This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

On the Sum Secrecy Rate of Multi-User Holographic MIMO Networks

Arthur S. de Sena1,‡, Jiguang He2, Ahmed Al Hammadi2, Chongwen Huang3,
Faouzi Bader2, Merouane Debbah4, Mathias Fink5
1Centre for Wireless Communications, FI-90014, University of Oulu, Finland
2Technology Innovation Institute, 9639 Masdar City, Abu Dhabi, UAE
3College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China
4Khalifa University of Science and Technology, P O Box 127788, Abu Dhabi, UAE
5Institut Langevin, ESPCI Paris, Université PSL, CNRS, 75005, Paris, France
Abstract

The emerging concept of extremely-large holographic multiple-input multiple-output (HMIMO), beneficial from compactly and densely packed cost-efficient radiating meta-atoms, has been demonstrated for enhanced degrees of freedom even in pure line-of-sight conditions, enabling tremendous multiplexing gain for the next-generation communication systems. Most of the reported works focus on energy and spectrum efficiency, path loss analyses, and channel modeling. The extension to secure communications remains unexplored. In this paper, we theoretically characterize the secrecy capacity of the HMIMO network with multiple legitimate users and one eavesdropper while taking into consideration artificial noise and max-min fairness. We formulate the power allocation (PA) problem and address it by following successive convex approximation and Taylor expansion. We further study the effect of fixed PA coefficients, imperfect channel state information, inter-element spacing, and the number of Eve’s antennas on the sum secrecy rate. Simulation results show that significant performance gain with more than 100% increment in the high signal-to-noise ratio (SNR) regime for the two-user case is obtained by exploiting adaptive/flexible PA compared to the case with fixed PA coefficients.

Index Terms:
HMIMO, secrecy capacity, max-min fairness, power allocation, artificial noise.
00footnotetext: ‡During the time of this research, A. S. Sena was affiliated with the Technology Innovation Institute, 9639 Masdar City, Abu Dhabi, UAE. He is now with the Centre for Wireless Communications, FI-90014, University of Oulu, Finland.

I Introduction

Secure transmissions have always been desired in wireless communications. However, due to the broadcast nature of the wireless propagation, challenges arise in secured transmissions. In the literature, researchers focused on physical layer security from the information-theoretic perspective and introduced artificial noise (AN) to guarantee that all the legitimate users have a higher rate than the eavesdroppers, complementary to traditional complex cryptographic approaches [1, 2]. Under the framework of multiple-input multiple-output (MIMO), the design of AN is usually jointly considered with precoder design and resource allocation, such as transmit power allocation (PA). By extending from the reconfigurable intelligent surface (RIS) free MIMO network to the RIS assisted one, RIS was verified to bring more flexibility and obvious performance enhancement [3, 4]. However, in RIS assisted MIMO networks, due to its passive property, channel state information acquisition becomes, if not infeasible, inevitably difficult, which in turn harms secrecy performance.

Recently, the active counterpart of RIS, termed as holographic MIMO (HMIMO), serves as a transceiver with a low-cost transformative wireless planar structure comprising of densely packed sub-wavelength metallic or dielectric scattering particles, which is capable of shaping electromagnetic waves according to specific requirements. It is a promising candidate technology for 6G, offering a cost-effective and energy-efficient way of realizing the extremely large-scale MIMO (XL-MIMO) [5]. With the introduction of sub-wavelength inter-element spacing, many good properties can be found, e.g., large degrees of freedom (DoFs) even under the condition of line of sight (LoS) connectivity. HMIMO is in favor of near-field communications, standing out in millimeter wave (mmWave) and Terahertz (THz) communications with vast available bandwidths but short communication range. Regarding HMIMO, many reported works focused on channel modeling, beamforming design, and resource allocation [6, 7, 8, 9, 10]. However, secure communication in HMIMO network has not yet been investigated.

In this paper, we analyze the secrecy performance of the multi-user HMIMO networks with the introduction of AN. In the analysis, we simplify the process by decoupling the following three tasks: (i) the design of base station (BS) transmit beamforming, (ii) that of receive filter, and (iii) PA between the information symbol and AN, and accordingly propose a multi-stage approach for secrecy analysis under the assumption of imperfect channel state information (CSI). For the PA, we follow the max-min fairness (MMF), which has already been applied in networking level power control in massive MIMO [11], and formulate the optimization problem, which aims at finding the optimal PA between the desired information signals and AN as to reach the maximal sum secrecy rate. We examine the effect of various system parameters, e.g., imperfectness of the CSI and inter-element spacing, on the sum secrecy rate of the studied system. The proposed PA approach is verified to outperform the case with fixed PA coefficients.

Notations: Bold lowercase letters denote vectors (e.g., 𝐚{\mathbf{a}}), while bold capital letters represent matrices (e.g., 𝐀{\mathbf{A}}). The operators ()𝖳(\cdot)^{\mathsf{T}} and ()𝖧(\cdot)^{\mathsf{H}} denote transpose and Hermitian transpose, respectively. diag(𝐚)\mathrm{diag}({\mathbf{a}}) denotes a square diagonal matrix with the entries of 𝐚{\mathbf{a}} on its main diagonal, 𝟎\mathbf{0} denotes the all-zero vector or matrix, 𝐈M{\mathbf{I}}_{M} (M2M\geq 2) denotes the M×MM\times M identity matrix, and j=1j=\sqrt{-1}. 2\|\cdot\|_{2} denotes the Euclidean norm of a vector, and |||\cdot| returns the absolute value of a complex number. [𝐚]m[{\mathbf{a}}]_{m} and [𝐀]:,m[{\mathbf{A}}]_{:,m} denote the mm-th element of 𝐚{\mathbf{a}} and mm-th column of 𝐀{\mathbf{A}}.

II System Model

Refer to caption
Figure 1: Multi-user HMIMO transmission system with an eavesdropper in the proximity of the legitimate users.

We consider a downlink transmission scenario where one BS (a.k.a. Alice) communicates with multiple legitimate users (a.k.a. Bobs) concurrently in the presence of one eavesdropper (a.k.a. Eve). Specifically, we assume the existence of BB Bobs in the system, indexed by the set ={1,,B}\mathcal{B}=\{1,\cdots,B\}, and that all communication nodes are equipped with a holographic uniform planar array (UPA), as illustrated in Fig. 1. The antenna arrays of Alice and Eve comprise NA=NA,x×NA,yN_{\text{A}}=N_{\text{A},x}\times N_{\text{A},y} and NE=NE,x×NE,yN_{\text{E}}=N_{\text{E},x}\times N_{\text{E},y} antenna elements, respectively, and without loss of generality all the BB Bobs are equipped with an equal number of antennas NB=NB,x×NB,yN_{\text{B}}=N_{\text{B},x}\times N_{\text{B},y}, i.e., Nb=NB,bN_{b}=N_{\text{B}},\forall b\in\mathcal{B}, in which {NA,x,NB,x,NE,x}\{N_{\text{A},x},N_{\text{B},x},N_{\text{E},x}\} and {NA,y,NB,y,NE,y}\{N_{\text{A},y},N_{\text{B},y},N_{\text{E},y}\} correspond to the number of elements in the xx-axis and yy-axis directions, respectively. Moreover, the inter-element spacing in all antenna arrays, denoted by δ\delta, is set to less than half wavelength λ\lambda, i.e., δ<λ/2\delta<\lambda/2. As a result, the lengths of the arrays in the xx-axis and yy-axis directions for the iith communication node are given by Li,x=Ni,xδL_{i,x}=N_{i,x}\delta and Li,y=Ni,yδL_{i,y}=N_{i,y}\delta, where the coordinates in 3\mathbb{R}^{3} of all antenna elements are organized into the matrix 𝐂i=[𝐜i,1,,𝐜i,Ni]3×Ni\mathbf{C}_{i}=[\mathbf{c}_{i,1},\cdots,\mathbf{c}_{i,N_{i}}]\in\mathbb{R}^{3\times N_{i}}, and the vector 𝐜i,n3\mathbf{c}_{i,n}\in\mathbb{R}^{3} corresponds to the three dimensional (3D) position of the nn-th antenna element, for n=1,,Nin=1,\cdots,N_{i}, with i{A,,E}i\in\{\text{A},\mathcal{B},\text{E}\}.

