On the Sum Secrecy Rate of Multi-User Holographic MIMO Networks
Abstract
The emerging concept of extremely-large holographic multiple-input multiple-output (HMIMO), beneficial from compactly and densely packed cost-efficient radiating meta-atoms, has been demonstrated for enhanced degrees of freedom even in pure line-of-sight conditions, enabling tremendous multiplexing gain for the next-generation communication systems. Most of the reported works focus on energy and spectrum efficiency, path loss analyses, and channel modeling. The extension to secure communications remains unexplored. In this paper, we theoretically characterize the secrecy capacity of the HMIMO network with multiple legitimate users and one eavesdropper while taking into consideration artificial noise and max-min fairness. We formulate the power allocation (PA) problem and address it by following successive convex approximation and Taylor expansion. We further study the effect of fixed PA coefficients, imperfect channel state information, inter-element spacing, and the number of Eve’s antennas on the sum secrecy rate. Simulation results show that significant performance gain with more than 100% increment in the high signal-to-noise ratio (SNR) regime for the two-user case is obtained by exploiting adaptive/flexible PA compared to the case with fixed PA coefficients.
Index Terms:
HMIMO, secrecy capacity, max-min fairness, power allocation, artificial noise.I Introduction
Secure transmissions have always been desired in wireless communications. However, due to the broadcast nature of the wireless propagation, challenges arise in secured transmissions. In the literature, researchers focused on physical layer security from the information-theoretic perspective and introduced artificial noise (AN) to guarantee that all the legitimate users have a higher rate than the eavesdroppers, complementary to traditional complex cryptographic approaches [1, 2]. Under the framework of multiple-input multiple-output (MIMO), the design of AN is usually jointly considered with precoder design and resource allocation, such as transmit power allocation (PA). By extending from the reconfigurable intelligent surface (RIS) free MIMO network to the RIS assisted one, RIS was verified to bring more flexibility and obvious performance enhancement [3, 4]. However, in RIS assisted MIMO networks, due to its passive property, channel state information acquisition becomes, if not infeasible, inevitably difficult, which in turn harms secrecy performance.
Recently, the active counterpart of RIS, termed as holographic MIMO (HMIMO), serves as a transceiver with a low-cost transformative wireless planar structure comprising of densely packed sub-wavelength metallic or dielectric scattering particles, which is capable of shaping electromagnetic waves according to specific requirements. It is a promising candidate technology for 6G, offering a cost-effective and energy-efficient way of realizing the extremely large-scale MIMO (XL-MIMO) [5]. With the introduction of sub-wavelength inter-element spacing, many good properties can be found, e.g., large degrees of freedom (DoFs) even under the condition of line of sight (LoS) connectivity. HMIMO is in favor of near-field communications, standing out in millimeter wave (mmWave) and Terahertz (THz) communications with vast available bandwidths but short communication range. Regarding HMIMO, many reported works focused on channel modeling, beamforming design, and resource allocation [6, 7, 8, 9, 10]. However, secure communication in HMIMO network has not yet been investigated.
In this paper, we analyze the secrecy performance of the multi-user HMIMO networks with the introduction of AN. In the analysis, we simplify the process by decoupling the following three tasks: (i) the design of base station (BS) transmit beamforming, (ii) that of receive filter, and (iii) PA between the information symbol and AN, and accordingly propose a multi-stage approach for secrecy analysis under the assumption of imperfect channel state information (CSI). For the PA, we follow the max-min fairness (MMF), which has already been applied in networking level power control in massive MIMO [11], and formulate the optimization problem, which aims at finding the optimal PA between the desired information signals and AN as to reach the maximal sum secrecy rate. We examine the effect of various system parameters, e.g., imperfectness of the CSI and inter-element spacing, on the sum secrecy rate of the studied system. The proposed PA approach is verified to outperform the case with fixed PA coefficients.
Notations: Bold lowercase letters denote vectors (e.g., ), while bold capital letters represent matrices (e.g., ). The operators and denote transpose and Hermitian transpose, respectively. denotes a square diagonal matrix with the entries of on its main diagonal, denotes the all-zero vector or matrix, () denotes the identity matrix, and . denotes the Euclidean norm of a vector, and returns the absolute value of a complex number. and denote the -th element of and -th column of .
