Power Allocation Strategy of Maximizing Secrecy Rate for Secure Directional Modulation Networks

02/04/2018 ∙ by Simin Wan, et al. ∙ University of Kent 0

In this paper, given the beamforming vector of confidential messages and artificial noise (AN) projection matrix and total power constraint, a power allocation (PA) strategy of maximizing secrecy rate (Max-SR) is proposed for secure directional modulation (DM) networks. By the method of Lagrange multiplier, the analytic expression of the proposed PA strategy is derived. To confirm the benefit from the Max-SR-based PA strategy, we take the null-space projection (NSP) beamforming scheme as an example and derive its closed-form expression of optimal PA strategy. From simulation results, we find the following facts: in the medium and high signal-to-noise-ratio (SNR) regions, compared with three typical PA parameters such β=0.1, 0.5, and 0.9, the optimal PA shows a substantial SR performance gain with maximum gain percent up to more than 60%. Additionally, as the PA factor increases from 0 to 1, the achievable SR increases accordingly in the low SNR region whereas it first increases and then decreases in the medium and high SNR regions, where the SR can be approximately viewed as a convex function of the PA factor. Finally, as the number of antennas increases, the optimal PA factor becomes large and tends to one in the medium and high SNR region. In other words, the contribution of AN to SR can be trivial in such a situation.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 5

page 6

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

I Introduction

Due to the broadcast nature of wireless transmission, security and privacy of confidential information increasingly becomes an extremely important problem in wireless networks. Directional modulation (DM), as a emerging and promising technique of physical layer security (PLS) in wireless networks, has attracted tremendous research interests from both academia and industry world. The concept of secrecy capacity was proposed for a discrete memoryless wiretap channel in [1], where the secure communication may be safeguarded if the channel of legitimated user is better than the channel of eavesdropper. Furthermore, artificial noise (AN) was utilized in [2, 3, 4, 5, 6] to enhance the information-theoretic security. In two typical scenarios, the transmitter with multiple antennas and the multiple-relay cooperation were used to improve the secret communication in [2]. In [5], the authors proposed an AN-aided zero forcing synthesis approach for secure multi-beam DM, and the dynamic multi-beam DM was achieved by randomly changing the AN vector at the symbol rate. As such, the intended users could receive confidential information while illegitimated users could not successfully recover the confidential messages. Moreover, some symbol-level precoding and cooperative relays were employed in [7] and [8, 9, 10] to enhance the PLS of wireless networks. Robust synthesis schemes for secure DM were proposed in [11, 12, 13, 14]

to enhance the security performance of desired directions and distort the constellation points of undesired directions. Given the uniform distribution of direction of arrival (DOA) measurement errors, the authors can significantly improved the bit error rate (BER) performance based on minimum mean square error criteria in

[11]. In addition, the authors of [12, 13, 14] extended the idea of literature [11]

to multi-beam DM scenarios in broadcasting systems, multicast precoding and multi-user multiple-input multiple-output (MIMO) systems in the presence of direction angel estimation errors. Furthermore, the authors in

[15] proposed a low-complexity secure and precise wireless transmission scheme combining random subcarrier selection (RSCS), orthogonal frequency division multiplexing (OFDM), and DM. In such a concept, the beamforming vector forms a two-dimensional direction and distance dependent property, which can transmit confidential messages to any given position, and form a high receive power peak around the position with only a little energy leaking out to the undesired area, where the undesired area is composed of all areas outside a small neighborhood around the desired position.

In [16, 17, 18, 19, 20, 21, 22], the transmitter transmitted confidential information concurrently with AN and the optimal power allocation (OPA) was analysed in different scenarios. Lower bounds of secrecy rate (SR) in multiple-input single-output with single-eavesdropper (MISOSE), multiple-input single-output with multiple-eavesdropper (MISOME) and multiple-input multiple-output multiple-eavesdropper (MIMOME) were derived in [16], and the closed-form solutions of OPA were obtained from these bounds. Additionally, equal power allocation (PA) and water-filling PA were analysed in this paper. The authors of [17] investigated the impact of PA parameter based on the asymptotic achievable SR in MIMO system with an active eavesdropper when the number of transmit antennas was infinite. Additionally, the effects of imperfect channel state information (CSI) were considered in [18, 19]. In [18], the OPA for the noncolluding eavesdropper case and colluding eavesdropper case were discussed, respectively. The authors of [19] proposed the OPA strategy in the presence of spatially randomly distributed eavesdropper. Furthermore, the authors designed a correlation-based PA strategy and compared it with uniform PA and OPA in [20], where the transmitter was equipped with correlated antennas. A cooperative jamming scheme was proposed in [21]

to enhance the PLS, and the authors analysed the impact of PA parameter between confidential information and AN by minimizing the secrecy outage probability subject to a minimum SR constraint. In

