This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Increasing Security Degree of Freedom in Multi-user and Multi-eve Systems

Kun Xie and Wen Chen,  and Lili Wei, 
Copyright (c) 2012 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org.The authors are with the Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China, 200240 (e-mail: {xiekunuestc, wenchen, liliwei@sjtu.edu.cn.)This work is supported by the National 973 Project #2012CB316106 and #2009CB824904, by NSF China #60972031 and #61161130529.
Abstract

Secure communication in the Multi-user and Multi-eavesdropper (MUME) scenario is considered in this paper. It has be shown that secrecy can be improved when the transmitter simultaneously transmits information-bearing signal to the intended receivers and artificial noise to confuse the eavesdroppers. Several processing schemes have been proposed to limit the co-channel interference (CCI). In this paper, we propose the increasing security degree of freedom (ISDF) method, which takes idea from the dirty-paper coding (DPC) and ZF beam-forming. By means of known interference pre-cancelation at the transmitter, we design each precoder according to the previously designed precoding matrices, rather than other users’ channels, which in return provides extra freedom for the design of precoders. Simulations demonstrate that the proposed method achieves the better performance and relatively low complexity.

Index Terms:
MUME-MIMO, Block Diagonalization, ZF beam-forming, ISDF, Secrecy Capacity,

I Introduction

The growing interest in security at the physical layer of wireless communications has sparked a resurgence of research in secure communication. In the early works on information theoretic security, Wyner introduces the wiretap channel model, in which the eavesdropper’s channel is defined to be a degraded version of the legitimate receiver’s channel [1]. It is shown that a non-zero secrecy capacity can be obtained only if the eavesdropper’s channel is of lower quality than that of the intended recipient. Csiszár and Körner extend this problem to a general non-degraded channel condition in which a common message is transmitted to the two receivers and the confidential message to only one of them [2]. Another main assumption in the aforementioned works is that the eavesdropper’s channel is known at the transmitter [3, 4], and then the generalized singular value decomposition (GSVD) 111The generalized singular value decomposition (GSVD) of an m×nm\times n matrix 𝐀\mathbf{A} and a p×np\times n matrix 𝐁\mathbf{B} is given by the pair of factorizations  𝐀=𝐔1[𝟎,𝐑]𝐐T\mathbf{A}=\mathbf{U}\sum_{1}[\mathbf{0,R}]\mathbf{Q}^{T} and 𝐁=𝐕2[𝟎,𝐑]𝐐T\mathbf{B}=\mathbf{V}\sum_{2}[\mathbf{0,R}]\mathbf{Q}^{T}, where 𝐔\mathbf{U}, 𝐕\mathbf{V} and 𝐐\mathbf{Q} are orthogonal matrices, RR is an r×rr\times r upper triangular nonsingular matrix, 1\sum_{1} and 2\sum_{2} are nonnegative diagonal matrice satisfying 1T1+2T2=𝐈\sum_{1}^{T}\sum_{1}+\sum_{2}^{T}\sum_{2}=\mathbf{I}. method can be used to transmit the signal to the null space of the channel from transmitter to eavesdropper. Clearly, these assumptions are usually impractical and unreasonable, particularly for passive eavesdroppers. In this paper, we overcome this problem and propose a scheme without using any CSI of eavesdroppers.

In order to achieve secure communication, even when the receiver’s channel is worse than the eavesdropper’s channel, or the absence of eavesdroppers’ channel state information (CSI), various physical-layer techniques have been proposed. One of the most common techniques is the use of cooperative interference or artificial noise to confuse the eavesdropper. The cooperative interference method can be divided into two categories: (i) the trust-friend model, in which two base stations connected by a high-capacity backbone such as optical fiber, and one base station can continuously transmit an interfering signal to secure the uplink communication for the other base station [5, 6]; (ii) the helper-relay model, where the secrecy level can be increased by having the cooperative interferer [7] or relay [8] to send codewords independent to the source message, which can be canceled at the intended receiver.

Another major techniques for secure communication is the use of multiple antennas. When multiple antennas are equipped at the transmitter, it is possible for the transmitter to simultaneously transmit both the information-bearing signal and artificial noise to achieve secrecy in a fading environment [9]-[11], which may replace the role of the cooperative interference method in [5]-[8]. In the design of secure communication with artificial noise, the transmit power allocation between the information signal and the artificial noise is an important issue, which has not been discussed in [9, 10, 11]. A suboptimal power allocation strategy is considered in [12], which aims to meet an ideal signal-to-interference-and-noise ratio (SINR) at the intended receiver to satisfy a quality of service requirement. The secure communication with artificial noise is also discussed in [11], in which the closed-form expression of achievable rate and the optimal power allocation has been obtained, however only single-receiver and single-antenna at receiver was considered.

Most of the previous papers focus on the single-user systems. However most practical communication systems have more than one user and the eavesdroppers may not appear alone as well, and they may choose to cooperate or not [11]. In addition, each terminal may be equipped with multiple antennas, which is representative, for example, of downlink transmission in LTE systems and wireless local area networks. This is the so called Multi-User and Multi-Eve (MUME) MIMO systems, which have been seldom investigated before. In this paper, we will focus on investigating the MUME systems.

It’s also worth noting that the achievable secrecy rate of MUME systems is different from that of single-user and single-antenna systems studied before, which must make sure that any legitimate user will not be wiretapped by any eavesdropper. The authors in [13] put forward an MUME model in which all other users are viewed as potential eavesdroppers by the targeted user. They also give a definition of the achievable secrecy rate of multiuser wiretap model in terms of secrecy sum rate. The authors in [14] give another definition of achievable secrecy rate in Gaussian MIMO multi-receiver Wiretap channel, which is named secrecy capacity region. Besides, the authors in [15, 16] considers the compound wire-tap channel, which is based on the classical wire-tap channel with channel from the source to the destination and the channel from the source to the wiretapper taking a number of states respectively. It can be viewed as the multicast wire-tap channel with multiple destinations and multiple wire-tappers with the same massage transmitted to different destinations, which is slightly different from the broadcast wire-tap channels in this paper. They also give another significant definition of the achievable secrecy rate in terms of absolute secrecy rate, which idea is to take the security of the poorest-performance receive-wiretap pair into consideration. If the poorest-performance pair can meet the quality of service requirement, then all other pairs can do. Therefore this definition of achievable secrecy rate may be more reasonable and constructive in the practical secure communication systems. The authors in [16, 17] discussed the realization of the achievable secrecy rate of multiple users (multiple eavesdroppers) with artificial noise separately, in which, however, the system model is compound wiretap channel but broadcast MUME wiretap channel [18].

Since the transmitter needs to transmit different message to different receivers in the broadcast MUME wiretap model, there must be considerable co-channel interference (CCI) in the system. In order to limit the CCI from the signals transmitted to other users and mask receivers’ own message signal simultaneously, two practical linear transmission schemes were often used in the early works: (i) the SVD method discussed in [9, 11], which conducts an SVD decomposition on each user’s channel matrix to get a maximum channel gain for their own message but can not suppress the interference from other user’s message; (ii) the ZF beamforming method [19] and its promotion—-the BD method [20, 21], in which all the information is transmitted in the null space of all other receivers’ channels. The SVD method and ZF beamforming method are simple, but of little ideal performance. While the BD method is of somewhat ideal performance but more complicated than the formers.

In view of the drawbacks of the previous schemes, we propose an alternative approach, which takes idea from dirty-paper coding (DPC) [22, 23] and ZF beam-forming [19]. It can directly increase the degree of freedom when designing the transmission precoders, which in return make obvious improvement not only at the achievable secrecy rate, but also at the antenna constraints at transmitter compared with the BD method. What’s more, in our proposed scheme, we choose to map the artificial noise into the null space of co-precoder matrix instead of the null space of legitimate receivers’ channels in the existing schemes, which may offer extra improvement on the secrecy rate in the low SNR region. The performance will be further improved when the water-filling (WF) method is used. Besides, the power allocation between the information signal and the artificial noise are also discussed.

In this paper, ()H{(\cdot)}^{H} and tr()tr(\cdot) denote the Hermitian transpose and trace of a matrix. E()E(\cdot) denotes expectation, and 𝐈\mathbf{I} denotes an identity matrix. I(,)I(\cdot,\cdot) denotes mutual information. [x]+[x]^{+} = max{0,x}\{0,x\}.

II System Model

In this paper, we consider the broadcast MUME wiretap model as shown in Fig. 1, in which there is one transmitter named Alice, JJ legitimate users named Bobs and KK passive eavesdroppers named Eves. Alice tries to send independent messages to all the legitimate receivers while keeping each of the eavesdropper ignorant of all the messages. All of the terminals are equipped with multiple antennas. NBjN_{Bj} antennas are equipped at the jj-th Bob, NEkN_{Ek} antennas at the kk-th Eve, and NAN_{A} antennas at the single Alice. This scenario is representative, for example, of downlink transmission in the LTE systems and wireless local area networks.

