Abstract

We investigate the problem of secure communication in multiple-input-multiple-output (MIMO) interference channels from the perspective of physical layer security (PLS). We focus on the design of joint transceiver, which aims at maximizing the difference of mean-squared errors (MSE) between legitimate users and the eavesdropper. To reduce the complexity, the problem is formulated as a noncooperative game, and an asynchronous algorithm is proposed to obtain the Nash equilibrium solution. In each iteration, the closed-form solution is obtained by using Karush-Kuhn-Tucker (KKT) conditions. Furthermore, the performance of the joint transceiver, including both the secrecy rate and the MSE, is evaluated by simulations. Experimental result shows that the proposed algorithm has fast convergence speed and the security performance in different scenarios is effectively improved.

1. Introduction

Interference channels are usually used to model multiuser scenarios, such as cognitive radio systems, ad-hoc wireless networks, and various forms of broadcast channels [1]. In interference networks, multiple transmitters simultaneously communicate with their corresponding receivers. In terms of each receiver, signals from nonpaired transmitters are regarded as interference. Meanwhile, multiple-input and multiple-output (MIMO) technique has been proposed to improve spectral efficiency as well as multiplex gain in wireless communication systems. By using multiple antennas, higher information rate can be obtained in MIMO interference networks. Nevertheless, system complexity and difficulty of coding are increased rapidly.

Although the study of interference channel has a long history, the investigations are mainly focused on dealing with the multiuser interference, and researches on secure communication are relatively fewer [25]. Due to the broadcast nature, signals from any transmitter are shared by all access receivers, which means interference channels are vulnerable to eavesdropping without effective protection. In the past, the traditional cryptography that widely applied in wireless scenario has obtained quiet nice security performance. However, with the rapid development of computing speed, once quantum computers are put into practical, traditional cryptography will be greatly challenged by the brute force of quantum computing. Therefore, physical layer security (PLS) technology, which is defined from the perspective of information theory, has been proposed in the physical layer to complement and enhance the confidentiality provided by other layers [6, 7]. By PLS encoding, the quality of the legitimate channels is improved while the eavesdropping channels is degraded. As a benefit, even if the encoding leaked, security can still be guaranteed because of the advantage of channel quality [8].

In MIMO networks equipped with multiple antennas, beamforming has been widely recognized as an effective approach for improving the PLS [913]. More specifically, a precoder at transmitting side and a decoder at receiving side are jointly designed, which are known as the joint transceiver. In PLS, the secure communication can be admitted if the information rate of legitimate transmitter-receiver link is greater than that of the transmitter-eavesdropper link. To this end, researches on the sum secrecy rate maximization (SSRM) problem are carried out for interference channels. The authors of [1416] designed the transceivers in MIMO interference network with two transmitter-receiver pairs aiming at maximizing sum secrecy rate. However, the analysis was limited to the two-users MIMO interference channels. Because the expression of the secrecy rate is quite complicated, the complexity of SSRM problem is rapidly increased with the number of users. Therefore, several authors select mean-squared error (MSE) instead of secrecy rate as the suboptimal indicator of security performance to reduce complexity. For interference network with K transmitter-receiver pairs, a transceiver design based on minimizing MSE was proposed in [12], and the optimization problem was divided into several subproblems which can be solved easier. But this solution takes no eavesdropper (Eve) into consideration. In [17], the MSE of the Eve was considered, and an iterative distributed algorithm was proposed to minimize sum MSE. The two algorithms mentioned above are aimed at the global optimal solution, and encoding matrices of all transmitter-receiver pairs are computed simultaneously in each iteration, which will greatly increase complexity and computational time. Therefore, the transceiver design in interference networks is still an outstanding issue. Motivated by this challenge, we use game theory to solve the minimizing MSE problem and an asynchronous algorithm, which has low complexity and fast convergence speed, is proposed to obtain the Nash equilibrium (NE) solution.

