ebook img

MIMO Beamforming for Secure and Energy-Efficient Wireless Communication PDF

0.13 MB·
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview MIMO Beamforming for Secure and Energy-Efficient Wireless Communication

1 MIMO Beamforming for Secure and Energy-Efficient Wireless Communication 1 1 2 3 Nguyen T. Nghia , Hoang D. Tuan , Trung Q. Duong and H. Vincent Poor 7 1 Abstract 0 2 Considering a multiple-user multiple-inputmultiple-output(MIMO) channel with an eavesdropper, n a this letter develops a beamformer design to optimize the energy efficiency in terms of secrecy bits J per Joule under secrecy quality-of-service constraints. This is a very difficult design problem with no 8 1 available exact solution techniques. A path-followingprocedure, which iteratively improvesits feasible ] points by using a simple quadratic program of moderate dimension, is proposed. Under any fixed T I computationaltolerancetheprocedureterminatesafterfinitelymanyiterations,yieldingatleastalocally . s c optimalsolution.Simulationresultsshowthesuperiorperformanceoftheobtainedalgorithmoverother [ existing methods. 1 v 0 Index Terms 6 9 4 MIMO beamforming, secure communication, energy efficiency. 0 . 1 0 I. INTRODUCTION 7 1 Secure communicationachieved by exploiting the wireless physical layer to providesecrecy in : v i data transmission, has drawn significant recent research attention (see e.g. [1]–[3] and references X r therein). The performance of this type of secure communication can be measured in terms of the a secrecy throughput, which is the capacity of conveying information to the intended users while ThisworkwassupportedinpartbytheAustralianResearchCouncilsDiscoveryProjectsunderProjectDP130104617, inpart bytheU.K.RoyalAcademyofEngineering ResearchFellowshipunder GrantRF1415/14/22, andinpartbytheU.S.National Science Foundation under Grants CMMI-1435778 and ECCS-1647198. 1Faculty of Engineering and Information Technology, University of Technology, Sydney, NSW 2007, Australia (email: [email protected], [email protected]). 2The School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, Belfast BT7 1NN, United Kingdom (e-mail: [email protected]). 3Department of Electrical Engineering, Princeton University, Princeton, NJ 08544 USA (e-mail: [email protected]). 2 keeping it confidential from eavesdroppers [2], [4]. On the other hand, energy efficiency (EE) has emerged as another important figure-of-merit in assessing the performance of communication systems [5], [6]. For most systems, both security and energy efficiency are of interest, and thus it is of interest to combine these two metrics into a single performance index called the secrecy EE (SEE), which can be expressed in terms of secrecy bits per Joule. Transmit beamforming can be used to enhance the two conflicting targets for optimizing SEE in multiple-user multiple-input multiple-output (MU-MIMO) communications: mitigating MU interference to maximize the users’ information throughput, and jamming eavesdroppers to control the leakage of information. However, the current approach to treat both EE [7], [8] and SEE [9], [10] is based on costly zero-forcing beamformers, which completely cancel the MU interference and signals received at the eavesdroppers. The EE/SEE objective is in the form of a ratio of a concave function and a convex function, which can be optimized by using Dinkelbach’s algorithm [11]. Each Dinkelbach’s iteration still requires a log-det function optimization, which is convex but computationally quite complex. Moreover, zero-forcing beamformers are mostly suitable for low code rate applications and are applicable to specific MIMO systems only. The computational complexity of SEE for single-user MIMO/SISO communications as considered in [12] and [13] is also high as each iteration