II-A Channel Model

We employ the electromagnetic compliant channel model for HMIMO communications from [6], which accurately approximates the HMIMO electromagnetic multi-path propagation through an asymptotic Fourier transform-based Karhunen-Loeve channel expansion. More specifically, the wireless channel between Alice and the uu-th user, for u{,E}u\in\{\mathcal{B},\text{E}\}, i.e., valid for all the Bobs and Eve, can be given by

𝐇u=𝚽u𝐇~u𝚽A𝖧Nu×NA,{\mathbf{H}}_{u}=\bm{\Phi}_{u}\tilde{{\mathbf{H}}}_{u}\bm{\Phi}_{\text{A}}^{\mathsf{H}}\in\mathbb{C}^{N_{u}\times N_{\text{A}}}, (1)

where 𝚽uNu×nu\bm{\Phi}_{u}\in\mathbb{C}^{N_{u}\times n_{u}} and 𝚽ANA×nA\bm{\Phi}_{\text{A}}\in\mathbb{C}^{N_{\text{A}}\times n_{\text{A}}} are semi-unitary matrices, i.e., 𝚽u𝖧𝚽u=𝐈nu\bm{\Phi}^{\mathsf{H}}_{u}\bm{\Phi}_{u}={\mathbf{I}}_{n_{u}} and 𝚽A𝖧𝚽A=𝐈nA\bm{\Phi}^{\mathsf{H}}_{\text{A}}\bm{\Phi}_{\text{A}}={\mathbf{I}}_{n_{\text{A}}}, comprising the array response vectors 𝜽(lu,x,lu,y,𝐂u)Nu\bm{\theta}(l_{u,x},l_{u,y},{\mathbf{C}}_{u})\in\mathbb{C}^{N_{u}} and 𝜽(lA,x,lA,y,𝐂A)NA\bm{\theta}(l_{\text{A},x},l_{\text{A},y},{\mathbf{C}}_{\text{A}})\in\mathbb{C}^{N_{\text{A}}} of the uu-th user and Alice, respectively, in which the nn-th entry of 𝜽(li,x,li,y,𝐂i)\bm{\theta}(l_{i,x},l_{i,y},{\mathbf{C}}_{i}), for n=1,,Nin=1,\cdots,N_{i}, and i{A,,E}i\in\{\text{A},\mathcal{B},\text{E}\}, can be computed by

[𝜽(li,x,li,y,𝐂i)]n\displaystyle[\bm{\theta}(l_{i,x},l_{i,y},{\mathbf{C}}_{i})]_{n} =1Niej([2πLi,xli,x,2πLi,yli,y,γ(li,x,li,y)]𝐜i,n),\displaystyle=\frac{1}{\sqrt{N_{i}}}e^{j\left(\left[\frac{2\pi}{L_{i,x}}l_{i,x},\frac{2\pi}{L_{i,y}}l_{i,y},\gamma(l_{i,x},l_{i,y})\right]{\mathbf{c}}_{i,n}\right)},

where γ(li,x,li,y)=κ2(2πLi,xli,x)2(2πLi,yli,y)2\gamma(l_{i,x},l_{i,y})=\sqrt{\kappa^{2}-\left(\frac{2\pi}{L_{i,x}}l_{i,x}\right)^{2}-\left(\frac{2\pi}{L_{i,y}}l_{i,y}\right)^{2}} with κ=2πλ\kappa=\frac{2\pi}{\lambda} denoting the wavenumber of the system, and li,xl_{i,x} and li,yl_{i,y} are the sampling points in the wavenumber domain, which lead to non-zero angular responses only when the points are within the lattice ellipse [6] i={(li,x,li,y)2:(λLi,xli,x)2+(λLi,yli,y)21}\mathcal{E}_{i}=\left\{(l_{i,x},l_{i,y})\in\mathbb{Z}^{2}:\left(\frac{\lambda}{L_{i,x}}l_{i,x}\right)^{2}+\left(\frac{\lambda}{L_{i,y}}l_{i,y}\right)^{2}\leq 1\right\}. In particular, with a uniform sampling, these points can be obtained through li,xi,x={Li,x+(qi,x1)λλ}l_{i,x}\in\mathcal{E}_{i,x}=\left\{\left\lceil\frac{-L_{i,x}+(q_{i,x}-1)\lambda}{\lambda}\right\rceil\right\}, for qi,x=1,,Li,xλq_{i,x}=1,\cdots,\left\lceil\frac{L_{i,x}}{\lambda}\right\rceil, and li,yi,y={Li,y+(qi,y1)λλ}l_{i,y}\in\mathcal{E}_{i,y}=\left\{\left\lceil\frac{-L_{i,y}+(q_{i,y}-1)\lambda}{\lambda}\right\rceil\right\}, for qi,y=1,,Li,yλq_{i,y}=1,\cdots,\left\lceil\frac{L_{i,y}}{\lambda}\right\rceil, which results in ni=4Li,xLi,yλ2n_{i}=4\left\lceil\frac{L_{i,x}L_{i,y}}{\lambda^{2}}\right\rceil, for u{A,,E}u\in\{\text{A},\mathcal{B},\text{E}\} [7]. Moreover, the matrix 𝐇~u\tilde{{\mathbf{H}}}_{u} collects the small-scale fading coefficients in the angular domain, which can be structured as 𝐇~u=𝚺u𝐆unu×nA\tilde{{\mathbf{H}}}_{u}=\bm{\Sigma}_{u}\odot{\mathbf{G}}_{u}\in\mathbb{C}^{n_{u}\times n_{\text{A}}}, where 𝐆unu×nA{\mathbf{G}}_{u}\in\mathbb{C}^{n_{u}\times n_{\text{A}}} is a random matrix with entries following the complex Gaussian distribution with zero mean and unity variance, and 𝚺unu×nA\bm{\Sigma}_{u}\in\mathbb{R}^{n_{u}\times n_{\text{A}}} is a matrix that collects nu×nAn_{u}\times n_{\text{A}} scaled standard deviations {NANuσ(lu,x,lu,y,lA,x,lA,y)}\{\sqrt{N_{\text{A}}N_{u}}\sigma(l_{u,x},l_{u,y},l_{\text{A},x},l_{\text{A},y})\} of the channel, where the variances σ2()\sigma^{2}(\cdot)’s describe the power transferred from Alice to the uu-th receiver in the corresponding wavenumber sampling points, with u{,E}u\in\{\mathcal{B},\text{E}\}. Under the assumption of isotropic scattering, the variances observed at Alice and receivers can be decoupled, i.e., σ2(lu,x,lu,y,lA,x,lA,y)σ2(lu,x,lu,y)σ2(lA,x,lA,y)\sigma^{2}(l_{u,x},l_{u,y},l_{\text{A},x},l_{\text{A},y})\approx\sigma^{2}(l_{u,x},l_{u,y})\sigma^{2}(l_{\text{A},x},l_{\text{A},y}). Thus, σ2(li,x,li,y)\sigma^{2}(l_{i,x},l_{i,y}), for i{A,,E}i\in\{\text{A},\mathcal{B},\text{E}\}, can be calculated as follows [8]

