Abstract

Physical layer security has recently emerged as a promising approach to achieve security and communication integration. The built-in security mechanism based on the characteristics of the wireless channel provides a feasible idea for the realization of “one secret at a time.” It has significant potential applications in high-rate data transmission encryption, authentication, integrity protection of service data, and Internet of Things lightweight encryption. This paper investigates the robust secure transmit design problem for amplify-and-forward multiantenna relay networks in the presence of multiple single-antenna eavesdroppers. A robust artificial noise (AN) aided secure beamforming design is proposed by taking into account the imperfect channel state information (CSI) of the eavesdroppers. The goal is to jointly design the beamforming matrix and the AN covariance matrix at the relay based on the imperfect CSI of eavesdroppers, such that the worst-case secrecy rate is maximized subject to the total power and the per-antenna power constraints. Aiming at the nonconvex optimization problem, a two-level optimization algorithm based on semidefinite relaxation (SDR) and S-procedure is proposed. It is proven that there is a rank-one optimal solution for the SDR problem. Simulation results show that the proposed scheme is robust and superior to existing schemes.

1. Introduction

With the rapid development of mobile communication network, its security has become a research hotspot [1, 2]. Traditionally, information security is guaranteed through the key-based encryption technique. However, key management (including key generation and distribution) is challenging in mobile wireless networks [3]. For this reason, physical layer security, which exploits the characteristics of wireless channels to encrypt confidential messages, has recently attracted much attention [46]. The emerging physical layer security technology takes advantage of the diversity and time variation of wireless channels and the uniqueness and interoperability of both channels of legitimate communication and explores the built-in security mechanisms based on the characteristics of wireless channels in the physical layer. It has important application prospects in high-rate data transmission encryption, authentication, integrity protection of service data, and Internet of Things lightweight encryption [79]. The key idea is to safely deliver confidential information by exploiting the physical characteristics of the wireless channel [10, 11]. The research on physical layer security has been used in relay communication and point-to-point communication system [12, 13] and could be extended to various wiretap channels such as broadcast channels [14], interference channels [15], and cooperative relay channels [16, 17].

There have been several studies addressing the physical layer security problem in cooperative relay communications. For the case of single-antenna relays, secure transmit schemes have been designed by Yang et al. [17], Feng et al. [18], Xu et al. [19], Wang et al. [20], Yang et al. [21], Li et al. [22], and Park et al. [23]. Yang et al. [17] designed the relay beamforming vector to obtain an optimal secrecy rate. An intelligent reflecting surface is deployed to modulate the received confidential signal to achieve secure transmission by Feng et al. [18] and Xu et al. [19]. The hybrid of cooperative beamforming and jamming has been proposed by Wang et al. [20] and Yang et al. [21] to improve security performance, where the beamforming vector and the artificial noise (AN) covariance matrix are jointly designed for the secrecy rate maximization (SRM) problem. All these works are conducted based on perfect channel state information (CSI). Taking into account the deterministic channel error, the authors by Li et al. [22] investigated the robust design to maximize the worst-case secrecy rate. Based on the statistical CSI of the eavesdropper, three jamming strategies performed at the destination were proposed for minimizing the secrecy outage probability by Park et al. [23].

For the case of a multiantenna relay, the physical layer security problem was studied by Vishwakarma and Chockalingam [24], Jilani and Ohtsuki [25], Li et al. [26], Wang et al. [27], Yang et al. [28], Zhang et al. [29, 30], Wang et al. [31, 32]. Using the decode-and-forward (DF) protocol, the secure transmit design was explored by Vishwakarma and Chockalingam [24] and Jilani and Ohtsuki [25]. Compared to the DF protocol, the transmit design for the SRM problem is more complex when using the amplify-and-forward (AF) protocol due to the noise amplification effects at the relay. Under perfect CSI, the SRM problem was studied by Li et al. [26] and Wang et al. [27], where an iterative algorithm was proposed by Li et al. [26], and a suboptimal joint source-relay linear precoding and power allocation scheme was developed by Wang et al. [27]. Under imperfect CSI, the robust design was investigated by Yang et al. [28], Zhang et al. [29, 30], Wang et al. [31, 32]. From the quality of service view, an optimal resource allocation strategy was proposed by Yang et al. [28], and the robust joint beamforming design of the source and relay for minimizing the overall power was proposed by Zhang et al. [29]. In the study of Zhang et al. [30], Wang et al. [31, 32], the suboptimal beamforming matrix was designed in order to maximize the worst-case secrecy rate. It is noteworthy that only one eavesdropper is considered in most works on the multiantenna relay networks mentioned above. And the methods are not applied to the scenarios with multiple eavesdroppers directly, or they are applied to special channels [33].

