Research Article  Open Access
Tao Hong, Gengxin Zhang, "Power Allocation for Reducing PAPR of ArtificialNoiseAided Secure Communication System", Mobile Information Systems, vol. 2020, Article ID 6203079, 15 pages, 2020. https://doi.org/10.1155/2020/6203079
Power Allocation for Reducing PAPR of ArtificialNoiseAided Secure Communication System
Abstract
The research of improving the secrecy capacity (SC) of wireless communication system using artificial noise (AN) is one of the classic models in the field of physical layer security communication. In this paper, we consider the peaktoaverage power ratio (PAPR) problem in this ANaided model. A power allocation algorithm for AN subspaces is proposed to solve the nonconvex optimization problem of PAPR. This algorithm utilizes a series of convex optimization problems to relax the nonconvex optimization problem in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation. Furthermore, we also derive the SC of the proposed signal under the condition of the ANaided model with a finite alphabet and the nonlinear highpower amplifiers (HPAs). Simulation results show that the proposed algorithm reduces the PAPR value of transmit signal to improve the efficiency of HPA compared with benchmark ANaided secure communication signals in the multipleinput singleoutput (MISO) model.
1. Introduction
With the rapid development of wireless communication technology, an everincreasing amount of sensitive data (e.g., private information and commercially confidential data) is transmitted over wireless networks. However, the broadcasting nature of the wireless communication medium makes the information particularly vulnerable to malicious interception. Currently, encryption techniques are used to guarantee confidential information without considering the physical properties of the wireless communication medium. Due to the development of computing techniques (e.g., quantum computing and cloud computing), these classic security solutions are becoming ever more challenging. Considering the physical properties of the wireless communication medium, the recently developed physical layer security (PLS) techniques based on information theory can guarantee secure transmission regardless of the eavesdropper’s computational capability. As such, PLS techniques have drawn a lot of attention recently from information theory to security engineering by the research community [1–5].
The idea of PLS is to add structured redundancy in the transmit signal such that the legitimate user can correctly decode the confidential information, but the eavesdroppers can retrieve almost nothing from their observations [6–9]. To make PLS viable, we usually need the legitimate user’s channel condition to be better than the eavesdroppers’. However, this assumption may not be always possible in practice. A more active approach is to send artificially generated noise to interfere the eavesdroppers’ channel. This notion of using artificial noise (AN) to enhance PLS was first proposed by Negi and Goel in [10] and has received much attention in recent studies. In [11], Zhou derived a closedform expression for the achievable secrecy rate with the Gaussian input, based on which the power allocation (PA) between the information signal and the AN was optimized. It was shown that equal power allocation is a nearoptimal strategy in terms of maximizing the secrecy rate. Instead of transmitting AN isotropically, Li and Ma in [12] considered joint optimization of the covariance matrices of the information signal and the AN for secrecy rate optimization. It was shown that transmit beamforming is optimal for secrecy rate maximization, which has been proved without using AN in [13]. Besides transmitting AN by Alice, a fullduplex Bob can also transmit AN in order to create interference to Eve, and this strategy is highly desirable in some specific practical scenarios (e.g., where Eve is close to Bob but far from Alice) [14]. To solve the problem of channel estimation, Yan in [15] proposed a new channel training (CT) scheme for this fullduplex ANaided secure transmission in the receiverside to prevent an eavesdropper from estimating the jamming channel from the receiver to the eavesdropper. Yang considered a practical transmission scheme (e.g., onoff transmission) with AN in [16] and optimized the system parameters to maximize the effective secrecy rate. In [17], Yan examined the secrecy performance of three typical artificialnoiseaided secure transmission schemes, namely, the partially adaptive, fully adaptive, and onoff schemes. A new analysis method was proposed to facilitate the optimization of the PA between the information signal and the AN. Liu in [18] developed an analytical framework to characterize the secrecy rate of the AN scheme as a function of the number of antennas in each terminal. In the aforementioned works about ANaided secure transmission, it was mainly assumed that the multiple transmit antennas are independent. However, this assumption is not always held. In many practical scenarios, correlation exists among the multiple antennas at one transceiver due to limited separation between antenna elements or poor scattering conditions. In [19], Yan examined the impact of transmitterside correlation on the ANaided secure transmission and designed a correlationbased power allocation (CPA) for AN to optimize the minimum secrecy outage probability. In [20], a new design criterion based on the behavior of the eavesdropper’s bit error probability was proposed instead of the traditional design criterion secrecy capacity (SC). The result showed that the practical secrecy can be guaranteed by the randomly distributed AN with specified power even if the eavesdropper can afford more antennas than Alice. Unlike a single eavesdropper in AN model, Zheng considered a secure transmission model with randomly located eavesdroppers in [21]. An optimization algorithm for PA ratio was designed to minimize the secrecy outage probability. In [22], Liu focused on the location information of each terminal in ANaided secure communication model. A new locationbased secure transmission scheme for wiretap channels was proposed to outline how such an estimate of the eavesdropper’s location can still allow for quantitative assessment of key security metrics. Furthermore, Yan in [23] proposed a new optimal locationbased beamforming scheme for the wiretap channel, where both the main channel and the eavesdropper’s channel are subject to Rician fading. The secrecy outage probability of the proposed scheme is derived in an easytoevaluate expression that is valid for arbitrary real values of the Rician kfactors.