σ2(li,x,li,y)=14πλLi,xli,xλLi,x(li,x+1)λLi,yli,yλLi,y(li,y+1)𝟙𝒟(x,y)1x2y2𝑑x𝑑y,\sigma^{2}(l_{i,x},l_{i,y})=\frac{1}{4\pi}\int_{\frac{\lambda}{L_{i,x}}l_{i,x}}^{\frac{\lambda}{L_{i,x}}(l_{i,x}+1)}\int_{\frac{\lambda}{L_{i,y}}l_{i,y}}^{\frac{\lambda}{L_{i,y}}(l_{i,y}+1)}\frac{\mathds{1}_{\mathcal{D}}(x,y)}{\sqrt{1-x^{2}-y^{2}}}dxdy, (2)

for li,xi,xl_{i,x}\in\mathcal{E}_{i,x} and li,yi,yl_{i,y}\in\mathcal{E}_{i,y}, where 𝒟={(x,y)2:x2+y21}\mathcal{D}=\{(x,y)\in\mathbb{R}^{2}:x^{2}+y^{2}\leq 1\} is a disk of radius 11 centered at the origin. The closed-form expression of σ2(li,x,li,y)\sigma^{2}(l_{i,x},l_{i,y}) is derived in [8, Appendix IV.C]. As a result, the matrix of standard deviations can be obtained as

𝚺u=𝝈u𝝈A𝖳, for u{,E},\bm{\Sigma}_{u}=\bm{\sigma}_{u}\bm{\sigma}_{\text{A}}^{\mathsf{T}},\qquad\text{ for }\;u\in\{\mathcal{B},\text{E}\}, (3)

where 𝝈ini\bm{\sigma}_{i}\in\mathbb{R}^{n_{i}} is the vector that collects the standard deviations {Niσ(li,x,li,y)},li,xi,x,li,yi,y\{\sqrt{N_{i}}\sigma(l_{i,x},l_{i,y})\},\forall l_{i,x}\in\mathcal{E}_{i,x},\forall l_{i,y}\in\mathcal{E}_{i,y}, for i{A,,E}i\in\{\text{A},\mathcal{B},\text{E}\}.

Recall that 𝚽u\bm{\Phi}_{u} and 𝚽A\bm{\Phi}_{\text{A}} are deterministic, depending only on the structure of the antenna arrays. Also, the entries of 𝚺u\bm{\Sigma}_{u} change slowly compared to the coherence interval of the fast-fading channel coefficients. Given these facts, we assume that 𝚽u\bm{\Phi}_{u}, 𝚽A\bm{\Phi}_{A}, and 𝚺u\bm{\Sigma}_{u} are perfectly known in the system. However, we introduce imperfectness on 𝐆u{\mathbf{G}}_{u}, which is modeled by a first-order Gauss-Markov process

𝐆^u=1ξ2𝐆u+ξ𝐄u,\displaystyle\hat{{\mathbf{G}}}_{u}=\sqrt{1-\xi^{2}}{\mathbf{G}}_{u}+\xi{\mathbf{E}}_{u},\vspace{-0.25cm} (4)

where 𝐄u{\mathbf{E}}_{u} is a complex standard Gaussian distributed error matrix, and ξ2\xi^{2} represents the variance of the channel estimation error. The effect of imperfect 𝐆u{\mathbf{G}}_{u} on secrecy performance will be evaluated comprehensively in Section IV.

II-B Signal Model

Under the above channel model, Alice transmits an information symbol sbs_{b} to the bb-th Bob, b\forall b\in\mathcal{B}. We assume that Alice does not have any knowledge of the channel or location information of Eve. As a result, it becomes challenging to avoid information leakage to Eve through beamforming only. To mitigate this security threat, Alice superimposes a random AN wbw_{b}\in\mathbb{C} onto the information symbol of each Bob, satisfying E{|wb|2}=1\mathrm{E}\{|w_{b}|^{2}\}=1. More specifically, Alice transmits the following beamformed data stream

𝐬=b=1B𝐟b(αbsb+βbwb)NA,{\mathbf{s}}=\sum_{b=1}^{B}{\mathbf{f}}_{b}(\sqrt{\alpha_{b}}s_{b}+\sqrt{\beta_{b}}w_{b})\in\mathbb{C}^{N_{\text{A}}},\vspace{-0.25cm} (5)

where 𝐟bNA{\mathbf{f}}_{b}\in\mathbb{C}^{N_{\text{A}}} is the beamforming vector for the bb-th Bob, such that 𝐟b22=1\|{\mathbf{f}}_{b}\|_{2}^{2}=1, αb\alpha_{b} and βb\beta_{b} are the PA coefficients for the information symbol and AN, respectively, with a total transmit power constraint PT=b=1Bαb+βbP_{T}=\sum_{b=1}^{B}\alpha_{b}+\beta_{b}. Furthermore, the information symbols sbs_{b}’s are assumed to have zero mean and unity variance, i.e., E{|sb|2}=1\mathrm{E}\{|s_{b}|^{2}\}=1. With these assumptions, the signals received by the bb-th user and Eve can be written, respectively, as

𝐲b\displaystyle{\mathbf{y}}_{b} =𝐇bζbk𝐟k(αksk+βkwk)+𝐳bNB,\displaystyle={\mathbf{H}}_{b}\sqrt{\zeta_{b}}\sum_{k\in\mathcal{B}}{\mathbf{f}}_{k}(\sqrt{\alpha_{k}}s_{k}+\sqrt{\beta_{k}}w_{k})+{\mathbf{z}}_{b}\in\mathbb{C}^{N_{\text{B}}}, (6)
𝐲E\displaystyle{\mathbf{y}}_{E} =𝐇EζEk𝐟k(αksk+βkwk)+𝐳ENE,\displaystyle={\mathbf{H}}_{\text{E}}\sqrt{\zeta_{\text{E}}}\sum_{k\in\mathcal{B}}{\mathbf{f}}_{k}(\sqrt{\alpha_{k}}s_{k}+\sqrt{\beta_{k}}w_{k})+{\mathbf{z}}_{\text{E}}\in\mathbb{C}^{N_{\text{E}}},\vspace{-0.35cm} (7)

where ζb=dbηΛ\zeta_{b}=d_{b}^{-\eta}\Lambda and ζE=dEηΛ\zeta_{\text{E}}=d_{\text{E}}^{-\eta}\Lambda model the large-scale fading coefficients, in which dbd_{b} and dEd_{\text{E}} denote the distances from Alice to the bb-th Bob and Eve, respectively, η\eta represents the path-loss exponent, and Λ\Lambda is the array gain parameter. Moreover, 𝐳b{\mathbf{z}}_{b} and 𝐳E{\mathbf{z}}_{\text{E}} are the corresponding additive noise vectors, whose entries follow the complex Gaussian distribution with zero mean and variance σz2\sigma^{2}_{z}.

