Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages

This work develops a beamforming framework for energy efficiency optimization in MIMO multi-user systems with confidentiality constraints. Two channel models are considered, namely, a broadcast channel with confidential messages (corresponding to single-cell downlink) and an interference channel with confidential messages (corresponding to multi-cell downlink), in which multiple messages are transmitted, and it must be ensured that only the intended receiver is able to perform data decoding, thus treating non-intended receivers as potential eavesdroppers. In this multi-user scenario, the new metric global secrecy energy efficiency is introduced and optimized. Moreover, the coupling among the secrecy energy efficiencies of different users is analyzed by providing an efficient way of computing the system secrecy energy efficiency Pareto boundary. Both contributions are achieved by developing an optimization framework which suitably combines fractional programming theory and sequential optimization theory. The proposed framework is provably convergent, enjoys affordable complexity, and fulfills first-order optimality properties. Finally, the closed form conditions are provided to support smart user selection algorithms for downlink transmission.

[1]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.

[2]  Jin Xu,et al.  Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.

[3]  Shlomo Shamai,et al.  An Information Theoretic Approach to Secret Sharing , 2015, IEEE Transactions on Information Theory.

[4]  Kaisa Miettinen,et al.  Nonlinear multiobjective optimization , 1998, International series in operations research and management science.

[5]  Geoffrey Ye Li,et al.  Distributed Interference-Aware Energy-Efficient Power Optimization , 2011, IEEE Transactions on Wireless Communications.

[6]  Charalambos D. Charalambous,et al.  On optimal signaling over secure MIMO channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[7]  Yongming Huang,et al.  Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.

[8]  A. Lee Swindlehurst,et al.  On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Muhammad Ali Imran,et al.  How much energy is needed to run a wireless network? , 2011, IEEE Wireless Communications.

[11]  Xiaoming Chen,et al.  Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.

[12]  Qi Zhang,et al.  Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.

[13]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[14]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[15]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[16]  Eduard A. Jorswieck,et al.  Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.

[17]  Eduard A. Jorswieck,et al.  Energy Efficiency and Interference Neutralization in Two-Hop MIMO Interference Channels , 2014, IEEE Transactions on Signal Processing.

[18]  Shih-Chun Lin,et al.  On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT , 2012, IEEE Transactions on Information Forensics and Security.

[19]  H. Vincent Poor,et al.  On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Eduard A. Jorswieck,et al.  On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT , 2017, 1712.03692.

[21]  Athina P. Petropulu,et al.  Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels , 2009, ArXiv.

[22]  Eduard A. Jorswieck,et al.  Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI , 2016, IEEE Journal of Selected Topics in Signal Processing.

[23]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Costas N. Georghiades,et al.  Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.

[25]  Emil Björnson,et al.  Globally Optimal Energy-Efficient Power Control and Receiver Design in Wireless Networks , 2016, IEEE Transactions on Signal Processing.

[26]  Gerhard Fettweis,et al.  Framework for Link-Level Energy Efficiency Optimization with Informed Transmitter , 2011, IEEE Transactions on Wireless Communications.

[27]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[28]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[29]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[30]  Shlomo Shamai,et al.  The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.

[31]  Symeon Chatzinotas,et al.  Secrecy energy efficiency optimization for MISO and SISO communication networks , 2015, 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[32]  Yingbin Liang,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages , 2009, IEEE Transactions on Information Theory.

[33]  Cheng-Liang Lin,et al.  On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT , 2013, IEEE Transactions on Wireless Communications.

[34]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[35]  J. Shanthikumar,et al.  Multivariate Stochastic Orders , 2007 .

[36]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[37]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[38]  Justin P. Coon,et al.  Network Coding for Physical Layer Secrecy , 2018, IEEE Wireless Communications Letters.

[39]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[40]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[41]  I. S. Ansari,et al.  Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.

[42]  Wei-Ping Zhu,et al.  Secrecy Energy Efficiency Maximization in Cognitive Radio Networks , 2017, IEEE Access.

[43]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[44]  Are Hjørungnes Complex-Valued Matrix Derivatives: Preface , 2011 .

[45]  A. Lee Swindlehurst,et al.  MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.

[46]  Kai-Kit Wong,et al.  Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[47]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[48]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[49]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[50]  Xiaoming Chen,et al.  Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.

[51]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[52]  George A. F. Seber,et al.  A matrix handbook for statisticians , 2007 .

[53]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[54]  Yu Gong,et al.  Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[55]  Zhi-Quan Luo,et al.  A Unified Convergence Analysis of Block Successive Minimization Methods for Nonsmooth Optimization , 2012, SIAM J. Optim..

[56]  Qi Zhang,et al.  Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.

[57]  Jacques A. Ferland,et al.  Algorithms for generalized fractional programming , 1991, Math. Program..

[58]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[59]  Shlomo Shamai,et al.  Broadcast Networks With Layered Decoding and Layered Secrecy: Theory and Applications , 2015, Proceedings of the IEEE.

[60]  Justin P. Coon,et al.  Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering , 2017, IEEE Wireless Communications Letters.

[61]  Simon L. Cotton,et al.  Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..

[62]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.