Let the transmit signal 𝐗=j=1J𝐔j+𝐕{\bf X}=\sum_{j=1}^{J}{{\bf U}_{j}}+{\bf V}, where 𝐔j{\bf U}_{j} is the information bearing signal vector for user jj, and 𝐕{\bf V} is the artificial noise signal vector to interference Eves. Then the received signals at Bobs and Eves are respectively:

\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 1: The MUME-MIMO wiretap system model.
Bobj:𝐘j=𝐇j𝐗+𝐍jB,forj=1,,J,\displaystyle\text{Bob}~{}j:~{}~{}{\bf Y}_{j}={\bf H}_{j}{\bf X}+{\bf N}^{B}_{j},~{}~{}\text{for}~{}j=1,...,J, (1)
Evek:𝐙k=𝐆k𝐗+𝐍kE,fork=1,,K,\displaystyle\text{Eve}~{}k:~{}~{}{\bf Z}_{k}={\bf G}_{k}{\bf X}+{\bf N}^{E}_{k},~{}~{}\text{for}~{}k=1,...,K,

where 𝐇j{\bf H}_{j} is the NBj×NAN_{Bj}\times N_{A} channel matrix between the transmitter and Bob jj, 𝐆k{\bf G}_{k} is the NEk×NAN_{Ek}\times N_{A} channel matrix between the transmitter and eavesdropper kk, 𝐍jB\mathbf{N}^{B}_{j} and 𝐍kE\mathbf{N}^{E}_{k} are respectively the additive white Gaussian noise vectors observed at the jj-th Bob and kk-th Eve, which covariance matrices satisfy E[𝐍jB𝐍jBH]=σBj2𝐈E[\mathbf{N}^{B}_{j}{\mathbf{N}^{B}_{j}}^{H}]=\sigma_{Bj}^{2}\mathbf{I}, and E[𝐍kE𝐍kEH]=σEk2𝐈E[\mathbf{N}^{E}_{k}{\mathbf{N}^{E}_{k}}^{H}]=\sigma_{Ek}^{2}\mathbf{I} respectively.

We assume that the channel matrix 𝐇j\mathbf{H}_{j} and 𝐆k{\bf G}_{k} are block-fading, whose entries are complex Gaussian variables with zero-mean and unit-variance. We also assume that perfect channel state information (CSI) of the receiver, i.e., the channel matrices 𝐇j\mathbf{H}_{j}, j=1,2,,Jj=1,2,~{}\ldots~{},J, are available at Alice, e.g., either through reverse channel estimation in time-division-duplex (TDD) or feedback in frequency-division-duplex (FDD). While the channel matrices 𝐆k\mathbf{G}_{k}, k=1,2,,Kk=1,2,~{}\ldots~{},K, are unavailable at Alice due to the passive nature of eavesdroppers.

Our objective is to transmit different secret message to the corresponding Bobs. We try to reduce the CCI from the others, and make sure that the underlying Eves can not wiretap any communication between Alice and Bobs. In the following, we provide lower and upper bounds on the achievable secrecy rate of the generalized broadcast MUME wire-tap channel.

Let RjBR^{B}_{j} denote the mutual information rate between Alice and Bob jj, and RkER^{E}_{k} denote that between Alice and Eve kk for Bob jj. Then

RjB=max[I(Uj;Yj)],forj=1,,J,\displaystyle R^{B}_{j}=\max[I(U_{j};Y_{j})],~{}~{}\text{for}~{}j=1,...,J, (2)
RjkE=max[I(Uj;Zk)],fork=1,,K.\displaystyle R^{E}_{jk}=\max[I(U_{j};Z_{k})],~{}~{}\text{for}~{}k=1,...,K.

In the sequel, the achievable secrecy rate of the receive-wiretap pair (j,k)(j,k) (for Bob jj and Eve kk) can be denoted by [24]

Rjk=[RjBRjkE]+.\displaystyle R_{jk}={[R^{B}_{j}-R^{E}_{jk}]}^{+}. (3)

The achievable secrecy rate of MUME wiretap model is usually noted by secrecy sum rate (RssrR_{ssr}) [13] or secrecy rate region [14]. However, in the practical broadcast MUME wireless communication systems, the massages transmitted vary with different users, we should take each user into consideration, once it is chosen according to some criterion. Therefore we must make sure that any user’s communication can not be wiretapped by any eavesdropper. Hence the secrecy rate of the system is determined neither by the best transmission pair nor the total rate gap between Bobs and Eves, but by the poorest-performance transmission pair in reality. Then we propose an alternative definition of the secrecy rate for MUME wire-tap channel, which is called absolute secrecy rate (RasrR_{asr}). Obviously, the absolute secrecy rate actually is just the lower bound of the achievable secrecy rate, and can be given by

Rasr\displaystyle R_{asr} =minj,k{Rjk}=minj,k{[RjBRjkE]+}=[minj{RjB}maxk{RjkE}]+\displaystyle=\min_{j,k}\{R_{jk}\}=\min_{j,k}\{{[R^{B}_{j}-R^{E}_{jk}]}^{+}\}={[\min_{j}\{R^{B}_{j}\}-\max_{k}\{R^{E}_{jk}\}]}^{+} (4)
=[minjmaxPUjI(Yj;Uj)maxkmaxPUjI(Zk;Uj))]+,\displaystyle={[\min_{j}\max_{P_{U_{j}}}I(Y_{j};U_{j})-\max_{k}\max_{P_{U_{j}}}I(Z_{k};U_{j}))]}^{+},

where PUjP_{U_{j}} is an input distribution. As for the secrecy sum rate (Rssr)(R_{ssr}), we have

Rssr\displaystyle R_{ssr} =jmink{Rjk}=j[RjBmaxk{RkE}]+\displaystyle=\sum_{j}\min_{k}\{R_{jk}\}=\sum_{j}{[R^{B}_{j}-\max_{k}\{R^{E}_{k}\}]}^{+} (5)
=j[maxPUjI(Yj;Uj)maxkmaxPUjI(Zk;Uj))]+.\displaystyle=\sum_{j}{[\max_{P_{U_{j}}}I(Y_{j};U_{j})-\max_{k}\max_{P_{U_{j}}}I(Z_{k};U_{j}))]}^{+}.

III the Design of Precoders in MUME-MIMO Network Based on ISDF

At Alice, the data for each user is processed before transmission. Then it is launched into the MIMO channel with the random artificial noise. Let 𝐖j\mathbf{W}_{j} be an NA×djN_{A}\times d_{j} linear precoder, 𝐮j\mathbf{u}_{j} be a dj×1d_{j}\times 1 symbol vector for Bob jj, and djd_{j} be the number of parallel data symbols transmitted simultaneously for Bob jj [22] satisfying 1djNBj1\leq d_{j}\leq N_{Bj}. Let 𝐕\mathbf{V} be the artificial noise signal vector, 𝐖\mathbf{W} be the transmission preprocessing matrix, and 𝐯\mathbf{v} be the symbol vector. They are both used for the artificial noise. Then the transmission signal is

𝐗=j=1J𝐔j+𝐕=j=1J𝐖j𝐮j+𝐖𝐯.\displaystyle\mathbf{X}=\sum_{j=1}^{J}\mathbf{U}_{j}+\mathbf{V}=\sum_{j=1}^{J}\mathbf{W}_{j}\mathbf{u}_{j}+\mathbf{W}\mathbf{v}. (6)

The received signal at Bobs and Eves are respectively

𝐘j=𝐇j=1J𝐖𝐮+𝐇j𝐖𝐯+𝐍jB,j=1,,J,\displaystyle\mathbf{Y}_{j}=\mathbf{H}_{j}\sum_{\ell=1}^{J}\mathbf{W}_{\ell}\mathbf{u}_{\ell}+\mathbf{H}_{j}\mathbf{Wv}+\mathbf{N}^{B}_{j},~{}j=1,~{}\ldots~{},J, (7)
𝐙k=𝐆k=1J𝐖𝐮+𝐆k𝐖𝐯+𝐍kE,k=1,,K.\displaystyle\mathbf{Z}_{k}=\mathbf{G}_{k}\sum_{\ell=1}^{J}\mathbf{W}_{\ell}\mathbf{u}_{\ell}+\mathbf{G}_{k}\mathbf{Wv}+\mathbf{N}^{E}_{k},~{}k=1,~{}\ldots~{},K.

The emphasis of this paper is to design the precoders 𝐖\mathbf{W}_{\ell} for =1,2,,J\ell=1,2,~{}\ldots~{},J and 𝐖\mathbf{W}. In the SVD method all the data is transmitted in their own channel image space, so that each Bob can get the maximum channel gain for the corresponding message. Another one is the block diagonalization (BD) method, in which all the data is transmitted in the null space of all other Bobs, which is the promotion of the ZF beamforming method and can reduce the interference from the other users’ message signal. Here, we propose an alternative approach—-the increasing security degrees of freedom (ISDF) method, which is based on dirty-paper coding (DPC) [22, 23] and ZF beam-forming [19]. In this paper, a single data stream is to be sent to each receiver when dj=1,jd_{j}=1,~{}\forall j, and multiple data streams are sent when dj>1,jd_{j}>1,~{}\forall j. Note that, only a maximum of NBjN_{Bj} streams can be transmitted simultaneously for user jj, else the message will not be decoded. Criterion of judging the design is whether the secrecy rate is sufficiently good under the given power constraints, which will be discussed in detail with the design of precoders in the following part.