Meanwhile, massive MIMO is emerging as a key technology enabler for future 5G wireless networks, and thus PLS in the context of massive MIMO is attracting increasing research interests. For example, in [24], the secure downlink transmission in a multicell massive MIMO system was examined, in which two AN shaping matrices were considered. The opportunities and challenges of PLS in the context of massive MIMO were discussed in [25], in which active pilot contamination attacks were revealed to be difficult to detect but of high harmfulness. In [26], Zhu investigated different precoding strategies of data and AN in secure massive MIMO system. This ANaided scheme was also applied in many different communication systems to guarantee the security performance of private information at the physical layer, such as cognitive radio system [27–29], relay cooperative communication system [30–34], satellite communication system [35–37], information and power transfer system [38–40], and Internet of Things (IoT) network [41].
In [4], Hamamreh made a comprehensive survey for the PLS communication and pointed out the PAPR problem of ANaided signal as a practical important issue in system design (in Section Vi (G)). This problem is similar to the PAPR problem in the traditional OFDM system or high dynamic range ratio (DRR) problem in a pattern synthesis using a phased array [42, 43]. The large PAPR brings disadvantages like an increased complexity of the digitaltoanalog (DA) and analogtodigital (AD) converters and feed network, a reduced efficiency of the highpower amplifier (HPA), and signal distortion in the nonlinear region HPA. Especially in some power limited scenarios, these shortcomings are the key problem of system design, such as satellite communication system and wireless sensor network. In [44], the researchers showed that the famous ANbased technique proposed by Nagi and Goel [10] creates high PAPR in the antenna domain for a multipleinput singleoutput (MISO) model due to the accidental inphase addition (superposition) of AN subspaces and the signal subspace compared with traditional OFDM signal in the time domain. To solve this problem, an angle rotation based technique was proposed to reduce the PAPR, while maintaining the SC performance as that of the original ANaided method. In [45], Hamamreh proposed to either change the distribution of the added AN from Gaussian to uniform in flat fading environments or use an optimized AN that not only avoids PAPR increase but also helps reduce the PAPR of OFDM signal transmission in a singleinput singleoutput (SISO) model.
Different from angle rotation based technique in [44], we utilize the system redundancy of the power allocation for the AN subspaces to reduce the PAPR value of ANaided secure communication signal. An optimization problem is also formulated to reduce the PAPR value under the constraint of the total power of AN subspaces (maintaining the optimal SC performance with Gaussian input in [11] and finitealphabet input in [46, 47]). Unfortunately, the formulated optimization problem is a nonconvex problem due to the objective function for PAPR with a fractional form and the constraint for total AN power with a quadratic equality form. To solve this optimization problem, we propose a tripleiterative algorithm to relax the nonconvex optimization problem into a series of convex optimization problems based on fractional programming, difference of convex (DC) functions programming, and quadratic equality relaxing. Simulation results show that the proposed algorithm reduces the PAPR value of ANaided signal to improve the efficiency of HPA compared with benchmark ANaided secure communication signals in the multipleinput singleoutput (MISO) model.
The rest of this paper is organized as follows. Section 2 details the ANaided secure transmission model and the optimization problem of PAPR. Section 3 presents the nonconvex relaxing algorithm for the optimization problem. Section 4 assesses the performance of the proposed signal. Section 5 provides numerical results to confirm our analysis and gives useful insights into the impact of PAPR problem. Section 6 draws concluding remarks.
Notations. Scalar variables are denoted by italic symbols. Vectors are denoted by lowercase boldface italic symbols. Matrices are denoted by uppercase boldface italic symbols. and represent the real and complex number fields, respectively. Given a complex number , , , and denote the modulus, real part, and imaginary part of . Given a complex vector , and denote the Euclidean norm and infinite norm of , respectively. Given a matrix , and denote the transpose and conjugate transpose of . The identity matrix is referred to as and denotes expectation of a random variable .
2. PAPR Problem of ANAided Secure Communication System
2.1. System Model
According to [10, 11, 44, 47], we consider the transmission from Alice to Bob in the presence of an eavesdropper Eve as shown in Figure 1. Alice is equipped with multiple transmit antennas , while each of Bob and Eve has one receive antenna. Thus, the channel from Alice to Bob or Eve is MISO model. We assume a nonlineofsight rich scattering environment and, as such, model all channels as uncorrelated Rayleigh fading. It is also assumed that Bob can estimate his channel accurately and use a perfect feedback link to inform Alice about his instantaneous CSI. Eve is considered as a passive eavesdropper; the instantaneous CSI of Eve is thereby unavailable to Alice. The entries of and are assumed to be independent and identically distributed (i.i.d.) zeromean complex Gaussian variables with unit variance.