[22], the normal transmitter DT is responsible for broadcasting public information to its service subscriber DR and disrupting the unauthorized eavesdropper was taken into consideration to guarantee secure communication.

However, all the above literature concerning PA does not belong to the scope of DM. To the best of our knowledge, there is still no research investigation of PA in directional modulation networks. In this paper, given any beamforming vector and AN projection at DM transmitter, we propose an OPA strategy to maximize the SR. Simulation results confirm the benefit of the OPA. Our main contributions are summarized as follows:

  1. Given the beamforming vector of confidential messages and AN projection matrix and total power constraint, a PA strategy of maximizing secrecy rate (Max-SR) is proposed for secure DM networks. By the method of Lagrange multiplier, the analytic expression of the proposed PA strategy is derived.

  2. Take the null-space projection (NSP) beamforming scheme as an example, its simple closed-form expression is also derived. From simulation results, it follows that the PA has an obvious dramatic impact on the SR performance. Compared with three typical values of PA factor such as , and , especially with small-scale number of transmit antennas at DM transmitter, the SR performance gain achieved by the OPA is relatively attractive with the maximum SR improvement percent being more than .

The remainder of this paper is organized as follows. Section II presents the DM system model. In Section III, the PA strategy for Max-SR is proposed and its closed-form expression is given. Subsequently, the NSP scheme is taken as a special example and its OPA expression is simplified. Simulation and numerical results are shown in Section IV. Finally, we draw our conclusions in Section V.

Notations: Throughout the paper, matrices, vectors, and scalars are denoted by letters of bold upper case, bold lower case, and lower case, respectively. Signs , , and represent transpose, conjugate transpose, modulus and norm, respectively. denotes the identity matrix.

Ii System Model


Fig. 1: Schematic diagram of the proposed directional modulation system.

The schematic diagram of the proposed DM system is illustrated in Fig. 1, where Alice is equipped with antennas, and Bob and Eve are equipped with single antenna, respectively. In this paper, we assume there exists the line-of-sight (LOS) path. The transmitted baseband signal is expressed as

(1)

where is the total transmission power and limited, and are the PA parameters of confidential messages and AN, respectively. denotes the transmit beamforming vector for controlling the confidential message to the desired direction and is the projection matrix leading AN to the undesired direction, where and . In (1), is the confidential message of satisfying and

denotes the AN vector with complex Gaussian distribution, i.e.,

.

Taking the path loss into consideration, the received signal at Bob can be written as

(2)

where and represent the path loss coefficient and channel vector between Alice and Bob, respectively. is the distance between them, is the path loss exponent and is the attenuation at reference distance . is the complex additive white Gaussian noise (AWGN) with distribution . Likewise, the received signal at Eve is given by

(3)

where , and denote the path loss coefficient, the distance and the channel vector between Alice and Eve, respectively. is the complex AWGN following distribution . In the following, we assume that .

As per (II) and (II), we can derive the achievable rate along Bob and Eve as

(4)

and

(5)

respectively, which yield the following achievable secrecy rate (SR)

(6)

Iii Proposed PA Strategy of Max-SR

In this section, fixing and , the PA strategy of maximizing SR is proposed and its closed-form expression is presented. The derived expression is a general expression, which is suitable for any beamforming scheme. For instance, when the NSP beamforming scheme in [11] is adopted, a simple formula of OPA is directly given.

Iii-a Proposed General Power Allocation Strategy of Max-SR

Before investigating PA, let us consider the joint optimization problem of Max-SR, which is casted as

(7)

where the three optimization variables are the PA factor , and . It is hard to solve the above optimization problem. In what follows, we focus on the PA problem by assuming that the beamforming scheme is given. For any fixed beamforming scheme, it is obvious that PA is an efficient and important way to enhance its SR. In this subsection, we consider the design of power allocation factor based on maximizing the secrecy rate in general case. If the and are known or designed well in advance, then the above optimization degenerates towards the following simple PA problem.