In MUME scenarios, several co-channel Bobs with multiple antennas aim to communicate with Alice in the same frequency and time slots. In this case, it is necessary to design transmission scheme that is able to suppress the CCI at Bobs. In multi-user wireless security communications with artificial noise, the precoding matrix is usually designed in the null space of channel matrix 𝐇j\mathbf{H}_{j}. We may called it precoding selection space as well. Obviously, the smaller the rank of matrix 𝐇j\mathbf{H}_{j} is, the larger the dimension of its corresponding precoding selection space will be. In return, the design of the corresponding precoder has more freedom and the secrecy performance will be better. Therefore we define the dimension of the precoding selection space as the security degrees of freedom (SDF).

III-A Design of Precoders for Bobs Based on ISDF

In the existing schemes e.g., the SVD method, ZF beamforming method and BD method, the precoder is designed based on their corresponding user’s own channel matrix or the other users’ channel matrices, which means the SDF will be largely limited by the rank of their corresponding channel matrices and the performance will be inevitably affected. To solve this problem, here we propose a new method, which are designed based on the previously designed precoders instead. Because the new method can directly increase the SDF when designing each precoder, we just name it as the increasing security degree of freedom (ISDF) method. This method is similar to the idea of DPC method [23] in some sense. For example, Alice first picks a precoder for Bob 1 and then chooses a precoder for Bob 2 with full (noncausal) knowledge of the precoder for Bob 1. Therefore, Bob 1 does not see the signal intended for Bob 2 as interference. Similarly, the precoder for Bob 3 is chosen such that Bob 1 and Bob 2 do not see the signals intended for Bob 3 as interference. This process continues for all Bobs. Bob J subsequently sees the signals intended for all other users as interference, Bob 2 sees the signals intended for Bob 1 as interference, etc.

Suppose that the JJ Bobs has been sorted as Bob 1, Bob 2, \ldots, Bob JJ according to some criterion, which will be discussed in the simulation section. We first design 𝐖1\mathbf{W}_{1} for Bob 1 without loss of generality.

𝐖1maxd1eigenvectors  of(𝐇1H𝐇1),\displaystyle\mathbf{W}_{1}\propto\max~{}d_{1}~{}\text{eigenvectors ~{}of}~{}(\mathbf{H}_{1}^{H}\mathbf{H}_{1}), (8)

where Eq. (8)(\ref{L8 equation 8}) means that 𝐖1\mathbf{W}_{1} is composed by the d1d_{1} eigenvectors corresponding to the largest d1d_{1} eigenvalues of 𝐇1H𝐇1\mathbf{H}_{1}^{H}\mathbf{H}_{1}, 1d1NB11\leq d_{1}\leq N_{B1}.

Then the following precoders are designed to satisfy an basic condition that each of them must be located in the null space of all previously designed precoders.

{𝐖2ker(𝐖1),𝐖3ker(𝐖1)ker(𝐖2),𝐖ji=1,i<jker(𝐖i),𝐖Ji=1J1ker(𝐖i),\left\{{\begin{array}[]{ll}\mathbf{W}_{2}\subset\ker(\mathbf{W}_{1}),\\ \mathbf{W}_{3}\subset\ker(\mathbf{W}_{1})\bigcap\ker(\mathbf{W}_{2}),\\ ~{}\vdots\\ \mathbf{W}_{j}\subset\underset{i=1,i<j}{\bigcap}\ker(\mathbf{W}_{i}),\\ ~{}\vdots\\ \mathbf{W}_{J}\subset\overset{J-1}{\underset{i=1}{\bigcap}}\ker(\mathbf{W}_{i}),\end{array}}\right. (9)

where ker()\ker(\cdot) denotes the null space (the kernel) of some matrix, and \cap represents the intersection of subspaces. Here, we define the co-designed-precoders matrix for the Bob jj as

𝐖~j=[𝐖1,𝐖2,,𝐖j1].\mathbf{\widetilde{W}}_{j}={[\mathbf{W}_{1},\mathbf{W}_{2},~{}\ldots~{},\mathbf{W}_{j-1}]}. (10)

From Eq. (9)(\ref{L9 equation 9}), we know that the design of each precoder should satisfy 𝐖jT𝐖~j=[0,,0]\mathbf{W}_{j}^{T}\mathbf{\widetilde{W}}_{j}=[\textbf{0},\cdots,\textbf{0}].

Let LjL_{j} be the dimension of ker(𝐖~j)\ker(\widetilde{\mathbf{W}}_{j}). Then the precoder 𝐖𝐣\mathbf{W_{j}} can be composed by

𝐖j=𝐓null,j𝐓stream,j,\mathbf{W}_{j}=\mathbf{T}_{null,j}\mathbf{T}_{stream,j}, (11)

where 𝐓null,j\mathbf{T}_{null,j} is used to suppress the interference, which is an NA×LjN_{A}\times L_{j} matrix. 𝐓stream,j\mathbf{T}_{stream,j} is an Lj×djL_{j}\times d_{j} matrix used for streams selection, which can make better use of the space resource and therefore improve the capacity.

Note that the precoding matrix 𝐖j\mathbf{W}_{j} should be a nonzero matrix, otherwise, no signal is transmitted. To guarantee the existence of a nonzero precoding matrix, a sufficient condition is that the number of the transmit antennas is larger than the previous j1j-1 users’ total data streams, i.e.,

NA>maxj=1,2,,Ji=1J1di.\displaystyle N_{A}>\max_{j=1,2,\ldots,J}~{}~{}\sum_{i=1}^{J-1}d_{i}. (12)

Under this sufficient condition, let {𝐭j1,𝐭j2,,𝐭jLj}\{\mathbf{t}_{j}^{1},\mathbf{t}_{j}^{2},~{}\ldots~{},\mathbf{t}_{j}^{L_{j}}\} be an orthnormal basis of the subspace ker(𝐖~j)ker(\widetilde{\mathbf{W}}_{j}). Then the kernel space is spanned by the generator 𝐓j(0)=[𝐭j1,𝐭j2,,𝐭jLj]\mathbf{T}_{j}^{(0)}=[\mathbf{t}_{j}^{1},\mathbf{t}_{j}^{2},~{}\ldots~{},\mathbf{t}_{j}^{L_{j}}]. Then Eq. (9)(\ref{L9 equation 9}) can be rewritten as

{𝐖2span𝐓2(0)=ker(𝐖1)=ker(𝐖~2),𝐖3span𝐓3(0)=ker(𝐖1)ker(𝐖2)=ker(𝐖~3),𝐖jspan𝐓j(0)=i=1,i<jker(𝐖i)=ker(𝐖~j),𝐖Jspan𝐓J(0)=i=1J1ker(𝐖J)=ker(𝐖~J),\left\{{\begin{array}[]{ll}\mathbf{W}_{2}\subset\mbox{span}\mathbf{T}_{2}^{(0)}=\ker(\mathbf{W}_{1})=\ker({\mathbf{\widetilde{W}}}_{2}),\\ \mathbf{W}_{3}\subset\mbox{span}\mathbf{T}_{3}^{(0)}=\ker(\mathbf{W}_{1})\bigcap\ker(\mathbf{W}_{2})=\ker({\mathbf{\widetilde{W}}}_{3}),\\ ~{}\vdots\\ \mathbf{W}_{j}\subset\mbox{span}\mathbf{T}_{j}^{(0)}=\underset{i=1,i<j}{\bigcap}\ker(\mathbf{W}_{i})=\ker({\mathbf{\widetilde{W}}}_{j}),\\ ~{}\vdots\\ \mathbf{W}_{J}\subset\mbox{span}\mathbf{T}_{J}^{(0)}=\overset{J-1}{\underset{i=1}{\bigcap}}\ker(\mathbf{W}_{J})=\ker({\mathbf{\widetilde{W}}}_{J}),\\ \end{array}}\right. (13)

where the generator matrix 𝐓j(0)\mathbf{T}_{j}^{(0)} can be computed through singular value decomposition (SVD) [25] as

𝐖~j=[𝐓j(1)𝐓j(0)][ΣW𝟎𝟎𝟎][𝐑j(1)𝐑j(0)],\displaystyle{\mathbf{\widetilde{W}}}_{j}=\left[\begin{array}[]{ccc}\mathbf{T}_{j}^{(1)}&\mathbf{T}_{j}^{(0)}\end{array}\right]\left[\begin{array}[]{ccc}\Sigma_{W}&\mathbf{0}\\ \mathbf{0}&\mathbf{0}\end{array}\right]\left[\begin{array}[]{ccc}\mathbf{R}_{j}^{(1)}\\ \mathbf{R}_{j}^{(0)}\end{array}\right], (14)

where ΣW\Sigma_{W} is a diagonal matrix whose diagonal entries are in descending order. Then we can get 𝐓null,j=𝐓j(0)\mathbf{T}_{null,j}=\mathbf{T}_{j}^{(0)}, which is an NA×LjN_{A}\times L_{j} matrix.