The authors in [10] introduced the concept of generating artificial noise to guarantee secure transmission. The key idea is outlined as follows. Alice adopts multiple antennas to transmit the information bearing signal into Bob’s channel, at the same time generating the artificial noise into the null space of Bob’s channel. Thus, only Eve’s channel is degraded by the artificial noise. Generally, the null space of Bob’s channel is calculated based on the singular value decomposition (SVD) as , where the weighting matrix for transmit signal is written aswhere denote the nth column vector of , is used for weighting information signal, and is used for weighting AN. Thus, the transmit signal is expressed aswhere denotes the transmit signal in nth antenna, denotes the BPSK modulation symbol, denotes the AN vector, the entries of are assumed to be independent and identically distributed (i.i.d.) zeromean complex Gaussian variables with unit variance, the total transmit power available at Alice is denoted by , the PA parameter is defined as the fraction of the information bearing signal power to the total transmit power, the variance of is set to , the total variance of is set to , and is a PA matrix for AN satisfying . For the convenience of expression, and denote the information subspace and the AN subspaces, respectively. It is noted that the index number of antenna appeared peak value is random for the mth transmit symbol because of random characteristics of AN vector. For the practical multiantenna system, the PA is the same for each antenna. Therefore, we focus on reducing the peak value of the transmit signal in ANaided secure communication system. The most aforementioned papers about the PA were mainly focused on the PA parameter to optimize the SC of this ANaided method, such as [11] for Gaussian input and [47] for finitealphabet input. Meanwhile, the PA matrix for AN subspaces was equal distribution , named EPA strategy, because of Alice without the a priori knowledge of eavesdropper’s channel . It is noted that the power allocation algorithm does not influence the independence of the artificialnoise source. In this paper, we utilize the redundancy of PA matrix of AN subspaces to optimize the PAPR value for relaxing the linear range requirement of amplifiers.
2.2. PAPR Definition and Optimization Problem Formulation
Following (2), the second term represents a series of summations of AN subspaces, whose value depends on the random AN vector . Therefore, it is possible that peak value appears for the transmit signal when the AN subspaces and information subspace are added with the same phase. According to the definition in [44], the PAPR value of the transmit signal by multiple antennas is expressed as
From (3), it is clear that the PAPR value is associated with two PA parameters, and . In [47], the authors proposed a gradient search algorithm to obtain the value of PA parameter for approaching the optimal SC with a finitealphabet input. Following these results, we focus on reducing the PAPR value of transmit signal to improve the efficiency of HPA by the system redundancy of the PA matrix in the following optimization problem.
Compared with angle rotation based technique in [44], we formulate an optimization problem for PAPR by the PA matrix as follows:where denotes the feasible region of the optimization problem. The physical meaning of the optimization problem (4) is to optimize PAPR value of the transmit vector signal under the total power constraint of AN subspaces to approach the optimal SC with a finitealphabet input. The objective function expressed by a nonconvex fractional form is used to reduce the peak value of the transmit vector signal from multiple transmit antennas for relaxing the linear range requirement of amplifiers. The convex constraint denotes the linear range of PA matrix element , which is used to optimize the PAPR value by allocating different power value to different AN subspace compared with the angle rotation based technique proposed in [44]. The nonconvex constraint denotes the total power constraint for the AN subspaces to maintain the optimal SC performance. The value of PA parameter has been addressed in many papers to obtain the optimal SC performance, such as [11] for Gaussian input and [47] for finitealphabet input. It is noted that the PA parameter in the constraint as a constant in this paper is obtained by the gradient search algorithm proposed in [47]. In this paper, we focus on the PA matrix to relax the linear range requirement of amplifiers. Thus, the formulated problem (4) is a nonconvex optimization problem.
3. Optimization Problem Solution
In this section, we use a series of convex optimization problems to relax the nonconvex optimization problem (4) in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation.
3.1. Fractional Programming
The fractional objective function in (4) can be classified as a nonlinear fractional programming [48]. Without loss of generality, we define the minimum PAPR value and corresponding PA matrix as
Following (5), we introduce Theorem 1.
Theorem 1. The optimal PA strategy achieves the minimum PAPR value if and only iffor , .
Proof:. See Appendix. Theorem 1 reveals that, for an objective function in fractional form, there exists an equivalent objective function in subtractive form, for example, in the considered case. As a result, we can focus on the equivalent optimization problem as follows:For solving the optimization problem (6), we employ an iterative algorithm (known as the Dinkelbach method [49]) via the equivalent optimization problem (7). The iterative algorithm is summarized in Algorithm 1 as follows.
In the following subsection, we will focus on the solution to the main loop problem (7) in Algorithm 1.

3.2. DC Programming
In the optimization problem (7), the objective function is expressed by a difference of two functions forms. According to DC programming [50], this nonconvex objective function can be replaced by its convex majorant form as shown in the following equation:where denotes the (j − 1)th solution in DC programming, denotes the gradient function at the point , and denotes the inner product of vectors. Following (2) and (8), we can obtainwhere is expressed as
The iterative algorithm for solving the nonconvex optimization problem (7) is summarized in Algorithm 2 as follows.

This iterative algorithm relies on the fact that the term in the objective function of (7) is replaced by its convex majorant in (8). The objective function in (8) is solved iteratively to approach the optimal solution. It should be noted that there is no guarantee that Algorithm 2 will return a global optimum of a DC problem. However, there exist related branchandbound approaches based on outer approximations, which are indeed globally optimal [51]. The provable convergence to a global optimum of these methods is accompanied though with an increase in computational complexity.