II-C Transmit Beamformer Design

In this subsection, we focus on the design of 𝐟bNA{\mathbf{f}}_{b}\in\mathbb{C}^{N_{\text{A}}}, b\forall b\in\mathcal{B}. Specifically, we wish to avoid information leakage to non-intended Bobs. Before introducing the beamforming design, we expand the HMIMO channel model in Eq. (1) as follows

𝐇b\displaystyle{\mathbf{H}}_{b} =𝚽b(𝚺b𝐆b)𝚽A𝖧=𝚽b([𝝈b𝝈A𝖳]𝐆b)𝚽A𝖧\displaystyle=\bm{\Phi}_{b}\left(\bm{\Sigma}_{b}\odot{\mathbf{G}}_{b}\right)\bm{\Phi}_{\text{A}}^{\mathsf{H}}=\bm{\Phi}_{b}\left(\left[\bm{\sigma}_{b}\bm{\sigma}_{\text{A}}^{\mathsf{T}}\right]\odot{\mathbf{G}}_{b}\right)\bm{\Phi}_{\text{A}}^{\mathsf{H}}
=𝚽bdiag(𝝈b)𝐆bdiag(𝝈A)𝚽A𝖧=𝚽b𝚫b𝐆b𝚫A𝚽A𝖧,\displaystyle=\bm{\Phi}_{b}\mathrm{diag}(\bm{\sigma}_{b}){\mathbf{G}}_{b}\mathrm{diag}(\bm{\sigma}_{\text{A}})\bm{\Phi}_{\text{A}}^{\mathsf{H}}=\bm{\Phi}_{b}\bm{\Delta}_{b}{\mathbf{G}}_{b}\bm{\Delta}_{\text{A}}\bm{\Phi}_{\text{A}}^{\mathsf{H}}, (8)

where 𝚫bdiag(𝝈b)\bm{\Delta}_{b}\triangleq\mathrm{diag}(\bm{\sigma}_{b}) and 𝚫Adiag(𝝈A)\bm{\Delta}_{\text{A}}\triangleq\mathrm{diag}(\bm{\sigma}_{\text{A}}). Given the expansion in Eq. (II-C) and the aforementioned property 𝚽A𝖧𝚽A=𝐈nA\bm{\Phi}_{\text{A}}^{\mathsf{H}}\bm{\Phi}_{\text{A}}={\mathbf{I}}_{n_{\text{A}}}, we can design the desired beamforming vector with the following structure 𝐟b=𝚽A𝐩b{\mathbf{f}}_{b}=\bm{\Phi}_{\text{A}}{\mathbf{p}}_{b}, where 𝐩bnA{\mathbf{p}}_{b}\in\mathbb{C}^{n_{\text{A}}} is an inner beamformer computed based on the null space spanned by the reduced-dimension effective matrices of unintended users given by 𝚽A𝖧𝐇b𝖧=𝚫A𝖧𝐆b𝖧𝚫b𝖧𝚽b𝖧nA×NB\bm{\Phi}_{\text{A}}^{\mathsf{H}}{\mathbf{H}}_{b^{\prime}}^{\mathsf{H}}=\bm{\Delta}_{\text{A}}^{\mathsf{H}}{\mathbf{G}}_{b^{\prime}}^{\mathsf{H}}\bm{\Delta}_{b^{\prime}}^{\mathsf{H}}\bm{\Phi}_{b^{\prime}}^{\mathsf{H}}\in\mathbb{C}^{n_{\text{A}}\times N_{\text{B}}}, with rank denoted by rbr_{b^{\prime}}, bb\forall b^{\prime}\neq b. More specifically, we collect all the reduced-dimension effective matrices of unintended users and stack them in a column-wise fashion as

𝚵b\displaystyle\bm{\Xi}_{b} =[𝚽A𝖧𝐇1𝖧,,𝚽A𝖧𝐇b1𝖧,𝚽A𝖧𝐇b+1𝖧,,𝚽A𝖧𝐇B𝖧],\displaystyle=\Big{[}\bm{\Phi}_{\text{A}}^{\mathsf{H}}{\mathbf{H}}_{1}^{\mathsf{H}},\cdots,\bm{\Phi}_{\text{A}}^{\mathsf{H}}{\mathbf{H}}_{b-1}^{\mathsf{H}},\bm{\Phi}_{\text{A}}^{\mathsf{H}}{\mathbf{H}}_{b+1}^{\mathsf{H}},\cdots,\bm{\Phi}_{\text{A}}^{\mathsf{H}}{\mathbf{H}}_{B}^{\mathsf{H}}\Big{]}, (9)

for bb\in\mathcal{B}, with a rank r¯b=b,bbrb\bar{r}_{b}=\sum\limits_{b^{\prime}\in\mathcal{B},b^{\prime}\neq b}r_{b^{\prime}}. Then, given that r¯b<BNB,b\bar{r}_{b}<BN_{\text{B}},\forall b\in\mathcal{B} due to the correlated entries of 𝚽A𝖧𝐇b𝖧\bm{\Phi}_{\text{A}}^{\mathsf{H}}{\mathbf{H}}_{b}^{\mathsf{H}}, the beamformer 𝐩bnA{\mathbf{p}}_{b}\in\mathbb{C}^{n_{\text{A}}} can be obtained from the orthonormal basis of the nontrivial null space of 𝚵b\bm{\Xi}_{b}, which we can choose from the left singular vectors of 𝚵b\bm{\Xi}_{b} that are associated with zero singular values. To this end, we perform singular value decomposition (SVD) and write

𝚵b\displaystyle\bm{\Xi}_{b} =[𝐔b(1)𝐔b(0)][𝛀b(1)𝟎𝟎𝛀b(0)]𝐕b𝖧,\displaystyle=\begin{bmatrix}{\mathbf{U}}^{(1)}_{b}&{\mathbf{U}}^{(0)}_{b}\end{bmatrix}\begin{bmatrix}\bm{\Omega}^{(1)}_{b}&\mathbf{0}\\ \mathbf{0}&\bm{\Omega}^{(0)}_{b}\end{bmatrix}{\mathbf{V}}^{\mathsf{H}}_{b}, (10)

where 𝛀b(1)\bm{\Omega}^{(1)}_{b} and 𝛀b(0)\bm{\Omega}^{(0)}_{b} are diagonal matrices that comprise the nonzero and zero singular values of 𝚵b\bm{\Xi}_{b}, respectively, 𝐔b(1){\mathbf{U}}^{(1)}_{b} and 𝐔b(0){\mathbf{U}}^{(0)}_{b} are semi-unitary matrices that comprise the corresponding left singular vectors, and 𝐕b{\mathbf{V}}_{b} comprises the right singular vectors of 𝚵b\bm{\Xi}_{b}. More specifically, given that the matrix 𝐔b(0)nA×(nAr¯b){\mathbf{U}}^{(0)}_{b}\in\mathbb{C}^{n_{\text{A}}\times(n_{\text{A}}-\bar{r}_{b})} comprises nAr¯bn_{\text{A}}-\bar{r}_{b} orthonormal basis vectors of the null space of 𝚵b\bm{\Xi}_{b}, the desired inner beamformer can be

𝐩b=[𝐔b(0)]:,1nA,\displaystyle{\mathbf{p}}_{b}=\left[{\mathbf{U}}^{(0)}_{b}\right]_{:,1}\in\mathbb{C}^{n_{\text{A}}}, (11)

which satisfies 𝐩b22=1\|{\mathbf{p}}_{b}\|_{2}^{2}=1 and 𝐇b𝚽A𝐩b=𝟎,bb{\mathbf{H}}_{b^{\prime}}\bm{\Phi}_{\text{A}}{\mathbf{p}}_{b}=\bm{0},\forall b\neq b^{\prime}\in\mathcal{B}, as long as the rank r¯b<BNB\bar{r}_{b}<BN_{\text{B}} and the constraints nA>r¯bn_{\text{A}}>\bar{r}_{b} and nAr¯b1n_{\text{A}}-\bar{r}_{b}\geq 1 are met.

