Abstract

In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. In particular, we maximize the weighted sum secrecy rate of the system by jointly optimizing the beamforming vector for transmitted signal and artificial noise at the base station (BS) and the cooperative phase shifts of two IRSs, under the constraints of transmission power at the BS and the unit-modulus phase shift of IRSs. To tackle the nonconvexity of the optimization problem, we first convert the objective function to its concave lower bound by utilizing a novel successive convex approximation technique, then solve the transformed problem iteratively by applying an alternating optimization method. The Lagrange dual method, Karush–Kuhn–Tucker conditions, and alternating direction method of multipliers are applied to develop a low-complexity solution for each subproblem. Finally, simulation results are provided to verify the advantages of the cooperative double-IRS scheme in comparison with the benchmark schemes.

1. Introduction

In order to support emerging wireless services, such as wireless data centers, holographic communication, and immersive XR, 6G network is expected to achieve 100-fold increase in data rate, connection density, and network energy efficiency compared to the 5G network [1]. However, the existing wireless technologies, such as millimeter wave (mmWave), which suffering from significant path loss and attenuation, and massive multiple-input multiple-output (MIMO) requiring active radio-frequency (RF) chains, are unable to further improve the performance of wireless network efficiently (active RF chains result in high energy consumption and hardware cost. Although hybrid beamforming technology can reduce hardware complexity, it still requires active RF chains [2]). Advanced technologies are being developed to satisfy future network requirements. Among them, intelligent reflecting surface (IRS) has recently received much interest from both academic and industry communities for achieving intelligent and programable radio propagation environment cost-effectively [35]. Specifically, an IRS is a type of meta-surface that consists of massive low-cost subwavelength reflecting components, each of which can be independently manipulated to adjust the magnitude, phase, frequency, or even polarization of the incident signal [4]. The IRS provides a new degree of freedom by dynamically manipulating the wireless channels to improve the performance of wireless networks, e.g., channel capacity, throughput, and coverage. Because the IRS does not require any active RF chains, the hardware cost, and energy consumption are significantly lower compared to traditional antennas [6]. Besides, since IRS reflects signal passively in full-duplex mode without requiring any signal and noise amplification, it can be densely deployed and the spectral efficiency is much higher than conventional relaying and beamforming. Moreover, the feature of lightweight and low cost facilitates IRS scalable and adaptable deployment. Motivated by the above advantages, various IRS-assisted communication systems have been studied extensively, e.g., multiantenna system [7, 8], THz communication [9], integrated sensing and communication [10], radar communication [11], etc.

On the other hand, security is also a key issue in wireless communication. Traditional encryption technology relying on key distribution and management becomes very challenging in future hyper-connection networks. The application of computation-based cryptography techniques is restricted by the limited computing capability of terminal devices [12]. Fortunately, physical layer security exploiting the random nature of wireless channels offers low-complexity information theoretic-based security, which is viewed as a powerful complement to the existing security schemes. In recent years, IRS-aided PLS has been extensively studied in various fields, such as relay [13], MIMO [14], nonorthogonal multiple access [15], unmanned aerial vehicles networks [16, 17], THz communication [18], etc.