3.3. Nonconvex Constraint Relaxing
The nonconvex objective function in the original optimization problem (4) was solved by fractional programming in subsection 3.1 and DC programming in subsection 3.2. In this subsection, we will focus on the solution method for nonconvex constraint . Following (4), the nonconvex constraint is transformed aswhere denotes infinitely small quantity. To relax this nonconvex constraint, the classic approach in the field of array pattern synthesis [52] is to utilize a sequence of linear convex optimizations to approximate the original optimization problem. Inspired by this classic approach, we define an iteration variable to transform the optimization problem (8) aswhere denotes the iteration variable in the kth iterative process, denotes the transform constraint, and denotes the transform feasible region. The iterative algorithm for solving the nonconvex constraint in (12) is summarized in Algorithm 3 as follows.

The core idea of the algorithm is described as follows: First, a reasonable starting point for Algorithm 3 is . Then, is computed by solving the optimization problem (12). The step to the (k + 1)th iteration variable is an “averaging” or “smoothing” operation to ensure that asymptotically the difference between and vanishes. Indeed, at the first iteration is set to , and along the iterations, this averaging is modified with to approximate . Finally, the optimal PA strategy is obtained when the difference value between kth PAPR value and (k + 1)th PAPR value is less than the maximum tolerance . The convergence of Algorithm 3 is shown in [53].
3.4. Summary of the Proposed Algorithm
We formulated a nonconvex optimization problem (4) to solve the PAPR problem of ANaided secure communication signal. To solve this nonconvex optimization problem, we use a series of convex optimization problems to approximate the optimal solution. The tripleiterative algorithm is summarized in Algorithm 4.

The parameters transmission diagram of the proposed algorithm is shown in Figure 2.
The complexity of the proposed algorithm depends on solution method of the convex optimization problem (12). According to the fast gradient method in [54], the complexity of a convex problem is , where is a Lipschitz constant to guarantee that the gradient of objective function satisfies the Lipschitz condition, denotes the convexity parameter, and denotes a given convergence precision. The proposed algorithm in Algorithm 3 contains triple loops with the loop times , , and for achieving the given convergence precisions , , and , respectively. Therefore, the proposed algorithm has a polynomial time complexity as follows:
4. Performance Assessment
To assess the performance of proposed signal, we establish two metrics: one is input backoff (IBO) of nonlinear HPA and the other is SC performance with a finite alphabet. To compare the metrics with the proposed signal, we also consider two benchmark ANaided signals: one is original signal with EPA strategy proposed in [47] and the other is angle rotation based technique proposed in [44].
4.1. Input BackOff of Nonlinear HighPower Amplifier
The modeling of nonlinear HPA is assumed as follows. For example, if the HPA input signal is
then the output signal iswhere and are known as the AM/AM and AM/PM conversions, respectively. According to the Rapp model, we consider a solidstate power amplifier (SSPA) model as follows:where denotes the normalized output signal amplitude, is the input saturation level, and determines the AM/AM sharpness of the saturation region. The AM/PM conversion is assumed to be negligibly small. In practical HPAs, output sharpness parameter is usually set at [55], and we set in this paper. We also consider the input saturation level to assess the performance for different transmit antenna number, where 1 denotes the normalized power of transmitter. It is noted that we use the total power with uniform distribution in each RF chain to evaluate PAPR characteristic of the transmit signal. For a given ANaided signal, we need to adjust the average input power so that the peaks of the transmit signal rarely fall into the nonlinear range of HPA. The input backoff (IBO) is expressed as
Figure 3 shows the normalized AM/AM conversion when equals 8 and signaltonoise ratio (SNR) equals 30 dB. It is shown that the dynamic amplitude range of the ANaided signal with proposed strategy is more concentrated compared with two benchmark ANaided signals. Under the constraint of the normalized transmit power, the IBO value equals 6.25 dB, 2.47 dB, and 0 dB, respectively. It is noted that high IBO value will cause low efficiency of the HPAs.
(a)
(b)
(c)
4.2. Secrecy Capacity Performance with a Finite Alphabet
According to the aforementioned SSPA model, the output signal in the n_{1}th transmit antenna can be written as
After passing the HPAs, the information space , the AN spaces , and the transmit signal can be denoted by , , and , respectively. We consider that the modulation symbol belongs to a symbol set with modulation symbols. In [47], a gradient search algorithm was proposed to approximate the optimal value of PA parameter in different SNR values. Following this conclusion, we will analyze the SC performance when the transmitter is equipped with the nonlinear HPAs in the following part. Based on (18), the transmit signal is affected by two factors: one is the orthogonal between the AN subspaces and the legal channel in the second term and the other is the capacity of the legal channel in the first term. For the transmit signal , the receive signals of Bob and Eve can be written as follows:where and are the AWGN at Bob and Eve satisfying and ; respectively, and denote the AN subspaces projecting into the legal channel and wiretap channel, respectively. Thus, the average SNR losses at Bob and Eve are given by
Motivated by the AN signal processing method in [56], the interference plus noise at Bob and Eve can be written aswhich have zero mean and variance.