According to (4) and (5), we can obtain the corresponding objective function in (III-A) as

(9)

where

(10)
(11)
(12)
(13)
(14)

Under the total transmit power constraint, the SR given by (III-A) is also limited. This means the numerator and denominator of the fraction inside logarithm operation (III-A) should be not equal to zero. Otherwise, an infinite value of SR is generated. Maximizing SR in (III-A) is equivalent to

(15)

which can be reduced to

(16)

considering , where means that SR is infinity. In terms of the above identity, we have the candidates for the optimal PA factor

(17)

and

(18)

where due to the non-negative real PA factor. The condition yields two singular points

(19)

The condition yields the remain two singular points

(20)

The above four critical points make the value of SR approach infinity, which is impossible to achieve an infinite SR with finite power in practice. For the purpose of simplifying our analysis below, it is assumed that the above four critical points lie outside the PA interval .

Meanwhile, we need to judge whether the two stationary points are in the interval of . After that, we can obtain the optimal value of by comparing the values of at endpoints and corresponding stationary points. While cannot be guaranteed, we need to discuss the relation between 0 and . The OPA parameter can be obtained by evaluating the following three cases.
Case 1. If , is a monotonously increasing function. Therefore, the OPA parameter is and the maximum secrecy rate is , i.e., all power of Alice is employed to transmit confidential information and the AN fails to work.
Case 2. When , the stationary point is . If , We need to compare the value of , and and obtain the OPA parameter by the corresponding value of of the maximum . Otherwise, we just need to compare the values of and .
Case 3. If , is a monotonously decreasing function. Consequently, the OPA parameter is and the optimal secrecy rate is , i.e., no confidential messages is transmitted to Bob and the secure communication cannot be guaranteed.

Furthermore, the detailed operational procedures of the proposed Max-SR PA strategy are presented in Algorithm 1.

  1. Initialization: , , , , , SNR.

  2. Compute .

    • If , four different cases are considered as fowllows
      Case 1. If , , then compare the values of , , and .
      Case 2. If , , then compare the values of , and .
      Case 3. If , , then compare the values of , and .
      Case 4. If , , then compare the values of and .
      After comparing the values of corresponding , we can get the OPA parameter by the corresponding value of of the maximum .

    • If , the OPA parameter has been solved in the aforementioned Case 1 to Case 3.

Algorithm 1 Proposed optimal power allocation strategy

Iii-B Proposed Simple Max-SR PA Strategy for NSP Beamforming Scheme

If the general beamforming scheme in subsection A is the simplest NSP scheme, then the problem to compute the optimal PA factor can be significantly simplified. In the case of NSP, the normalized values of beamforming vector and projection matrix is given by [11]

(21)

and

(22)

respectively, where

(23)

and the phase function is defined as

(24)

where denotes the -th antenna, is the distance of two adjacent antennas, and is the wavelength.

Substituting (21) and (22) into (III-A), the first derivative of can be written as

(25)

where

(26)
(27)
(28)
(29)

In the case of , the corresponding roots and corresponding to the equation that (25) is equal to zero can be denoted as

(30)

and

(31)

when . In the case of , the stationary point can be formulated as

(32)

Based on the above results, the determinant of OPA parameter is detailedly shown in Algorithm 1.

Iv Simulation and Discussion

To assess the SR performance gain of the proposed Max-SR PA strategy, simulation results and analysis are presented in the following. Taking NSP as beamforming scheme, we numerically examine the effect of on the performance gain achieved by the optimal PA strategy in comparison with some typical PA strategies.

In our simulation, system parameters are set as follows: quadrature phase shift keying(QPSK) modulation, the total transmitting power dBm, the spacing between two adjacent antennas , the distance between Alice and Bob is , the distance between Alice and Eve is , the path loss exponent , the desired direction , and the eavesdropping direction .


Fig. 2: Secrecy rate versus (SNR=0dB).

Fig. 3: Secrecy rate versus (SNR=15dB).