However, the majority of the existing researches focused on the beamforming design of single or noncooperative multiple IRSs [19, 20], which actually limits the potential of IRS for improving communication performance. Recently, cooperative double-IRS-assisted system has attracted much attentions. Different from single IRS and noncooperative double IRSs, each serving associated users independently, cooperative double IRS, which considering the inter-IRS channel, can bypass dense obstacles and further increase the network coverage, especially when the direct and two single-reflection links are all blocked [21]. Although the two-hop reflections in the double-IRS system incur an extra triple-path loss, it can be compensated by a sufficiently large number of IRS reflective elements and carefully selected deployment locations. The work [22] demonstrated that for a double-IRS-assisted SISO system with line-of-sight (LoS) inter-IRS channels, the cooperative beamforming scheme achieves power gain, while the system assisted by conventional single-IRS with equal number of reflection elements only yields power gain, given a sufficient total reflection elements . Then, the work [23] analyzed the capacity scaling order in the MIMO network given the transmit power approaching infinity and shown that the performance achieved by cooperative double-IRS also significantly outperforms that of single-IRS. Motivated by these advantages, cooperative double IRS technology has been investigated in several applications. For instance, the work [24] investigated the multiuser (MU) MISO network assisted by double-IRS, where the fractional programing (FP) and block coordinate descent method were utilized to maximize the weight sum rate (WSR) of the system. Moreover, Zheng et al. [25] investigated the double-IRS-assisted uplink MIMO system and found that deploying two cooperative IRSs results in an increased rank of the channel matrix compared to deploying only one IRS. Then, the work [26] focused on a double-IRS-assisted MU-MIMO mmWave system, where the active beamforming at the base station (BS) and passive beamforming of IRSs are optimized by quadratically constrained quadratic programing (QCQP) and Riemannian manifold optimization, respectively. Also, in [27], a block minorization–maximization algorithm was proposed to maximize the WSR of a multi-RIS-assisted system. Lu et al. [28] considered the energy efficiency maximization of cooperative double-IRS-assisted MU-MIMO network where FP and semidefinite relaxation (SDR) were utilized to optimize the beamforming of BS and phase shifts of IRSs. For security issues, the work [29] proposed a double-IRS-assisted MISO secure system, where the product Riemmanian manifold optimization approach was developed to design the phase shift of IRSs.

From the above analysis, it is evident that there is a lack of sufficient research on cooperative double-IRS-aided PLS. Although a cooperative double-IRS-aided secure system was investigated, it only focused on the single-user scenario, leaving room for further investigation in MU scenarios. Besides, the incorporation of artificial noise (AN) can further enhance the secure performance [30, 31]. However, the joint design of AN and cooperative double-IRS in PLS is still in its infancy. Motivated by these observations, we investigate a novel MU-MISO secure network with multiple single-antenna noncolluding eavesdroppers. Specifically, two cooperative IRSs are deployed to enhance the secure performance of the network, and AN is emitted by the BS to deteriorate the wiretap channels. We summarize the main contributions of this paper as follows:(1)We study the joint design of beamforming for transmitted signal and AN vector as well as the cooperative phase shifts of both IRSs in a double-IRS-aided MU-MISO secure communication system where the inter-IRS channel is considered. To evaluate the system performance, we establish the weighted sum secrecy rate (WSSR) maximization problem under the restrictions of transmit power budget and unit-module phase shift of IRS. Both continuous phase shift and discrete phase shift are considered in this work.(2)The formulated problem is nonconvex due to the nonconcave objective function, the deeply coupled variables, and the unit-modulus constraint of IRS. To address this issue, we first derive an approximated concave lower bound of the objective function via a novel successive convex approximation (SCA) technique. Then, we propose a low-complexity alternating optimization (AO) algorithm to optimize each variable in an alternated manner. Specifically, transmit beamforming and AN vector are solved by using the Lagrange dual method and Karush–Kuhn–Tucker (KKT) conditions, while the phase shifts of the cooperative IRSs are optimized by utilizing the alternating direction method of multipliers (ADMM).(3)We demonstrate the convergence of the proposed algorithm through rigorous mathematical proof. Simulation results validate the advantage of employing cooperative double-IRS and the effectiveness of the proposed algorithm in practical implementation.

The rest of this paper is organized as follows: Section 2 introduces the considered cooperative double-IRS aided MU-MISO secure communication system and formulated a WSSR maximization problem. In Section 3, the proposed problem is solved by an AO algorithm. The proposed algorithm is evaluated by numerical results in Section 4, and conclusions are drawn in Section 5.

1.1. Notation

Boldface lower-case and boldface upper-case letters represent column vector and matrix, respectively. Superscript , and denotes the conjugate, transpose, and conjugated–transpose operation, respectively. The operators , and , respectively, denote the angle, the absolute value, and the real part of a complex number. denotes the statistical expectation. The notation denotes the nth element of a vector. denote the imaginary unit, .

