999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Optimal Beamforming for Secure Transmit in Practical Wireless Networks

2022-11-10 02:32:18QiuqinYangLinfangLiMingXingLuoandXiaojunWang
Computers Materials&Continua 2022年10期

Qiuqin Yang,Linfang Li,Ming-Xing Luo,*and Xiaojun Wang

1The School of Information Science and Technology,Southwest Jiaotong University,Chengdu,610031,China

2School of Electronic Engineering,Dublin City University,Dublin 9,Ireland

Abstract:In real communication systems,secure and low-energy transmit scheme is very important.So far,most of schemes focus on secure transmit in special scenarios.In this paper,our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise(AN),the imperfect receiver and imperfect channel state information (CSI) of eavesdropper,weight of beamforming(BF)vector,cooperative jammers(CJ),multiple receivers,and multiple eavesdroppers,and the analysis shows that the protocol can reduce the transmission power,and at the same time the safe reachability rate is greater than our pre-defined value,and the analysis results are in good agreement with the simulation results.In this letter,the minimal transmit power is modeled as a non-convexity optimization that is general difficult.Our method is to transform it into a two-level non-convex problem.The outer is a univariate optimization that can be solved by the golden search algorithm.The inner is a convex optimization solved by using the CVX.The solutions are further used to improve the confidentiality rate of the system,and reduce the transmit power of the system and resource consumption in terms of the imperfect CSI.Simulations show the efficiency and robustness of the proposed protocol.

Keywords:Secure transmission;MISO system;imperfect CSI;BF vector;convex optimization

1 Introduction

Physical Layer Security (PLS) has received extensive attention in ensuring the security of data transmission.The main goal of PLS in applications is to ensure the secrecy of messages,which transmitted by legitimate receivers[1].This is achieved by reducing the signal-to-noise ratio (SNR)of the eavesdropper.One method is to add AN to the legal signal[2-4].Cooperative relay (CR) is useful in the secure transmit of CR-assisted multi-antenna systems.CR can act as a jammer and expand the interference range[5-7].At the same time,the status information of the channel should also be considered.It is difficult to obtain accurate CSI because of the time-varying characteristics of the channel.Some schemes have studied robust and secure transmit with imperfect CSI[8-12].There are two kinds of protocols with uncertain CSI.One is uncertain on one side,that is,only the status information of the eavesdropper or receiver is unknown[13-15].The other is uncertain on both sides,which mean the CSI of both parties is completely unknown[16-19].In addition to the secrecy performance,the power consumption of the system is also considered[20-25].Reference[25]gives the best solution for spectral efficiency and energy consumption issues in 5G communications.

Our motivation comes from the fact that most of cooperative interferences only consider one or a few factors,while the actual factors are not involved in applications,such as imperfect receiver and imperfect CSI of eavesdropper,cooperative jammer,multiple Receivers,and multiple eavesdroppers.In this article,we propose a secure transmit protocol by considering all these factors,which provide a more reliable model for complex networks.The main consideration is coordinated interference,which ensures the confidentiality of the receiver CSI (RCSI) and the eavesdropper CSI (ECSI) under the imperfect premise.At the same time,we will reduce the power required to transmit the signal.Due to the bounded error of CSI,we propose a robust and secure transmit scheme in the MISO downlink network.To further improve the security performance,we also use multi-antenna auxiliary jammers.The main contributions made in this paper are as follows:

(2)We introduce a slack-variable logarithm and semi-definite slack(SDR)to simplify the transmit power optimization,which is due to the non-convexity of the optimization problem involved.At the same time,the Lagrange duality is used to obtain the analytical formula of the constraint conditions.The non-convex problem further becomes a two-level optimization.The external is a univariate optimization,which is solved by using the golden search algorithm.The inner layer is a semi-definite programming(SDP)problem which will be resolved by CVX.

The rest of the paper is organized as follows.Section 2 introduces the system model.In Section 3,we establishes the problem formulationand model the robust transmit power as a non-convex minimization problem.The two-level optimization algorithms will be applied to solve the present problem.Section 4 contributes the simulation that shows the efficiency of the proposed schemes while last section concludes the paper.

2 System Model

Before introducing the system model,we introduce the parameter symbols used in this paper and their meanings,as shown in Tab.1.The matrix is indicated in bold capital letters.Vectors are represented in bold lowercase letters.

Table 1:Notions used in this paper

Table 1:Continued

We consider anassisting jammer (AJ)-assisted MISO system as shown in Fig.1.Alice sends message to multiple receivers Bob1,...,Bobl.The AJ sends AN (here,Gaussian noises will be used in what follows)for the secure transmit by confusingKeavesdroppers Eve.Due to limited feedback,assume that Alice knows the imperfect CSI of each receiver and eavesdropper.The channel estimation errorΔis bounded.The receiver is equipped with an antenna,Eves as same as the receiver.The total number of antennas for the transmitter and assisting jammer is denoted asNtandNj,respectively.