In this paper, we consider a MIMO interference network with transmitter-receiver pairs, and any receiver has the potential to be Eve. The kth transmitter broadcasts signals in the whole network, which are only meaningful for the th receiver. Accordingly, the th receiver will receive signals from all the transmitters, which are regarded as noises except for signals sent by the th transmitter. Eve is assumed as one of the receivers of transmitter-receiver pairs and tries to wiretap signals from any non-pair transmitter. For secure communication, we did the following contributions: we build the wiretap model of the interference network with transmitter-receiver pairs. And statistically imperfect CSI model is adopted to guarantee the absolute robustness. We use MSE to denote the security performance, and the security problem in MIMO interference networks is formulated as an optimization problem for the purpose of maximizing MSE difference between legitimate transmitter-receiver pairs and Eve. In detail, by adopting linear minimum mean-squared errors (MMSE) receiver, transmit precoders (TPC) are regarded as the independent variables of the optimal problem. We model a noncooperative game among all legitimate transmitter-receiver pairs, and each legitimate transmitter-receiver pair tries to minimize its MSE with security constraint. After that, an asynchronous algorithm is proposed to obtain the NE solution of joint transceivers. Specifically, the nonconvex MSE expressions are transformed into convex forms by an one-to-one mapping and the close-formed solution is obtained in each iteration.

The rest of this paper is organized as follows: based on information-theoretic viewpoint, Section 2 analyses the MIMO interference network and build the wiretap channel model; then, Section 3 formulates a noncooperative game and proposes an asynchronous algorithm to obtain the NE solution; in Section 4, the optimal joint transceiver with the purpose of minimizing the MSE of the estimated data between the legitimate transmitter-receiver pairs is solved; in Section 5, the performance of the joint transceiver is tested by simulation experiments and a detailed analysis is also conducted; finally, conclusion of this paper is stated in Section 6.

Notation. The following notation is used in this paper. Uppercase and lowercase boldface lines denote matrices and vectors, respectively. The operators , , , and are conjugate, Hermitian, expectation, and trace operators. The operator is defined as . denotes the Frobenius norm of a matrix. represents the complex circularly symmetric Gaussian distribution with zero mean and unit variance. denotes the complex field.

2. System Model

2.1. Wiretap Model

Here we consider an interference network of K legitimate transmitter-receiver pairs. Each receiver can be the potential Eve, and wiretaps signals from nonpaired transmitters. As shown in Figure 1, the kth transmitter, the kth receiver, and Eve are equipped with , , and antennas, respectively. The kth transmitter broadcasts signals which are only meaningful for the kth receiver. And the kth receiver will receive the signals not only from the kth transmitter but also from other transmitters, which causes the mutual interference. We assume that Eve is trying to wiretap data from the kth transmitter, and the wiretap model can be built from the perspective of kth receiver and the Eve aswhere and are the vectors of signals received by the th receiver and Eve, respectively, and is the vector of signals transmit by the th transmitter. and are the channel matrices of the lth transmitter to the kth receiver link and the th transmitter to Eve link, respectively, and and are the complex additive white Gaussian noise (AWGN) vectors received by the kth receiver and Eve, respectively. And we have and , where and are the covariances of noises.

We place a joint transceiver which is consist of a TPC and a receive decoder (RDC) in each transmitter-receiver pair. For the th transmitter, the transmitted signal vector can be rebuilt aswhere is the data symbol vector and ; is the TPC matrix with independent columns. Substituting (3) into (1) and (2), the received signals can be rewritten as

Let and denote the RDC matrices of the th receiver and Eve respectively, and the estimated data symbol vectors of the th receiver and Eve are given by

In this paper, the linear MMSE receiver is selected as the RDC [18, 19], which is formulated as

As shown in (8) and (9), the RDC matrix depends on the set of TPC matrices . Therefore, we focus on the design of TPC matrices in the sections that follow.