2. System Model and Problem Formulation

As Figure 1 shows, we study a MU-MISO downlink secure broadcast network, which consists of a BS (Alice), two distributed IRSs (IRS 1 near BS and IRS 2 near users), legitimated single-antenna users (Bobs) and noncooperative single-antenna eavesdroppers (Eves). Alice is equipped with transmit antennas while the number of passive reflective elements of IRS is with . The smart controller equipped on each IRS is used to coordinate the information transmission and improve the secure performance of the system. It is assumed that all links experience quasi-static slow fading. The baseband equivalent channel coefficients from Alice to the IRS , from IRS 1 to IRS 2, from Alice to the kth Bob/Eve, from IRS to the kth Bob/Eve are denoted by , , , , , (, ), respectively. The link of BS-IRS2-IRS1-Bobs/Eves is ignored due to the significant path loss [25]. In addition, it is assumed in this work that the channel state information (CSI) of all links is perfectly known to Alice and the IRSs, which allows us to consider the results obtained in this study as an upper bound for the secure performance of the system. Note that the assumption of perfect CSI of Eves is reasonable in the scenario where Eves are other system users but not trusted by Bobs [32]. In addition, the existing channel estimation technique in [33] can be utilized to estimate each channel. The direct channel between the BS and Bob/Eve is modeled as Rayleigh fading, while the other channel is assumed as Rician fading. Take for example, which is given by the following:where is the Ricean factor, and denote the Rayleigh fading non-LoS component and the deterministic LoS component, respectively. Similar to [34], the IRSs are shaped as a uniform planar array with five horizontal elements. Thus can be represented as , where is the array response vectors of the receiver which modeled as follows:where is the carrier wavelength, is the separation between adjacent elements, and , respectively, denote the azimuth angle and elevation angle of departure. and denote the horizontal and vertical element indices, respectively. The receive array response can be defined similarly.

2.1. Signal Transmission Model

The BS sends independent confidential data streams simultaneously to Bobs. Meanwhile, Eves distributed around Bobs attempt to wiretap the private information. Besides, AN is added to the transmitted signal to disrupt eavesdropping. Thus, the signal sent from the BS is given as , where denotes the private message transmitted to the kth Bob with , is the transmit beamforming vector and denotes the AN which is assumed as a zero-mean circularly symmetric complex (ZMCSC) Gaussian vector, i.e., where denotes the covariance matrix. Therefore, the signal received at the kth Bob/Eve can be represented as follows:respectively, where , , denotes the phase shift matrix of IRS . It should be noted that the amplitude of phase shift is assumed as a unit since the passive characteristic of IRS. and , respectively, represent ZMCSC additive white Gaussian noise at the kth Bob/Eve, i.e., and . For analytical purposes, it is assumed that each Eve, which is noncooperative with each other, solely attempts to wiretap their nearest Bob. Thus, the received signal-to-interference-plus-noise ratio at the kth Bob/Eve can be represented as follows [35]:respectively, where , , , and . The achievable secrecy rate for the kth Bob can be written as follows:where and denote the achievable rate of kth Bob/Eve, respectively. To ensure simplicity in the subsequent sections of this paper, the operator is omitted, given that the optimal secrecy rate cannot be negative [32].

2.2. Problem Formulation

In this work, we attempt to consider the maximization of the WSSR while satisfying the power budgets of the BS and the unit modulus constraints of IRS phase shifts. The WSSR is defined as , where denotes the nonnegative weight factor for the th Bob. The considered optimization problem can be mathematically formulated as follows:where denotes the transmit power budget at BS and constraint (8c) represents unit modulus phase shifts constraints. The optimal solution to problem (8) is challenging to find since the nonconcave objective function, the unit modulus constraint, and the highly coupled optimization variables.

3. The WSSR Maximization Algorithm Design

In this part, we first derive the approximated concave lower bound of via a novel SCA technique. Then, we propose an AO algorithm to decompose the reformulated problem into three subproblems, i.e., optimizing , , and , alternatively. To be specific, we adopt the Lagrange dual method and KKT condition to solve the subproblem with respect to , where the optimal dual variable is found by using bisection method. The optimal phase shift is iteratively derived by the ADMM method. At last, we extend the proposed algorithm to discrete phase shift cases. The convergence of the proposed algorithm is proved, and the computational complexity is analyzed.