As for 𝐓stream,j\mathbf{T}_{stream,j} whose role is to linearly combine the LjL_{j} orthnomral basis to compose a precoder with djd_{j} columns, it therefore can make better use of the space resource. The design of 𝐓stream,j\mathbf{T}_{stream,j} can be achieved by applying SVD to the equivalent channel matrix 𝐇~j=𝐇j𝐓null,j\widetilde{\mathbf{H}}_{j}=\mathbf{H}_{j}\mathbf{T}_{null,j},

𝐇~jT=[𝐓~j(1)𝐓~j(0)][ΣH𝟎𝟎𝟎][𝐑~j(1)𝐑~j(0)],\displaystyle\widetilde{\mathbf{H}}_{j}^{T}=\left[\begin{array}[]{ccc}\widetilde{\mathbf{T}}_{j}^{(1)}&\widetilde{\mathbf{T}}_{j}^{(0)}\end{array}\right]\left[\begin{array}[]{ccc}\Sigma_{H}&\mathbf{0}\\ \mathbf{0}&\mathbf{0}\end{array}\right]\left[\begin{array}[]{ccc}\widetilde{\mathbf{R}}_{j}^{(1)}\\ \widetilde{\mathbf{R}}_{j}^{(0)}\end{array}\right], (15)

where ΣH\Sigma_{H} is a diagonal matrix whose diagonal entries are in descending order. Then we get 𝐓stream,j=𝐓~j(1)\mathbf{T}_{stream,j}=\widetilde{\mathbf{T}}_{j}^{(1)}, which is an Lj×djL_{j}\times d_{j} matrix. Then Eq. (11)(\ref{L11 equation 11}) can be rewritten as:

𝐖j=𝐓j(0)𝐓~j(1).\displaystyle\mathbf{W}_{j}=\mathbf{T}_{j}^{(0)}\widetilde{\mathbf{T}}_{j}^{(1)}. (16)

The dimension of 𝐖j\mathbf{W}_{j} is djLjd_{j}\leq L_{j}. If dj=1d_{j}=1, there is a single data stream sent to Bob jj, and 𝐓stream,j\mathbf{T}_{stream,j} contains the singular vector corresponding to the largest singular value, i.e., the data stream is transmitted through the equivalent channel with the largest singular value. So does for 1<dj<Lj1<d_{j}<L_{j}. If dj=Ljd_{j}=L_{j}, the data streams will be transmitted through all the sub-channels with non-zero singular value. In order to simplify the analysis, we assume that the power are uniformly allocated for the message of user jj. The secrecy rate can be further increased if Water-Filling (WF) method is used, which will be discussed in section IV.

Obviously, we can get the SDF for each method as following:

𝐒𝐃𝐅j,ISDF=the dimension of=1j1ker(𝐖),\displaystyle\mathbf{SDF}_{j,ISDF}=~{}\text{the dimension of}~{}\cap_{\ell=1}^{j-1}\ker({\mathbf{{W}}}_{\ell}), (17)
𝐒𝐃𝐅j,BD=the dimension ofjker(𝐇),\displaystyle\mathbf{SDF}_{j,BD}=~{}\text{the dimension of}~{}\cap_{\ell\neq j}\ker({\mathbf{{H}}}_{\ell}),
𝐒𝐃𝐅j,ZF=the dimension ofjker(𝐇),\displaystyle\mathbf{SDF}_{j,ZF}=~{}\text{the dimension of}~{}\cap_{\ell\neq j}\ker({\mathbf{{H}}}_{\ell}),
𝐒𝐃𝐅j,SVD=the dimension ofker(𝐇j).\displaystyle\mathbf{SDF}_{j,SVD}=~{}\text{the dimension of}~{}\ker({\mathbf{H}}_{j}).

Since the dimension of ker(𝐖)\ker({\mathbf{{W}}}_{\ell}) is usually greater than that of jker(𝐇)\cap_{\ell\neq j}\ker({\mathbf{{H}}}_{\ell}), and the intersection operation in ISDF scheme takes less terms than that of BD and ZF schems, we have the SDF of the ISDF scheme is usually greater than those of the BD and ZF-beamforming schemes. But the SDF of the ISDF scheme may not be greater than that of the SVD scheme. Since the SVD method can not well cancel the CCI, the secrecy performance of ISDF scheme outperforms that of the SVD scheme, which will be verified by the simulation results.

III-B Precoder Design for Eves Based on ISDF

Since the CSI of all receivers (except for the eavesdroppers) is available at the transmitter, in order to guarantee that it does not impact the desired receivers, the artificial noise is often mapped into the subspace orthogonal to the effective downlink co-channel matrix 𝐇^\hat{\mathbf{H}} [11][17], where

𝐇^=[𝐇1T,𝐇2T,,𝐇JT].\displaystyle\hat{\mathbf{H}}={[\mathbf{H}_{1}^{T},\mathbf{H}_{2}^{T},\ldots,\mathbf{H}_{J}^{T}]}. (18)

Then we can get the precoder 𝐖ker(𝐇^)\mathbf{W}\subset ker(\hat{\mathbf{H}}), i.e., the kernel of 𝐇^\hat{\mathbf{H}}. Note that the precoding matrix 𝐖\mathbf{W} should also be a nonzero matrix. To guarantee the existence of a nonzero power of artificial noise, a sufficient condition is that the number of the transmit antennas is larger than the rank of matrix 𝐇^\hat{\mathbf{H}}. Because the practical channel matrix is usually assumed to be full-rank, NAN_{A} must satisfies NA>j=1JNBjN_{A}>\sum_{j=1}^{J}N_{Bj}, which is a very tight constraint.

However, we actually don’t have to make W orthogonal to each user’s channel matrix 𝐇j\mathbf{H}_{j}. We can achieve the goal by transmitting the artificial noise into the null space of all users’ precoder matrices instead. Define the effective co-precoder matrix as

𝐖^=[𝐖1,𝐖2,,𝐖J].\displaystyle\hat{\mathbf{W}}={[\mathbf{W}_{1},\mathbf{W}_{2},\ldots,\mathbf{W}_{J}]}. (19)

To transmit the artificial noise more effectively, it may be mapped into the subspace orthogonal to the effective co-precoder matrix 𝐖^\hat{\mathbf{W}}. Then we can get 𝐖ker(𝐖^)\mathbf{W}\subset ker(\hat{\mathbf{W}}), i.e., 𝐖\mathbf{W} lies in the null space of 𝐖^\hat{\mathbf{W}}. Because inequality djNBjd_{j}\leq N_{Bj} is always valid, the rank of 𝐖^\hat{\mathbf{W}} is usually smaller than that of 𝐇^\hat{\mathbf{H}}. Therefore, we have more freedom to transmit the artificial noise, and the constraint on NAN_{A} can therefore be relaxed as NA>i=1JdjN_{A}>\sum_{i=1}^{J}d_{j}.

To distinguish the two schemes of transmitting artificial noise, we category them as the ISDF1 scheme and the ISDF2 scheme. If the noise is mapped into the subspace orthogonal to the effective downlink co-channel matrix 𝐇^\hat{\mathbf{H}}, it is called ISDF1; if If the noise is mapped into the subspace orthogonal to the effective co-precoder matrix 𝐖^\hat{\mathbf{W}}, it is called ISDF2. In the simulation section, we will compare the two schemes.

III-C The analysis of complexity

In this section, we will make a discussion on the computational complexity of the proposed approach versus the other threes methods. As introduced in section II, The SVD method and ZF beamforming method are simple, but of little ideal performance. The BD method get somewhat better performance on secrecy rate, but its computational complexity becomes higher compared with the former.

Then, the emphasis is the comparison of complexity between the proposed ISDF method and the BD method. Essentially, the main difference between the ISDF and BD method lies on solving the precoding selection matrix (PSM). In the ISDF method, the PSM is obtained by implementing an SVD decomposition on the previously designed precoders 𝐖~j\mathbf{\widetilde{W}}_{j}, which is a NA×n=1j1dnN_{A}\times\sum^{j-1}_{n=1}d_{n} matrix. The complexity of this SVD decomposition is O((n=1j1dn)3)O((\sum^{j-1}_{n=1}d_{n})^{3}). While the PSM in the BD method is obtained by an SVD decomposition on all others’ channel matrixes 𝐇~j\mathbf{\widetilde{H}}_{j}, where 𝐇~j=[𝐇1T,𝐇2T,,𝐇j1T,𝐇j+1T,,𝐇JT]\mathbf{\widetilde{H}}_{j}={[\mathbf{H}^{T}_{1},\mathbf{H}^{T}_{2},\ldots,\mathbf{H}^{T}_{j-1},\mathbf{H}^{T}_{j+1},\ldots,\mathbf{H}^{T}_{J}]}, which is a NA×njNBnN_{A}\times\sum_{n\neq j}N_{Bn} matrix. And the complexity of this SVD decomposition is O((njNBn)3)O((\sum_{n\neq j}N_{Bn})^{3}), which is higher than the former. Since both of the two methods have JJ precoders to design, there are JJ PSMs need to be solven accordingly. Therefore, the complexity of the ISDF method is O(j=1J(n=1j1dn)3)O(\sum^{J}_{j=1}(\sum^{j-1}_{n=1}d_{n})^{3}), on the other hand, that of the BD method is O(j=1J(njNBn)3)O(\sum_{j=1}^{J}(\sum_{n\neq j}N_{Bn})^{3}). Obviously, the complexity of the our proposed approach is lower.