still involves a difficult nonconvex optimization problem. This letter aims to design transmit beamformers to optimize SEE subject to per-user secrecy quality-of-service (QoS) and transmit power constraints. The specific contributions are detailed in the following dot-points. A path-following computational procedure, which invokes a simple convex quadratic pro- • gram at each iteration and converges to at least a locally optimal solution, is proposed. The MU interference and eavesdropped signals are effectively suppressed for optimizing the SEE. In contrast to zero-forcing beamformers, higher code rates not only result in transmitting more concurrent data streams but also lead to much better SEE performance in our proposed beamformer design. As a by-product, other important problems in secure and energy-efficient communications, • such as EE maximization subject to the secrecy level or sum secrecy throughput maximiza- tion, which are still quite open for research, can be effectively addressed by the proposed procedure. 3 Notation. All variables are written in boldface. For illustrative purpose, f(V) is a mapping of variable V while f(V¯) is the output of mapping f corresponding to a particular input V¯. I n denotes the identity matrix of size n n. The notation ( )H stands for the Hermitian transpose, × · A denotes the determinant of a square matrix A, and A denotes its trace while (A)2 = AAH. | | h i The inner product X,Y is defined as XHY and therefore the Frobenius squared norm of a h i h i matrix X is X 2 = XXH . The notation A B (A B, respectively) means that A B is || || h i (cid:23) ≻ − a positive semidefinite (definite, respectively) matrix. E[ ] denotes expectation and denotes · ℜ{·} the real part of a complex number. (0,a) denotes a circularly-symmetric complex Gaussian CN random variable with mean zero and variance a. II. SEE FORMULATION Consider a MIMO system consisting of D transmitters and D users indexed by 1,...,D. Each transmitter j is equipped with N antennas to transmit information to its intended user j equipped with N antennas. There is an eavesdropper equipped with N antennas, which is part r e of the legitimate network [1], [4]. The channel matrices H CNr×N and H CNe×N from ℓj ℓe ∈ ∈ transmitter ℓ to user j and to the eavesdropper, respectively, are known at the transmitters by using the channel reciprocity, feedback and learning mechanisms [1], [4], [14], [15]. A complex-valued vector s Cd1 contains the information transmitter j intends to convey j ∈ to user j, where E s sH = I , and d N is the number of concurrent data streams. Denote j j d1 1 ≤ by V CN×d1 the(cid:2)comp(cid:3)lex-valued beamformer matrix for user j. The ratio d /N is called the j 1 ∈ code rate of V . For notational convenience, define , 1,...,D and V , [V ] . j j j∈D D { } The received signal at user j and the signal received at the eavesdropper are y = H V s + H V s +n˜ , (1) j jj j j ℓj ℓ ℓ j X ℓ∈D\{j} D y = H V s +n˜ , (2) e je j j e Xj=1 where n˜ (0,σ2) and n˜ (0,σ2) are additive noises. j ∈ CN j e ∈ CN e By (1), the rate of information f leaked from user j (in nats) is j f (V) = ln I +( (V ))2(Ψ (V)+σ2I )−1 , (3) j Nr Lj j j j Nr (cid:12) (cid:12) (cid:12) (cid:12) 4 where (V ) , H V and Ψ (V) , (H V )2. Lj j jj j j ℓ∈D\{j} ℓj ℓ P On the other hand, the wiretapped throughput for user j at the eavesdropper is f (V) , ln I +( (V ))2(Ψ (V)+σ2I )−1 , (4) j,e Ne Lj,e j j,e e Ne (cid:12) (cid:12) (cid:12) (cid:12) where (V ) , H V and Ψ (V) , (H V )2. The secrecy throughput in trans- Lj,e j je j j,e ℓ∈D\{j} ℓe ℓ P mitting information s to user j while keeping it confidential from the eavesdropper is defined j as [2], [4] f (V) , f (V) f (V). (5) j,s j j,e − Following[16], theconsumedpowerforsignaltransmissionis modelledby Ptot(V) , ζPt(V)+ P , where