Abstract

The secure communication in reconfigurable intelligent surface-aided cell-free massive MIMO system is investigated with low-resolution ADCs and with the existence of an active eavesdropper. Specifically, an aggregated channel estimation approach is applied to decrease the overhead required to estimate the channels. Using the available imperfect channel state information (CSI), the conjugate beamforming and random beamforming are applied at the APs and the RIS for downlink data transmission, respectively. The closed-form expression of the achievable secrecy rate is acquired to appraise the achievable secrecy performance using only the channel statistics. With the achievable analytical results, the impacts of the quantization bit of ADCs, channel estimation error, the number of RIS elements, and the number of the APs can be unveiled. Aiming to maximize the minimum achievable rate of all legitimate users subject to security constraints, the power control optimization scheme is first formulated. To tackle this nonconvex property of the proposed optimization problem, a path-following algorithm is then utilized to solve the initial problem with continuous approximations and iterative optimization. Numerical results are presented to verify the achieved results along with availability of the presented power allocation approach.

1. Introduction

Cell-free massive MIMO and reconfigurable intelligent surface (RIS) are two conspicuous technologies which can meet the demanding coverage and massive connectivity request in the sixth generation (6G) and future wireless communication systems [1, 2]. As a serviceable and scalable implementation of the distributed antenna network, cell-free massive MIMO system exploits multitudinous access points (APs) to serve a smaller number of users [3, 4]. Besides, all APs are attached via backhaul links to a central processing unit (CPU) for information interaction. Due to the superiority of the distributed systems and network MIMO configurations, the cell-free massive MIMO system has obvious superiority in terms of 95%-likely network capacity [57]. RIS is an emerging technology which can beamform the electromagnetic waves without requiring digital signal processing techniques and without applying power amplifiers. RISs are programmable metasurfaces with many passive reflecting elements which can be independently designed to alter the phase shifts of the electromagnetic signal to turn the reflective wave beam to different orientations [810]. Recently, the attractive benefits of deploying RISs for various existing communication have been demonstrated in various scenarios, for instance, RIS-aided NOMA systems, RIS-aided mmWave communication, RIS-aided secure transmission system, and RIS-aided massive MIMO systems [1114]. The results in these studies have shown that introducing RISs can provide an augmented performance while envisioning higher efficiency and lower cost than common systems. Integration of the two aforesaid techniques can be defined as RIS-aided cell-free massive MIMO system [15]. The performance analysis of the downlink RIS-aided cell-free massive MIMO adopting a random beamforming scheme at the RIS has been considered and studied in [16]. Besides, the authors in [17] employed multiple RISs in cell-free massive MIMO system to acquire an evident performance gain. This letter also developed a hybrid beamforming (HBF) scheme and formulated a sum rate optimization problem. Then, the uplink and downlink performance of RIS-aided cell-free massive MIMO systems under the presence of spatially-correlated channels has been considered in [18], where various impact factors on the system performance have been analyzed in detail. Then, a new scenario called aerial IRS- (AIRS-) aided cell-free massive MIMO was studied in [19].

On the other hand, due to the increasing complexity of the communication environment and the imperative security of private information, communication security for protecting the confidential message transmission is crucially important in future wireless communication networks [20, 21]. Different from the traditional cryptographic encryption and decryption secure technique, physical layer security can provide good security performance by exploiting the properties of wireless communication channels without requiring secret key distribution, protection, and management [22, 23]. Thus, the physical layer security is more absorbing in academia and industry and has been widely studied in wireless communication scenarios. In particular, multiantenna wireless communication systems can enhance its secrecy in the physical layer by enlarging the signal quality difference of the target user and the eavesdropper [24, 25]. Hence, secrecy-enhancing techniques have been widely investigated in recent years, such as secrecy beamforming, artificial noise transmission, cooperative jammers, and power control. As a scalable MIMO system, massive MIMO can harvest all the advantages of conventional MIMO. Besides, the abundant transmit antennas can be used for secrecy improvement. Thus, application of the physical layer security in massive MIMO system is potential [26, 27]. In general, most studies in security in massive MIMO follow with interest colocated massive MIMO. Then, the secure communication in multicell massive MIMO systems was studied in [28]. Furthermore, the secure massive MIMO transmission along with a multiantenna active eavesdropper was studied in detail in [29]. Besides, the precoding, power control, relay systems, active attack detection, and hardware impairments in secure massive MIMO have also been investigated [3033]. In addition, another practical deployment of massive MIMO is to employ a so-called distributed antenna architecture which can obtain a deterministic performance gain over the colocated massive MIMO system. Besides, the security performance analysis in multiuser massive MIMO was studied in detail in [34, 35]. The secure communication in cell-free massive MIMO system has been studied in some related works. The authors in [36] focused on the secure communication in the cell-free massive MIMO network. The security aspect in multigroup multicasting cell-free massive MIMO has been considered in [37]. Considering the impact of hardware impairments, the authors in [38] were concerned with the problem of secure communication in cell-free massive MIMO system.