IV The secrecy rate of MUME-MIMO system

In this section, we will analyze the secrecy rate of ISDF1 and ISDF2. Suppose that the variance of the transmit symbol vector 𝐮j\mathbf{u}_{j} is σuj2{\sigma_{u_{j}}^{2}}, and the complex Gaussian random elements of 𝐯\mathbf{v} are i.i.d whose variance is σv2{\sigma_{v}^{2}}. It is assumed that Alice has a total amount of transmit power budget PP. Due to the normalization of the noise variance at Bob, we can also refer to PP as the transmission SNR. One important parameter should be designed is the power ratio, denoted by ρj(0<ρj<1)\rho_{j}~{}~{}(0<\rho_{j}<1), allocated for the user jj’s information transmission. We define the power ratio for transmitting artificial noise as α\alpha (0<α<10<\alpha<1). Let

𝐐jE(𝐮j𝐮jH),𝐐vE(𝐯𝐯H).\mathbf{Q}_{j}\triangleq E(\mathbf{u}_{j}\mathbf{u}_{j}^{H}),\quad\mathbf{Q}_{v}\triangleq E(\mathbf{v}\mathbf{v}^{H}). (20)

Then we have

tr(𝐐j)=Pj=ρjP,tr(𝐐v)=αP,tr({\mathbf{Q}_{j}})=P_{j}=\rho_{j}P,\quad tr({\mathbf{Q}_{v}})=\alpha P, (21)

and

P=j=1JρjP+αP=j=1Jdjσuj2+(NAj=1Jdj)σv2,P=\sum_{j=1}^{J}\rho_{j}P+\alpha P=\sum_{j=1}^{J}d_{j}\sigma_{u_{j}}^{2}+\left(N_{A}-\sum_{j=1}^{J}d_{j}\right)\sigma_{v}^{2}, (22)

in which, we have used the following facts

α=1j=1Jρj,\displaystyle\alpha=1-\sum_{j=1}^{J}\rho_{j}, (23)
NAj=1Jdj+1,\displaystyle N_{A}\geq\sum_{j=1}^{J}d_{j}+1,
σuj2=Pjdj=ρjPdj,\displaystyle\sigma_{u_{j}}^{2}=\frac{P_{j}}{d_{j}}=\frac{\rho_{j}P}{d_{j}},
σv2=(1j=1Jρj)PNAj=1Jdj.\displaystyle\sigma_{v}^{2}=\frac{(1-\sum_{j=1}^{J}\rho_{j})P}{N_{A}-\sum_{j=1}^{J}d_{j}}.

In order to analyze the secrecy rate concisely, Eq. (7)(\ref{L7 equation 7}) can be rewritten as:

𝐘j\displaystyle\mathbf{Y}_{j} =𝐇ji=1J𝐖i𝐮i+𝐇j𝐖𝐯+𝐍jB\displaystyle=\mathbf{H}_{j}\sum_{i=1}^{J}\mathbf{W}_{i}\mathbf{u}_{i}+\mathbf{H}_{j}\mathbf{Wv}+\mathbf{N}^{B}_{j} (24)
=𝐇j𝐖j𝐮j+𝐇ji=1,ijJ𝐖i𝐮i+𝐇j𝐖𝐯+𝐍jB\displaystyle=\mathbf{H}_{j}\mathbf{W}_{j}\mathbf{u}_{j}+\mathbf{H}_{j}\sum_{i=1,i\neq j}^{J}\mathbf{W}_{i}\mathbf{u}_{i}+\mathbf{H}_{j}\mathbf{Wv}+\mathbf{N}^{B}_{j}
=𝐇^jj𝐮j+i=1,ijJ𝐇^ji+𝐇^j𝐯+𝐍jB\displaystyle=\widehat{\mathbf{H}}_{jj}\mathbf{u}_{j}+\sum_{i=1,i\neq j}^{J}\widehat{\mathbf{H}}_{ji}+\widehat{\mathbf{H}}_{j}\mathbf{v}+\mathbf{N}^{B}_{j}
𝐙k\displaystyle\mathbf{Z}_{k} =𝐆k=1K𝐖𝐮+𝐆k𝐖𝐯+𝐍kE\displaystyle=\mathbf{G}_{k}\sum_{\ell=1}^{K}\mathbf{W}_{\ell}\mathbf{u}_{\ell}+\mathbf{G}_{k}\mathbf{Wv}+\mathbf{N}^{E}_{k}~{}~{}~{}~{}~{}~{}~{}~{}
=𝐆k𝐖𝐮+𝐆k=1,jJ𝐖𝐮+𝐆k𝐖𝐯+𝐍kE\displaystyle=\mathbf{G}_{k}\mathbf{W}_{\ell}\mathbf{u}_{\ell}+\mathbf{G}_{k}\sum_{\ell=1,\ell\neq j}^{J}\mathbf{W}_{\ell}\mathbf{u}_{\ell}+\mathbf{G}_{k}\mathbf{Wv}+\mathbf{N}^{E}_{k}
=𝐆^kk𝐮k+=1,jJ𝐆^k+𝐆^k𝐯+𝐍kE\displaystyle=\widehat{\mathbf{G}}_{kk}\mathbf{u}_{k}+\sum_{\ell=1,\ell\neq j}^{J}\widehat{\mathbf{G}}_{k\ell}+\widehat{\mathbf{G}}_{k}\mathbf{v}+\mathbf{N}^{E}_{k}

where we have defined

𝐇^ji𝐇j𝐖i,𝐇^j𝐇j𝐖,\displaystyle\widehat{\mathbf{H}}_{ji}\triangleq\mathbf{H}_{j}\mathbf{W}_{i},\quad\widehat{\mathbf{H}}_{j}\triangleq\mathbf{H}_{j}\mathbf{W}, (25)
𝐆^k𝐆k𝐖,𝐆^k𝐆k𝐖,\displaystyle\widehat{\mathbf{G}}_{k\ell}\triangleq\mathbf{G}_{k}\mathbf{W}_{\ell},\quad\widehat{\mathbf{G}}_{k}\triangleq\mathbf{G}_{k}\mathbf{W}, (26)

for j,i,=1,2,,J,k=1,2,,Kj,i,\ell=1,2,~{}\ldots~{},J,~{}k=1,2,~{}\ldots~{},K.

The secrecy rate is the maximum transmission rate at which the intended receiver can decode the data with arbitrarily small error, which is bounded by the difference in the capacity between Alice and Bob and that between Alice and Eve [2]. In the following part, the secrecy rate will be given in terms of secrecy sum rate [13] and absolute secrecy rate, where the secrecy sum rate is noted by RssrR_{ssr} and the absolute secrecy rate is noted by RasrR_{asr}.

IV-A The secrecy rate of ISDF1

As in [11], we can normalize the distance of each Bob to make the variance of the elements of 𝐇j\mathbf{H}_{j} equal to unity without loss of generality, and the noise vector 𝐍jB\mathbf{N}^{B}_{j} is of unit variance. Since the artificial noise is transmitted in the null space of all legitimate users’ matrixes, it will be nulled in any user’s received signal. Then the capacity between Alice and Bob jj is

RjB\displaystyle R^{B}_{j} =E𝐇^{log2|𝐈+σuj2𝐇^jj𝐇^jjH(𝐈+ijJσui2𝐇^ji𝐇^jiH)1|}\displaystyle=E_{\widehat{\mathbf{H}}}\left\{{\log}_{2}\left|~{}\mathbf{I}+{\sigma}_{uj}^{2}\widehat{\mathbf{H}}_{jj}\widehat{\mathbf{H}}^{H}_{jj}\bigg{(}\mathbf{I}+\sum_{i\neq j}^{J}{\sigma}_{ui}^{2}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}\bigg{)}^{-1}\right|\right\} (27)
=E𝐇^{log2|𝐈+ρjPdj𝐇^jj𝐇^jjH(𝐈+ijJρiPdi𝐇^ji𝐇^jiH)1|},\displaystyle=E_{\widehat{\mathbf{H}}}\left\{{\log}_{2}\left|~{}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{H}}_{jj}\widehat{\mathbf{H}}^{H}_{jj}\bigg{(}\mathbf{I}+\sum_{i\neq j}^{J}\frac{\rho_{i}P}{d_{i}}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}\bigg{)}^{-1}\right|\right\},

where we used the fact 𝐇^j=0\widehat{\mathbf{H}}_{j}=0.