II System Model

We consider a downlink transmission scenario where one BS (a.k.a. Alice) communicates with multiple legitimate users (a.k.a. Bobs) concurrently in the presence of one eavesdropper (a.k.a. Eve). Specifically, we assume the existence of Bobs in the system, indexed by the set , and that all communication nodes are equipped with a holographic uniform planar array (UPA), as illustrated in Fig. 1. The antenna arrays of Alice and Eve comprise and antenna elements, respectively, and without loss of generality all the Bobs are equipped with an equal number of antennas , i.e., , in which and correspond to the number of elements in the -axis and -axis directions, respectively. Moreover, the inter-element spacing in all antenna arrays, denoted by , is set to less than half wavelength , i.e., . As a result, the lengths of the arrays in the -axis and -axis directions for the th communication node are given by and , where the coordinates in of all antenna elements are organized into the matrix , and the vector corresponds to the three dimensional (3D) position of the -th antenna element, for , with .
II-A Channel Model
We employ the electromagnetic compliant channel model for HMIMO communications from [6], which accurately approximates the HMIMO electromagnetic multi-path propagation through an asymptotic Fourier transform-based Karhunen-Loeve channel expansion. More specifically, the wireless channel between Alice and the -th user, for , i.e., valid for all the Bobs and Eve, can be given by
(1) |
where and are semi-unitary matrices, i.e., and , comprising the array response vectors and of the -th user and Alice, respectively, in which the -th entry of , for , and , can be computed by
where with denoting the wavenumber of the system, and and are the sampling points in the wavenumber domain, which lead to non-zero angular responses only when the points are within the lattice ellipse [6] . In particular, with a uniform sampling, these points can be obtained through , for , and , for , which results in , for [7]. Moreover, the matrix collects the small-scale fading coefficients in the angular domain, which can be structured as , where is a random matrix with entries following the complex Gaussian distribution with zero mean and unity variance, and is a matrix that collects scaled standard deviations of the channel, where the variances ’s describe the power transferred from Alice to the -th receiver in the corresponding wavenumber sampling points, with . Under the assumption of isotropic scattering, the variances observed at Alice and receivers can be decoupled, i.e., . Thus, , for , can be calculated as follows [8]
(2) |
for and , where is a disk of radius centered at the origin. The closed-form expression of is derived in [8, Appendix IV.C]. As a result, the matrix of standard deviations can be obtained as
(3) |
where is the vector that collects the standard deviations , for .
Recall that and are deterministic, depending only on the structure of the antenna arrays. Also, the entries of change slowly compared to the coherence interval of the fast-fading channel coefficients. Given these facts, we assume that , , and are perfectly known in the system. However, we introduce imperfectness on , which is modeled by a first-order Gauss-Markov process
(4) |
where is a complex standard Gaussian distributed error matrix, and represents the variance of the channel estimation error. The effect of imperfect on secrecy performance will be evaluated comprehensively in Section IV.
II-B Signal Model
Under the above channel model, Alice transmits an information symbol to the -th Bob, . We assume that Alice does not have any knowledge of the channel or location information of Eve. As a result, it becomes challenging to avoid information leakage to Eve through beamforming only. To mitigate this security threat, Alice superimposes a random AN onto the information symbol of each Bob, satisfying . More specifically, Alice transmits the following beamformed data stream
(5) |
where is the beamforming vector for the -th Bob, such that , and are the PA coefficients for the information symbol and AN, respectively, with a total transmit power constraint . Furthermore, the information symbols ’s are assumed to have zero mean and unity variance, i.e., . With these assumptions, the signals received by the -th user and Eve can be written, respectively, as
(6) | ||||
(7) |
where and model the large-scale fading coefficients, in which and denote the distances from Alice to the -th Bob and Eve, respectively, represents the path-loss exponent, and is the array gain parameter. Moreover, and are the corresponding additive noise vectors, whose entries follow the complex Gaussian distribution with zero mean and variance .