Thus, we can whiten the AN interference term asWithout affecting the mutual information of the legal channel and wiretap channel, we apply a linear transformationon and , respectively, to whiten the interference plus noise as follows:where and have zero mean and variance and , respectively. Following (24), the values of and are determined by two factors: one is the AN power projecting into the legal channel or wiretap channel and the other is noise variance of AWGN. Taking as example, when is much larger than , its value mainly depends on the noise variance and tends to (ideal HPAs); when has the same order of , its value depends on these two factors and there appears inflection point of SC performance; when is much less than , its value mainly depends on the ratio of the noise variance to the AN power projecting into the legal channel and represents the decreasing gradient of SC performance.
According to the aforementioned processing method, the mutual information of the legal channel and wiretap channel is written as follows:
Thus, the SC of ANaided model with the nonlinear HPAs is written as follows:
Following (21)–(27), the SC value is mainly determined by the parameters , , and noise variance . In Section 5, we will give useful insights into the impact of SC performance.
5. Simulation Results
In this section, we evaluate the system performance through simulations. The simulation conditions are supposed as follows. We consider that the modulation symbol belongs to a BPSK symbol set with . We focus on the PAPR problem of the transmitter. Thus, we suppose that Bob and Eve have the same noise variance . We use two HPA models in simulations: one is ideal HPA model with infinite linear range and the other is nonlinear HPA model. The total transmitter power is normalized as 1. The value of PA parameter is derived via gradient search algorithm in [47] as a constant value for different SNR values. Monte Carlo simulations with 100 repetitions are used to obtain the average SC performance by equation (27).
5.1. PeakToAverage Power Ratio Performances
Figure 4 shows the PAPR performance of the ANaided signal with proposed PA strategy by complementary cumulative distribution function (CCDF) compared with the ANaided signal with EPA strategy proposed in [47] and ANaided signal with angle rotation based technique proposed in [44]. The following are found: (1) For the proposed signal in [47], the PAPR performance degrades with the transmit antenna number increasing. When transmit antenna number equals 64, the PAPR value is greater than 10.5 dB with the probability of , which is similar to the performance of traditional OFDM signal with 64 subcarriers and BPSK modulation [57]. (2) For the proposed signal in [44], the PAPR value is decreased by 3.8 dB, 4 dB, and 4.2 dB when equals 8, 16, and 64, respectively. (3) For the ANaided signal with proposed PA strategy, the PAPR value is decreased by 4 dB, 7 dB, and 8.5 dB when equals 8, 16, and 64, respectively. (4) For a fixed transmit antenna number, the PAPR curves for proposed signal in [44, 47] almost coincide for different SNR values. Meanwhile the PAPR reducing performance for the ANaided signal with proposed PA strategy increases with SNR values because more power of the transmitter is used in AN subspaces to keep the optimal SC performance. The PAPR simulation results reveal that the effect of PAPR reducing by proposed PA strategy is better than the angle rotation based technique proposed in [44] to improve the efficiency of the HPAs because more AN subspaces and transmitter power can be used to adjust the PAPR value.
(a)
(b)
5.2. SignalToNoise Ratio Loss Performances
Figure 5 shows the average SNR loss of ANaided signals at Bob and Eve. The following are found: (1) At Bob, the SNR loss increases with the transmit signal SNR and transmit antenna number both for EPA strategy in [47] and proposed PA strategy. The gradient of curves for the proposed PA strategy is much smaller than ANaided signal with EPA strategy. The performance difference of these two ANaided signals reaches about 6 dB for and 11 dB for when SNR equals 30 dB. (2) At Eve, the SNR loss almost equals 0 dB and coincides with different SNR values and transmit antennas because the nonlinear characteristic of HPA not only reduces the power of the information subspace but also degrades the interference effect of AN subspaces. This average SNR loss simulation results illustrate that the proposed PA strategy can improve the channel capacity performance with the transmit antenna number increasing. Furthermore, the SC performance is mainly determined by the capacity of legal channel.
5.3. Secrecy Capacity Performances
Figure 6 shows the SC performance of the ANaided signals when equals 8 and 16, respectively. The key parameter is defined by the AN subspaces power projecting into the legal channel . The relationship between and determines the inflection point of the SC performance. If is much larger than , it means that the AN subspaces power projecting into the legal channel plays the main role in the value of , which will result in the SC performance degrading obviously. If is much smaller than in , it means less AN subspaces power projecting into the legal channel, which will result in the SC performance being similar to the ANaided model with ideal HPA. From the subfigure in (a) and (b), the value of is reduced by the proposed PA strategy compared with proposed signal in [44, 47]. Therefore, the inflection point will appear later with the transmit signal SNR increasing.