Next, we study the capacity between Alice and the multiple colluding or non-concluding Eves. When multiple Eves are allocated at different places, the noise at each Eve may be different. In addition, the receiver noise levels at Eves may not be known by Alice or Bobs. To guarantee secure communication, it is therefore reasonable to consider the worst-case scenario where the noises at Eves are arbitrarily small. Note that this approach has been also taken in [9] and [11]. In this case, the noiseless eavesdropper assumption gives an upper bound on the rate between Alice’s message for the user jj and the eavesdropper kk as

RjkE=\displaystyle R^{E}_{jk}= E𝐇^,𝐆k{log2|𝐈+σuj2𝐆^kj𝐆^kjH(=1,jJσu2𝐆^k𝐆^kH\displaystyle E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\bigg{\{}{\log}_{2}\bigg{|}\mathbf{I}+\sigma_{uj}^{2}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}\Big{(}\sum_{\ell=1,\ell\neq j}^{J}{\sigma_{u\ell}^{2}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}} (28)
+σv2𝐆^k𝐆^kH)1|}\displaystyle{\quad+\sigma_{v}^{2}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\Big{)}}^{-1}\bigg{|}\bigg{\}}
=\displaystyle= E𝐇^,𝐆k{log2|𝐈+ρjPdj𝐆^kj𝐆^kjH(=1,jJρPd𝐆^k𝐆^kH\displaystyle E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\bigg{\{}{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}{\bigg{(}\sum_{\ell=1,\ell\neq j}^{J}\frac{\rho_{\ell}P}{d_{\ell}}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}}
+αPNAi=1JNBi𝐆^k𝐆^kH)1|}.\displaystyle{\quad+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}N_{Bi}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\bigg{)}}^{-1}\bigg{|}\bigg{\}}.

After deriving the expressions of RjBR^{B}_{j} and RkjER^{E}_{kj} , the ergodic secrecy rate can now be obtained as Rjk=[RjBRjkE]+R_{jk}=[R^{B}_{j}-R^{E}_{jk}]^{+}.

IV-A1 Secrecy Sum-Rate

As proposed in [13], the secrecy rate for Bob jj is

Rsej=min1kK,{Rjk}.R^{j}_{se}=\underset{1\leq k\leq K,}{\min}\,\{R_{jk}\}.

Then the secrecy sum rate is

Rssr=\displaystyle R_{ssr}= j=1JRsej=j=1Jmin1kK,{Rjk}.\displaystyle\sum_{j=1}^{J}R^{j}_{se}=\sum_{j=1}^{J}\underset{1\leq k\leq K,}{\min}\,\{R_{jk}\}. (29)
=\displaystyle= j=1Jmin𝑘E𝐇^,𝐆k{[log2|𝐈+ρjPdj𝐇^jj𝐇^jjH\displaystyle\sum_{j=1}^{J}\underset{k}{\min}~{}E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\Bigg{\{}\Bigg{[}{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{H}}_{jj}{\widehat{\mathbf{H}}_{jj}}^{H}
(𝐈+ijJρiPdi𝐇^ji𝐇^jiH)1|\displaystyle\Big{(}\mathbf{I}+\sum_{i\neq j}^{J}\frac{\rho_{i}P}{d_{i}}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}\Big{)}^{-1}\bigg{|}
log2|𝐈+ρjPdj𝐆^kj𝐆^kjH(=1,jJρPd𝐆^k𝐆^kH\displaystyle\quad-{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}{\bigg{(}\sum_{\ell=1,\ell\neq j}^{J}\frac{\rho_{\ell}P}{d_{\ell}}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}}
+αPNAi=1JNBi𝐆^k𝐆^kH)1|]+}.\displaystyle{\quad\quad+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}N_{Bi}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\bigg{)}}^{-1}\bigg{|}\Bigg{]}^{+}\Bigg{\}}.

IV-A2 Absolute secrecy rate

As we have discussed, for the broadcast MUME-MIMO wiretap system, the absolute secrecy capacity is the lower bound of the ergodic secrecy rate, which is given by

Rasr=\displaystyle R_{asr}= min1jJ,1kK{Rjk}=minj,kE𝐇^,𝐆k{[\displaystyle\underset{1\leq j\leq J,1\leq k\leq K}{\min}\,\{R_{jk}\}=\underset{j,k}{\min}E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\Bigg{\{}\Bigg{[} (30)
log2|𝐈+ρjPdj𝐇^jj𝐇^jjH(𝐈+ijJρiPdi𝐇^ji𝐇^jiH)1|\displaystyle{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{H}}_{jj}{\widehat{\mathbf{H}}_{jj}}^{H}\Big{(}\mathbf{I}+\sum_{i\neq j}^{J}\frac{\rho_{i}P}{d_{i}}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}\Big{)}^{-1}\bigg{|}
log2|𝐈+ρjPdj𝐆^kj𝐆^kjH(=1,jJρPd𝐆^k𝐆^kH\displaystyle\quad-{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}{\bigg{(}\sum_{\ell=1,\ell\neq j}^{J}\frac{\rho_{\ell}P}{d_{\ell}}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}}
+αPNAi=1JNBi𝐆^k𝐆^kH)1|]+}.\displaystyle\quad\quad{+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}N_{Bi}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\bigg{)}}^{-1}\bigg{|}\Bigg{]}^{+}\Bigg{\}}.

IV-B The secrecy rate of ISDF2

In the ISDF2 method, the rate between Alice and Bob jj is

RjB\displaystyle R^{B}_{j} =E𝐇^{log2|𝐈+σuj2𝐇^jj𝐇^jjH(𝐈+ijJσui2𝐇^ji𝐇^jiH\displaystyle=E_{\widehat{\mathbf{H}}}\bigg{\{}{\log}_{2}\bigg{|}~{}\mathbf{I}+{\sigma}_{uj}^{2}\widehat{\mathbf{H}}_{jj}\widehat{\mathbf{H}}^{H}_{jj}\bigg{(}\mathbf{I}+\sum_{i\neq j}^{J}{\sigma}_{ui}^{2}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji} (31)
+σv2𝐇^j𝐇^jH)1|}\displaystyle\quad+{\sigma}_{v}^{2}\widehat{\mathbf{H}}_{j}\widehat{\mathbf{H}}^{H}_{j}\bigg{)}^{-1}\bigg{|}\bigg{\}}
=E𝐇^{log2|𝐈+ρjPdj𝐇^jj𝐇^jjH(𝐈+ijJρiPdi𝐇^ji𝐇^jiH\displaystyle=E_{\widehat{\mathbf{H}}}\bigg{\{}{\log}_{2}\bigg{|}~{}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{H}}_{jj}\widehat{\mathbf{H}}^{H}_{jj}\bigg{(}\mathbf{I}+\sum_{i\neq j}^{J}\frac{\rho_{i}P}{d_{i}}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}
+αPNAi=1Jdi𝐇^j𝐇^jH)1|}.\displaystyle\quad+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}d_{i}}\widehat{\mathbf{H}}_{j}\widehat{\mathbf{H}}^{H}_{j}\bigg{)}^{-1}\bigg{|}\bigg{\}}.

Similar to Eq. (28)(\ref{L28 equation 28}), the rate between Alice’s message for the user jj and the eavesdropper kk can be rewritten as:

RkjE=\displaystyle R^{E}_{kj}= E𝐇^,𝐆k{log2|𝐈+σuj2𝐆^kj𝐆^kjH(=1,jJσu2𝐆^k𝐆^kH\displaystyle E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\bigg{\{}{\log}_{2}\bigg{|}\mathbf{I}+\sigma_{uj}^{2}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}\Big{(}\sum_{\ell=1,\ell\neq j}^{J}{\sigma_{u\ell}^{2}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}} (32)
+σv2𝐆^k𝐆^kH)1|}\displaystyle\quad{+\sigma_{v}^{2}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\Big{)}}^{-1}\bigg{|}\bigg{\}}
=\displaystyle= E𝐇^,𝐆k{log2|𝐈+ρjPdj𝐆^kj𝐆^kjH(=1,jJρPd𝐆^k𝐆^kH\displaystyle E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\bigg{\{}{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}{\bigg{(}\sum_{\ell=1,\ell\neq j}^{J}\frac{\rho_{\ell}P}{d_{\ell}}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}}
+αPNAi=1Jdi𝐆^k𝐆^kH)1|}.\displaystyle\quad{+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}d_{i}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\bigg{)}}^{-1}\bigg{|}\bigg{\}}.

IV-B1 Secrecy Sum-Rate

Accordingly, the secrecy sum-rate is

Rssr=\displaystyle R_{ssr}= j=1JRsej=j=1Jmin1kK,{Rjk}.\displaystyle\sum_{j=1}^{J}R^{j}_{se}=\sum_{j=1}^{J}\underset{1\leq k\leq K,}{\min}\,\{R_{jk}\}. (33)
=\displaystyle= j=1Jmin𝑘E𝐇^,𝐆k{[log2|𝐈+ρjPdj𝐇^jj𝐇^jjH\displaystyle\sum_{j=1}^{J}\underset{k}{\min}~{}E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\Bigg{\{}\Bigg{[}{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{H}}_{jj}{\widehat{\mathbf{H}}_{jj}}^{H}
(𝐈+ijJρiPdi𝐇^ji𝐇^jiH+αPNAi=1Jdi𝐆^k𝐆^kH)1|\displaystyle\Big{(}\mathbf{I}+\sum_{i\neq j}^{J}\frac{\rho_{i}P}{d_{i}}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}d_{i}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\Big{)}^{-1}\bigg{|}
log2|𝐈+ρjPdj𝐆^kj𝐆^kjH(=1,jJρPd𝐆^k𝐆^kH\displaystyle-{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}{\bigg{(}\sum_{\ell=1,\ell\neq j}^{J}\frac{\rho_{\ell}P}{d_{\ell}}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}}
+αPNAi=1Jdi𝐆^k𝐆^kH)1|]+}.\displaystyle{+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}d_{i}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\bigg{)}}^{-1}\bigg{|}\Bigg{]}^{+}\Bigg{\}}.