All aforementioned works are based on a common assumption that all APs are installed with ideal ADCs. However, due to the increasing large number of the ADCs, the implementation with high-resolution ADCs may become more expensive and significantly bulkier. A feasible scheme is to make use of low-resolution ADCs for low-cost practical cell-free massive MIMO system. The authors in [39] presented a detailed analysis on the achievable performance of the cell-free massive MIMO system with low-resolution ADCs. The uplink achievable rate in cell-free massive MIMO considering the low-resolution ADCs and RF impairments has been studied in [40]. Then, considering the low-resolution DACs, the authors in [41] presented an investignation on the RIS-aided massive MIMO systems. In addition, facilitating physical layer secrecy in cell-free massive MIMO network with low-resolution ADCs is another critical concern and has received attention recently. Under the assumption of low-resolution ADCs, the secrecy performance analysis and the power control in cell-free massive MIMO have been investigated in detail in [42]. Besides, the authors in [43] analyzed the effect of the RF impairments and low-resolution ADCs/DACs in secure cell-free massive MIMO system, where some key parameters on the security performance have been stuided and been verified via numerical results.

With these above considerations in mind, the secure RIS-aided cell-free massive MIMO system with low-resolution ADCs at the users and the APs is studied in this paper. Different from the previous conference paper [44], the paper provides novel insights on secure performance analysis and power control scheme. The specific contributions of our article are summarized as follows: (i)With the equipment of the low-resolution ADCs, the secure aspect in RIS-aided cell-free massive MIMO system has been firstly studied in this paper. The AQNM is advocated to model the ADC imperfections which can well simulate the quantization noise terms as Gaussian variable. Then, we present a channel estimation approach at the APs to estimate the aggregated channels comprising the direct and indirect links, instead of all individual channel coefficients(ii)Using the imperfect CSI by channel estimation, the closed-form secrecy rate expression has been derived by using conjugate beamforming at the APs and the random beamforming at the RIS, which can provide an implement for quantitative analysis on the impacts of the channel estimation error, the quantization bit of coarse ADCs, the number of total antenna arrays, and the RIS’s scattering elements(iii)To ensure the user fairness and further improve the system performance, we aim to optimize the power allocation coefficients to maximize the minimum achievable rate of the legitimate users subject to the achievable rate constraints of the active eavesdropper in parallel. With some continuous approximations, this formulated problem has been solved efficiently by an iterative manner under the path-following algorithms framework

The remainder of this article is as follows. Section 2 describes the secure communication in the considered RIS-aided cell-free massive MIMO system, including the uplink channel estimation and downlink data transmission. Section 3 details the achievable secrecy rate. Section 4 further provides a max–min power control optimization strategy with security constraint. Furthermore, Section 5 presents some simulation results. Finally, the conclusions of the paper are given in Section 6.

1.1. Notation

The matrices and vectors in the paper are represented as uppercase and lowercase boldface letters, respectively. Besides, the superscripts , , and denote the transpose operator, conjugate operator, and Hermitian (conjugate transpose) operator, respectively. represents the identity matrix. The expectation is represented as . refers to a diagonal matrix consisting of the entries in the main diagonal of vector . stands for the base-2 logarithm. represents a circularly symmetric complex Gaussian random vector with mean and covariance matrix . The notation indicates the complex matrix space. Finally, is the nonnegative projection operation, i.e., .

2. System Model

As depicted in Figure 1, we take into account a cell-free massive MIMO system consisting single-antenna APs simultaneously communicating with single-antenna legitimate users with the existence of an active single-antenna eavesdropper (Eve). All APs are connected to a central processing unit (CPU) via a backhaul link, thereby they can share information. Besides, all APs, all users, and the Eve are randomly located in the coverage area. Considering the scenario that the target users are located far away from the APs, a RIS that comprises scattering elements is adopted to assist the communication by modifing the phases of the incident signals [18]. In this regard, it is important to unveil the achievable secrecy performance improvement in the considered RIS-aided system. In addition, a quasistatic block fading model is considered in this paper; that is, the transmission channels are frequency flat and static in each coherence interval comprising symbols. Furthermore, this topology adopts a time division duplex (TDD) protocol, thereby the channel reciprocity can be utilized for CSI estimation.