2.2. Channel State Information

To reduce the multiuser interference, transmitter-receiver pairs share each other’s CSI. In practice, training sequences are sent between each transmitter and receiver, and the estimation of CSI can be obtained at both transmitter and receiver side. In this paper, we consider the situation when Eve is not a hostile node, but one of the receivers in the alliance and the CSI of legitimate transmitter-receiver pairs is available to Eve as well. Meanwhile, although the feedback can facilitate the CSI estimation, there is always an error between the actual and estimated channel. To improve robustness, the statistically imperfect CSI model is adopted, and we havewhere and are the estimated channel of the lth transmitter to kth receiver and lth transmitter to Eve links, respectively, while and denote the corresponding estimation error.

The uncertainty terms and are characterized by the widely adopted deterministic uncertainty model [20, 21]. In this model, and are bounded by the sets and , respectively, where and are known constants. Relying on this deterministic model, we optimize the system’s security performance under the worst-case channel condition. This approach guarantees the absolute robustness of the system design, since the achievable security performance is bounded to be no worse than the optimized result under the worst-case condition.

3. Game-Theoretic Formulation

In this section, the problem of TPC design is formulated as a noncooperative game and the NE solution is obtained by using an asynchronous algorithm. Different from algorithms that pursue global optimum, there is no need to calculate the TPC matrices of all transmitter-receiver pairs simultaneously. As a benefit, the arithmetic complexity is significantly reduced by solving the TPC matrix one by one.

3.1. Nash Equilibrium

The framework of a noncooperative game models a scenario where all legitimate transmitter-receiver pairs are regarded as competing players in a game. Each player acts independently and simultaneously according to their own interests with no a priori knowledge of other players’ strategies. Specifically, we formulate the problem as follows.

Definition 1. Given a strategic form game , an action profile is a pure-strategy Nash equilibrium of if the following condition holds for all :where is the set of players; is a nonempty set of the available pure strategies for the th player; is the utility function of the th player.

The existence of NE is proved in Appendix A.

3.2. Asynchronous Algorithm

According to the NE analyzed above, an asynchronous algorithm, which is formally presented as Algorithm 1, is proposed to obtain the NE solution. The main procedure of our algorithm is given as follows:

1. Initialization: set the iteration counter to , and start with an
arbitrary TPC matrix .
2. Begin the iteration: calculate and update and
according to the MMSE receivers in (8) and (9), respectively.
3. Update TPC matrix :
for    to    do
()
end
4. Repeat through 3 until is converged.

Firstly, the initialization of TPC matrices is randomly generated and RDC matrices and are calculated in the sequel.

Secondly, each TPC matrix is updated according to the best response of the utility function based on TPC matrices of other players in the most recent time.

Finally, the second step is repeated until utility functions of all players are converged. In other words, the Nash solution is obtained when none of the players will actively modify its TPC matrix.

4. Optimal Joint Transceiver

In this section, we solve the optimal joint transceiver by using the asynchronous algorithm mentioned in Section 3. Specifically, we first generate the utility function which is expressed by MSE. Then, a closed-form solution of the TPC matrix is deduced from the TPC matrix in last iteration.

4.1. Utility Function

In PLS, the secure rate is first proposed by Shannon and is defined as the difference of information rate between the legitimate user and Eve [22]. As shown in (13), if the secure rate is positive, the data symbol will be considered to be secure.where and are the information rate of the kth transmitter to the kth receiver link and the kth transmitter to Eve link, respectively. In multiuser scenario, the communication rate is measured by signal-to-interference-plus-noise-ratio (SINR). Thus, and are given by

However, differentiation of (14) and (15) has the shortcoming of computing expensive. Meanwhile, MSE is the suboptimal choice to reflect the communication quality. Therefore, we define the utility function as the difference of MSE between legitimate transmitter-receiver pair and Eve, which is formulated aswhere and are the MSE of the kth transmitter to the kth receiver link and the kth transmitter to Eve link, respectively. and are given by