In this paper, we consider a two-hop AF multiantenna relay network. It is assumed that the CSI of the eavesdroppers is imperfectly known at the relay, and the channel uncertainties are bound in ellipsoidal regions. Our work is different from Wang et al. [31] in the following aspects: (1) we assume that multiple eavesdroppers exist; (2) the AN is adopted to enhance the security performance; (3) the per-antenna power constraints are considered in addition to the total power constraint. The goal is to jointly design the beamforming matrix and the AN covariance matrix at the relay based on the imperfect CSI of eavesdroppers, such that the worst-case secrecy rate is maximized subject to the total power and the per-antenna power constraints. We show that the nonconvex worst-case secrecy rate maximization (WCSRM) problem can be recast into a two-level optimization. The outer part is a one-variable optimization problem, which can be handled by one-dimensional search. The inner part can be solved by the combination of the semidefinite relaxation (SDR) technique [34, 35] and the S-procedure [36]. Moreover, we prove that the SDR is tight, i.e., a rank-one solution always exists. Simulation results are provided to show the efficacy of the proposed AN-aided secure beamforming design.

1.1. Notations

and denote the trace, inverse, conjugate, Hermitian transpose, Euclidean norm, and rank of a matrix, respectively. and denote the spaces of complex vector and complex matrix, respectively. and stand for the Hadamard product, Kronecker product, identity matrix of dimension and the all-one column vector of dimension , respectively. represents a diagonal matrix with on the main diagonal. extracts the real part of a complex variable. means that is a positive semidefinite (definite) matrix, q  = vec(Q) denotes a column vector by stacking all the elements of and is the inverse operation of for recovering Q. means that x is a complex circular Gaussian random vector with mean c and covariance Q.

2. System Model and Problem Formulation

As shown in Figure 1, we consider a two-hop AF relay network consisting of one source (Alice), one relay, one legitimate destination (Bob), and multiple eavesdroppers (Eves). Each of the nodes is equipped with a single antenna, except that the relay is equipped with N antennas. There are no direct links between Alice and Bob, nor between Alice and Eve, due to the weak quality of the channels. Alice intends to transmit the confidential information to Bob, assisted by the trusted relay, while keeping it secret from the Eves. This model corresponds to the following scenario: each user belongs to the same system but subscribes to different services, e.g., pay-TV services. When a relay node sends a subscription service to a paying user, other users who do not subscribe to the service cannot access the service and are treated as eavesdroppers.

All the nodes work in a half-duplex mode. Hence, one round of information exchange includes two phases. In the first phase, the signals are transmitted from Alice to the relay. The signal vector received at the relay can be written as follows:where denotes the channel vector from Alice to the relay; is the confidential information with average power ; and denotes the additive white Gaussian noise (AWGN) vector received at the relay. In the second phase, the relay forwards the signals multiplied by a beamforming matrix. At the same time, the AN is transmitted to confuse the Eves. Hence, the signal vector to be transmitted by the relay can be expressed as follows:where is the beamforming matrix, is the artificial noise vector with being the AN covariance matrix. Note that the channel vector f, the AWGN vector and the AN vector v are mutually independent. From Equation (2), the total power of all antennas and the power of the nth antenna are computed, respectively, as follows:where is a unit vector with the th entry being one and . The signals received at Bob and the th Eve can be written, respectively, as follows:where is the channel vector between the relay and Bob; , is the channel vector between the relay and the kth Eve, ; and and are the AWGN terms at the receivers.