3 Optimal Beamforming Schemes

3.1 Channel Mismatch

3.2 Robust Transmit Power Minimization

The present problem is to minimize the transmit power,while the guarantee the minimum transmit secrecy rate.Here,the estimation error of CSI is considered.For the worst case of secrecy capacity,according to the principle of power minimization,the optimization function after adding AN is given by

whereRsis the pre-defined target secrecy rate.In the model,the secrecy rate is evaluated by the difference between the minimum secrecy capacity of the receiver and the maximum secrecy capacity of the eavesdropper.So,the secrecy rate obtained in the optimization is the minimum secrecy rate of the system.In our setting,the minimum secrecy rate should also be higher than the target secrecy rate.To simplify the secrecy capacity function,we introduceβis used as a slack variable.The optimization problem Q1 is equivalently written into

where log(·)denotes the base-2 logarithmic function.

The man slammed on the brakes. Before he could ask her why she wanted to stop, the woman was out of the car and hurrying up a nearby grassy19 slope with the lilacs still in her arms. At the top of the hill was a nursing home and, because it was such a beautiful spring day, the patients were outdoors strolling with relatives or sitting on the porch.

According to Shannon’s formula,the achievable secure rate of Bobland the Evekcan be represented as

From Eqs.(14b),(14c),(15a)and(15b),we can obtain

The Q3 is still non-convex problem.We resort to the idea of SDR to deal with Q3.Define W =wwH.It follows that W ■0,rank(W)= 1.By regardless of the constraint rank(W)= 1,Q3 is written into

whereF1=1-2RsβandF2=1-β

Due to the semi-definite constraints in Eqs.(17b)and(17c),it is difficult to solve the problem Q5.To solve this problem,we firstly transformed into a convex form to get an accurate form.It can be stated as the following proposition.

Now,in order to obtain the optimal value ofβ,we use the one-dimensional search variables method to calculate.Since the inner-level problem is a convex SDP,which will be solved by the CVX[29].The outer layer problem for a fixedβis solved by using the golden search method[30].In summary,we obtain a specific algorithm to solve Q6 as shown in Algorithm 1:

Algorithm 1:to solve Problem Q6 Input:Rs,a0,b0,Pmax,ε.1 Use golden search method to solve Q7 to obtain an optimal solution β* = ai+bi 2 2 Q6 is solved by getting the optimal values of W*,Q*z,P*using β*.3 Output:the optimal solution(W*,Q*)

4 Simulation Results

This section provides numerical results to verify the performances of the proposed transmit scheme.The main setups are shown in Tab.2.

Table 2:Simulation parameters

The channel uncertainty is given in the following form.:

Figs.2 and 3 show the relationships betweenRs,P,Randαb.Fig.2a presents the actual total transmit power in terms of the target secrecy rate andαe.We setξb,l=ξe,k=1.It shows that the total transmit power increases asαeincreases.Moreover,as the uncertainty of the Eve’s channel increases,the proposed BF scheme requires a higher total transmit power in order to ensureRstarget secrecy rate.From Fig.2b,the achievable secrecy rate in the worst case is higher than the target secrecy rate,which satisfies the secrecy requirement of the system in Eq.(13b).In addition,although Fig.2b shows that the larger theαe,the larger the actual secrecy rate when the target secrecy rate takes a certain value,which does not seem to be true.However,when we compare the actual secrecy rate,the consumed power P jointly,as shown in Fig.3,a reasonable explanation can be obtained.As its shown in Fig.3,the largerαeis,the smaller the achievable secrecy rate is obtained in the system with the same power.This is because in the present scheme,the power is related to the target secrecy rate,while the achievable secrecy rate in the worst case and the power are correlated.So,the larger the channel uncertainty is,the lower the system secrecy performance is.Fortunately,this can be overcome by increasing the transmit powerPmax.

Fig.4 shows the system channel capacity and transmit power with random 100 independent experiments.There are more than 90% channels which satisfy the target secrecy rate and the power requirements.This shows that the proposed scheme should be applicable in piratical channels.

Now,we compare the present schemes with previous schemes to show its performances.We mainly consider the LD system model in ref.[23]and CVaR and BTiE in ref.[31],while other schemes may not be consistent with the communication model in this paper or have inconsistent optimization objectives,so no more schemes are selected for comparison.The transmit power and achievable secrecy rate in worst case will be simulated.