4.2. Solution of Optimal Joint Transceiver

For the sake of maximizing the utility function, there are two intuitive strategies. The first one is that setting the minimum threshold of MSE to an acceptable constant, any value greater than it will be considered as a representation of poor communication quality. Then, we minimize the MSE of the th transmitter to the th receiver link. On the contrary, the second one is maximizing the MSE of the kth transmitter to Eve link while setting the MSE of the th transmitter to the th receiver link to an acceptable value. Here we adopt the first strategy which can be described as an optimization problem as follows:where is the optimal solution obtained; is the minimum threshold of MSE of the kth transmitter to Eve link; is the maximum power constraint imposed on the kth transmitter. In fact, enough transmitted power is necessary to keep bigger than . Therefore, the optimization problem can be simplified by ignoring the transmitted power constraint and the mathematical proof is shown in Appendix B.

To start with, we transform the expression of RDC matrix in (8) as follows:where . By substituting (20) into (17) and using the matrix inversion lemma, the MSE matrix of the kth transmitter to the kth receiver link is simplified aswhere . Similarly, the MSE matrix of the kth transmitter to the kth receiver link is as follows:where . Then, the optimization problem in (17) can be transformed as

To facilitate the analysis, we use the fact that and are Hermitian matrices and have the same rank. Therefore, we can use a nonsingular matrix to diagonalize and simultaneously [23].where and ; is the dimensions of the diagonal matrix. In [24], the optimal TPC matrix in MIMO wiretap channel is proved to follow the diagonal structure which is given bywhere . The problem (23) can be simplified as

However, the objective function in (26) is monotone and nonconvex. Thus, we transform the objective function to a standard convex function by adopting the one-to-one mapping :

The Lagrangian function of the optimization problem in (27) is given bywhere , , and are the Lagrange multipliers. In order to obtain the optimal solution, the following Karush-Kuhn-Tucker (KKT) conditions have to be satisfied:

Combining (29), (30), (31), and (32), the optimal solution is given by

Consequently, the allocation of can be derivable from (33)

Obviously, (34) is a piecewise function which is segmented by . And can be derived by substituting (33) into (30):where and are the numbers of active data streams (where ) and inactive data streams (where ), respectively.

By observing (34) and (35), we find that and depend on each other and if is known, both and can be solved. Therefore, we propose a searching algorithm to obtain by comparing and boundary conditions in (34). In detail, we first rearrange the values of in a decreasing order, i.e., . Then, comparing the value of and , if is satisfied, is also satisfied. If not, we will continue to compare the value of and until the appropriate is obtained. The steps of this algorithm are summarized in Algorithm 2.

1. Initialization:  set  ,
2. Begin the iteration:  set  
3. If    then
set  , , ; go to step 2.
else
calculate according to Eq. ()
if   then
set  , ; go to step 2.
else
set  .
end
end
4. Set()

It is noteworthy that two conditions should be satisfied to ensure the existence of the solution. Firstly, should be satisfied to ensure that the interval is nonempty. Otherwise, we will change the strategy to maximize the MSE of the kth transmitter to Eve link. Secondly, should be set to a reasonable value to make sure that the right-hand side in (35) is negative and the solution exists. Accordingly, following condition should be satisfied:

5. Simulation Analysis

In this section, simulation experiments are conducted to evaluate the performance of the proposed algorithm. Specially, we consider a MIMO interference network with K legitimate transmitter-receiver pairs, and any receiver could be the potential Eve. In the network, both transmitters and receivers are equipped three antennas. The elements of the estimated channel matrices and are assumed to be i.i.d. zero-mean unit-variance complex-valued Gaussian random variables with variances . The power of background noise is assumed to be the same for all transmitter-receiver pairs and Eve, i.e., . For each scenario below, we randomly generate 500 channel realizations and any conclusion is the arithmetic mean of 500 trials.

