Secure Precoding in MIMO-NOMA:
A Deep Learning Approach
Abstract
A novel signaling design for secure transmission over two-user multiple-input multiple-output non-orthogonal multiple access channel using deep neural networks (DNNs) is proposed. The goal of the DNN is to form the covariance matrix of users’ signals such that the message of each user is transmitted reliably while being confidential from its counterpart. The proposed DNN linearly precodes each user’s signal before superimposing them and achieves near-optimal performance with significantly lower run time. Simulation results show that the proposed models reach about 98% of the secrecy capacity rates. The spectral efficiency of the DNN precoder is much higher than that of existing analytical linear precoders–e.g., generalized singular value decomposition–and its on-the-fly complexity is several times less than the existing iterative methods.
Index Terms:
Deep learning, DNN, MIMO, NOMA, physical layer security, wiretap, precoding, covariance, GSVD.I Introduction
Non-orthogonal multiple access (NOMA) is a promising candidate for connecting massively increasing devices to fifth-generation and beyond wireless networks [1]. NOMA is the optimal transmission strategy for both the single-input, single-output (SISO) and multiple-input, multiple-output (MIMO) cases in a single-cell network. In the SISO case, superposition coding at the transmitter with successive interference cancellation at the receiver is optimal. In contrast, in the MIMO case, dirty-paper coding (DPC) is the optimal solution. Nonetheless, in both cases, the base station (BS) broadcasts a superimposed signal of multiple users. This makes secure communications challenging in the presence of adversarial users as signals can be eavesdropped on by such users.
Physical layer security enables the exchange of confidential messages over a wireless medium in the presence of internal or unauthorized eavesdroppers [2]. Specifically, in two-user MIMO-NOMA networks, both users can transmit their messages concurrently and confidentially via secret dirty-paper coding (S-DPC) [3]. While S-DPC is the most spectral efficient precoding for the two-user MIMO-NOMA, it is excessively complex for practical uses. Alternatively, S-DPC region can be achieved by linear precoding and power allocation schemes. In the past years, various linear precoding schemes have been introduced [4, 5, 6, 7]. Generalized singular value decomposition (GSVD)-based precoder [4] is a fast analytical precoder, but it falls short of getting the capacity region when the users have a single antenna. Also, weighted sum-rate maximization [5] and power-splitting [6] approaches are still too time-consuming to be used in practice. More accurately, these approaches require much higher time than the coherence time of wireless channels which is about a few milliseconds [8].
This letter exploits deep learning (DL) to design the covariance matrices of the channel input vectors–or equivalently, to design precoding and power allocation matrices–for secure MIMO-NOMA transmission. Embedding DL into the mobile and wireless networks is well justified in various cases, e.g., when closed-form solutions require poor approximation or the complexity of existing techniques is high [9, 10, 11].
We leverage supervised deep neural networks (DNNs) for secure communication for the two-user MIMO-NOMA channel (see Fig. 1), resulting in a significantly faster solution while almost reaching the spectral efficiency of the S-DPC. To fulfill the task, we first decompose the two-user MIMO-NOMA with confidential messages into two wiretap channels [6] and use a wiretap channel solution for generating and labeling the training data set. We then build and train DNN models that learn to approximate the function mapping channel matrices, base station power, and required secrecy rate of the users to the covariance matrix of the channel input vector for each user. Simulation results prove the efficacy of the developed model since the proposed DL-based precoding scheme has near-optimal performance and outperforms GSVD-based precoding with a large margin. It also brings mapping time below the coherence time of the wireless channel. Therefore, the channel input signal can be designed before the channel coefficients become stale, which is crucial in practice.

II System Model and Existing Solutions
Consider a single-cell two-user MIMO-NOMA network, as shown in Fig. 1. Assume that the transmitter, user , and user are equipped with , , and antennas, respectively. The transmitter wishes to send two messages and to user , and user , respectively. When PHY security is a concern, each message must be kept confidential from the other user [12]. 111In information theory, this channel is known as the MIMO broadcast channel (BC) with two confidential messages [12]. That is, user should not be able to decode and vice versa. As such, the transmitter securely encodes and to codewords and , superimposes them , and broadcasts [12, 13]. Let and be the channel matrices corresponding to user and user . Then, the received signals at user and user , respectively, can be represented as
(1a) | ||||
(1b) |
in which and are two independent identically distributed (i.i.d) Gaussian noise vectors with mean zero and identity covariance matrices.