(a)
(b)
From Figures 6(a) and 6(b), the following are found: (1) For the ANaided signal with EPA strategy in [47], the SC performance degrades with the transmit signal SNR increasing when the power of AN subspaces projecting into the legal channel plays the main role in . Furthermore, the SC performance reduces with the transmit antennas increasing, for example, 0.55 bit/s/Hz for and 0.45 bit/s/Hz for , almost half of the ideal HPAs scenario at . (2) For the ANaided signal with angle rotation based technique in [44], the PAPR reducing algorithm improves the SC performance, for example, 0.86 bit/s/Hz for and 0.90 bit/s/Hz for . (3) For the ANaided signal with the proposed PA strategy, the degradation gradient of SC performance is smooth compared with proposed signal in [44, 47]. Furthermore, the SC performance is similar to the ANaided model with ideal HPAs by the transmit antenna number increasing, for example, 0.92 bit/s/Hz for and 0.99 bit/s/Hz for , almost coinciding with the ideal HPAs scenario at . On the assumption of larger transmit antenna numbers, the nonlinear characteristic of HPA does not affect the SC performance of ANaided signal by the proposed PA strategy because the amplitude of transmit signal is close to uniform distribution. Fortunately, this assumption is beneficial to the SC performance when eavesdropper equips multiple antennas [18].
6. Conclusion
In this paper, we have formulated the AN power allocation for PAPR problem of the ANaided secure communication system as a mixed nonconvex optimization problem. By exploiting the properties of fractional programming, DC programming, and nonconvex constraint relaxing, the considered problem was transformed into an equivalent problem with a tractable solution. An efficient tripleiterative AN power allocation algorithm was derived for minimization of the PAPR value of transmit signal. Compared with the benchmark ANaided signals, simulation results showed that the proposed algorithm can reduce the PAPR value of the transmit signal to improve the efficiency of HPAs in ANaided secure communication model.
Interesting topics for future work include studying better algorithm for achieving the transmit signal with low PAPR characteristic, other system redundancy parameters to reduce PAPR value of transmit signal, and the complexity of PAPR reducing algorithm.
Appendix
Proof of Theorem 1. First, we prove the forward implication of Theorem 1. Without loss of generality, we define and as the optimal PAPR and the optimal power allocation strategy of the original objective function in (4), respectively. Then, the optimal PAPR can be expressed asTherefore, we conclude that and it is achievable by power allocation strategy . This completes the forward implication.
Next, we prove the converse implication of Theorem 1. For any feasible power allocation strategy , we can obtain the following inequality:The preceding inequality impliesIn other words, the optimal power allocation strategy for the equivalent objective function is also the optimal power allocation strategy for the original objective function. This completes the proof of the converse implication of Theorem 1. In summary, the optimization of the original objective function and the optimization of the equivalent objective function result in the same power allocation strategy.
Data Availability
Some or all data, models, and codes generated or used during the study are available in a repository or online in accordance with the funder data retention policies.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 91738201, Grant 61971440 and Grant 61302102, and Special Program for Advanced Leading Research of the Jiangsu Province under Grant BK20192002.
References
 K. Zeng, “Physical layer key generation in wireless networks: challenges and opportunities,” IEEE Communications Magazine, vol. 53, no. 6, pp. 33–39, 2015. View at: Publisher Site  Google Scholar
 W. Mei, Z. Chen, J. Fang, and S. Li, “Physical layer service integration in 5G: potentials and challenges,” IEEE Access, vol. 6, pp. 16563–16575, 2018. View at: Publisher Site  Google Scholar
 N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Communications Magazine, vol. 53, no. 4, pp. 20–27, 2015. View at: Publisher Site  Google Scholar
 J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1773–1828, 2019. View at: Google Scholar
 M. Bloch and J. Barros, PhysicalLayer Security: From Inf. Theory to Security Engineering, Cambridge University Press, Cambridge, MA, USA, 2011.
 C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at: Publisher Site  Google Scholar
 A. D. Wyner, “The wiretap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, Oct. 1975. View at: Publisher Site  Google Scholar
 I. Csiszár and J. Körner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978. View at: Publisher Site  Google Scholar
 Y.B. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2470–2492, 2008. View at: Google Scholar
 S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, 2008. View at: Publisher Site  Google Scholar
 X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation,” IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831–3842, 2010. View at: Publisher Site  Google Scholar
 Q. Li and W.K. Ma, “Spatially selective artificialnoise aided transmit optimization for MISO multieves secrecy rate maximization,” IEEE Transactions on Signal Processing, vol. 61, no. 10, pp. 2704–2717, 2013. View at: Publisher Site  Google Scholar