II-D Receive Filter Design

With the beamformer design presented in the previous subsection, all inter-user interference among the Bobs can be eliminated. This fact allows the bb-th Bob to exploit its effective channel 𝐇b𝐟b=𝚽b𝚫b𝐆b𝚫A𝐩bnA{\mathbf{H}}_{b}{\mathbf{f}}_{b}=\bm{\Phi}_{b}\bm{\Delta}_{b}{\mathbf{G}}_{b}\bm{\Delta}_{\text{A}}{\mathbf{p}}_{b}\in\mathbb{C}^{n_{\text{A}}} for computing its reception combining vector, as follows

𝐪b=𝚽b𝚫b𝐆b𝚫A𝐩b𝚽b𝚫b𝐆b𝚫A𝐩b2nA,\displaystyle{\mathbf{q}}_{b}=\frac{\bm{\Phi}_{b}\bm{\Delta}_{b}{\mathbf{G}}_{b}\bm{\Delta}_{\text{A}}{\mathbf{p}}_{b}}{\left\|\bm{\Phi}_{b}\bm{\Delta}_{b}{\mathbf{G}}_{b}\bm{\Delta}_{\text{A}}{\mathbf{p}}_{b}\right\|_{2}}\in\mathbb{C}^{n_{\text{A}}}, (12)

which is a matched filter vector, satisfying 𝐪b22=1\|{\mathbf{q}}_{b}\|_{2}^{2}=1, constructed based on the effective channel matrix observed only by the bb-th Bob. It has a reduced dimension that is determined by the number of receive antennas NBN_{\text{B}}, where we adopt NBNAN_{\text{B}}\ll N_{\text{A}} in this work. This property makes the proposed approach much less demanding than relying on the full channel matrix 𝐇bNB×NA{\mathbf{H}}_{b}\in\mathbb{C}^{N_{\text{B}}\times N_{\text{A}}}, which has a much higher dimension. By employing the reception combining vector in Eq. (12), the bb-th legitimate user will have the post-processed signal as

yb\displaystyle y_{b} =𝐪b𝖧𝐇b𝐟bζbαbsbSignal of interest+𝐪b𝖧𝐇b𝐟bζbβbwbArtificial noise+𝐪b𝖧𝐳bAdditive noise.\displaystyle=\underset{\text{Signal of interest}}{\underbrace{{\mathbf{q}}_{b}^{\mathsf{H}}{\mathbf{H}}_{b}{\mathbf{f}}_{b}\sqrt{\zeta_{b}\alpha_{b}}s_{b}}}+\underset{\text{Artificial noise}}{\underbrace{{\mathbf{q}}_{b}^{\mathsf{H}}{\mathbf{H}}_{b}{\mathbf{f}}_{b}\sqrt{\zeta_{b}\beta_{b}}w_{b}}}+\underset{\text{Additive noise}}{\underbrace{{\mathbf{q}}_{b}^{\mathsf{H}}{\mathbf{z}}_{b}}}. (13)

On the other hand, we assume that Eve infiltrates into the system and gets access to the effective channels 𝐇E𝐟b,b{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b},\forall b\in\mathcal{B} of the legitimate users. Note, however, that because 𝐟b,b{\mathbf{f}}_{b},\forall b\in\mathcal{B}, is computed based on the channels of legitimate users only, the signals intended for other Bobs, i.e., b,bb\forall b^{\star}\in\mathcal{B},b^{\star}\neq b, will cause interference to Eve when Eve eavesdrops on the bb-th Bob. In addition, Eve is not aware that Alice is transmitting AN. Under these assumptions, Eve computes its reception vector 𝐪E{\mathbf{q}}_{\text{E}} following the same approach as in Eq. (12) but based on Eve’s effective channel matrix 𝐇E𝐟bnA{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b}\in\mathbb{C}^{n_{\text{A}}} associated with the target user bb. More specifically, Eve’s receive combining vector is obtained as

𝐪E=𝚽E𝚫E𝐆E𝚫A𝐩b𝚽E𝚫E𝐆E𝚫A𝐩b2nA.\displaystyle{\mathbf{q}}_{\text{E}}=\frac{\bm{\Phi}_{\text{E}}\bm{\Delta}_{\text{E}}{\mathbf{G}}_{\text{E}}\bm{\Delta}_{\text{A}}{\mathbf{p}}_{b}}{\left\|\bm{\Phi}_{\text{E}}\bm{\Delta}_{\text{E}}{\mathbf{G}}_{\text{E}}\bm{\Delta}_{\text{A}}{\mathbf{p}}_{b}\right\|_{2}}\in\mathbb{C}^{n_{\text{A}}}. (14)

Then, after filtering the eavesdropped signal of user bb through 𝐪E{\mathbf{q}}_{\text{E}}, Eve has the post-processed signal as

yE\displaystyle y_{E} =𝐪E𝖧𝐇EζE(𝐟bαbsbSignal of interest+𝐟bβbwbArtificial noise\displaystyle={\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}\sqrt{\zeta_{\text{E}}}\bigg{(}\hskip 2.84526pt\underset{\text{Signal of interest}}{\underbrace{{\mathbf{f}}_{b}\sqrt{\alpha_{b}}s_{b}}}+\underset{\text{Artificial noise}}{\underbrace{{\mathbf{f}}_{b}\sqrt{\beta_{b}}w_{b}}}
+b,bb𝐟b(αbsb+βbwb)Inter-user interference)+𝐪E𝖧𝐳EAdditive noise.\displaystyle+\underset{\text{Inter-user interference}}{\underbrace{\sum_{b^{\star}\in\mathcal{B},b^{\star}\neq b}{\mathbf{f}}_{b^{\star}}(\sqrt{\alpha_{b^{\star}}}s_{b^{\star}}+\sqrt{\beta_{b^{\star}}}w_{b^{\star}})}}\hskip 2.84526pt\bigg{)}+\underset{\text{Additive noise}}{\underbrace{{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{z}}_{E}}}.

The corresponding signal-to-interference-plus-noise ratios (SINRs) as well as the secrecy capacity experienced in the system are investigated in the sequel.