IV-B2 Absolute secrecy rate

we can also get the lower bound of ergodic secrecy rate for ISDF2 method,

Rasr=\displaystyle R_{asr}= min1jJ,1kKE𝐇^,𝐆k{[log2|𝐈+ρjPdj𝐇^jj𝐇^jjH\displaystyle\underset{1\leq j\leq J,1\leq k\leq K}{\min}E_{\widehat{\mathbf{H}},\mathbf{G}_{k}}\Bigg{\{}\Bigg{[}{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{H}}_{jj}{\widehat{\mathbf{H}}_{jj}}^{H} (34)
(𝐈+ijJρiPdi𝐇^ji𝐇^jiH+αPNAi=1Jdi𝐆^k𝐆^kH)1|\displaystyle\Big{(}\mathbf{I}+\sum_{i\neq j}^{J}\frac{\rho_{i}P}{d_{i}}\widehat{\mathbf{H}}_{ji}\widehat{\mathbf{H}}^{H}_{ji}+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}d_{i}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\Big{)}^{-1}\bigg{|}
log2|𝐈+ρjPdj𝐆^kj𝐆^kjH(=1,jJρPd𝐆^k𝐆^kH\displaystyle-{\log}_{2}\bigg{|}\mathbf{I}+\frac{\rho_{j}P}{d_{j}}\widehat{\mathbf{G}}_{kj}{\widehat{\mathbf{G}}_{kj}}^{H}{\bigg{(}\sum_{\ell=1,\ell\neq j}^{J}\frac{\rho_{\ell}P}{d_{\ell}}\widehat{\mathbf{G}}_{k\ell}{\widehat{\mathbf{G}}_{k\ell}}^{H}}
+αPNAi=1Jdi𝐆^k𝐆^kH)1|]+}.\displaystyle{+\frac{\alpha P}{N_{A}-\sum_{i=1}^{J}d_{i}}\widehat{\mathbf{G}}_{k}{\widehat{\mathbf{G}}_{k}}^{H}\bigg{)}}^{-1}\bigg{|}\Bigg{]}^{+}\Bigg{\}}.

IV-C The secrecy rate of ISDF1 with Water Filling method

This section focuses on improving the secrecy rate with water-filling method based on ISDF1 method introduced in section III. As mentioned in section III-A, when the users have multiple antennas and djd_{j} (dj>1d_{j}>1) data streams are transmitted to user jj simultaneously, the water-filling method may be employed together with ISDF1 to further improved the performance of achievable secrecy rate. Our goal is to implement single-user water-filling on each legitimate user to maximize their rate under the given power ratio constraint.

The single-user optimization problem has a well-known water-filling solution. The water-filling algorithm takes advantage of the problem structure by decomposing the channel into orthogonal modes, which greatly reduces the optimization complexity. Here, without loss of generality, we just take user jj for example with the constraint of the given total power (ρjP\rho_{j}P). As derived in Eq. (24)(\ref{L24 equation 24}), the signal received at user jj can be written as:

𝐘j\displaystyle\mathbf{Y}_{j} =𝐇^jj𝐮j+𝐊j\displaystyle=\widehat{\mathbf{H}}_{jj}\mathbf{u}_{j}+\mathbf{K}_{j} (35)

where 𝐊j=i=1,ijJ𝐇^jiui+𝐇^j𝐯+𝐍jB\mathbf{K}_{j}=\sum_{i=1,i\neq j}^{J}\widehat{\mathbf{H}}_{ji}u_{i}+\widehat{\mathbf{H}}_{j}\mathbf{v}+\mathbf{N}^{B}_{j} is the interference towards user jj from the message signal transmitted to other users. We first implement an Whiting processing on the interference vector 𝐊j\mathbf{K}_{j} in Eq. (35)(\ref{L35 equation 35}), before conducting the water-filling algorithm. Let M=E(KjKjH)M=E(K_{j}K_{j}^{H}), which unitary decomposition is M=EΛEHM=E\Lambda E^{H}. The we can whiten KjK_{j} by

Λ1/2EH𝐘j\displaystyle\Lambda^{-1/2}E^{H}\mathbf{Y}_{j} =Λ1/2EH𝐇^jj𝐮j+Λ1/2EHKj.\displaystyle=\Lambda^{-1/2}E^{H}\widehat{\mathbf{H}}_{jj}\mathbf{u}_{j}+\Lambda^{-1/2}E^{H}K_{j}. (36)

Then the corresponding mutual information rate RjBR^{B}_{j} is

RjB\displaystyle R^{B}_{j} =E𝐇^{log2|𝐈+σuj2Λ1/2EH𝐇^jj𝐇^jjHEΛ1/2|}.\displaystyle=E_{\widehat{\mathbf{H}}}\bigg{\{}{\log}_{2}\bigg{|}~{}\mathbf{I}+{\sigma}_{uj}^{2}\Lambda^{-1/2}E^{H}\widehat{\mathbf{H}}_{jj}\widehat{\mathbf{H}}^{H}_{jj}E\Lambda^{-1/2}\bigg{|}\bigg{\}}. (37)

Suppose that RjnBR_{jn}^{B} is the rate from the nn-th subcarrier to Bob jj, and hjnh_{jn} the corresponding effective sub-channel after whitening and orthgononalizing. Since only djd_{j} streams are transmitted to user jj, the optimal problem on the dynamic power allocation aiming to maximize the rate RjBR^{B}_{j} between transmitter and user jj can be expressed as following:

Rj=maxn=1djlog2(1+Pjnhjn),\displaystyle~{}~{}~{}~{}~{}R^{*}_{j}=\max\sum^{d_{j}}_{n=1}{\log}_{2}\big{(}1+P_{jn}h_{jn}\big{)}, (38)
s.t.n=1djPjnPj=ρjP,andPjn>0,n,\displaystyle s.t.~{}~{}\sum^{d_{j}}_{n=1}P_{jn}\leq P_{j}=\rho_{j}P,~{}\text{and}~{}P_{jn}>0,~{}\forall n,

where PjnP_{jn} denotes the power allocated for the nn-th subcarrier of user jj. Based on Eq. (38)(\ref{L38 equation 38}), we use the classical Lagrange algorithm to construct an Lagrange function,

L=n=1djlog2(1+Pjnhjn)λ(n=1djPjnρjP).\displaystyle L=\sum^{d_{j}}_{n=1}{\log}_{2}\left(1+P_{jn}h_{jn}\right)-\lambda\left(\sum^{d_{j}}_{n=1}P_{jn}-\rho_{j}P\right). (39)

Let

LPjn=1ln2hjn1+hjnPjnλ=0,\frac{\partial L}{\partial P_{jn}}=\frac{1}{\ln 2}\frac{h_{jn}}{1+h_{jn}P_{jn}}-\lambda=0,

and β=λln2\beta=\lambda\ln 2. Then we can obtain

β=hjn1+Pjnhjn,Pjn=[1β1hjn]+.\beta=\frac{h_{jn}}{1+P_{jn}h_{jn}},\quad P_{jn}=\left[\frac{1}{\beta}-\frac{1}{h_{jn}}\right]^{+}.

Then solving the optimal problem depends on the computation of β\beta and PjnP_{jn}. The paper [26] put forward a fast iterative algorithm, which give the preliminary value of β\beta and its update method. That is

β0=1dj(|Pj+n=1dj1hjn|),\displaystyle\beta_{0}=\frac{1}{d_{j}}\Big{(}\big{|}P_{j}+\sum^{d_{j}}_{n=1}\frac{1}{h_{jn}}\big{|}\Big{)}, (40)
β=β1+1dj(|Pj+n=1djPjn|).\displaystyle\beta_{\ell}=\beta_{\ell-1}+\frac{1}{d_{j}}\Big{(}\big{|}P_{j}+\sum^{d_{j}}_{n=1}P_{jn}\big{|}\Big{)}. (41)

In this paper, we will employ this fast iterative algorithm to perform simulations.

V Simulation Results

In this section, we will carry out some simulations to show the achievable secrecy rate. In all simulations, the entries of all channel matrices are assumed to be independent, zero-mean Gaussian random variables with unit variance. All results are based on an average of 10001000 independent trials. The background noise power is the same for all Bobs with a variance 𝐈\mathbf{I}. To guarantee the secure communication, it is therefore reasonable to consider the worst case scenario, where the noises variance at Eves are arbitrarily small (approaching zero). The desired rate for Bobs and Eves will be measured by the ergodic capacity rather than the outage capacity.