According to Equation (4), the received signal-to-interference-plus-noise ratios (SINRs) at Bob and the kth Eve are, respectively,

Similar to the model by Wang et al. [31], only partial CSI of Eves is available at the relay. The worst-case ellipsoidal error model is adopted to characterize the imperfect CSI of Eves. In this model, the actual channel vector of the kth Eve takes the form the following:andwhere is the estimated channel vector from the relay to the kth Eve; is the corresponding error vector; defines the shape of the uncertainty region ; and controls the size of the region.

In this paper, we investigate the WCSRM problem. The objective is to jointly design the beamforming matrix and the AN covariance matrix at the relay in order to maximize the worst-case secrecy rate. Let denote the optimal worst-case secrecy rate. The WCSRM problem is subject to the total power constraint, and the per-antenna power constraints can be formulated as follows:where 1/2 is inserted due to the fact that the relay transmission is divided into two phases; denotes the logarithmic function; and are the maximum total power of all the antennas and the maximum power of the nth antenna at the relay, respectively. The optimization problem (Equation (8)) is nonconvex and it is difficult to get the solution. In the following, we focus on handling this WCSRM problem.

3. Robust AN-Aided Transmission Design

In this section, we propose a two-level optimization algorithm to solve the WCSRM problem (Equation (8)) and obtain the secure beamforming matrix and AN covariance matrix. Substituting the expressions of and in Equation (5) as well as the expressions of and in Equation (3) into Equation (8), we can rewrite Equation (8) as follows:where τ is the introduced auxiliary variable. Applying the matrix identities and , Equation (12) can be equivalently expressed as follows:where a  = vec(A); ; ; ; ; ; .

3.1. Two-Level Optimization Formulation

Equation (10) is nonconvex and can not be solved directly. However, if τ is fixed in Equation (10), due to the monotonicity of function, we just need to consider the following optimization problemwhich has the same optimal solution to Equation (10). Equation (11) can be converted into an SDP, which can be solved efficiently using CVX [37], as it will be shown later in the next subsection. Motivated by this, Equation (10) can be equivalently reformulated as a two-level optimization problem [14, 21]. The inner part is Equation (11) with fixed τ. The outer part can be written as follows:where τmin and τmax, which will be determined later in this subsection, are the lower bound and the upper bound on τ, respectively, and γ(τ) is the optimal objective value of the inner-level optimization problem (Equation (11)) for a given τ. Equation (12) is a single-variable optimization problem with respect to τ. It can be solved through the one-dimensional linear search over . During the search process, the γ(τ) is obtained by solving the inner optimization problem (Equation (11)). In the next subsection, we will concentrate on handling the inner-level optimization problem (Equation (11)).

To complete the description of the two-level optimization problem, we determine the values of τmin and τmax in Equation (12). Given the optimization problem (Equation (10)), the auxiliary variable τ is inside the interval . Let us observe the constraints in Equation (10b). Due to the monotonicity of function, we simplify Equation (10b) as follows:

The second term on the left-hand side of the above inequality is nonnegative, and its minimal value 0 is achieved when the optimization variable a is set to 0. Hence, the relation holds true, meaning that .

According to Equation (10a), the relation must hold true for guaranteeing the nonnegative secrecy rate with being the maximum value of . The maximum value can be achieved under the scenario, where all the power is used to transmit the information to Bob neglecting the security problem. Hence, we have the following:

Equation (14) can be rewritten as a generalized Rayleigh quotient problem [38]. Using the results of [38], we have , where . Based on the derivation above, we have the following:

3.2. Tight SDR of Inner Optimization Problem

Equation (11) is a fractional quadratically constrained quadratic problem, which is difficult to solve. To circumvent this difficulty, we resort to the SDR technique [34]. Let us define and drop the nonconvex constraint . Then, we can get a relaxed version of Equation (11) as follows:

Here . Note that , because the nonconvex rank-one constraint is dropped in Equation (16). It can be seen that there are infinitely many constraints in Equation (16b), which make it hard to solve Equation (16). It is necessary to convert these constraints into quadratic forms in terms of for the use of the S-procedure [36] later.

To proceed, we define the following notations: , with . Besides, , with an all-one matrix.

