing Letters.

[12]  Tareq Y. Al-Naffouri,et al.  On the Distribution of Indefinite Quadratic Forms in Gaussian Random Variables , 2009, IEEE Transactions on Communications.

[13]  Derrick Wing Kwan Ng,et al.  Robust Chance-Constrained Optimization for Power-Efficient and Secure SWIPT Systems , 2017, IEEE Transactions on Green Communications and Networking.

[14]  H. Vincent Poor,et al.  Power Allocation for Energy Efficiency and Secrecy of Wireless Interference Networks , 2018, IEEE Transactions on Wireless Communications.

[15]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[16]  Hui Yu,et al.  Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[18]  H. Vincent Poor,et al.  Secrecy Rate Beamforming for Multicell Networks With Information and Energy Harvesting , 2017, IEEE Transactions on Signal Processing.

[19]  Wei-Chiang Li,et al.  Coordinated Beamforming for Multiuser MISO Interference Channel Under Rate Outage Constraints , 2011, IEEE Transactions on Signal Processing.

[20]  H. Vincent Poor,et al.  Secure and Energy-Efficient Beamforming for Simultaneous Information and Energy Transfer , 2016, IEEE Transactions on Wireless Communications.

[21]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[22]  F. Richard Yu,et al.  Adaptive Energy-Efficient Power Allocation in Green Interference-Alignment-Based Wireless Networks , 2015, IEEE Transactions on Vehicular Technology.

[23]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[24]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[25]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[26]  Slawomir Stanczak,et al.  Toward Energy-Efficient 5G Wireless Communications Technologies , 2014, ArXiv.

[27]  Stéphane Y. Le Goff,et al.  Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel , 2015, IEEE Transactions on Vehicular Technology.

[28]  H. Vincent Poor,et al.  Power Allocation for Energy Efficiency and Secrecy of Interference Wireless Networks , 2017, ArXiv.

[29]  Zhu Han,et al.  Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.

[30]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[31]  Rafael F. Schaefer,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[32]  Eduard A. Jorswieck,et al.  Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI , 2016, IEEE Journal of Selected Topics in Signal Processing.

[33]  Mikael Skoglund,et al.  Outage Region Characterization for Beamforming in MISO Interference Networks with Imperfect CSI , 2015, IEEE Signal Processing Letters.

[34]  Ha H. Nguyen,et al.  Successive Interference Mitigation in Multiuser MIMO Channels , 2015, IEEE Transactions on Communications.

[35]  Ha H. Nguyen,et al.  Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.

[36]  Venugopal V. Veeravalli,et al.  Sum Capacity of MIMO Interference Channels in the Low Interference Regime , 2011, IEEE Transactions on Information Theory.

[37]  Ronan Farrell,et al.  Energy-Efficient Zero-Forcing Precoding Design for Small-Cell Networks , 2016, IEEE Transactions on Communications.

[38]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.

[39]  I. Bechar,et al.  A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables , 2009, 0909.3595.

[40]  Hoang Duong Tuan,et al.  Nonsmooth Optimization for Efficient Beamforming in Cognitive Radio Multicast Transmission , 2012, IEEE Transactions on Signal Processing.

[41]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[42]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[43]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[44]  Hoang Duong Tuan,et al.  Transceiver Design for Optimizing the Energy Efficiency in Multiuser MIMO Channels , 2016, IEEE Communications Letters.