3.1. Problem Transformation

To proceed, we derive an approximated lower bound of and an approximated upper bound of in Lemma 1.

Lemma 1. The approximated lower bound of and the approximated upper bound of around a given point can be expressed as follows:where , , , , , , .

Proof. Please see Appendix A.
The approximated lower bound for can be obtained by subtracting Equations (9) and (10) to Equation (7). By neglecting the constant items, we obtain an equivalent formulation of problem (8), which is represented as follows:However, the optimization variables in the reformulated problem are still highly coupled. To circumvent this issue, we adopt the AO technique to decouple these variables and optimize them in an alternated manner.

3.2. Optimal Transmit Beamforming and AN Design

In this subsection, we optimize and with given and . Let denotes a feasible point of problem (8) at the th iteration. With some mathematical manipulations on the objective function (11), the problem (11) can be re-expressed as follows:whereProblem (12) is QCQP, which can be solved by utilizing the CVX tool [36]. Here, we develop a low-complexity approach by using the Lagrange dual method and KKT conditions. First, we write the Lagrange function associated with Equation (12a) as follows:where is the Lagrange dual variable with respect to the constraint (8b). The corresponding dual problem is given by the following:It is easy to proof that problem (12) is convex, leading to the assurance of strong duality between problem (12) and problem (15) based on Slater’s condition. Therefore, the optimal solutions to problem (12) satisfy the following KKT conditions:The optimal of problem (12) can be obtained by considering Equations (16a) and (16b) as follows:It is important to note that needs to satisfy Equation (16c); thus, the solution can be categorized into two situations: (1) If remains valid, then is set to 0. (2) Alternatively, can be determined by solving . Recall that and satisfy Equations (17a) and (17b), respectively. Thus, the optimal can be obtained by adopting the bisection method. Based on the above discussion, the detailed steps for finding are summarized in Algorithm 1.

1: Initialization: set the accuracy , a feasible point and the searching bounds and ;
2: Calculate and . Ifthen and terminate; Otherwise, move to step 3;
3: Repeat
4: Calculate;
5: Update and according to Equations (17a) and (17b), respectively;
6: Ifset; Otherwise, setend if;
7: Until;
8: Output.
3.3. Design of Phase Shift of IRS 1

In this part, we design the phase shift of IRS 1 with given . We first recast and as follows:where andLet and , we can, respectively, represent and as follows:By substituting Equations (21a) and (21b) into Equation (11), it is readily to formulate an optimization problem w.r.t. .To proceed, we reform the problem (22) into the following quadratic problem:where and . and are, respectively, denoted as follows:Problem (23) can be solved by adopting SDR and Gaussian randomization method with the computational complexity of [37]. Here, we propose a low complexity algorithm based on the ADMM method to iteratively derive the suboptimal solution of .

The basic idea of the ADMM method is to decompose a complex problem into more manageable subproblems and solve them iteratively. According to the ADMM method, we first introduce a slack variable , satisfying , to problem (23) and reformulate it as follows:Then, we write the augmented Lagrange dual function of Equation (25) as follows:where is the Lagrange dual vector regarding constraint (25c) and is the penalty factor. To proceed, we update variables , and iteratively by following the steps of ADMM framework. We denote the feasible solutions at the ith iteration as , and , and calculate , and by sequentially solving the following subproblems:(1)The subproblem associated with updating is given by the following:Problem (27) can be solved by utilizing the first-order optimality condition of Equation (26), i.e.,After performing a few mathematical manipulations to Equation (28), we obtain as follows:(2)To obtain , the following subproblem needs to be solved:which is equivalent to the subsequent projection problemThus, the corresponding solution can be derived as follows:(3) can be obtained by employing the following equality:By substituting Equation (28) into Equation (34), we derive the as follows:The convergence of the ADMM algorithm is guaranteed when the value of penalty factor satisfies: [38]. The overall procedures of the ADMM algorithm to solve problem (23) are listed in Algorithm 2.