Fig.5a shows a comparison between the present scheme and its in ref.[23]for one receiver and one eavesdropper.In Fig.5a,the present scheme costs less power than the LD scheme when the system secrecy rate is less than 4.4 provided that the secrecy rate in the worst case reaches the target.However,when the achievable secrecy rate is larger than 4.4,we get converse result.So,when the system secrecy rate is less than 3.8,the present scheme is better than its in ref.[23]to guarantee both the secrecy and power consumption Fig.5b shows the comparison between the present scheme and the two approaches in ref.[31]for one receiver and multiple eavesdroppers.In both models,the simulations are completed with the same total transmit power ofPmax= 30dB.Here,ξb,l=ξe,k= 0.002.In Fig.5b,the present scheme achieves the bettersecrecyperformance when three schemes have the same transmit power.Hence,these results show when both power loss and achievable secrecy rate are involved,our transmit scheme is better than both schemes in refs.[23,31].Other parameter effects and performance indicators were not considered in this simulation,but it is worth considering.

5 Conclusion

In this paper,we investigate the robust transmit BF design for MISO wiretapping channels with the imperfect CSI and the minimum transmit power.The covariance-based CSIs of both legitimate receivers and eavesdroppers are imperfect,where the CSI error is restricted to the ellipsoidal model.The communication models are assisted by AJs.We jointly optimized the covariance of the interference signal generated by the auxiliary node and the beamforming vector of the source node in the AJassisted system.The SDR method is firstly used to approximate the present non-convex optimization.We then obtained the equivalent tractable semi-infinite constraints by using the Lagrange duality.This transforms the original non-convex optimization into a two-level optimization with univariate optimization in the outer layer and convex SDP in the inner layer.Simulation results show the present scheme is better than previous schemes.This provides an efficient transmit scheme in practical systems.

Funding Statement:This work was supported by the national natural Science Foundation of China(no.62172341),and Fundamental Research Funds for the Central Universities(no.2682014CX095).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

Appendix A.

It can be verified that the convex problem (18) satisfies Slater’s conditions[27].Hence the strong duality holds between(18)and its dual problem,i.e.,they have the same objective value.The Lagrangian of(18)can be written as

λis the dual variable corresponding to the inequality constraint.Differentiating(27)with respect toΔand setting the derivative to zero,we have

After applying the identitywe have the following equality

The Lagrangian dual function for the problem(18)can be written as

Appendix B.

主站蜘蛛池模板: 又爽又大又光又色的午夜视频| 久青草网站| 制服丝袜国产精品| 亚洲成人黄色在线观看| 精品国产Ⅴ无码大片在线观看81 | 热久久综合这里只有精品电影| 久久久久久久久亚洲精品| 亚洲视频免费在线看| 国产18在线| 99久久精品国产麻豆婷婷| www亚洲天堂| 热久久这里是精品6免费观看| 色婷婷天天综合在线| 蜜桃视频一区二区三区| 性欧美在线| 成人免费视频一区| 日日碰狠狠添天天爽| 国产成人喷潮在线观看| 久久无码av三级| 免费国产不卡午夜福在线观看| 亚洲中文精品久久久久久不卡| 一本久道热中字伊人| 欧美伦理一区| 国产乱子伦视频在线播放| 欧美中文字幕无线码视频| 亚洲综合激情另类专区| 日本91视频| 国产成人无码综合亚洲日韩不卡| 二级特黄绝大片免费视频大片| 亚洲人成在线免费观看| 欧美一级高清免费a| 欧美色图久久| 国产午夜看片| 国产美女无遮挡免费视频| 亚洲精品少妇熟女| 亚洲精品黄| 在线播放91| 亚洲欧美日韩另类| 国产人人射| 日韩色图在线观看| 国产欧美性爱网| 91色老久久精品偷偷蜜臀| 欧美v在线| 亚洲AV无码久久精品色欲| 久久精品亚洲热综合一区二区| 中文字幕欧美成人免费| 国产成人91精品| 国产色婷婷视频在线观看| www.亚洲一区二区三区| v天堂中文在线| 精品小视频在线观看| av手机版在线播放| 亚洲欧美日韩成人在线| 精品人妻一区二区三区蜜桃AⅤ| 五月激情婷婷综合| 日本一区二区不卡视频| 国产成人a在线观看视频| 日本在线亚洲| 三上悠亚精品二区在线观看| 亚洲精品麻豆| 91精品综合| 好紧太爽了视频免费无码| 国模视频一区二区| 亚洲毛片网站| 国产不卡一级毛片视频| 伊人久综合| 久久精品无码一区二区国产区| 风韵丰满熟妇啪啪区老熟熟女| 有专无码视频| 成年人午夜免费视频| 国产一级精品毛片基地| 亚洲成在线观看 | 99热国产这里只有精品无卡顿"| 亚洲精品少妇熟女| 日韩A级毛片一区二区三区| 久久五月天国产自| 免费精品一区二区h| 伊人蕉久影院| 无码专区在线观看| 综合社区亚洲熟妇p| 婷婷伊人五月| 毛片手机在线看|