Fig. 4: Secrecy rate versus (SNR=30dB).

Fig. 5: Secrecy rate versus N at =0.1 and SNR=30dB

Fig. 6: Secrecy rate versus N at =0.5 and SNR=30dB

Fig. 7: Secrecy rate versus N at =0.9 and SNR=30dB

Fig. 8: Theoretical optimal power allocation parameter versus SNR with different numbers of antennas.

Fig. 2 plots the curves of SR (i.e., secrecy rate) versus with SNR=0dB. This case corresponds to the low SNR region. From this figure, we can observe that the SR increases with increasing the number of antennas. In addition, from the figure, it is seen that the SR increases continuously with the increase of regardless of the number of antennas. The result could be explained as follows: the superimposed AN is unnecessary in the low SNR regime because the channel noise is large enough. When the number of antennas is small, the SR is also small. For example, the SR approaches zero when the number of antennas is 4.

Fig. 3 demonstrates the curves of SR versus with SNR=15dB. The situation corresponds to the medium SNR region. We can find that the SR curve is concave downward and a concave function of , i.e., there exists a unique value of OPA parameter , which may maximize over the interval [0,1]. Furthermore, the associated optimal value of are 0.49, 0.88 and 0.99 when the number of antennas is 4, 16 and 64. It is seen that the optimal value of grow gradually as the number of antennas increases from 4 to 64.

Fig. 5, Fig. 6, and Fig. 7 depict the histograms of the SR versus N at , and , respectively. From Fig. 5, we can observe that the SR performance improvements achieved by the optimal value over are 23.3%, 46.5% and 40.9% for N=4, N=16, and N=64, respectively. The achievable SR performance gain is very attractive. Increasing the value of up to even , the SR performance gain indicates an obvious reduction trend as shown in Fig. 6, and Fig. 7. However, there are still a substantial performance gain in a small-scale number of transmit antennas.

Furthermore, the SR performance gain percentage compared with the SR of OPA parameter is shown in the three bar diagrams. The performance gain percentage achieved by OPA parameter at SNR=30dB is remarkable, especially when the PA factor .

In Fig. 8, we plot the theoretical optimal power allocation parameter versus SNR with different numbers of antennas. Observing this figure, we can find that the theoretical OPA parameter maintain 1 in the low SNR regime and begin to decrease in the medium and high SNR regimes, which represents that the AN has a little effect on SR performance in the low SNR regime and the impact of AN becomes larger in the medium and high SNR regimes. Additionally, the theoretical OPA parameter declines earlier and faster for a small number of antennas, for example, , compared with a larger number of antennas such as or . This demonstrates that the power to transmit confidential messages using a small number of antennas is less than that using a large number of antennas.

V Conclusion

In our work, we proposed an optimum PA strategy of maximizing SR in secure DM networks. Firstly, a general optimization problem of maximizing SR was established. Given any beamforming scheme, the closed-form OPA strategy is given. Then the OPA parameter can be obtained by discussing different scenarios. Finally, the NSP-based OPA strategy is taken into consideration and its closed-form formula was derived. Simulation and numerical results show that, in medium and high SNR regions, the proposed OPA can substantially improve the SR performance compared with some typical PA factors such as 0.1, 0.5, and 0.9. Moreover, the OPA factor achieves its optimal value in the open interval , and grows gradually with increasing in the number of transmit antennas. In the low SNR region, the OPA factor is equal to 1, i.e., the total transmit power is utilized to transmit confidential messages and the AN play a trivial role here. As the number of antennas tends to large-scale, the OPA parameter is close to one. In summary, in the medium and high SNR regions or small number of transmit antennas at DM transmitter, the OPA strategy has an important impact on SR performance. The proposed OPA strategy is a general-form PA strategy suitable for any beamforming scheme, and may be applied to any given bemaforming scheme. This makes it available to the diverse future applications such as future mobile communications, satellite communications, millimeter-wave communications, unmanned-aerial-vehicles networks, device-to-device, and vehicle-to-vehicle.