5.1. Convergence Performance

In the network we considered, there is no difference among the legitimate transmitter-receiver pairs statistically. Therefore, without any loss of generality, the performance of the 1st transmitter-receiver pair is selected as a representative of other transmitter-receiver pairs. We set the MSE constraint to 2, i.e., , and generate the joint transceivers accordingly. The networks contain 2, 3, and 4 transmitter-receiver pairs are simulated, respectively, and the convergence behaviors of proposed algorithm based on NE are shown in Figure 2. As a comparison, we also use the Minimum Total MSE (MT-MSE) algorithm in [17] which pursues global optimality to solve the joint transceivers. We observe that final MSE values of two algorithms are convergent over iterations. Moreover, NE algorithm converges to a slightly smaller MSE as compared to MT-MSE algorithm. Since the result is based on statistic, all transmitter-receiver pairs could be considered to have similar channels, so the NE solution and the global solution are very close. But in some extreme cases in which channels of transmitter-receiver pairs are quite different, the two algorithms will lead to very different solutions and it is hard to tell which is better. However, there is no doubt that NE algorithm has a faster convergence, especially in networks with more transmitter-receiver pairs. As shown in Table 1, we observe that MT-MSE algorithm takes more CPU time in each iteration and is rapidly increased with the number of transmitter-receiver pairs increasing. Conversely, for NE algorithm, average CPU time in each iteration is increased slightly. This can be explained by the fact that we obtain closed-form solution in each iteration of NE algorithm while only an approximately optimal solution can be obtained in MT-MSE algorithm. In each iteration, NE algorithm leads to more precise optimal solution while the complexity is relatively small. This also explains why NE algorithm has higher convergence speed.

5.2. Security Performance

The MSE and secrecy rate performance in networks of the number from 2 to 4 transmitter-receiver pairs are simulated. As shown in Figure 3, the MSE of the 1st transmitter to the 1st receiver link decreases with the transmitted power increasing, and the convergence values are smaller than the MSE of the 1st transmitter to Eve link (the minimum threshold is set to 2). It means that the communication quality of the 1st transmitter-receiver pair is better than Eve. Moreover, we note that the MSE of the 1st transmitter to the 1st receiver link is larger than 2 when transmitted power is small. In such case, the transmitted power is insufficient, which causes the constraint in (30) to be unsatisfied and the optimal TPC matrix fails to be achieved. Therefore, to obtain the best MSE performance, enough transmitted power must be provided in the actual application. In addition, the mutual interference becomes more serious as the number of transmitter-receiver pairs grows, which leads to the increase of MSE.

In PLS, secure communications can be guaranteed when the secrecy rate is positive. The secrecy rate performance of networks with 3 transmitter-receiver pairs is shown in Figure 4. The secrecy rate without PLS coding is zero, which means that the 1st transmitter-receiver pair has no advantage in physical layer comparing to Eve. On the contrary, under effect of PLS coding, the secrecy rate becomes positive and is proportional to transmitted power, which means the 1st transmitter-receiver pair can defend against eavesdropping effectively. However, the information rate is lower under applying PLS coding. This can be explained by the fact that the PLS coding sacrifices a certain fraction of attainable communication rate in order to obtain a useful positive secrecy rate of data transmission. In other words, our strategy is a compromise between information rate and security performance. Moreover, the secrecy rate stops growing when the maximum transmitted power constraint is over 14dB. As mentioned in Section 4, required power corresponds one-to-one to the MSE constraint . Therefore, once is fixed, the ideal power of optimal transceiver is determined and higher transmitted power will not improve the secrecy performance anymore.