II-A Secrecy Capacity Region
The secrecy capacity region of this channel under a matrix constraint on the covariance matrix of the input is proved in [12, Theorem 1]. However, in practical MIMO systems, a total power constraint at the transmitter is more common. Under this assumption, using Corollary 1 in [3], the secrecy capacity region of this channel can be represented as
(2a) | ||||
(2b) | ||||
(2c) |
in which , is the secure achievable rate at user , is an identity matrix of size , and is the covariance matrix of . By definition, where denotes expectation, and thus, is positive semidefinite, i.e., . Further, since total transmit power cannot be higher than , we have
II-B Existing Solutions
Although the secure capacity region of the two-user MIMO-NOMA channel is given in (2), it is still unknown how to analytically form and to achieve the capacity region. This is because the right-hand side expressions both in (2a) and (2b) are non-convex, and thus, the corresponding optimization problems are challenging. Early works like [12] use an exhaustive search over all possible and , satisfying the constraints in (2c). Such an approach is, however, prohibitively complex for practical systems. Later, Fakoorian et al. [4] proposed a GSVD-based precoder for this problem. The rate region of this method is, however, far from the capacity region when and/or are small numbers and, in particular, when the users have a single antenna. Intriguingly, such cases are very prevalent and thus important in practice.
Lately, another approach was proposed to solve this problem [6] whose achievable rate region is very close to the optimal solution for any number of antennas at each node. The main observation is that the two-users MIMO-NOMA channel can be decomposed into two MIMO wiretap channels by splitting power between the two users. Then, the associated optimization problems are solved one at a time. Despite the fact that the rate region obtained from this solution is very close to the secure capacity region of the channel, this solution incurs an unacceptable amount of delay, which hinders it from being used for practical systems. To be specific, finding optimal and could take several hundred milliseconds, [6] wheres the coherence time of the wireless channel can be as small as a few milliseconds [8]. That is, the solution assumes that the channel is constant for several hundred milliseconds while it changes much faster in practice.
In this letter, we propose a DL-based signaling design to approach the secure capacity of the MIMO-NOMA channel within a practically acceptable delay. This is obtained at the expense of a slightly smaller achievable rate region. In the following, we describe the structure of the DNN, the training process, and the test results.
III Deep Learning-based Solution
In this section, we build a supervised deep learning model to determine suitable covariance matrices for (2). Put differently, we describe signaling design (precoding and power allocation) for secure transmission over the MIMO-NOMA channel. We present a DNN structure that includes data generation, training methodology, DNN structure, and hyper-parameters.
III-A Data Generation and Labeling
In supervised learning, labeled data is used for drawing inferences, i.e., for classification, regression, or approximation. In this paper, labeled training data is used to build predictive models to learn the functions mapping inputs to outputs, i.e., to approximate optimal signaling in the secure MIMO-NOMA by regression. Specifically, for each set of and we find and and use them for training a DNN and determining a model.
We decompose the secure MIMO-NOMA channel into two MIMO wiretap channels [6]. For , we allot and to user and user , respectively. Then, we find the covariance matrix from (2a), i.e.,
(3a) | ||||
(3b) |
Now, this problem can be seen as a wiretap channel in which user is the legitimate user and user is an eavesdropper. Thus, we can apply any wiretap channel solutions to solve it. Alternating optimization and water filling (AOWF) algorithm [14] and rotation-based [15] method are two of them. Once is obtained, we plug it in (2b) and manipulate it to get
(4a) | ||||
(4b) |
in which , , where and are obtained from eigenvalue decomposition of , i.e., . Then again, (4) is the rate for a MIMO wiretap channel where and are the channels corresponding to the legitimate user and eavesdropper, respectively. Thus, we solve it using a wiretap solution. Although this approach is suboptimal, the resulting rate region is close to the optimal solution–obtained by a brute-force search.
We next describe the structure of the DNN used for finding suitable covariance matrices for the MIMO-NOMA networks.