First, we deal with the first term, denoted by , on the left-hand side (LHS) of the inequality in Equation (16b). It can be easily shown that . Then, we can written as follows:

After some mathematical manipulations, the can be rewritten as follows:where

Next, we proceed with the second term, denoted by , on the LHS of the inequality in Equation (16b). It can be shown that . Then, the can be expressed as follows:

After some mathematical manipulations, the is given by the following:where

Finally, we consider the third term, denoted by , on the LHS of the inequality in Equation (16b). It is obvious that the has the following quadratic forms:

According to Equations (18), (21), and (23), the constraints in Equation (16b) are equivalent to the following implication:where

By applying the S-procedure [36], the constraints in Equations (24) and (16b) can be equivalently rewritten as the following linear matrix inequalities:where is an auxiliary variable. Now, by replacing Equation (16b) with Equation (26), Equation (16) can be reformulated as follows:

By applying the Charnes–Cooper transformation [39], the quasi-convex problem (Equation (27)) can be recast into a convex SDP. Specifically, let . Equation (27) can be equivalently converted into the following:where

The resulting problem (Equation (28)) is a convex SDP, which can be efficiently solved by existing conic optimization software, e.g., CVX [37]. When the optimal solution of Equation (28) is obtained, the optimal solution of Equation (27) can be recovered through the variable change .

Now, the inner-level optimization problem (Equation (12)) has been solved by using the SDR technique and the S-procedure. In the following, we will show that there always exists a rank-one optimal solution for Equation (27). That is to say, the relaxation problem (Equation (16)), which is equivalent to Equation (27) is tight to Equation (12).

We consider the following power minimization problem as follows:where ϕ(α) is the optimal objective value of Equation (27). The constraint in Equation (30e) is converted from . For Equation (30), we can derive two important properties listed in Propositions 1 and 2.

Proposition 1. Any optimal solution of Equation (30), denoted by, is also the optimal solution of Equation (27).

Proof. By checking the constraints of Equations (30) and (27), we can find that is also the feasible solution of Equation (27). Hence, . From Equation (30e), we have . As a result, must hold true, which implies that is optimal to Equation (27).

Proposition 2. When ϕ(α) > 0, the optimal solutionof Equation (30) is rank-one.
The proof of Proposition 2 is given in Appendix.
From Propositions 1 and 2, we can derive the following theorem.

Theorem 1. When, there always exists an optimal solutionfor Equation (27) such that. Furthermore, the rank-one solution can always be obtained by solving Equations (27) and (30).
According to Theorem 1, we can get the optimal beamforming matrixof Equation (8) withbeing the rank-one optimal solution of Equation (27).

4. Simulation Results

In this section, we use Monte Carlo simulations to evaluate the worst-case secrecy rate performance of the proposed AN-aided beamforming design. The CVX [37] is used to solve the optimization problem (Equation (28)). Each curve is obtained by averaging over 1,000 independent channel realizations. In all the simulations, the channel coefficients are independently generated following the complex Gaussian distribution with zero-mean and unit covariance. We set the signal power of Alice as Ps = 20 dB. The relay is equipped with antennas, and the maximum transmit power is Pmax = 20 dB unless specified otherwise. It is assumed that each antenna’s maximum transmit power is ρ = ρn = Pmax/N, . Without loss of generality, we set and .

We compare the performance of our proposed design (labeled “AN-aided SRM”) with the ones of the following three designs: (1) the “Nonrobust AN-aided SRM,” where the estimated CSI with errors is considered as the perfect CSI; (2) the “No-AN SRM” which is the same as the “AN-aided SRM,” except that the AN covariance matrix is set as zero; (3) the “Isotropic AN,” where the AN is transmitted in the null space of the main channel, and the power is equally allocated between the beamforming matrix and isotropic AN [14, 40]. Note that the “Isotropic AN” design does not take into account the per-antenna power constraints. Hence, the obtained solution in the “Isotropic AN” design should be multiplied by the scaling factor for satisfying the per-antenna constraints in Equation (10d).