6. Conclusion

In this paper, we investigated secure communications for a MIMO interference network with transmitter-receiver pairs. A security strategy based on maximizing the difference of MSE between legitimate transmitter-receiver pairs and Eve is proposed. Specifically, the MSE of the signals between the legitimate transmitter-receiver pairs is minimized while the MSE of the signals decoded by Eve is kept higher than a certain threshold. The MSE minimization problem is formulated as a noncooperative game, and the NE solution is obtained by an asynchronous algorithm. In each iteration, the calculation of TPC matrices is sufficiently decoupled and the close-formed optimal solution is obtained. As a benefit, the computational complexity is highly reduced. The simulation results demonstrated that our security strategies can provide a positive secrecy rate and protect the network from eavesdropping. The proposed asynchronous algorithm is also confirmed to have faster convergence speed and shorter calculation time compared to iterative algorithm pursuing the global optimality.

Appendix

A. Proof of the Existence of Nash Equilibrium

In [25], Nash demonstrated the existence of equilibrium points in n-person games by Kakutani’s fixed-point theorem.

Theorem A.1 (Kakutani’s fixed-point theorem). Given , let be a multifunction. Suppose that the following hold:(a) is a nonempty, compact, and convex set;(b) is a convex-valued correspondence and has a closed graph. Then, there exists a fixed point of .

For classical n-person games, assumption (b) of Theorem A.1 can be simplified into two sufficient conditions [26] and [27].

Theorem A.2 (existence of NE). Consider a strategic form , where is a finite set. Suppose that(a)Each is a nonempty, compact, and convex subset of a finite-dimensional Euclidean space;(b)One of the two following conditions holds:(1)Each utility function is continuous on and, for any given , it is quasiconcave on ;(2)Each utility function is continuous on and, for any given , the optimization problemadmits a unique optimal solution. Then, game admits a pure-strategy NE.

Here, the proof of existence of NE algorithm we proposed is given as follows.

Proof. According to (25), the TPC matrix of the kth transmitter is transformed into the product of a constant matrix and a diagonal matrix. Due to the power constraint, coefficients of the diagonal matrix are , which means that is bounded. Moreover, is a nonempty, compact, and convex subset of a N-dimensional Euclidean space. Thus, Theorem A.2 (a) is satisfied.
According to (27), the utility function is continuous and convex. And the closed-form solution of the optimization problem (27) is given by (34), which means that the solution is unique and optimal. Therefore, Theorem A.2 (b.2) is satisfied. And the existence of NE is proved.

B. Proof of the Inverse Correlation between MSE and Transmitted Power

Proposition B.1. The minimum threshold of power constraint is inversely proportional to the MSE constraint .

Proof. According to (35), we have , where , , and .
Taking the derivative of it with respect to into consideration, we have , which means that is in direct proportion to .
Taking the derivative of (34) with respect to into consideration, we have , which means that is in inversely proportion to .
In conclusion, is in inversely proportion to while ; thus is in inversely proportional to the security constraint .

A MIMO PLC network consists of three transmitter-receiver pairs and an Eve is selected to verify this proposition. We set from 1 to 2, and the optimal joint transceiver of the 1st transmitter-receiver pair is generated as described in Section 4. As shown in Figure 5, the transmitted power is increased with decreasing. This can be explained by the fact that when the transmitted power increases, the SNR will increase accordingly. And both the legitimate receiver and the eavesdropper will get better evaluations of data symbol, which cause the decrease of MSE. Therefore, there is a one-to-one correspondence between minimum threshold of transmitted power and MSE constraint . In other words, once is set, any value of transmitted power higher than will not get any extra benefit in MSE. For clarity, the solution space of is shown in Figure 6. The solution space is a closed set in interval . And the solutions in this set are not optimal except the points on the bottom face. In other words, there are varying degrees of transmitted power waste at any point above the bottom surface. And only the points on the left edge surface are the optimal solution of . From the perspective of interference channel, when benefit of increasing transmitted power is not greater than the influence of the interference it caused, there is no need to raise the power anymore.

Data Availability

All data included in this study are available upon request by contact with the corresponding author.

Conflicts of Interest

The authors declare that they have no conflicts of interest.