1: Initialization:, set the accuracy , set initial points and the maximum iteration number ;
2: Set penalty factor where is the minimum integer satisfying ;
3: Repeat
4: Obtain according to Equation (29);
5: Obtain according to Equation (32);
6: Obtain according to Equation (34);
7: Until or ;
8: Output.
3.4. Design of Phase Shift of IRS 2

In this subsection, we aim to solve the subproblem in terms of with given . Let us recast and as follows,where andLet , we have the following:By substituting Equations (38a) and (38b) into Equation (11) and following similar steps as in the previous subsection, the problem w.r.t is formulated as follows:where and . and are, respectively, denoted as follows:The problem (39) can be solved by applying the ADMM method as described in the previous subsection, which is omitted for space saving.

Based on the above discussions, we summarize the AO algorithm, which updating each variable iteratively in Algorithm 3, where represents the WSSR obtained at the th iteration.

1: Initialization: set the accuracy , a feasible point and the maximum iteration number , calculate ;
2: Repeat
3: Update and by solving problem (12) with given ;
4: Update by solving problem (23) with given ;
5: Update by solving problem (39) with given ;
6: Caculate and set;
7: Until or ;
8: Output the optimal .
3.5. Extension to Discrete Phase Shift

Due to hardware cost and power consumption limitations, practical systems adopt discrete phase shifter rather than ideal continuous phase shifter. We assume the values of discrete phase shifter are equally distributed along the unit circle . In this case, the -bit discrete phase shift set can be denoted as follows:Then, the optimal discrete phase shifts, which are denoted as , can be obtained by projecting the continuous phase shifts to , i.e.,where is an integer. It is important to note that the project operation should be conducted during each iteration of the AO algorithm instead of just at the end of the AO algorithm.

3.6. Convergence and Complexity Analysis
3.6.1. Convergence Analysis

We provide Theorem 1 to demonstrate the convergence of the proposed AO approach.

Theorem 1. The value of the sequence increases with iteration number and can converge to KKT point of problem (11).

Proof. Please see Appendix B.

3.6.2. Complexity Analysis

Here, we examine the computational complexity cost by the suggested algorithms. The proposed AO approach is a double-layer algorithm, where the inner layer consists of subsequently optimizing , and while the outer layer is the AO iteration. Since the complexity of optimizing is significant lower than that of optimizing and . Therefore, the complexity of the inner layer consists of the ADMM method. During each iteration of the ADMM method, the complexity is dominant by calculating which consists of calculating with complexity and other multiplication operations with of . However, we note that only need to be calculated once and stored for other iterations, thus the complexity cost by the ADMM method is , where is the number of iterations in the ADMM method [39]. The total complexity of the proposed AO algorithm depends on the AO iteration times and the complexity of inner layer, which is given as .

4. Simulation Results

This part provides extensive numerical results to examine the performance of the proposed system design. Figure 2 illustrates the top view of the simulation scenario, where the BS is located at (0, 20 m), and the IRS1 and IRS2 are located at (0, 0 m) and (100, 0 m), respectively. Additionally, the coordinates of Bobs are randomly scattered within a circle of radius 10 m and centered at (100, 20 m), and each Eve is randomly distributed within a circle of radius 10 m and centered at each Bob. The height of the BS and IRSs is set as 20 m, while the height of Bob and Eve is set as 1.5 m. The large-scale path loss is modeled as , where  dB is the path loss at the reference distance , is the link distance in meters. The path loss exponent between the BS and Bobs/Eves is set as , while that of IRS-related links is set as . The Ricean factor for the link of BS-IRS2 and IRS1-Bobs/Eves is set to −5 dB due to obstacles in the paths, while that of the other links is set to 5 dB. Unless otherwise stated, we set , ,  dBm  dBm.