Then, the line-of-sight (LoS) channel between the user and the AP can be written as where denotes the large-scale fading coefficient of the LoS link.

Since this paper considers a harsh propagation conditions with the existence of poor scattering environment or high attenuation as a result of large obstacles, we should consider the issue that the direct links will be unblocked with a given probability. Considering the harsh propagation environments, the large-scale fading coefficient is indicated as where large-scale fading coefficient is composed of the shadow fading and the path loss and the binary variables is associated with the probability that the LoS links are resisted which can be formulated as [18]

Similarly, the channel of the LoS link between the Eve and the AP can be denoted by

The channel between the RIS and the AP is expressed as where represents the channel attenuation coefficient and , represents the small-scale fading with elements being i.i.d. random variables.

Similarly, the channels between the user, the Eve, and the RIS can be represented as where () and () are the large-scale channel attenuation coefficient and small-scale attenuation coefficients, respectively.

Besides, the configuration matrix of the RIS can be represented as where vector is the RIS reflect beamforming vector, which can be denoted by where and represent the amplitude reflection coefficient and phase shift of the element in the RIS. Specifically, to achieve the largest array reflection gain, we assume that in this paper.

This paper focuses on the secure downlink transmission. Consequently, each coherence interval contains two phases: uplink channel estimation and downlink data transmission.

2.1. Uplink Channel Estimation

Under the TDD protocol, the downlink transmission channel can be estimated by uplink training due to the channel reciprocity. The user transmits a certain pilot sequence to the APs where is the length of uplink training duration and is the normalized pilot vector. In addition, it is required that . To avoid the pilot contamination caused by the legitimate users, the system can exploit orthogonal pilot vectors such that for [45]. Since the used pilot symbols are publicly designed, an active eavesdropper can intervene the channel estimation by sending the same pilot symbols as the target user which is also called spoofing attack. Let be the Eve’s pilot sequence without the loss of generality, let the user be the target user, that is, . Consequently, the receiving signal at the AP is indicated as where denotes the additive noise vector at the AP with the distribution as .

Due to the coexistence of direct and indirect links caused by the RIS, we aim to estimate the cascaded channel including the direct and indirect links [16]. Based on the above definitions, we define the total cascaded channel between the AP and the user as

Then, the cascaded channel between the AP and the Eve can be written as

According to the central limit theory of great numeral, the cascaded channels and are approximatively distributed as [16]. where

Besides, the additive quantization noise model (AQNM) could be exploited to evaluate the impact of the low-resolution ADCs at the APs [39, 40]. Hence, the output of the ADCs at the AP is expressed as where represents the quantization distortion factor which dictates the quantization precision of the ADC and is related to the number of quantization bits at the APs, . When , can be approximately expressed as

Whereas for , the corresponding values of are listed in Table 1 [40].

Besides, the last term in (14) denotes the additive Gaussian quantization noise component whose covariance matrix can be given by

Projecting onto , the postprocessing signal can be given by where the function is defined as

Then, we can acquire the channel estimation results in Lemma 1 [46].

Lemma 1. Based on , the minimum mean-square (MMSE) method can be adopted at the AP to estimate the cascaded channel as where

Also, we can obtain another estimated channel as

In addition, both the channel estimation and the estimation error are zero mean Gaussian variable with variances as

Besides, we can define the variance of as

Proof. Please refer to Appendix A.

It is noted that . Thus, and are independent of RIS’s phase shift matrix under the considered system architecture and channel estimation method. Therefore, adopting a random phase shift design at the RIS can be considered as a suboptimal scenario in these settings [16].

Furthermore, the normalized minimum square error (NMSE) can be used to access the performance of the channel estimation which is written as [40]

Then, since NMSE is the function of , we can consider the asymptotic high-SNR regime as follows.

As , the NMSE converges to

The above presented result indicates that the NMSE converges to a finite limit by increasing the pilot power of the legitimate users. That is, there will be a nonzero channel estimation error floor which is only determined by quantization distortion factor (quantization bits) of the low-resolution ADCs at the APs and cannot be mitigated by enlarging the number of the APs or enhancing the SNR.