III Secrecy Analysis and Power Allocation

III-A SINR Expressions

Alice informs all legitimate users of the exploitation of AN. Therefore, we assume that wbw_{b} can be successfully subtracted from the signal in Eq. (13) with the aid of the successive interference cancellation (SIC) technique. As a result, the SINR observed by the bb-th Bob when recovering its information symbol, for b\forall b\in\mathcal{B}, can be given by

γb=|𝐪b𝖧𝐇b𝐟bζbαb|2|𝐪b𝖧𝐳b|2=|𝐪b𝖧𝐇b𝐟b|2ζbαbσz2.\displaystyle\gamma_{b}=\frac{|{\mathbf{q}}_{b}^{\mathsf{H}}{\mathbf{H}}_{b}{\mathbf{f}}_{b}\sqrt{\zeta_{b}\alpha_{b}}|^{2}}{|{\mathbf{q}}_{b}^{\mathsf{H}}{\mathbf{z}}_{b}|^{2}}=\frac{|{\mathbf{q}}_{b}^{\mathsf{H}}{\mathbf{H}}_{b}{\mathbf{f}}_{b}|^{2}\zeta_{b}\alpha_{b}}{\sigma_{z}^{2}}. (15)

In contrast to Bobs, Eve cannot decode the AN wbw_{b} and, thus, it will be able to eavesdrop only on a noisy version of the transmitted information symbol, which is also corrupted by inter-user interference. To be specific, when detecting the symbol of the target user bb\in\mathcal{B}, Eve observes the following SINR

γEb=|𝐪E𝖧𝐇E𝐟b|2ζEαb(|𝐪E𝖧𝐇E𝐟b|2ζEβb+b,bb|𝐪E𝖧𝐇E𝐟b|2ζEαb+b,bb|𝐪E𝖧𝐇E𝐟b|2ζEβb+σz2),\displaystyle\gamma^{b}_{\text{E}}=\frac{|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b}|^{2}\zeta_{\text{E}}\alpha_{b}}{\big{(}\underset{\scalebox{1.0}{$+\sum_{b^{\star}\in\mathcal{B},b^{\star}\neq b}|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b^{\star}}|^{2}\zeta_{\text{E}}\beta_{b^{\star}}+\sigma_{z}^{2}$}\big{)}}{|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b}|^{2}\zeta_{\text{E}}\beta_{b}+\sum_{b^{\star}\in\mathcal{B},b^{\star}\neq b}|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b^{\star}}|^{2}\zeta_{\text{E}}\alpha_{b^{\star}}}}, (16)

where the numerator |𝐪E𝖧𝐇E𝐟b|2ζEαb|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b}|^{2}\zeta_{\text{E}}\alpha_{b} represents the received power of the signal of interest. The denominator, on the other hand, represents the total interference and noise power observed by Eve. It consists of four components: (i) the power of the AN intended for Bob bb, |𝐪E𝖧𝐇E𝐟b|2ζEβb|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b}|^{2}\zeta_{\text{E}}\beta_{b}, (ii) the sum powers of the signals intended for all the other legitimate users, b,bb|𝐪E𝖧𝐇E𝐟b|2ζEαb\sum_{b^{\star}\in\mathcal{B},b^{\star}\neq b}|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b^{\star}}|^{2}\zeta_{\text{E}}\alpha_{b^{\star}}, (iii) the sum powers of AN intended for all the other legitimate users, b,bb|𝐪E𝖧𝐇E𝐟b|2ζEβb\sum_{b^{\star}\in\mathcal{B},b^{\star}\neq b}|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b^{\star}}|^{2}\zeta_{\text{E}}\beta_{b^{\star}}, and (iv) the noise power σz2\sigma_{z}^{2}.

III-B Secrecy Capacity

With the above derivations of SINRs, the rates achieved by the bb-th Bob and Eve are given by Rb=log2(1+γb),R_{b}=\log_{2}\big{(}1+\gamma_{b}\big{)}, and REb=log2(1+γEb),R^{b}_{\text{E}}=\log_{2}\big{(}1+\gamma^{b}_{\text{E}}\big{)}, respectively. As a result, the secrecy capacity in bits per channel use (bpcu) observed for the legitimate user bb\in\mathcal{B} can be computed by

Sb=[RbREb]+,S_{b}=\Big{[}R_{b}-R^{b}_{\text{E}}\Big{]}^{+}, (17)

where [a]+=max{a,0}[a]^{+}=\max\{a,0\}.

III-C PA Formulation and Solution

By following the MMF tradition, we aim to maximize the minimum of the secrecy rates of Bobs. The associated optimization problem can be formulated as follows:

𝒫1:\displaystyle\mathcal{P}_{1}:\;\; maxαb,βbminb{Sb}\displaystyle\underset{\alpha_{b},\beta_{b}}{\max}\hskip 5.69054pt\underset{\forall b\in\mathcal{B}}{\min}\left\{S_{b}\right\} (18a)
s.t.b=1Bαb+βb=PT,\displaystyle\text{s.t.}~{}\sum_{b=1}^{B}\alpha_{b}+\beta_{b}=P_{T}, (18b)
αb0,βb0,\displaystyle\alpha_{b}\geq 0,\beta_{b}\geq 0, (18c)

under the constraint of sum transmit power in (18b). We conduct PA based on the instantaneous CSI, either perfect or imperfect. It is noted that the MMF form in the objective function makes the problem 𝒫1\mathcal{P}_{1} intractable. To address this issue, we reformulate the optimization problem 𝒫1\mathcal{P}_{1} as

𝒫2:maxαb,βbτ\displaystyle\mathcal{P}_{2}:\;\;\underset{\alpha_{b},\beta_{b}}{\mathop{\max}}\,~{}\tau (19a)
s.t.(18b),(18c),\displaystyle\text{s.t.}~{}\eqref{p1b},\eqref{p1c},
RbREbτ,\displaystyle R_{b}-R_{E}^{b}\geq\tau, (19b)

by introducing the auxiliary variable τ\tau. However, the non-convexity of constraint (19b) remains an obstacle for solving problem 𝒫2\mathcal{P}_{2}. To address this issue, we introduce an auxiliary variable CEbC_{E}^{b} to transform (19b) into the following two constraints: i.e., RbCEbτR_{b}-C_{E}^{b}\geq\tau and CEbREb0C_{E}^{b}-R_{E}^{b}\geq 0. The latter is non-convex, and can be further transformed into 2CEb1|𝒒E𝖧𝑯E𝒇b|2ζEαbIEb2^{C_{E}^{b}}-1\geq|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b}|^{2}\zeta_{E}\frac{\alpha_{b}}{I_{E}^{b}} and |𝒒E𝖧𝑯E𝒇b|2ζEβb+b=1,bbB|𝒒E𝖧𝑯E𝒇b|2ζEαb+b=1,bbB|𝒒E𝖧𝑯E𝒇b|2ζEβb+σz2IEb|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b}|^{2}\zeta_{E}\beta_{b}+\sum\limits_{b^{\star}=1,b^{\star}\neq b}^{B}|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b^{\star}}|^{2}\zeta_{E}\alpha_{b^{\star}}+\sum\limits_{b^{\star}=1,b^{\star}\neq b}^{B}|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b^{\star}}|^{2}\zeta_{E}\beta_{b^{\star}}+\sigma_{z}^{2}\geq I_{E}^{b}, where IEbI_{E}^{b} is another newly introduced auxiliary variable. The tight coupling of optimization variables in the constraint 2CEb1|𝒒E𝖧𝑯E𝒇b|2ζEαbIEb2^{C_{E}^{b}}-1\geq|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b}|^{2}\zeta_{E}\frac{\alpha_{b}}{I_{E}^{b}} introduces further challenges in solving the optimization problem 𝒫2\mathcal{P}_{2}. By introducing a series of auxiliary variables, i.e., XbX_{b}, YbY_{b}, and ZbZ_{b}, for bb\in\mathcal{B}, we can further transform it into four constraints, i.e., exp(Z)|𝒒E𝖧𝑯E𝒇b|2ζEexp(XbYb)\exp(Z)\geq|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b}|^{2}\zeta_{E}{\exp(X_{b}-Y_{b})}, αbexp(Xb)\alpha_{b}\leq\exp(X_{b}), IEbexp(Yb)I_{E}^{b}\geq\exp(Y_{b}), and 2CEb1exp(Zb)2^{C_{E}^{b}}-1\geq\exp(Z_{b}). Summarizing the above steps, the optimization problem 𝒫2\mathcal{P}2 becomes