Pt(V) , D V 2 is the total transmit power of the transmitters and ζ and P are c j=1|| j|| c P the reciprocal of the drain efficiency of the power amplifier and the circuit power, respectively. Consider the following secure beamformer design to optimize the system’s energy efficiency: D 1 max (f (V) f (V)) s.t. (6a) V Ptot(V) j − j,e Xj=1 V 2 P , j , (6b) j max || || ≤ ∈ D f (V) f (V) r ,j , (6c) j j,e j − ≥ ∈ D where the constraints (6b) limit the transmit power, while (6c) are the secrecy QoS constraints. It can be seen from their definitions (3) and (4) that both throughput f and wiretapped j throughput f are very complicated functions of the beamformer variable V. The approach of j,e [7] and [8] (to EE) and [9] and [10] (to SEE) seeks V in the class of zero-forcing beamformers Ψ (V) 0, j and (H V )2 0 to cancel completely all the MU interference and j ≡ ∈ D ℓ∈D ℓe ℓ ≡ wiretapped signals. EachPthroughput f becomes a log-det function of only V . Dinkelbach’s j j algorithm is then applied to compute a zero-forcing solution of (6), which requires a log-det function optimization for each iteration. Such optimization is still computationally difficult with no available polynomial-time solvers. Note that the feasibility of the zero-forcing constraints imposes N N +d and D(N +N N 2d ) (D 1)d [10]. Thus, there is not much e 1 r e 1 1 ≥ − − ≥ − freedom for optimizing zero-forcing beamformers whenever N is not large. In the next section, we will provide a completely new computational approach to (6) by effectively enhancing its difficult objective and constraints. 5 III. PATH-FOLLOWING COMPUTATIONAL PROCEDURE By introducing a variable t satisfying the convex quadratic constraint D ζ V 2 +PBS t, (7) j || || ≤ Xj=1 the optimization problem (6) can be equivalently expressed as D 1 max (V,t) , (f (V) f (V)) s.t. (6b),(6c). (8) t j j,e V,t P − Xj=1 In what follows, a function h is said to be a minorant (majorant, resp.) of a function f at a point x¯ in the definition domain dom(f) of f iff h(x¯) = f(x¯) and h(x) f(x) x dom(f) ≤ ∀ ∈ (h(x) f(x) x dom(f), resp.) [17]. ≥ ∀ ∈ By [18], a concave quadratic minorant of the throughput function f (V) at V(κ) , [V(κ)] , j j j∈D which is feasible for (6b)-(6c) is Θ(κ)(V) , a(κ) +2 (κ), (V ) (κ), (V) , (9) j j ℜ{Aj Lj j i}−hBj Mj i where (V) , Ψ (V)+( (V ))2, 0 > a(κ) , f (V(κ)) ( (V(κ)))H(Ψ (V(κ))+σ2I )−1 Mj j Lj j j j −h Lj j j j Nr (V(κ)) σ2 (Ψ (V(κ))+σ2I )−1 ( (V(κ))+σ2I )−1 , (κ) , (Ψ (V(κ))+σ2I )−1 (V(κ)) Lj j i− jh j j Nr − Mj j Nr i Aj j j Nr Lj j and 0 (κ) , (Ψ (V(κ))+σ2I )−1 ( (V(κ))+σ2I )−1. (cid:22) Bj j j Nr − Mj j Nr To provide a minorant of the secrecy throughput f (see (5)) at V(κ), the next step is to find a j,s majorant of the eavesdropper throughput function f (V) at V(κ). Reexpressing f by j,e j,e ln I + (V)/σ2 ln I +Ψ (V)/σ2 , (10) Ne Mj,e e − Ne j,e e (cid:12) (cid:12) (cid:12) (cid:12) for (V) , Ψ (V) (cid:12)+ ( (V ))2, and(cid:12)apply(cid:12)ing Theorem 1 in(cid:12)the appendix for upper j,e j,e j,e j M L bounding the first term and lower bounding the second term in (10) yields the following convex quadratic majorant of f at V(κ): j,e Θ(κ)(V) , a(κ) 2 H V(κ)VHHH /σ2 j,e j,e − ℜ{h ℓe ℓ ℓ ℓei} e X ℓ∈D\{j} + (κ), (V) /σ2+ (κ),Ψ (V) /σ2, hBj,e1 Mj,e i e hBj,e2 j,e i e where a(κ) , f (V(κ))+ (I + (V(κ))/σ2)−1 I +Ψ (V(κ))/σ2 , and j,e j,e h Ne Mj,e e − Ne j,e ei 0 (κ) , (I + (V(κ))/σ2)−1, (cid:22) Bj,e1 Ne Mj,e e 0 (κ) , (σ2)−1I (σ2I +Ψ (V(κ)))−1. (cid:22) Bj,e2 e Ne − e Ne j,e 6 A concave quadratic minorant of the secrecy throughput function f at V(κ) is then j,s Θ(κ)(V) = Θ(κ)(V) Θ(κ)(V) j,s j − j,e = a(κ) + (κ)(V) (κ)(V). (11) j,s Aj,s −Bj,s Here, a(κ) , a(κ)+a(κ), (κ)(V) , 2 (κ), (V ) +2 H V(κ)VHHH /σ2, j,s j j,e Aj,s ℜ{hAj Lj j i} ℓ∈D\{j}ℜ{h ℓe ℓ ℓ ℓei} e and (κ)(V) , (κ), (V) + (κ), (V) + (κ),ΨP (V) /σ2. Bj,s hBj Mj i hBj,e1 Mj,e i hBj,e2 j,e i e Therefore, the nonconvex secrecy QoS constraints (6c) can be innerly approximated by the followingconvex quadratic constraints in the sense that the feasibility of the former is guaranteed by the feasibility of the latter: Θ(κ)(V) r ,j = 1,...,D. (12) j,s ≥ j For good approximation, the following trust region is imposed: (κ)(V) 0, j = 1,...,D. (13) Aj,s ≥ By using the inequality x √x(κ)√x x(κ) 2 t x > 0,x(κ) > 0,t > 0,t(κ) > 0 t ≥ t(κ) − (t(κ))2 ∀ we obtain (κ)(V)/t ϕ(κ)(V,t), for Aj,s ≥ j,s ϕ(κ)(V,t) , 2b(κ) (κ)(V) c(κ)t (14) j,s j,sqAj,s − j,s where 0 < b(κ) , (κ)(V(κ))/t(κ), 0 < c(κ) , (b(κ)/t(κ))2, which is a concave function [17]. j,s qAj,s j,s j,s With regard to a(κ)/t we define a concave function a(κ)(t) as follows: j,s j,s • If aj(κ,s) < 0, define aj(κ,s)(t) , aj(κ,s)/t, which is a concave function; • If a(κ) > 0, define a(κ)(t) = a(κ)(2/t(κ) t/(t(κ))2), which is a linear minorant of the convex j,s j,s j,s − function a(κ)/t at t(κ). j,s AconcaveminorantofΘ(κ)(V)/t,whichisalsoaminorantof(f (V) f (V))/tat(V(κ),t(κ)), j,s j − j,e is thus g(κ)(V,t) , a(κ)(t)+ϕ(κ)(V ,t) (κ)(V) /t. (15) j,s j,s j j −Bj,s i We now solve the nonconvex optimization problem (6) by generating the next feasible point (V(κ+1),t(κ)) as the optimal solution of the following convex quadratic program (QP), which is 7 Algorithm 1 Path-following Algorithm for SEE Optimization Initialization: Set κ := 0, and choose a feasible point (V(0),t(0)) for (8). κ-th iteration: Solve (16) for an optimal solution (V∗,t∗) and set κ := κ + 1, V(κ),t(κ)) , (V∗,t∗) and calculate (V(κ),t(κ)). Stop if P (V(κ),t(κ)) (V(κ−1)),t(κ−1) / (V(κ−1),t(κ−1)) ǫ. P −P P ≤ (cid:12)(cid:0) (cid:1) (cid:12) (cid:12) (cid:12) an inner approximation [17] of the nonconvex optimization problem (8): D max (κ)(V,t) , g(κ)(V,t) V,t P j,s Xj=1 s.t. (6b),(7),(12),(13). (16) Notethat(16)involvesn = 2DNd +1 scalarreal variablesandm = 2D+1quadraticconstraints 1 so its computational complexity is (n2m2.5 +m3.5). O It can be seen that (V(κ+1),t(κ+1)) (κ)(V(κ+1),t(κ+1)) > (κ)(V(κ),t(κ)) = (V(κ),t(κ)) as P ≥ P P P long as (V(κ+1),t(κ+1)) = (V(κ),t(κ)), i.e. (V(κ+1),t(κ+1)) is better than (V(κ),t(κ)). This means 6 that, once initialized from a feasible point (V(0),t(0)) for (8), the κ-th QP iteration (16) generates a sequence (V(κ),t(κ)) of feasible and improved points toward the nonconvex optimization { } problem (8), which converges at least to alocally optimalsolutionof (6)[18]. Underthe stopping criterion (V(κ+1),t(κ+1)) (V(κ),t(κ)) / (V(κ),t(κ)) ǫ P −P P ≤ (cid:12)(cid:0) (cid:1) (cid:12) (cid:12) (cid:12) for a given tolerance ǫ > 0, the QP iterations will terminate after finitely many iterations. The proposed path-following procedure for computational solution of the nonconvex optimiza- tion problem (6) is summarized in Algorithm 1. We note that a feasible initial point (V(0),t(0)) for (8) can be found by solving maxmin (f (V) f (V))/r s.t. (6b) j j,e j V j∈D − bytheiterations maxmin Θ(κ)(V)/r s.t. (6b) ,whichterminateuponreaching(f (V(κ)) (cid:26) V j∈D j,s j (cid:27) j − f (V(κ)))/r 1 j , to satisfy (6b)-(6c). j,e j ≥ ∀ ∈ D 8 The following problem of EE optimization under users’ throughput QoS constraints and secrecy levels: D 1 max f (V) s.t. (6b), V Ptot(V) j Xj=1 f (V) r & f (V) ǫ,j = 1,...,D, (17) j j j,e ≥ ≤ where ǫ is set small enough to keep the users’ information confidential from the eavesdropper, is simpler than (6). It can be addressed by a similar path-following procedure, which solves the following QP at the κ th iteration instead of (16): − D max a(κ)/t+4b(κ) (κ), (V ) V,t (cid:18) j j qℜ{hAj Lj j i} Xj=1 2c(κ)t (κ), (V) /t s.t. (6b), (18a) − j −hBj Mj i (cid:17) (κ), (V ) 0, j , (18b) ℜ{hAj Lj j i} ≥ ∈ D Θ(κ)(V) r & Θ(κ)(V) ǫ, j , (18c) j ≥ j j,e ≤ ∈ D where 0 < b(κ) , ( (V(κ)))H(Ψ (V(κ)) + σ2I )−1 (V(κ)) 1/2/t(κ), 0 < c(κ) , (b(κ)/t(κ))2 j h Lj j j j Nr Lj j i j j and (κ) and (κ) are defined from (9). A feasible initial point (V(0),t(0)) for (17) can be found Aj Bj by solving maxminmin f (V) r ,ǫ f (V) s.t. (6b) j j j,e V j∈D { − − } by the iterations maxminmin Θ(κ)(V) r ,ǫ Θ(κ)(V) s.t. (6b) , V j∈D { j − j − j,e } } which terminate upon reaching f (V(κ)) r 0, ǫ f (V(κ)) 0 j , to satisfy (6b), j j j,e − ≥ − ≥ ∀ ∈ D (17). Lastly, the problem of sum secrecy throughput maximization D max (f (V) f (V)) s.t. (6b),(6c) j j V − Xj=1 is also simpler than the SEE optimization problem (6), which can be addressed by a similar path-following procedure with the QP D max Θ(κ)(V) s.t. (6b),(12) V j,s Xj=1 solved at the κ th iteration instead of (16). − 9 IV. NUMERICAL EXAMPLES The fixed parameters are: D = 3, N = 12, N = 6, N = 9, σ 1, σ = 1, r 1 bits/s/Hz, r e j e j ≡ ≡ ζ = 1 and P 7,10 dB. The secrecy level ǫ = 0.05/log e is set in solving (17). The c ∈ { } 2 channels are Rayleigh fading so their coefficients are generated as (0,1). CN For the first numerical example, the number of data streams d = 3 is set, so the code rate is 1 3/12 = 1/4. Each V is of size 12 3. Figure 1 shows the SEE performance of our proposed j × beamformer and the zero-forcing beamformer [9], [10]. One can see that the former outperforms the latter substantially. Apparently, the latter is not quite suitable for both EE and SEE. The SEE performance achieved by the formulation (6) is better than that achieved by the formulation (17) because the secrecy level is enhanced with the users’s throughput in the former instead of being constrained beforehand in the latter. When the transmit power P is small, the denominator of max the SEE objective in (6) and (17) is dominated by the constant circuit power P . As a result, the c SEE is maximized by maximizing its numerator, which is the system sum secrecy throughput. On the other hand, the SEE objective is likely maximized by minimizing the transmitted power P in its denominator when the latter is dominated by P . That is why the SEE saturates max max once P is beyond a threshold according to Figure 1. We increase the number d of data max 1 2 ) e ul o z/J1.5 H s/ p b P=7 dB E ( 1 c Pc=10 dB E S e g a0.5 r e Proposed Algorithm (6) v A Proposed Algorithm (18) [10] 0 0 10 20 30 P (dB) max Fig. 1: Average SEE vs. P for d = 3. max 1 streams to 4 in the second numerical example. The code rate is thus 4/12 = 1/3. For this higher-code-rate case, the zero-forcing beamformers [9], [10] are infeasible. Comparing Figure 10 1 and Figure 2 reveals that higher code-rate beamforming is also much better in terms of SEE because it leads to greater freedom in designing V of size 12 4 for maximizing the SEE. In j × other words, the effect of code rate diversity on the SEE is observed. 2 ) P=7 dB e c ul o J z/ P=10 dB H1.5 c s/ p Proposed Algorithm (6) b ( E Proposed Algorithm (18) E S e 1 g a r e v A 0.5 0 10 20 30 P (dB) max Fig. 2: Average SEE vs. P for d = 4. max 1 V. CONCLUSION We have proposed a path-following computational procedure for the beamformer design to maximize the energy efficiency of a secure MU MIMO wireless communication system and have also showed its potential in solving other important optimization problems in secure and energy-efficient communications. Simulation results have confirmed the superior performance of the proposed method over the exiting techniques. Acknowledgement. The authors thank Dr. H. H. Kha for providing the computational code from [10]. APPENDIX Theorem 1: For a given σ > 0, consider a function f(X) = ln I +(X)2/σ m | | in X Cm×n. Then for any X¯ Cm×n, it is true that ∈ ∈ h(X) f(X) g(X) (19) ≤ ≤

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.