2.2. Downlink Data Transmission

In this section, we shall pay attention to the downlink data transmission. The APs utilize the estimated channel state information to implement conjugate beamforming technique for data transmission. Let be the average transmission power of the certain data signal. Besides, the downlink transmitted signal by the AP can be designed as where is the normalized signal intended for the user, i.e., . are the power control coefficients designed to satisfy the limited power budget constraint at each AP as follows

As such, with superposition of all transmitted signals, the receiving signal at the user is expressed as where is the AWGN at the user. Furthermore, low-resolution ADCs are exploited at the legitimate users. To appraise the impact of these low-resolution ADCs, the AQNM is used to describe the quantization processing. As a result, the output of the ADC at the user can be expressed as where indicates the quantization distortion factor of the ADCs, which is related to the relative accuracy of the ADCs, and . denotes the quantization noise whose covariance can be modeled as

An active malicious eavesdropper can boost its wiretapping performance by employing ideal hardware and perfect high-resolution ADCs. Since it is difficult for the system to achieve the configuration information of the Eve, this worst-case assumption is reasonable. Then, the receiving signal at the Eve is expressed as where denotes the additive Gaussian noise at the Eve.

3. Secrecy Performance Analysis

This paper assumes that the delay can be tolerable, and coding with various different independent channel realizations is possible. Therefore, this paper adopts the ergodic secrecy rate as the performance metric to assess the network’s secrecy performance. The achievable ergodic secrecy rate is bounded by the difference of the target user’s achievable rate and the information leakage to the Eve. Thus, the ergodic secrecy rate is indicated as [28, 29]. where denotes the achievable rate of the target user and represents the information capacity of the Eve.

Then, we present a detailed investigation on the achievable rate of the user. Considering a realistic case that the user only have the statistical effective CSI instead of instantaneous CSI to decode the desired data, the signal can be indicated as where is the effective noise component whose expression is given by (34).

_

Since the transmitted symbols are intended for various users, the quantization noise and the AWGN component are mutually independent; the achievable rate of the user is provided by (35). where the terms can be given by

Furthermore, we can provide the following theorem:

Theorem 2. In the considered system, the achievable rate of the user via RIS with the low-resolution ADCs can be given by (37) listed on the top of the next page.

Proof. Please refer to Appendix B.

Next, we consider the ergodic capacity of the Eve. To obtain some analytical results, we should make another assumption that the Eve can perfectly acknowledge its effective channel gains. The receipt signal at the Eve is expressed as with the terms being

The terms and denote the strength of the desired signal and the interference caused by the other users, respectively. Besides, it is not hard to prove that the terms , , and are pair-wisely uncorrelated. Hence, the ergodic capacity can be given by

Then, we can derive the following result:

Theorem 3. With an assumptions that the Eve is an equipped ideal ADCs and can know the perfect instantaneous CSI and is formulated as (41).

Proof. Please refer to Appendix C.

Then, substituting (37) and (41) into (32) can yield the desired tractable expression of the system’s achievable ergodic secrecy rate.

4. Power Control Optimization

Since all users are randomly located in the service region, there will be great difference of the achievable rates due to their geographic locations. Hence, adopting a uniform power allocation strategy would result in poor user fairness. With this above consideration, we work to design an optimal power control scheme at the APs by adopting the max–min power control principle which can guarantee the network fairness. Furthermore, to boost the security performance of the considered system, a critical condition restriction can be presented on the achievable rate of the Eve.

To facilitate further analysis in this section, we should define the following matrices and vectors as

Now, let us begin with designing the power allocation coefficients to maximize the minimum achievable ergodic rate of all legitimate users subject to security constraints. The optimization problem is formulated as where means the signal-to-interference-plus-noise ratio and is the upper bound of the Eve’s SINR.

Then, we can use the path-following algorithm to settle this nonconvex optimization problem.

Now, we define a function as

It is noted that the objective function in (43) is monotonically increasing with . Hence, can be replaced with .

Then, using the first-order Taylor approximation, the nonconvex constraint of can be approximated by [36]. where the analytical form of the function can be indicated as

Furthermore, we can introduce slack variables [39]. And optimization problem (43) is redescribed as

It can be noted that objective function in (47) is quasiconcave, and the constraints are convex. Hence, the bisection method can be utilized to resolve the optimization problem. With initialization by some feasible value, the next feasible point can be generated by convex optimization in each step. The optimal power control scheme can be obtained until the algorithm converges. For clarity, the detailed algorithm is presented in Algorithm 1.

