Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints

This paper considers a unicast multiuser multiple-input single-output (MISO) downlink system overheard by multiple single-antenna eavesdroppers. The objective is to jointly design the beamforming vectors and the artificial noise (AN) covariance matrix with imperfect channel state information (CSI) at the transmitter, such that the total transmit power is minimized while satisfying probabilistic quality of service (QoS) constraints at legitimate users and the eavesdroppers. Using Bernstein-type inequalities and the S-procedure, we recast the non-convex power minimization problem as two different convex semidefinite programs (SDPs) which can be solved using interior-point methods. Simulation results show that the proposed methods outperform a nonrobust method and the ones using the isotropic AN.创新点本文考虑了存在多个单天线窃听者的多用户单播MISO通信系统。提出了人工噪声辅助的安全波束成形发送方法。其目的为, 根据非理想信道状态信息对发送端的波束成形向量和人工噪声协方差矩阵进行联合优化, 在满足合法用户和窃听者的概率服务质量(Quality of Service, QoS)约束下, 最小化发送功率。由于无法获得概率QoS约束的解析表达式, 分别采用Bernstein-type不等式和S-过程将其转化为两种不同的确定性约束, 进而得到两种不同的半定规划(Semidefinite Program, SDP)问题。仿真结果表明所提方法的性能优于非鲁棒方法和全向人工噪声(Isotropic Artificial Noise)辅助波束成形方法。

[1]  Jiaheng Wang,et al.  Robust MIMO Precoding for Several Classes of Channel Uncertainty , 2013, IEEE Transactions on Signal Processing.

[2]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Yueming Cai,et al.  Secure Transmission Design and Performance Analysis for Cooperation Exploring Outdated CSI , 2014, IEEE Communications Letters.

[5]  Yueming Cai,et al.  On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ , 2014, IEEE Communications Letters.

[6]  Qihui Wu,et al.  Effective capacity region of two-user opportunistic spectrum access , 2011, Science China Information Sciences.

[7]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[8]  Jianhua Li,et al.  Strongly secure identity-based authenticated key agreement protocols in the escrow mode , 2011, Science China Information Sciences.

[9]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[10]  Jiaheng Wang,et al.  Robust MIMO precoding for the schatten norm based channel uncertainty sets , 2013, GLOBECOM 2013.

[11]  Qiang Li,et al.  A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.

[12]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[13]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[14]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[15]  Shuai Ma,et al.  Chance Constrained Robust Beamforming in Cognitive Radio Networks , 2013, IEEE Communications Letters.

[16]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[17]  Qiang Li,et al.  Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[18]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[19]  Chong-Yung Chi,et al.  A semidefinite relaxation based conservative approach to robust transmit beamforming with probabilistic sinr constraints , 2010, 2010 18th European Signal Processing Conference.

[20]  Di Zhao,et al.  Ergodic secrecy rate of two-user MISO interference channels with statistical CSI , 2014, Science China Information Sciences.

[21]  Wei Zhang,et al.  MIMO-OFDM Channel Estimation in the Presence of Frequency Offsets , 2008, IEEE Transactions on Wireless Communications.

[22]  Qinye Yin,et al.  Two-step transmission with artificial noise for secure wireless SIMO communications , 2014, Science China Information Sciences.

[23]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[24]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.

[25]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[26]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[28]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[29]  Shaoquan Jiang On τ-time secure key agreement , 2014, Science China Information Sciences.

[30]  A. Leon-Garcia,et al.  Probability, statistics, and random processes for electrical engineering , 2008 .

[31]  Dongtang Ma,et al.  Robust Artificial Noise Aided Transmit Design for MISO Wiretap Channels with Channel Uncertainty , 2013, IEEE Communications Letters.