4.1. Convergence Behavior

To begin with, we plot the convergence properties of the proposed algorithm for different amount of phase shifts in both continuous phase shift and discrete phase shift cases. As depicted in Figure 3, it is evident that the WSSR obtained in all schemes first increases with the ADMM iteration times and then gradually converges within 500 iterations, which verifies the algorithm converges efficiently in both continuous and discrete cases. Besides, more iterations are required to converge for a larger number of IRS phase shifts, which is due to the fact that more variables need to be optimized. Next, we investigate the convergence behavior of the AO algorithm in Figure 4. Also, the WSSR first increases and then saturates with the AO iteration numbers. For all tested cases, the WSSR can achieve convergence within almost 10 iteration times, which verifies that the proposed algorithm converges fast.

4.2. Performance Evaluation

In this part, we study the secure performance of the proposed cooperative double-IRS-assisted system. To facilitate a comprehensive comparison, the following approaches are employed as benchmarks: (1) uncooperative beamforming, which performs beamforming when setting ; (2) discrete phase shift; (3) cooperative beamforming without AN; (4) only IRS 1 is deployed near the BS; (5) only IRS 2 is deployed near the users; (6) generating the phase shift randomly; (7) adopting SDR and Gaussian randomization techniques to design the phase shift. These schemes are labeled as “Uncooperative beamforming,” “Discrete PS,” “Without AN,” “IRS 1,” “IRS 2,” “Random PS,” and “Upper bound,” respectively.

Figure 5 illustrates the relationship between the WSSR and the maximum transmit power at BS. It can be seen that the WSSR obtained in all approaches increases with the transmit power. To be specific, the proposed scheme achieves comparable performance to the upper bound scheme, while significantly reducing computational complexity, which validates its effectiveness. Besides, the performance of the proposed scheme outperforms that of “Uncooperative beamforming” scheme and single-IRS schemes (“IRS 1” and “IRS 2”), and the performance gap widens with the increase in transmit power, thus demonstrating the advantage of cooperative double-IRS framework. This observation is expected since the distributed IRS deployment with cooperative beamforming provides more spatial multiplexing gain than single-IRS. Moreover, the relatively small performance difference between the proposed scheme and the discrete phase shift scheme suggests the feasibility of the proposed algorithm. In addition, the WSSR obtained in a continuous phase scheme is significantly better than that of a random phase scheme, which is mainly thanks to the passive beamforming gain offered by the proposed algorithm.

To further investigate the performance of cooperative beamforming, Figure 6 shows the WSSR versus the path loss exponent of channel with different number of IRS elements when  dBm. It can be seen that the WSSR achieved by the proposed scheme decreases with the increase of path loss exponent of , which is expected since more cooperative beamforming gain can be obtained when the inter-IRS channel has better condition. Besides, the proposed schemes always achieve better performance than the “Uncooperative beamforming” scheme, and the advantage of cooperative beamforming increases with the number of reflective elements.

Figure 7 depicts the WSSR versus the total number of IRS elements. We can observe that the WSSR of all schemes increases with , which is because as increases, the IRS can provide more array gain. Moreover, the growth rate of double-IRS scheme is higher than that of single-IRS. For example, when the number of IRS elements increases from 20 to 100, the growth rate of the WSSR in the continuous phase scheme exceeds 90% (from 0.62 to 1.2 bps/Hz), while the growth rate of the WSSR in the IRS 1 and IRS 2 cases are only 80% (from 0.52 to 0.94 bps/Hz) and 50% (from 0.43 to 0.64 bps/Hz), respectively. Based on the observations, it can be suggested that as the total number of IRS elements increases, the advantages of using a cooperative double-IRS system become more significant. Besides, we observe that the WSSR without AN case is consistently lower than that of the continuous phase case, and the difference between the two increases as M grows. This finding indicates that the benefits of AN become more prominent when the number of IRS elements is relatively large. Then, we investigate the effect of the number of BS antennas on the WSSR in Figure 8. As expected, the WSSR for all schemes increases with due to the availability of more spatial degrees of freedom.