Notably, the assumption on the Eve is stringent; since perfect CSI is practically unavailable at the APs. One straightforward extension is to consider the practical scenarios with the partial Eve’s CSI or without knowledge of the Eve, which can be taken into account in future works.

(1) Initialization: set , , , and , where is the optimal value of the objective function in (47) and denotes the tolerance
(2) Set , then solve the following optimization problem
Then, update the ; if the problem is feasible, set the or else set that ;
(3) Repeat 2 until the algorithm converges; that is, ; return as the optimal power control coefficients

5. Numerical and Simulation Results

This section presents some representative simulation results to assess the impact of various parameters on the secrecy performance of the considered secure RIS-aided cell-free massive MIMO system. Unless stated otherwise, some key system parameter settings are as follows: , , , , , , , and . Since a harsh communication environment is mainly considered in this paper, the simulations can be operated in some special scenarios [18]. The geographic position of the APs, legitimate users, and the Eve are given in terms of coordinates. The APs are evenly distributed within the subregion, , while the Eve and the legitimate users are evenly distributed within the subregion, . And the RIS is situated at the coordinate origin, i.e., . The large-scale fading coefficients are subordinated to the following model as [5, 6]

where means the path loss and models the shadow fading with standard deviation and . Then, the three-slope model is utilized to simulate the path loss in , which can be given by where , , and .

Besides, the noise power in can be expressed as where denotes the Boltzmann constant and means the noise temperature. Also, we can set that and .

Figure 2 indicates the NMSE of the channel estimator versus the power of the legitimate users’ uplink pilot against different quantization bits . It is noted that employing imperfect ADCs at the APs causes higher NMSE, which indicates that implementing low-quality ADCs could give rise to a significant performance degradation in terms of the channel estimation error. Besides, as a result of the low-resolution ADC distortions, some error floors appear at high SNR cases. However, the error floors vanish when the APs are equipped perfect high-quality ADCs at the APs, i.e., , which means that employing perfect ADCs could achieve an error-free channel estimation with a considerably large .

Figure 3 illustrates the achievable rates at the target legitimate user and the Eve of the “Simulated Result” and the “Analytical Result” against different with different ADC configurations. The “Simulated Result” is obtained via the Monte Carlo simulations by averaging over independent channel realizations. We could see that both the achievable rates at the target user and the Eve are monotonically increasing in . Also, we could observe that the analytical results coincide with the numerical values for all considered cases with high tightness. These comparisons verify the validity of our derived analytical representations. For simplification, the rest of the simulations can be operated by using the derived closed-form expressions in the paper.

Figure 4 illustrates the achievable ergodic secrecy rate versus against four different ADC configurations. As expected, the increase of APs yields improved secrecy performance. Furthermore, the ADC configuration has apparent effect on secrecy rates. For instance, the configuration “” produces the best performance, while the configuration “” brings about the worst performance. Besides, it is clear to note that the system would suffer a trifling performance loss by using low-quality ADCs at the APs. However, the system performance is dominated by the ADC distortion at the users, which indicates that the ADC configuration bring a great effect on the system properties. In other words, low-resolution ADCs could be widely installed at the APs instead of at the user terminals in actual system configuration.

Figure 5 validates the effects of the ADCs’ quantization bits on the ergodic secrecy rate against different ADC configuration. We could note that the ergodic secrecy rate increases with the rising of quantization bit and would finally converge to some fixed limit rates when , which implies that the 5-bit ADCs are sufficient to replace the ideal ADCs for practical system design. Besides, as expected, employing high-resolution ADCs at the users can achieve larger ergodic secrecy rate, which also verify the conclusion obtained from the Figure 4. These observations suggest that the system should implement low-resolution ADCs at the APs to cut the hardware costing while achieving appreciable performance. From the obtained results, it is observed that the probability also has an imposed prominent effect on the achievable ergodic rate which monotonically increases with the increase of the probability .