𝒫3:maxαb,βb,CEb,IEb,Xb,Yb,Zbτ\displaystyle\mathcal{P}_{3}:\;\;\underset{\alpha_{b},\beta_{b},C_{E}^{b},I_{E}^{b},X_{b},Y_{b},Z_{b}}{\mathop{\max}}\,~{}\tau (20a)
s.t.(18b),(18c),\displaystyle\text{s.t.}~{}\eqref{p1b},\eqref{p1c},
RbCEbτ,\displaystyle R_{b}-C_{E}^{b}\geq\tau, (20b)
exp(Zb)|𝒒E𝖧𝑯E𝒇b|2ζEexp(XbYb),\displaystyle\exp(Z_{b})\geq|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{b}|^{2}\zeta_{E}{\exp(X_{b}-Y_{b})}, (20c)
i=1,ibB|𝒒E𝖧𝑯E𝒇i|2ζEαi+i=1B|𝒒E𝖧𝑯E𝒇i|2ζEβi+σz2IEb,\displaystyle{\sum\limits_{i=1,i\neq b}^{B}|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{i}|^{2}\zeta_{E}\alpha_{i}+\sum\limits_{i=1}^{B}|\bm{q}_{E}^{\mathsf{H}}\bm{H}_{E}\bm{f}_{i}|^{2}\zeta_{E}\beta_{i}+\sigma_{z}^{2}}\geq I_{E}^{b}, (20d)
αbexp(Xb),\displaystyle\alpha_{b}\leq\exp(X_{b}), (20e)
IEbexp(Yb),\displaystyle I_{E}^{b}\geq\exp(Y_{b}), (20f)
2CEb1exp(Zb).\displaystyle 2^{C_{E}^{b}}-1\geq\exp(Z_{b}). (20g)

Although the problem 𝒫3\mathcal{P}_{3} becomes more tractable than the original problem 𝒫1\mathcal{P}_{1}, constraints (20e) and (20g) remain non-convex. To address this, we employ the successive convex approximation (SCA) method with first-order Taylor expansion to tackle them. In particular, the problem 𝒫3\mathcal{P}_{3} can be finally rewritten as

𝒫4:maxαb,βb,CEb,IEb,Xb,Yb,Zbτ\displaystyle\mathcal{P}_{4}:\;\;\underset{\alpha_{b},\beta_{b},C_{E}^{b},I_{E}^{b},X_{b},Y_{b},Z_{b}}{\mathop{\max}}\,~{}\tau (21a)
s.t.(18b),(18c),(20b),(20c),(20d),(20f),\displaystyle\text{s.t.}~{}\eqref{p1b},\eqref{p1c},\eqref{p3b},\eqref{p3c},\eqref{p3d},\eqref{p3f},
αbexp(X¯b[n])(XbX¯b[n]+1),\displaystyle\alpha_{b}\leq\exp(\bar{X}_{b}[n])(X_{b}-\bar{X}_{b}[n]+1), (21b)
2C¯Eb[n](ln2(CEbC¯Eb[n])+1)1exp(Zb).\displaystyle 2^{\bar{C}_{E}^{b}[n]}(\ln 2(C_{E}^{b}-\bar{C}_{E}^{b}[n])+1)-1\geq\exp(Z_{b}). (21c)

The right-hand side of  (21b) and the left-hand side of (21c) are the first-order approximations of exp(Xb)\exp(X_{b}) and 2CEb12^{C_{E}^{b}}-1 at points X¯b[n]\bar{X}_{b}[n] and C¯Eb[n]\bar{C}_{E}^{b}[n], respectively, which are the solutions of XbX_{b} and CEbC_{E}^{b} from the nn-th iteration. Obviously, 𝒫4\mathcal{P}_{4} is a convex problem that can be solved by using the well-known Matlab CVX toolbox [12].

IV Simulation Results

Refer to caption
Figure 2: Simulation setup.
Refer to caption
Figure 3: Sum secrecy capacity with the proposed PA (NB=NE=10×10N_{\text{B}}=N_{\text{E}}=10\times 10, channel error variance ξ=0\xi=0, and δ=λ/4\delta=\lambda/4).
Refer to caption
Figure 4: Effect of CSI imperfectness on sum secrecy capacity (NB=NE=10×10N_{\text{B}}=N_{\text{E}}=10\times 10, various channel error variances ξ\xi’s).
Refer to caption
Figure 5: Effect of inter element spacing on sum secrecy capacity (NB=NE=10×10N_{\text{B}}=N_{\text{E}}=10\times 10, various δ\delta’s, channel error variance ξ=0.1\xi=0.1).
Refer to caption
Figure 6: Effect of the number of Eve’s antennas on sum secrecy capacity (NB=10×10N_{\text{B}}=10\times 10, various NEN_{\text{E}}’s, channel error variance ξ=0.1\xi=0.1).

In this section, we present the results of the analysis and optimization of the sum secrecy rate of HMIMO with PA. The baseline scheme with fixed PA coefficients is introduced and compared. To this end, we implement a scenario in which B=2B=2 Bobs and one Eve receive information from one Alice. Unless otherwise stated, Alice and the Bobs employ, respectively, NA=20×20N_{\text{A}}=20\times 20 and NB=10×10N_{\text{B}}=10\times 10 antenna elements. On the other hand, we test the effect of different numbers of antennas for Eve on the secrecy performance in the sequel. The first antenna element of Alice is located in the origin of the 3D plane, i.e., its coordinate being 𝐩A,1=[0,0,0]{\mathbf{p}}_{\text{A},1}=[0,0,0], whereas the 3D coordinates for the first antennas of Bobs 11 and 22 are 𝐩1,1=[40,20,0]{\mathbf{p}}_{1,1}=[40,-20,0] and 𝐩2,1=[60,30,0]{\mathbf{p}}_{2,1}=[60,30,0], respectively. We assume that Eve is close to Bob 22 with its first antenna located at 𝐩E,1=[60,25,0]{\mathbf{p}}_{E,1}=[60,25,0]. Such a simulation setup is depicted in Fig. 2. For the channel parameters, we set η=2.7\eta=2.7 and Λ=1000\Lambda=1000. Unless otherwise stated, the inter-element spacing of all arrays is set as δ=λ/4\delta=\lambda/4, with antennas indexed by 𝐩i,n=[[𝐩i,1]1+δmod(n1,Ni,x),[𝐩i,1]2+δ(n1)/Ni,x,0]{\mathbf{p}}_{i,n}=[[{\mathbf{p}}_{i,1}]_{1}+\delta\cdot\mathrm{mod}(n-1,N_{i,x}),[{\mathbf{p}}_{i,1}]_{2}+\delta\cdot\lfloor(n-1)/N_{i,x}\rfloor,0], for n=2,,Nin=2,\cdots,N_{i}, with i{A,,E}i\in\{\text{A},\mathcal{B},\text{E}\}. The sum transmit power is configured as PT=b=12αb+βb=2P_{T}=\sum_{b=1}^{2}\alpha_{b}+\beta_{b}=2. The signal-to-noise ratio (SNR) is defined as 1/σz21/\sigma_{z}^{2} and the number of trials is set to 10001000.