V-A Secrecy Rate and Power Efficiency

Fig. 2, Fig. 3 and Fig. 4, are corresponding to the cases dj=1d_{j}=1, which exhibits the comparison of secrecy rate and information power ratio for information signal among the 55 methods. Fig. 2 and Fig. 3 demonstrate that that the ISDF1 method offers the best performance compared with the other methods, in term of secrecy sum rate and absolute secrecy rate respectively. From Fig. 2 and Fig. 3, we can see that ISDF2 performs best in the low SNR region but performs worse in the high SNR region. This is because that at the high SNR region, the artificial noise is not well canceled at receive terminal by using the null space of the co-precoder matrix to design W. Since ISF1 uses the nulll space of the co-channel matrix to desing W, which can well cancel the artificial noise. From Fig. 4, we can see that both ISDF1 and ISDF2 methods have less power efficiency (information power over total power) than the ZF Beamforming method. While in secure communications, the secrecy rate is the major concern. Therefore the ISDF scheme provides a good candidate for secure communications.

\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 2: Comparison of secrecy sum rate for the five methods when J=3J=3, K=2K=2, dj=1d_{j}=1, NBj=3N_{Bj}=3, NEk=4N_{Ek}=4.
\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 3: Comparison of absolute secrecy rate for the five methods when J=3J=3, K=2K=2, dj=1d_{j}=1, NA=10N_{A}=10, NBj=3N_{Bj}=3, NEk=4N_{Ek}=4.
\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 4: Comparison of information power ratio for the five methods when J=3J=3, K=2K=2, dj=1d_{j}=1, NA=10N_{A}=10, NBj=3N_{Bj}=3, NEk=4N_{Ek}=4.
\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 5: The absolute secrecy rate of ISDF1 for Eves’ colluding (K=1K=1) and non-colluding (K=2K=2) scenarios when J=3J=3, dj=1d_{j}=1, NA=10N_{A}=10, NBj=3N_{Bj}=3.
\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 6: The information power ratio of ISDF1 for Eves’ colluding (K=1K=1) and non-colluding (K=2K=2) scenarios when J=3J=3, dj=1d_{j}=1, NA=10N_{A}=10, NBj=3N_{Bj}=3.
\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 7: The absolute secrecy rate for different users as Bob1 when J=3J=3, K=2K=2, NA=10N_{A}=10, NB1=1N_{B1}=1, NB2=2N_{B2}=2, NB3=3N_{B3}=3,NEk=4N_{Ek}=4.
\captionstyle

flushleft \onelinecaptionstrueRefer to caption

Figure 8: Comparison of absolute secrecy rate for ISDF method and ISDF method with WF when J=3J=3, K=2K=2, NA=10N_{A}=10, J=3J=3, NEk=4N_{Ek}=4, NB1=NB2=NB3=NBN_{B1}=N_{B2}=N_{B3}=N_{B}.

V-B Secrecy Rate and Power Efficiency for Eves’ Colluding and Non-Colluding

Fig. 5 and Fig. 6 show the absolute secrecy rate and information power ratio of ISDF1 for the Eves’ colluding and non-colluding scenarios. If the Eves choose to wiretap the message jointly, we may think they are colluding, else non-colluding. As shown in Fig. 5, it will be more difficult to achieve secure communication if the Eves choose to cooperate, which is as we expected. We are interesting in whether we need to allocate more power to transmit information signal or artificial noise when the Eves choose to cooperate. Fig. 6 shows that more power needs to be allocated to artificial noise if Eves choose to cooperate. So does the case with more Eves. These demonstrate that when power has been optimized already and the eavesdroppers’ condition is getting better, the power allocating towards artificial noise can make more contribution for the secrecy rate than allocating towards users’ information signal.

V-C Power Ratio for different Ordering and Power Allocation

As mentioned in section III-A, since the ordering of the users will affect the performance, we wish to study how the power is allocated between the information signal and the artificial noise for giving different user priority of precoding. Fig. 7 illustrates that the the system performs better in term of absolute secrecy capacity when we give the user with least antennas or largest noise variance the priority of precoding. This is because that the absolute secrecy capacity is mainly determined by the poorest-performance receive-wiretap pair to a large extent. In order to get a large secrecy rate, we should make the secrecy rate for each user equivalently. Therefor should give the weaker user (less antennas or larger noise) more SDF by rendering them the priority of precoding. Fig. 8 shows that the secrecy capacity can be further increased as introduced in IV-C, if the water-filling (WF) algorithm is used.

VI Conclusions

This paper proposes the precoding strategy based on the ISDF method for providing secure communication at the physical layer in broadcast MUME-MIMO wiretap channels combined with artificial noise. We derive both the secrecy sum rate and absolute secrecy rate for the proposed ISDF1 and ISDF2 method. Simulations show that the ISDF2 perform best in low SNR region and ISDF1 outperforms other four methods in high SNR region in terms of achievable secrecy rate. Furthermore, we find that more power should be allocated to artificial noise instead of information signal when the eavesdroppers’ condition is better than the intended users, and we should first precode the user with bad condition (least antennas or largest noise variance).

References

  • [1] A. Wyner, ”The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  • [2] I. Csiszár and J. Körner, ”Broadcast channels with confidential messages,” IEEE Trans. Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
  • [3] J. Huang, A. L. Swindlehurst, ”Cooperative Jamming for Secure Communications in MIMO Relay Networks” IEEE Trans. on Signal Processing, No. 59, no. 10, pp. 2011 4871-4884, 2011.
  • [4] S. A. Fakoorian, A. L. Swindlehurst, ”Optimal Power Allocation for GSVD-Based Beamforming in the MIMO Wiretap Channel,” IEEE International Symposium on Information Theory (ISIT), Cambridge, MA, August 2012, pp. 2321-2325.
  • [5] M. L. Jorgensen, B. R. Yanakiev, F. E. Kirkelund, P. Popovski, H. Yomo, and T. Larsen, ”Shout to secure: Physical-layer wireless security with known interference,” in Proc. IEEE GLOBECOM, Washington, DC, Nov. 2007, pp. 33-38.
  • [6] O. Simeone and P. Popovski, ”Secure communications via cooperating base stations,” IEEE Communications Letters, vol. 12, no. 3, pp. 188-190, Mar. 2008.
  • [7] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, ”Interference-assisted secret communication,” in Proc. IEEE ITW, Porto, Portugal, May 2008, pp. 164-168.
  • [8] L. Lai and H. E. Gamal, ”The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Trans. Information Theory, vol. 54, no. 9, pp. 4005-4019, 2008.
  • [9] R. Negi and S. Goel, ”Secret communications using artificial noise,” in Proc. IEEE VTC, Dallas, TX, Sep. 2005, pp. 1906-1910.
  • [10] S. Goel and R. Negi, ”Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
  • [11] X. Zhou, M. McKay ”Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation,” IEEE Trans. on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010.
  • [12] A. L. Swindlehurst, ”Fixed SINR solutions for the MIMO wiretap channel,” in Proc. IEEE ICASSP, Taipei, Taiwan, Apr. 2009, pp. 2437-2440.
  • [13] G. Geraci, J. Yuan, A. Razi and I. B. Collings, ”Secrecy Sum-Rates for Multi-User MIMO Linear Precoding,” 8th International Symposium on Wireless Communication Systems (ISWCS), 2011
  • [14] E. Ekrem, and S. Ulukus ”The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel,” IEEE Trans. on Information Theory, vol. 57, no. 4, pp. 2083-2114, April 2011.
  • [15] Y. Liang, H. V. Poor, and S. Shamai, ”Secure communication over fading channels,” IEEE Trans. on Information Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
  • [16] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), ”Compound wire-tap channels,” in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, USA, 2007.
  • [17] A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, ”Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey”, available online: http://arxiv.org/abs/1011.3754
  • [18] K. Xie, and W. Chen, ”Precoding Strategy Based on SLR for Secure Communication in MUME Wiretap Systems,” IEEE Global communications (GC), 2012.
  • [19] A. Mukherjee and A. L. Swindlehurst, ”Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels,” In Proc. 47th Allerton Conf. on Communication, Control and Computing, October, 2009.
  • [20] Q. H. Spencer, A. L. Swindlehurst, and M. Haardt, ”Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Trans. on Signal Processing, vol. 52, no. 2, pp. 461471, 2004.
  • [21] Q. Spencer and A. Swindlehurst, ”A hybrid approach to spatial multiplexing in multi-user MIMO downlinks,” EURASIP Journal on Wireless Communications and Networking, pp. 236-247, Dec. 2004.
  • [22] D. Gesbert, M. Kountouris, R. W. Heath Jr, C.-B. Chae, and T. Salzer, ”Shifting the MIMO paradigm: From single user to multiuser communications,” IEEE Signal Processing Magazine, vol. 24, no. 10, pp. 36 C46, 2007.
  • [23] M. H. M. Costa, Writing on dirty paper, IEEE Trans. Information Theory, vol. IT-29, no. 5, pp. 439 C411, 1983.
  • [24] F. Oggier and B. Hassibi, ”The secrecy capacity of the MIMO wiretap channel,” in Proc. IEEE ISIT, Toronto, ON, Canada, Jul. 2008, pp. 524-528.
  • [25] L. Choi and R.D. Murch, ”A transmit preprocessing technique for multiuser MIMO systems using a decomposition approach,” IEEE Trans. on Wireless Communications, vol. 2, no. 4, pp. 773 C786, 2003.
  • [26] Jang J, Lee K B, and Lee Y H. Transmit power and bit allocations for OFDM systems in a fading channel. in Proc. IEEE Global Communications Conference, San Francisco, CA, Dec. 2003: 283 C288.