References

  • [1] A. D. Wyner, “The wire-tap channel,” Bell. Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
  • [2] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
  • [3] N. Yang, S. Yan, J. Yuan, R. Malaney, R. Subramanian, and I. Land, “Artificial noise: Transmission optimization in multi-input single-output wiretap channels,” IEEE Trans. Commun., vol. 63, no. 5, pp. 1771 – 1783, May. 2015.
  • [4] N. Zhao, F. R. Yu, M. Li, Q. Yan, and V. C. Leung, “Physical layer security issues in interference-alignment-based wireless networks,” IEEE Commun. Mag., vol. 54, no. 8, pp. 162–168, Aug. 2016.
  • [5] T. Xie, J. Zhu, and Y. Li, “Artificial-noise-aided zero-forcing synthesis approach for secure multi-beam directional modulation,” IEEE Commun. Lett., vol. PP, no. 99, pp. 1–1, 2017.
  • [6] Y. Ding and V. Fusco, “A vector approach for the analysis and synthesis of directional modulation transmitters,” IEEE Trans. Antennas Propag., vol. 62, no. 1, pp. 361–370, Jan. 2014.
  • [7] A. Kalantari, M. Soltanalian, S. Maleki, S. Chatzinotas, and B. Ottersten, “Directional modulation via symbol-level precoding: A way to enhance security,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1478–1493, Dec. 2016.
  • [8] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process, vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
  • [9] H. Wang, Q. Yin, and X.-G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks,” IEEE Trans. Signal Process, vol. 61, no. 5, pp. 3532–3545, Jul. 2012.
  • [10] Y. L. Zou, B. Champagne, W.-P. Zhu, and L. Hanzo, “Relay-selection improves the security-reliability trade-off in cognitive radio systems,” IEEE Trans. Commun., vol. 63, no. 1, pp. 215–228, Jan. 2015.
  • [11] J. Hu, F. Shu, and J. Li, “Robust synthesis method for secure directional modulation with imperfect direction angle,” IEEE Commun. Lett., vol. 20, no. 6, pp. 1084–1087, Jun. 2016.
  • [12] F. Shu, X. Wu, J. Li, R. Chen, and B. Vucetic, “Robust synthesis scheme for secure multi-beam directional modulation in broadcasting systems,” IEEE Access, vol. 4, pp. 6614–6623, Oct. 2016.
  • [13] F. Shu, W. Zhu, X. Zhou, J. Li, and J. Lu, “Robust secure transmission of using main-lobe-integration based leakage beaforming in directional modulation MU-MIMO systems,” IEEE Syst. J., vol. PP, no. 99, pp. 1–11, Nov. 2017.
  • [14] F. Shu, L. Xu, J. Wang, W. Zhu, , and X. Zhou, “Artificial-noise-aided secure multicast precoding for directional modulation systems,” IEEE Trans. Veh. Technol., accepted with minor revision, Dec. 2017.
  • [15] F. Shu, X. Wu, J. Hu, R. Chen, and J. Wang, “Secure precise wireless transmission with random-subcarrier-selection-based directional modulation transmit antenna array,” IEEE J. Sel. Areas Commun., accepted with minor revision, Dec. 2017.
  • [16] S. Tsai and H. V. Poor, “Power allocation for artificial-noise secure MIMO precoding systems,” IEEE Trans. Signal Process, vol. 62, no. 13, pp. 3479–3493, Jul. 2014.
  • [17] Y. Wu, R. Schober, D. K. Ng, C. Xiao, and G. Caire, “Secure massive MIMO transmission in the presence of an active eavesdropper,” IEEE ICC, pp. 1434–1440, 2015.
  • [18] X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, Oct. 2010.
  • [19] T. Zheng and H. Wang, “Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers,” IEEE Trans. Veh. Technol., vol. 65, no. 19, pp. 8812–8817, Oct. 2016.
  • [20] S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8286–8297, Dec. 2016.
  • [21] L. Hu, H. Wen, B. Wu, F. Pan, R. Liao, H. Song, J. Tang, and X. Wang, “Cooperative jamming for physical layer security enhancement in internet of things,” IEEE Internet Things J., vol. PP, no. 99, pp. 1–1, 2017.
  • [22] H. Song, H. Wen, L. Hu, Y. Chen, and R. Liao, “Optimal power allocation for secrecy rate maximization in broadcast wiretap channels,” IEEE Trans. Veh. Technol., vol. PP, no. 99, pp. 1–1, 2018.