Fig. 3 compares the proposed PA scheme with fixed PA coefficients in terms of sum secrecy rate, showing the significant performance enhancement (up to two fold) with the aid of PA, especially in the high SNR regime. When the SNR value is 2020 dB, the proposed PA approach with δ=λ/8\delta=\lambda/8 achieves more than 5050 bpcu while the fixed PA scheme with αb=βb=0.5\alpha_{b}=\beta_{b}=0.5 and δ=λ/8\delta=\lambda/8 achieves about 2424 bpcu. For the fixed PA coefficients, the performance becomes better when αb\alpha_{b} increases. However, this does not mean that AN fails to play a essential role in secrecy performance. With the aid of proposed PA, we are able to turn AN from foe to friend. Fig. 4 studies the effect of CSI imperfectness. For the case of fixed PA coefficients, the performance degradation is obvious when the SNR is large. However, the proposed PA scheme shows great robustness against the imperfectness of CSI. Fig. 5 examines the impact of inter-element spacing. It is noted that we keep the numbers of BS antennas unchanged. When the inter-element spacing reduces from λ/2\lambda/2 to λ/8\lambda/8, we observe performance gain in our proposed PA scheme. However, with fixed PA coefficients, only a small gain is observed in the low SNR regime, and it vanishes as the SNR increases. Fig. 6 studies the effect of NEN_{\text{E}} on the sum secrecy rate. Among the selected setups, e.g., NE{6×6,10×10,16×16}N_{\text{E}}\in\{6\times 6,10\times 10,16\times 16\}, the performance is almost overlapping. In other words, the number of Eve’s antennas fails to play an essential role in the sum secrecy rate of the studied multi-user HMIMO systems. The reason lies in that the term related to Eve’s combining vector 𝐪E{\mathbf{q}}_{\text{E}}, i.e., |𝐪E𝖧𝐇E𝐟b|2|{\mathbf{q}}_{\text{E}}^{\mathsf{H}}{\mathbf{H}}_{\text{E}}{\mathbf{f}}_{b}|^{2}, appears in both the denominator and the numerator of (16). In this sense, its effect on Eve’s rate will be cancelled out, leaving the major impact from the control of αb\alpha_{b} and βb\beta_{b}, i.e., power allocation.

Last, we extend the two-Bob scenario to four-Bob scenario, where the four Bobs are spatially distributed over the xyxy plane while fixing z=0z=0. In this experiment, we introduce the heat-map to further illustrate the performance gain introduced by the proposed PA scheme compared to the fixed power allocation coefficient (b,αb=βb=0.5\forall b,\alpha_{b}=\beta_{b}=0.5) as a function of Eve’s location (varying xx and yy coordinates while fixing z=0z=0). The simulation results with the SNR being 10-10 dB are shown in Fig. 7. It is observed from the figure that the performance gain in terms of sum secrecy rate becomes more pronounced when the number of legitimate users increases (by comparing with Fig. 3). This comes from the setup that the sum transmit power PTP_{T} increases linearly as the number of legitimate users. The sum secrecy rate of the fixed PA scheme falls within the range [7.25,7.95][7.25,7.95] bpcu while that of the proposed PA falls within the range [36,46][36,46] bpcu. In addition, the proposed PA is insensitive to the location of Eve. In other words, regardless of the distance between Eve and one of the Bobs, the sum secrecy rates surrounding a specific legitimate user with the proposed PA are almost constant with a very small variation.

Refer to caption
Figure 7: Heat map in terms of sum secrecy rate [bpcu] for four-Bob scenario: (a) fixed power allocation (b,αb=βb=0.5\forall b,\alpha_{b}=\beta_{b}=0.5), (b) proposed PA scheme, where the SNR value is set to be 10-10 dB.

V Conclusion

In this paper, we have studied the secrecy performance analysis of the multi-user HMIMO network under the max-min fairness, where AN is adopted. We have further addressed the PA problem and studied the effect of multiple system parameters on the sum secrecy rate. It has been demonstrated that with the aid of PA, up to two-fold sum secrecy rate can be achieved compared to the case with fixed PA coefficients in the two-Bob scenario. This becomes more profound when we further increase the number of legitimate users. The obtained heat maps have shown that the sum secrecy rate of the proposed PA scheme falls within [36,46][36,46] bpcu compared to [7.25,7.95][7.25,7.95] bpcu for the fixed PA scheme.

References

  • [1] X. Zhou and M. R. McKay, “Physical layer security with artificial noise: Secrecy capacity and optimal power allocation,” in proc. 3rd International Conference on Signal Processing and Communication Systems, 2009, pp. 1–5.
  • [2] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961–4972, 2011.
  • [3] S. Hong, C. Pan, H. Ren, K. Wang, and A. Nallanathan, “Artificial-noise-aided secure MIMO wireless communications via intelligent reflecting surface,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7851–7866, 2020.
  • [4] A. Rafieifar, H. Ahmadinejad, S. Mohammad Razavizadeh, and J. He, “Secure beamforming in multi-user multi-IRS millimeter wave systems,” IEEE Trans. Wireless Commun., pp. 1–1, 2023.
  • [5] C. Huang, S. Hu, G. C. Alexandropoulos, A. Zappone, C. Yuen, R. Zhang, M. D. Renzo, and M. Debbah, “Holographic MIMO surfaces for 6G wireless networks: Opportunities, challenges, and trends,” IEEE Wireless Commun., vol. 27, no. 5, pp. 118–125, 2020.
  • [6] A. Pizzo, L. Sanguinetti, and T. L. Marzetta, “Fourier plane-wave series expansion for holographic MIMO communications,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 6890–6905, 2022.
  • [7] R. Ji, S. Chen, C. Huang, J. Yang, W. E. I. Sha, Z. Zhang, C. Yuen, and M. Debbah, “Extra DoF of near-field holographic MIMO communications leveraging evanescent waves,” IEEE Wireless Commun. Lett., pp. 1–1, 2023.
  • [8] A. Pizzo, T. L. Marzetta, and L. Sanguinetti, “Spatially-stationary model for holographic MIMO small-scale fading,” IEEE J. Sel. Areas Commun., vol. 38, no. 9, pp. 1964–1979, 2020.
  • [9] O. T. Demir, E. Björnson, and L. Sanguinetti, “Channel modeling and channel estimation for holographic massive MIMO with planar arrays,” IEEE Wireless Commun. Lett., vol. 11, no. 5, pp. 997–1001, 2022.
  • [10] L. Wei, C. Huang, G. C. Alexandropoulos, Z. Yang, J. Yang, W. E. I. Sha, Z. Zhang, M. Debbah, and C. Yuen, “Tri-polarized holographic MIMO surfaces for near-field communications: Channel modeling and precoding design,” IEEE Trans. Wireless Commun., pp. 1–1, 2023.
  • [11] H. Yang and T. L. Marzetta, “Massive MIMO with max-min power control in line-of-sight propagation environment,” IEEE Trans. Commun., vol. 65, no. 11, pp. 4685–4693, 2017.
  • [12] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1,” http://cvxr.com/cvx, Mar. 2014.