II-C Transmit Beamformer Design
In this subsection, we focus on the design of , . Specifically, we wish to avoid information leakage to non-intended Bobs. Before introducing the beamforming design, we expand the HMIMO channel model in Eq. (1) as follows
(8) |
where and . Given the expansion in Eq. (II-C) and the aforementioned property , we can design the desired beamforming vector with the following structure , where is an inner beamformer computed based on the null space spanned by the reduced-dimension effective matrices of unintended users given by , with rank denoted by , . More specifically, we collect all the reduced-dimension effective matrices of unintended users and stack them in a column-wise fashion as
(9) |
for , with a rank . Then, given that due to the correlated entries of , the beamformer can be obtained from the orthonormal basis of the nontrivial null space of , which we can choose from the left singular vectors of that are associated with zero singular values. To this end, we perform singular value decomposition (SVD) and write
(10) |
where and are diagonal matrices that comprise the nonzero and zero singular values of , respectively, and are semi-unitary matrices that comprise the corresponding left singular vectors, and comprises the right singular vectors of . More specifically, given that the matrix comprises orthonormal basis vectors of the null space of , the desired inner beamformer can be
(11) |
which satisfies and , as long as the rank and the constraints and are met.
II-D Receive Filter Design
With the beamformer design presented in the previous subsection, all inter-user interference among the Bobs can be eliminated. This fact allows the -th Bob to exploit its effective channel for computing its reception combining vector, as follows
(12) |
which is a matched filter vector, satisfying , constructed based on the effective channel matrix observed only by the -th Bob. It has a reduced dimension that is determined by the number of receive antennas , where we adopt in this work. This property makes the proposed approach much less demanding than relying on the full channel matrix , which has a much higher dimension. By employing the reception combining vector in Eq. (12), the -th legitimate user will have the post-processed signal as
(13) |
On the other hand, we assume that Eve infiltrates into the system and gets access to the effective channels of the legitimate users. Note, however, that because , is computed based on the channels of legitimate users only, the signals intended for other Bobs, i.e., , will cause interference to Eve when Eve eavesdrops on the -th Bob. In addition, Eve is not aware that Alice is transmitting AN. Under these assumptions, Eve computes its reception vector following the same approach as in Eq. (12) but based on Eve’s effective channel matrix associated with the target user . More specifically, Eve’s receive combining vector is obtained as
(14) |
Then, after filtering the eavesdropped signal of user through , Eve has the post-processed signal as
The corresponding signal-to-interference-plus-noise ratios (SINRs) as well as the secrecy capacity experienced in the system are investigated in the sequel.
III Secrecy Analysis and Power Allocation
III-A SINR Expressions
Alice informs all legitimate users of the exploitation of AN. Therefore, we assume that can be successfully subtracted from the signal in Eq. (13) with the aid of the successive interference cancellation (SIC) technique. As a result, the SINR observed by the -th Bob when recovering its information symbol, for , can be given by
(15) |
In contrast to Bobs, Eve cannot decode the AN and, thus, it will be able to eavesdrop only on a noisy version of the transmitted information symbol, which is also corrupted by inter-user interference. To be specific, when detecting the symbol of the target user , Eve observes the following SINR
(16) |
where the numerator represents the received power of the signal of interest. The denominator, on the other hand, represents the total interference and noise power observed by Eve. It consists of four components: (i) the power of the AN intended for Bob , , (ii) the sum powers of the signals intended for all the other legitimate users, , (iii) the sum powers of AN intended for all the other legitimate users, , and (iv) the noise power .
III-B Secrecy Capacity
With the above derivations of SINRs, the rates achieved by the -th Bob and Eve are given by and respectively. As a result, the secrecy capacity in bits per channel use (bpcu) observed for the legitimate user can be computed by
(17) |
where .