In Figure 2, we present the worst-case secrecy rate versus the maximum transmit power Pmax for different designs with and ε2 = 0.2, 0.3, and 0.5. As can be clearly seen from Figure 2, the proposed AN-aided SRM design surpasses the other three methods over the whole region of powers tested. Moreover, we find that the nonrobust design is sensitive to the imperfect CSI, i.e., it has lower performance than the robust method. This demonstrates the necessity to design the robust method. When the power is small, e.g., Pmax = 0 dB, all the designs approach the same performance nearly, but the rate gap between the proposed design and the other methods becomes wider with the increasing power. This indicates that the AN can improve the secrecy performance; also, the proposed AN pattern is more efficient for confusing the Eves than the isotropic AN. We also compared the case with different impact parameter values ε2 = 0.2, 0.3, and 0.5, and as can be clearly seen from Figure 2, the worst-case secrecy rate decreases as ε2 increases.

Figure 3 plots the worst-case secrecy rate against the number of Eves with Pmax = 20 dB and ε2 = 0.3. As expected, we can observe that the worst-case secrecy rates of all the designs decrease with an increasing number of Eves. The performance of the No-AN SRM design drops dramatically. By contrast, the proposed AN-aided SRM design always shows the best performance under the different number of Eves. This confirms that the AN can enhance security significantly. Even though both the AN-aided SRM design and the Isotropic-AN use the AN, the former has better performance than the latter. This is attributed to the fact that AN-aided SRM design fully uses the CSI of all channels, including Eves’ channels with errors and Bob’s channel, to optimize the beamforming matrix and the AN covariance matrix. On the contrary, for the Isotropic-AN, the relay can not fully exploit the degrees of freedom of its own since the beamforming matrix and the AN pattern are fixed according to the CSI of Bob.

To investigate the impact of imperfect CSI of Eves on the worst-case secrecy rate performance, in Figure 4, we show the worst-case secrecy rate behaviors of different designs with fixed maximum transmit power and the fixed number of Eves, i.e., Pmax = 20 dB and K = 3. As is expected, the worst-case secrecy rate is a monotonically decreasing function of ε2. This is because the relay has to allocate more power to the artificial noise for jamming the Eves when the CSI error variance ε2 increases. As a result, the signal power becomes less, and the worst-case secrecy rate decreases correspondingly. In addition, the performance of the Nonrobust AN-aided SRM design degrades rapidly when the CSI errors variance becomes larger. By contrast, the proposed AN-aided SRM design provides substantial performance improvements compared to the other designs due to the joint optimization of the beamforming matrix and AN covariance matrix. This phenomenon again confirms the robustness and effectiveness of the proposed design.

5. Conclusion

In this paper, we explore robust and secure transmission for AF multiantenna relay networks in the presence of multiple single-antenna eavesdroppers. The beamforming matrix and the AN covariance matrix of the relay are jointly optimized to maximize the worst-case secrecy rate under total power and per-antenna power constraints. Due to the intractability of the resulting WCSRM problem, it is converted into a two-level optimization. The outer part can be handled by 1D search, while the inner part can be handled by SDR technique. The simulation results have effectively showcased the performance enhancements and robustness achieved by the proposed AN-aided transmit design.

Appendix

It can be verified that the convex problem (Equation (8)) satisfies Slater’s conditions [36]. Hence, the strong duality holds between Equation (30) and its dual problem, and the optimal solutions satisfy the Karush–Kuhn–Tucker (KKT) conditions. The Lagrangian function of Equation (30) is given by the following:where are the optimal dual variables associated with the constraints , Equations (30c), (30d), and (30e), respectively.

For ease of expression, we first rewrite as follows:where blkdiag(.) represents the block diagonal matrix; ; ; and .

Substituting Equation (32) into Equation (31), we can get some KKT conditions related to the proof as follows:

According to Equation (33b), the Kronecker product of IN and Y can be expressed as follows:

It can be easily shown that . Hence, subtracting Equation (34) from Equation (33a), we can get the following:where

By postmultiplying both sides of Equation (35) by , and using the Equation (33c), we can obtain the following:

It can be found that , and all the other term on the right-hand side of Equation (36) are positive semidefinite matrices, therefore . Hence, we have the following relation:

Since ϕ(α) > 0, the constraint in Equation (30e) will be violated if . As a result, holds true, which completes the proof.

Data Availability

The data of the models can be available by request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research was supported by the Key Technologies R & D Program of Henan Province under Grant 222102210185, the General Program of the Natural Science Foundation of Henan Province of China under Grant 232300420159, and the National Natural Science Foundation of China under Grants 61572447 and 61521003.