Figure 6 shows the influence of the probability on the achievable ergodic secrecy rate. We could see that the achievable ergodic secrecy rates increase with the increase of the unblocked probability of the direct links. We could note that the RIS-aided system setup furnishes the largest net throughput. The reason is that the system can conquer the nonexistence of the LoS links due to the existence of the RIS. If the direct links are blocked and unreliable, as expected, the information directly offered by the APs of the system tends to zero. In addition, we can find that the RIS-aided system setup can offer nonzero secrecy throughput even in the worst scenario that all LoS links are obstructed, i.e., . Hence, the presence of the RIS is especially beneficial when is small, since in this case the direct links are incapable to provide a high-information capacity. On this condition, the application of RIS in cell-free massive MIMO is able to offer a high-information throughput and reliable communication.

Figure 7 depicts the curves of the ergodic secrecy rate versus the power ratio between the uplink pilot power of the legitimate users and the Eve. Just as the prediction, the ergodic secrecy rate is decreasing in the power of the Eve and gradually approach zero with an appropriately larger . That is, an active wiretapper can improve its eavesdropping ability by increasing its power of the pilot spoofing attack. In addition, the outcomes in Figure 7 indicate that the active eavesdropper leads to a significant degradation of the secrecy capacity and poses a prominent threat for secure communication of the concerned network. To alleviate the negative impact of the Eve, some measures can be operated in the secure communication system, such as active pilot spoofing attack detection, artificial noise aiding, and power control. This is beyond our consideration in this paper, which can be left for the future research.

To appraise the power allocation optimization algorithm, we consider a network configuration as depicted in Figure 8. All APs, the users, and the Eve are all located randomly in the subregions. For the sake of analysing, we assume that Eve is trying to intercept the private messages intended for the 1st user; that is, the first user is the target user. Figure 9 depicts the achievable information rates of the Eve and the users with and without power control. Besides, it is assumed that the users and the APs are all installed with low-quality ADCs (). For the situation without power control, we choose the constant power control coefficients, i.e., , . From the obtained results, it is easy to observe that the fluctuation of the per user achievable rate with the suggested power allocation scheme has been greatly reduced. Moreover, the max–min power allocation method is operated to maintain the ergodic rate of the Eve under some fixed restriction. It signifies that adopting the max–min power control scheme can concentrate all per users ergodic rate around its median. Therefore, the proposed power control algorithm can maintain better fairness among the users with security constraints. These aforementioned observations can give perceptive insight for optimizing the power allocation in the considered system.

6. Conclusions

This paper studied the secure communication in RIS-aided cell-free massive MIMO system with low-resolution ADCs. To overcome the high overhead of uplink training, a simple and effective aggregated channel estimation scheme is presented to acquire the CSI at the APs. Using the estimated CSI, the conjugate beamforming has been operated at the APs. Under these settings, the tractable closed-form expression for downlink secrecy capacity has been provided in terms of only the channel statistics which is independent of the RIS phase configuration. The derived analytical expressions can be used to evaluate the effects of the CSI estimation error, the quantization bits of the ADCs, the number of APs, and the number of passive reflecting elements in RIS. Moreover, we proposed a power control technique aiming at maximizing the minimum achievable rate of all legitimate users subject to security constraints. Some numerical results have been offered to confirm the analytical conclusions and the efficiency of the power allocation algorithm.

Appendix

A. Proof of Lemma 1

On the basis of the MMSE estimation method, the estimate of the aggregate channel can be obtained as

First, due to the statistical characteristics of the channel and the terms of , the expression can be computed as

Next, the term can be calculated as

Since the vector is a normalized vector, we can get that

According to [39], the covariance matrix of the quantization noise can be denoted as where the term can be given by

Hence, substituting (52) and (56) into (51), we can obtain the channel estimate as

Then, we can easily obtain that

Now, we finish the proof.

B. Proof of Theorem 2

To acquire the analytical closed-form representation of , the essential issue is to analyse the expressions of , , , and , respectively.

First, we can calculate as

Then, we compute as where

Substituting (61) and (62) into (60), it is easy to get the expression as

Next, we show solicitude for the evaluation of as

We notice that the variance of the quantization noise component is written as where

Using some simple algebraic manipulations, it is not hard to obtain that

Finally, substituting (59), (63), (64), and (65) into (35), we can get the desired result as (37).

C. Proof of Theorem 3

At first we pay attention to the component as

Next, let us calculate the component as

Finally, substituting (68) and (69) into (40), we can obtain the expression as (41).

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported in part by the China Postdoctoral Science Foundation under Grant 2021MD703980 and in part by the National Natural Science Foundation of China under Grant 61901502 and 61901497.