III-C PA Formulation and Solution
By following the MMF tradition, we aim to maximize the minimum of the secrecy rates of Bobs. The associated optimization problem can be formulated as follows:
(18a) | ||||
(18b) | ||||
(18c) |
under the constraint of sum transmit power in (18b). We conduct PA based on the instantaneous CSI, either perfect or imperfect. It is noted that the MMF form in the objective function makes the problem intractable. To address this issue, we reformulate the optimization problem as
(19a) | |||
(19b) |
by introducing the auxiliary variable . However, the non-convexity of constraint (19b) remains an obstacle for solving problem . To address this issue, we introduce an auxiliary variable to transform (19b) into the following two constraints: i.e., and . The latter is non-convex, and can be further transformed into and , where is another newly introduced auxiliary variable. The tight coupling of optimization variables in the constraint introduces further challenges in solving the optimization problem . By introducing a series of auxiliary variables, i.e., , , and , for , we can further transform it into four constraints, i.e., , , , and . Summarizing the above steps, the optimization problem becomes
(20a) | |||
(20b) | |||
(20c) | |||
(20d) | |||
(20e) | |||
(20f) | |||
(20g) |
Although the problem becomes more tractable than the original problem , constraints (20e) and (20g) remain non-convex. To address this, we employ the successive convex approximation (SCA) method with first-order Taylor expansion to tackle them. In particular, the problem can be finally rewritten as
(21a) | |||
(21b) | |||
(21c) |
The right-hand side of (21b) and the left-hand side of (21c) are the first-order approximations of and at points and , respectively, which are the solutions of and from the -th iteration. Obviously, is a convex problem that can be solved by using the well-known Matlab CVX toolbox [12].
IV Simulation Results





In this section, we present the results of the analysis and optimization of the sum secrecy rate of HMIMO with PA. The baseline scheme with fixed PA coefficients is introduced and compared. To this end, we implement a scenario in which Bobs and one Eve receive information from one Alice. Unless otherwise stated, Alice and the Bobs employ, respectively, and antenna elements. On the other hand, we test the effect of different numbers of antennas for Eve on the secrecy performance in the sequel. The first antenna element of Alice is located in the origin of the 3D plane, i.e., its coordinate being , whereas the 3D coordinates for the first antennas of Bobs and are and , respectively. We assume that Eve is close to Bob with its first antenna located at . Such a simulation setup is depicted in Fig. 2. For the channel parameters, we set and . Unless otherwise stated, the inter-element spacing of all arrays is set as , with antennas indexed by , for , with . The sum transmit power is configured as . The signal-to-noise ratio (SNR) is defined as and the number of trials is set to .
Fig. 3 compares the proposed PA scheme with fixed PA coefficients in terms of sum secrecy rate, showing the significant performance enhancement (up to two fold) with the aid of PA, especially in the high SNR regime. When the SNR value is dB, the proposed PA approach with achieves more than bpcu while the fixed PA scheme with and achieves about bpcu. For the fixed PA coefficients, the performance becomes better when increases. However, this does not mean that AN fails to play a essential role in secrecy performance. With the aid of proposed PA, we are able to turn AN from foe to friend. Fig. 4 studies the effect of CSI imperfectness. For the case of fixed PA coefficients, the performance degradation is obvious when the SNR is large. However, the proposed PA scheme shows great robustness against the imperfectness of CSI. Fig. 5 examines the impact of inter-element spacing. It is noted that we keep the numbers of BS antennas unchanged. When the inter-element spacing reduces from to , we observe performance gain in our proposed PA scheme. However, with fixed PA coefficients, only a small gain is observed in the low SNR regime, and it vanishes as the SNR increases. Fig. 6 studies the effect of on the sum secrecy rate. Among the selected setups, e.g., , the performance is almost overlapping. In other words, the number of Eve’s antennas fails to play an essential role in the sum secrecy rate of the studied multi-user HMIMO systems. The reason lies in that the term related to Eve’s combining vector , i.e., , appears in both the denominator and the numerator of (16). In this sense, its effect on Eve’s rate will be cancelled out, leaving the major impact from the control of and , i.e., power allocation.