III-B Network Structure
We use a multi-layer perceptrons (MLP) DNN in this paper. As feed-forward neural nets, MLPs are less complex, easy to design, and have quick run time. The structure of the network is shown in Fig. 2. As we will see in Section III-C, the input is a feature mapping of and –the channel matrices of user 1 and user 2. Rectified linear unit (ReLU) [16] serves as the activation function. ReLUs are sparse and have a reduced likelihood of vanishing gradient which reduce training and inference time for neural networks. The network has nine fully connected (FC) layers, each with a width of 256 nodes. The network then funnels through a 128 node layer and a 64 node layer before reaching the output layer. The output layer is the upper triangular elements of the covariance matrices ( and ) that the network is trying to learn how to predict. We note that since and are symmetric, once we get the upper triangular elements, we know all elements. The size of the output layer depends on and is equal to .

We have investigated the effect of various hyperparameters including learning rate, drop factor, Adam optimizer, validation frequency, mini-batch size, and validation patience in order to most effectively train the network. The final, tuned hyperparameters are shown in Table I.
Hyper-parameter | Value | Hyper-parameter | Value |
---|---|---|---|
Initial learning rate | 0.001 | Mini batch size | 256 |
Learn rate drop factor | 0.5 | Learn rate drop period | 5 |
Training set size | Validation set size | ||
Validation frequency | iters | Validation patience | 5 |
III-C Pre-processing
III-C1 Input design
A big advantage of DL algorithms is that they reduce/eliminate the need for feature engineering as they try to learn high-level features from data. Hence, this problem the input could simply be the channel matrices and . However, we have observed that some nonlinear combinations of the channels improve the network performance. Specifically, observing that , we can rewrite (3) and (4) as functions of . Then, the input is designed based on , not [10]. This makes our design independent of the number of antennas at the users since the size of is which does not depend on and , unlike the size of . This also simplifies the inputs.
III-C2 Scaling
Before feeding the data to the network, we scale it to avoid over-fitting and improve the performance [17]. It makes back-propagation more efficient [18], and allows the network to more quickly learn the optimal parameters for each input node. Normalizing or standardizing the inputs are the two common ways of scaling. We normalize the input variables. To summarize, the input vector is designed as
(5) |
in which and are given by
(6a) | |||
(6b) |
where converts matrix to a vector. The coefficients of and in (5) are chosen based on the histogram of all elements of and for input channels. After this normalization, with a high probability, the elements of will be in the range of .
IV Numerical Results
We next evaluate the performance of the proposed DNN-based covariance matrix design (precoding and power allocation) in different antenna settings. A large dataset was used to have the network generalize for many different channels, and cross-validation data was used to prevent over-fitting. The test dataset was based on 1,000 channel matrices and whose elements were generated randomly based on .
The performance of the proposed solution can be evaluated in different ways. We may find the mean square error (MSE) of elements and provided by the DNN and those obtained from a traditional capacity-approaching. The lower the MSEs, the better the regression. Alternatively, we can substitute and to (2) and compare the secure rate region achieved by the DNN with analytical methods like GSVD and maximum achievable rates (capacity) for this channel. We also compare the performance of the DL and traditional iterative methods in terms of computation time.
Figures 4 and 4 illustrate the accuracy of the proposed DNN model compared to GSVD and capacity region. The rate region plots were made for and . The users have a single antenna, and the BS power is 10 Watts. Our DNN is able to find covariance matrices for any given . To demonstrate this, rate region plots were made. These plots show the different rates simultaneously achieved by user 1 and user 2 as the power splitting factor is changed. In order to be accurate at different power splitting factors, eleven networks were trained, each at a different alpha starting from with a step size of 0.1. This produces a smooth, piecewise linear secure rate region curve and proves that the neural network can be generalized for any . It is important to note that different values of correspond to different services and result in very different covariance matrices. For example, implies which gives , i.e., security is important only for user 2, whereas has the reverse implication. That being said, we choose the value of and the associated DNN based on the users’ quality of service. Averaging over all s, the DNN achieves %98.9 and %97.7 of the capacity rates for and , respectively. We have used the same regularization parameters on all networks. A finer tune would increase this accuracy.