 A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas I: the MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088–3104, 2010. View at: Publisher Site  Google Scholar
 G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving physical layer secrecy using fullduplex jamming receivers,” IEEE Transactions on Signal Processing, vol. 61, no. 20, pp. 4962–4974, 2013. View at: Publisher Site  Google Scholar
 S. Yan, X. Zhou, N. Yang, T. D. Abhayapala, and A. L. Swindlehurst, “Secret channel training to enhance physical layer security with a fullduplex receiver,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 11, pp. 2788–2800, 2018. View at: Publisher Site  Google Scholar
 N. Yang, S. Yan, J. Yuan, R. Malaney, R. Subramanian, and I. Land, “Artificial noise: transmission optimization in multiinput singleoutput wiretap channels,” IEEE Transactions on Communications, vol. 63, no. 5, pp. 1771–1783, 2015. View at: Publisher Site  Google Scholar
 S. Yan, N. Yang, I. Land, R. Malaney, and J. Yuan, “Three artificialnoiseaided secure transmission schemes in wiretap channels,” IEEE Transactions on Vehicular Technology, vol. 67, no. 4, pp. 3669–3673, 2018. View at: Publisher Site  Google Scholar
 S. Liu, Y. Hong, and E. Viterbo, “Artificial noise revisited,” IEEE Transactions on Information Theory, vol. 61, no. 7, pp. 3901–3911, 2015. View at: Publisher Site  Google Scholar
 S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Artificialnoiseaided secure transmission in wiretap channels with transmitterside correlation,” IEEE Transactions on Wireless Communications, vol. 15, no. 12, pp. 8286–8297, 2016. View at: Publisher Site  Google Scholar
 S.Y. Liu, Y. Hong, and E. Viterbo, “Practical secrecy using artificial noise,” IEEE Commun. Lett., vol. 17, no. 7, pp. 1483–1486, 2013. View at: Publisher Site  Google Scholar
 T.X. Zheng, H.M. Wang, J. Yuan, D. Towsley, and M. H. Lee, “Multiantenna transmission with artificial noise against randomly distributed eavesdroppers,” IEEE Transactions on Communications, vol. 63, no. 11, pp. 4347–4362, 2015. View at: Publisher Site  Google Scholar
 C. Liu, N. Yang, J. Yuan, and R. Malaney, “Locationbased secure transmission for wiretap channels,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 7, pp. 1458–1470, 2015. View at: Publisher Site  Google Scholar
 S. Yan and R. Malaney, “Locationbased beamforming for enhancing secrecy in rician wiretap channels,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2780–2791, 2016. View at: Publisher Site  Google Scholar
 J. Zhu, R. Schober, and V. K. Bhargava, “Secure transmission in multicell massive MIMO systems,” IEEE Transactions on Wireless Communications, vol. 13, no. 9, pp. 4766–4781, 2014. View at: Publisher Site  Google Scholar
 D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks,” IEEE Communications Magazine, vol. 53, no. 6, pp. 21–27, 2015. View at: Publisher Site  Google Scholar
 J. Zhu, R. Schober, and V. K. Bhargava, “Linear precoding of data and artificial noise in secure massive MIMO systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 2245–2261, 2016. View at: Publisher Site  Google Scholar
 F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, “Robust ANaided beamforming and power splitting design for secure MISO cognitive radio with SWIPT,” IEEE Transactions on Wireless Communications, vol. 16, no. 4, pp. 2450–2464, 2017. View at: Publisher Site  Google Scholar
 Y. Deng, L. Wang, S. A. R. Zaidi, J. Yuan, and M. Elkashlan, “Artificialnoise aided secure transmission in large scale spectrum sharing networks,” IEEE Transactions on Communications, vol. 64, no. 5, pp. 2116–2129, 2016. View at: Publisher Site  Google Scholar
 A. Alnahari, G. Geraci, M. Aljamali, M. H. Ahmed, and N. Yang, “Beamforming with artificial noise for secure MISOME cognitive radio transmissions,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 1875–1889, 2018. View at: Publisher Site  Google Scholar
 X.J. Ding, T.C. Song, Y.L. Zou, X.S. Chen, and L. Hanzo, “Securityreliability tradeoff analysis of artificial noise aided twoway opportunistic relay selection,” IEEE Transactions on Vehicular Technology, vol. 66, no. 5, pp. 3930–3941, 2017. View at: Google Scholar
 Q. Li, Y. Yang, W.K. Ma, M. Lin, J. Ge, and J. Lin, “Robust cooperative beamforming and artificial noise design for physicallayer secrecy in AF multiantenna multirelay networks,” IEEE Transactions on Signal Processing, vol. 63, no. 1, pp. 206–220, 2015. View at: Publisher Site  Google Scholar
 H. Guo, Z. Yang, L. Zhang, J. Zhu, and Y. Zou, “Joint cooperative beamforming and jamming for physicallayer security of decodeandforward relay networks,” IEEE Access, vol. 5, pp. 19620–19630, 2017. View at: Publisher Site  Google Scholar
 R. Zhao, Y. Huang, W. Wang, and V. K. N. Lau, “Ergodic achievable secrecy rate of multipleantenna relay systems with cooperative jamming,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2537–2551, 2016. View at: Publisher Site  Google Scholar
 X. Zhou, S. Yan, Q. Wu, J. Lin, and F. Shu, “Robust beamforming design for secure DMbased relay networks with selfsustained jammers,” IEEE Access, vol. 7, pp. 969–983, 2019. View at: Publisher Site  Google Scholar