Last, we extend the two-Bob scenario to four-Bob scenario, where the four Bobs are spatially distributed over the plane while fixing . In this experiment, we introduce the heat-map to further illustrate the performance gain introduced by the proposed PA scheme compared to the fixed power allocation coefficient () as a function of Eve’s location (varying and coordinates while fixing ). The simulation results with the SNR being dB are shown in Fig. 7. It is observed from the figure that the performance gain in terms of sum secrecy rate becomes more pronounced when the number of legitimate users increases (by comparing with Fig. 3). This comes from the setup that the sum transmit power increases linearly as the number of legitimate users. The sum secrecy rate of the fixed PA scheme falls within the range bpcu while that of the proposed PA falls within the range bpcu. In addition, the proposed PA is insensitive to the location of Eve. In other words, regardless of the distance between Eve and one of the Bobs, the sum secrecy rates surrounding a specific legitimate user with the proposed PA are almost constant with a very small variation.

V Conclusion
In this paper, we have studied the secrecy performance analysis of the multi-user HMIMO network under the max-min fairness, where AN is adopted. We have further addressed the PA problem and studied the effect of multiple system parameters on the sum secrecy rate. It has been demonstrated that with the aid of PA, up to two-fold sum secrecy rate can be achieved compared to the case with fixed PA coefficients in the two-Bob scenario. This becomes more profound when we further increase the number of legitimate users. The obtained heat maps have shown that the sum secrecy rate of the proposed PA scheme falls within bpcu compared to bpcu for the fixed PA scheme.
References
- [1] X. Zhou and M. R. McKay, “Physical layer security with artificial noise: Secrecy capacity and optimal power allocation,” in proc. 3rd International Conference on Signal Processing and Communication Systems, 2009, pp. 1–5.
- [2] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961–4972, 2011.
- [3] S. Hong, C. Pan, H. Ren, K. Wang, and A. Nallanathan, “Artificial-noise-aided secure MIMO wireless communications via intelligent reflecting surface,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7851–7866, 2020.
- [4] A. Rafieifar, H. Ahmadinejad, S. Mohammad Razavizadeh, and J. He, “Secure beamforming in multi-user multi-IRS millimeter wave systems,” IEEE Trans. Wireless Commun., pp. 1–1, 2023.
- [5] C. Huang, S. Hu, G. C. Alexandropoulos, A. Zappone, C. Yuen, R. Zhang, M. D. Renzo, and M. Debbah, “Holographic MIMO surfaces for 6G wireless networks: Opportunities, challenges, and trends,” IEEE Wireless Commun., vol. 27, no. 5, pp. 118–125, 2020.
- [6] A. Pizzo, L. Sanguinetti, and T. L. Marzetta, “Fourier plane-wave series expansion for holographic MIMO communications,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 6890–6905, 2022.
- [7] R. Ji, S. Chen, C. Huang, J. Yang, W. E. I. Sha, Z. Zhang, C. Yuen, and M. Debbah, “Extra DoF of near-field holographic MIMO communications leveraging evanescent waves,” IEEE Wireless Commun. Lett., pp. 1–1, 2023.
- [8] A. Pizzo, T. L. Marzetta, and L. Sanguinetti, “Spatially-stationary model for holographic MIMO small-scale fading,” IEEE J. Sel. Areas Commun., vol. 38, no. 9, pp. 1964–1979, 2020.
- [9] O. T. Demir, E. Björnson, and L. Sanguinetti, “Channel modeling and channel estimation for holographic massive MIMO with planar arrays,” IEEE Wireless Commun. Lett., vol. 11, no. 5, pp. 997–1001, 2022.
- [10] L. Wei, C. Huang, G. C. Alexandropoulos, Z. Yang, J. Yang, W. E. I. Sha, Z. Zhang, M. Debbah, and C. Yuen, “Tri-polarized holographic MIMO surfaces for near-field communications: Channel modeling and precoding design,” IEEE Trans. Wireless Commun., pp. 1–1, 2023.
- [11] H. Yang and T. L. Marzetta, “Massive MIMO with max-min power control in line-of-sight propagation environment,” IEEE Trans. Commun., vol. 65, no. 11, pp. 4685–4693, 2017.
- [12] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1,” http://cvxr.com/cvx, Mar. 2014.