Figure 9 illustrates the WSSR versus the number of Bobs/Eves when  dBm. As we can see that the WSSR of all schemes exhibits a downward trend as increases. This is mainly because the interuser interference increases as the number of users grows, and the weight factor is . Besides, we note that the performance gap between without AN scheme and proposed scheme becomes smaller with the increase of . This is because the inter-user interference functions similarly to AN. As a result, the effectiveness of AN is limited in MU system, particularly when the number of users is large.

Then in Figure 10, the WSSR versus the distance between the double-IRS is depicted to show the influence of IRS deployment on the secure performance. Assuming the spacing between IRS 1 and IRS 2 is m, then the x coordinate of IRS 1 and IRS 2 are given as () m and () m, respectively. We can observe that the WSSR first raises then reduces as grows, and there exists an optimal value of spacing between the two IRSs, which reveals us a practical insight into deploying IRSs.

5. Conclusion

This paper investigated the cooperative beamforming of double-IRS in the MU-MISO secure system. We established the WSSR maximization problem by jointly optimizing the beamforming for transmitted signal and AN as well as the phase shifts of two cooperative IRSs. We proposed a novel SCA approach to convexify the objective function and developed an efficient AO algorithm based on the Lagrange dual method, KKT conditions, and ADMM method. At last, simulation results confirmed the significant advantages of the proposed method over benchmark schemes. For future research, we aim to investigate the user fairness and evaluate the performance of ultra-massive MIMO and THz communications in the considered system.

Appendix

A. Proof of Lemma 1

According to Nasir et al. [40], for any , , , and , the following inequality holds trueSince can be represented as follows:The inequality (9) can be proved by substituting Equation (A.1) into Equation (A.2). Next, we will prove inequality (10), which follows the similar step to [35]. We first rewrite as follows:Since is a convex function, we can drive the lower bound by the first-order condition of the convex function.Let , (A.1) can be recast as follows:Then by keeping fixed, we obtain the following inequality:where . Using Equation (A.6) with , the following inequality can be derived:According to Equation (A.8), we have the following:Finally, the inequality (10) is proved by substituting Equations (A.4) and (A.9) back into Equation (A.3).

B. Proof of Theorem 1

To begin with, we will demonstrate that the objective function guaranteed convergence. Considering the th iteration of Algorithm 3, an upper bound of , i.e., around the given point is obtained in updating . Similarly, with updating and , two upper bound of can be obtained around the given point and , which can be denoted as and . Thus, we have the following inequality:where (a, b, c) holds due to the fact that , , and are the optimal solution of the problems (12), (22), and (39), respectively. Meanwhile, note that the feasible set is bounded by the constraints (8b) and (8c). Therefore, according to the Cauchy theorem, the sequence can always converge to a local optimum as .

Next, we will demonstrate the optimal point obtained by Algorithm 3 is a KKT point. We first write the Lagrangian function of Equation (12) as follows:where is the dual variable of Equation (12b). When , the involving KKT conditions can be written as follows:Meanwhile, the Lagrange function of Equation (23) can be written as follows:where is the dual variable of . The corresponding KKT conditions are given as follows:The KKT condition for can be derived similarly. The above KKT conditions hold since , and are the optimal solutions of Equations (12), (23), and (39), respectively. Therefore, is KKT point of problem (11).

Data Availability

Data will be available upon reasonable request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research was funded in part by the National Key Research and Development Program of China (no.2022YFB2902205), in part by the National Natural Science Foundation of China under grant (nos. U22A2001 and 61901490), in part by the Training Program for Young Scholar of Henan Province for Colleges and Universities under grant 2020GGJS172, in part by the Program for Science & Technology Innovation Talents in Universities of Henan Province under grant 22HASTIT020, in part by the Scientific and Technological Key Project of Henan Province under grant 232102210151. The work of Zheng Chu was supported in part by the Open Fund of the Shaanxi Key Laboratory of Information Communication Network and Security under grant ICNS201801. The work of Li Zhen was supported in part by the Innovation Capability Support Program of Shaanxi under grant 2023KJXX-062, in part by the Key Research and Development Program of Shaanxi under grant 2024GX-YBXM-064, and in part by the Scientific Research Program of Shaanxi Provincial Education Department under grant 23JS057.