 G. Zheng, P.D. Arapoglou, and B. Ottersten, “Physical layer security in multibeam satellite systems,” IEEE Transactions on Wireless Communications, vol. 11, no. 2, pp. 852–863, 2012. View at: Publisher Site  Google Scholar
 J. Liu, J. Wang, W. Liu, Q. Wang, and M. Wang, “A novel cooperative physical layer security scheme for satellite downlinks,” Chinese Journal of Electronics, vol. 27, no. 4, pp. 860–865, 2018. View at: Publisher Site  Google Scholar
 J. Du, C. Jiang, H. Zhang, X. Wang, Y. Ren, and M. Debbah, “Secure satelliteterrestrial transmission over incumbent terrestrial networks via cooperative beamforming,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 7, pp. 1367–1382, 2018. View at: Publisher Site  Google Scholar
 N. Zhao, Y. Cao, F. R. Yu, Y. Chen, M. Jin, and V. C. M. Leung, “Artificial noise assisted secure interference networks with wireless power transfer,” IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1087–1098, 2018. View at: Publisher Site  Google Scholar
 M. Zhang, Y. Liu, and R. Zhang, “Artificial noise aided secrecy information and power transfer in OFDMA systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 3085–3096, 2016. View at: Publisher Site  Google Scholar
 Y. Feng, Z. Yang, W.P. Zhu, Q. Li, and B. Lv, “Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplifyandforward relay networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2354–2366, 2017. View at: Publisher Site  Google Scholar
 J. Hu, N. Yang, and Y. Cai, “Secure downlink transmission in the Internet of Things: how many antennas are needed?” IEEE Journal on Selected Areas in Communications, vol. 36, no. 7, pp. 1622–1634, 2018. View at: Publisher Site  Google Scholar
 Z. Xu, Y. Liu, M. Li, and Y. Li, “Linearly polarized shaped power pattern synthesis with dynamic range ratio control for arbitrary antenna arrays,” IEEE Access, vol. 7, pp. 53621–53628, 2019. View at: Publisher Site  Google Scholar
 X. Fan, J. Liang, Y. Zhang, H. C. So, and X. Zhao, “Shaped power pattern synthesis with minimization of dynamic range ratio,” IEEE Transactions on Antennas and Propagation, vol. 67, no. 5, pp. 3067–3078, 2019. View at: Publisher Site  Google Scholar
 T. Hong and Z.P. Li, “Peaktoaverage power ratio reduction for an artificial noise aided secure communication system,” in Proceedings of the 2016 3rd International Conference on Information Science and Control Engineering (ICISCE), pp. 1370–1374, Beijing, China, July 2016. View at: Google Scholar
 J. M. Hamamreh and H. Arslan, “Joint PHY/MAC layer security design using ARQ with MRC and nullspace independent PAPRaware artificial noise in SISO systems,” IEEE Transactions on Wireless Communications, vol. 17, no. 9, pp. 6190–6204, 2018. View at: Publisher Site  Google Scholar
 S. R. Aghdam, A. Nooraiepour, and T. M. Duman, “An overview of physical layer security with finitealphabet signaling,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1829–1850, 2019. View at: Google Scholar
 X.R. Liu, D.T. Ma, J. Xiong, W. Li, and L.W. Cheng, “Power allocation for ANaided beamforming design in MISO wiretap channels with finitealphabet signaling,” in Proceedings of the 2016 IEEE 84th Vehicular Technology Conference, pp. 1–6, September 2016. View at: Google Scholar
 W. Dinkelbach, “On nonlinear fractional programming,” Management Science, vol. 13, no. 7, pp. 492–498, 1967. View at: Google Scholar
 S. Schaible, ““Fractional programming. II, on Dinkelbach’s algorithm,” Management Science, vol. 22, no. 8, pp. 868–873, 1976. View at: Google Scholar
 L. T. H. An and P. D. Tao, “The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems,” Annals of Operations Research, vol. 133, no. 1–4, pp. 23–46, 2005. View at: Publisher Site  Google Scholar
 N. Vucic, S.Y. Shi, and M. Schubert, “DC programming approach for resource allocation in wireless networks,” in Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 380–386, May 2010. View at: Google Scholar
 B. Fuchs, A. Skrivervik, and J. R. Mosig, “Shaped beam synthesis of arrays via sequential convex optimizations,” IEEE Antennas and Wireless Propagation Letters, vol. 12, pp. 1049–1052, 2013. View at: Publisher Site  Google Scholar
 J.D. Wang, Q.H. Zhang, and L. Ljung, “Revisiting the twostage algorithm for Hammerstein system identification,” in Proceedings of the Joint 48th IEEE Conference Decision Control & 28th Chinese Control Conference, pp. 3620–3625, Shanghai, China, December 2009. View at: Google Scholar
 S. Richter, C. N. Jones, and M. Morari, “Computational complexity certification for realtime MPC with input constraints based on the fast gradient method,” IEEE Transactions on Automatic Control, vol. 57, no. 6, pp. 1391–1403, 2012. View at: Publisher Site  Google Scholar
 A. J. Cann, “Improved nonlinearity model with variable Knee sharpness,” IEEE Transactions on Aerospace and Electronic Systems, vol. 48, no. 4, pp. 3637–3646, 2012. View at: Publisher Site  Google Scholar
 L. Wang, S. Bashar, Y. Wei, and R. Li, “Secrecy enhancement analysis against unknown eavesdropping in spatial modulation,” IEEE Communications Letters, vol. 19, no. 8, pp. 1351–1354, 2015. View at: Publisher Site  Google Scholar
 R. van Nee and R. Prasad, OFDM for Wireless Multimedia Communications, Artech House, Norwood, MA, USA, 1999.
Copyright
Copyright © 2020 Tao Hong and Gengxin Zhang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.