As can be seen in Fig. 4 and 4, the DNN highly outperforms analytical methods like GSVD in terms of rate region. Further, the proposed method largely outperforms existing iterative solutions [5, 6] in terms of computation time. Table II shows the input signaling design time gain that we obtain with the DNN. It is several times faster than the rotation algorithm and AOWF. All algorithms are tested on the same machine in Matlab. The time difference becomes much larger as increases. In short, the DNN is able to get very close to the capacity region of the MIMO-NOMA and achieves this much faster, and thus, it is a viable solution.


Rotation | AOWF | DNN | |
---|---|---|---|
2 | 6.6 | 22.7 | 3.7 |
3 | 26.1 | 31.4 | 6.3 |
V Conclusion
A novel deep learning assisted covariance matrix design for the two-user MIMO-NOMA with confidential messages has been developed, trained, and tested in this paper. The proposed DNN, which is used to approximate the capacity region of this channel, is able to achieve nearly perfect accuracy for maximum secure rates for this channel. Remarkably, using the DNN for signaling design significantly reduces the solution time versus existing iteratively solutions and brings this time low enough that it can be used in practice. It also significantly outperforms GSVD precoding in achievable secure rates.
References
- [1] M. Vaezi, Z. Ding, and H. V. Poor, Multiple Access Techniques for 5G Wireless Networks and Beyond. Cham, Switzerland: Springer, 2019.
- [2] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550–1573, 2014.
- [3] E. Ekrem and S. Ulukus, “Capacity region of Gaussian MIMO broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5669–5680, 2012.
- [4] S. A. A. Fakoorian and A. L. Swindlehurst, “On the optimality of linear precoding for secrecy in the MIMO broadcast channel,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1701–1713, 2013.
- [5] D. Park, “Weighted sum rate maximization of MIMO broadcast and interference channels with confidential messages,” IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 1742–1753, 2015.
- [6] Y. Qi and M. Vaezi, “Secure transmission in MIMO-NOMA networks,” IEEE Commun. Lett., vol. 24, no. 12, pp. 2696–2700, 2020.
- [7] M. F. Hanif and Z. Ding, “Robust power allocation in MIMO-NOMA systems,” IEEE Wireless Commun. Lett., vol. 8, no. 6, pp. 1541–1545, 2019.
- [8] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005.
- [9] C. Zhang, P. Patras, and H. Haddadi, “Deep learning in mobile and wireless networking: A survey,” IEEE Commun. Surveys Tuts., vol. 21, no. 3, pp. 2224–2287, 2019.
- [10] X. Zhang and M. Vaezi, “Deep learning based precoding for the MIMO Gaussian wiretap channel,” in Proc. IEEE Global Commun. Conf. Workshops (GC Workshops), pp. 1–6, 2019.
- [11] M. Gümüş and T. M. Duman, “Deep neural network based precoding for wiretap channels with finite alphabet inputs,” IEEE Wireless Commun. Lett., vol. 10, no. 8, pp. 1652–1656, 2021.
- [12] R. Liu, T. Liu, H. V. Poor, and S. Shamai, “Multiple-input multiple-output Gaussian broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215–4227, 2010.
- [13] E. Ekrem and S. Ulukus, “The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083–2114, 2011.
- [14] Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W. Ma, and Z.-Q. Luo, “Transmit solutions for MIMO wiretap channels using alternating optimization,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714–1727, 2013.
- [15] X. Zhang, Y. Qi, and M. Vaezi, “A rotation-based method for precoding in Gaussian MIMOME channels,” IEEE Commun. Lett., vol. 69, no. 2, pp. 1189–1200, 2021.
- [16] B. Xu, N. Wang, T. Chen, and M. Li, “Empirical evaluation of rectified activations in convolutional network,” arXiv:1505.00853, 2015.
- [17] C. M. Bishop, Neural Networks for Pattern Recognition. Oxford Univ. Press, 1995.
- [18] Y. A. LeCun, L. Bottou, G. B. Orr, and K.-R. Müller, “Efficient backprop,” in Neural Networks: Tricks of the Trade, pp. 9–48, Springer, 2012.