Secure Transmission Design for Virtual Antenna Array-aided Device-to-device Multicast Communications
Abstract
This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device-to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and cooperatively multicast the content to UEs who desire it. Specifically, with the target of securing the VAA-aided D2DM communication under the threat of multiple eavesdroppers, we propose a secure beamforming scheme by jointly considering the formed VAA and the Base Station (BS). For obtaining the optimal beamforing vectors, a nonsmooth and nonconvex Weight Sum Rate Maximization Problem (WRMP) is formulated and solved using Successive Convex Approximation (SCA) approach. Furthermore, we consider the worst case that eavesdroppers cooperatively form a eavesdrop VAA to enhance the overhearing capacity. In this case, we modify the securing beamforming scheme, formulate the corresponding WRMP and solve it using a two-level optimization. Simulation results validate the improvements of the VAA-aided D2DM scheme in terms of communication security compared with conventional D2DM schemes.
Index Terms:
Physical-layer security, virtual antenna array, D2D multicast communication, beamforming.I Introduction
Device-to-Device Multicast (D2DM) communication which developed from Device-to-Device (D2D) unicast [1] communication has been regarded as one of the key technologies to improve the data rate and alleviate the workload of cellular networks [2, 3]. By allowing one transmitted information bearing signal to be received and decoded by multiple receivers, D2DM could achieve the large-scale parallel implementation of local contents sharing in high-density environments, thus can support massive connectivity and also reduce the redundancy transmission of the Base Station (BS), signaling overhead, and bandwidth waste. Due to the high spectrum utilization and transmission efficiency, D2DM is not only suitable for the data-rate-hungry mobile applications such as online conference, video streaming, mobile computing, and virtual reality, but also considered as a key enabling technique for various future cellular network services such as mobile edge computing (MEC)[4, 5, 6, 7, 8] and fog-radio access network (F-RAN) [9, 10].
Although D2DM has a wide range of applications and there have been many literatures on how to improve its network delivery efficiency[11, 12, 13, 3, 14, 15], on the other hand, as in other wireless communication systems, communication security is an important indicator to evaluate the performance of a D2DM system. Physical Layer Security (PLS), which is an essential strategy to protect the information by fully utilizing the basic characteristics of the wireless channel and noise, has been regarded as a highly promising security approach for wireless communications. Compared with the cryptography in the higher layer, PLS is independent of the computational complexity and thus more suitable for computation resource limited networks such as D2D communications. Motivated by this, many research efforts have been devoted to secure D2D communication from the physical layer security perspective [16, 17, 18, 19, 20, 21, 22, 23]. Ref. [16] attempted to increase the D2D link’s capacity while guaranteeing the security rate by controlling the transmit power of D2D pairs. Refs. [17, 18] considered that multiple D2D pairs can access the same resource block and one D2D pair is also permitted to access multiple RBs. In [19], aimed to secure CUE’s communication and increase energy efficiency of D2D communication, the condition whether D2D link could reuse a CUE’s RB was derived. Ref. [20] investigated both single-channel and multi-channel D2D communications. For providing security to CUEs and improving the spectral efficiency of the D2D links simultaneously, the authors jointly optimized the power allocation and channel assignment of the D2D links and CUEs. In [21], the model selection of a D2D link under the physical-layer security perspective was investigated. The PLS in UAV-enabled D2D communications was investigated in [22] where a UAV plays the role of flying BS. In [23], authors shown that the Non-Orthogonal Multiple Access (NOMA) technique could also be used to secure D2D communications. Note that, the above literatures are mainly focused on the D2D unicast scenarios. To the best of our knowledge, the PLS schemes in D2DM are rare [24]. No matter whether the design target is to increase network capacity or to provide PLS, the main difference between D2D unicast and D2DM is that the data rate in D2DM is limited by the worst Signal to Interference Plus Noise Ratio (SINR) UE and hence leading to a max-min optimization problem which is hard to deal with.
However, the above secure schemes in D2D communication are mainly based on cooperative jamming, in which the cellular communication signals and other D2D communication signals are utilized to interfere eavesdroppers for securing intended D2D communications, or vice versa. Constrained by the limited physical size, UEs usually have only one antenna or multiple antennas that are less distant than the coherent distance. Hence, the multiple-antenna based beamforming technologies for providing PLS [25, 26, 27] are not suitable for D2D communications. Thus, how to secure D2D communications is still an open issue and this paper makes attempt to deal with it by introducing the following Virtual Antenna Array (VAA) technique.
Recently, a novel implementation of Multiple-Input-Multiple-Output (MIMO) wireless system called VAA [28, 29, 30] was proposed as a promising approach to further increase the PLS performance and network delivery efficiency of the above D2DM scenario. The VAA system is realized by permitting adjacent single antenna mobile terminals to cooperate among each other and thus form the so called virtual antenna array. In the VAA system, as a virtual transmitter, the elements in VAA could perform cooperative beamforming to transmit information to receivers, while as a virtual receiver, the elements in VAA could exchange the received signals via some short-range communication techniques such as blue tooth and then perform some multiple-antenna receive techniques like maximum ratio combination to increase SINR. It is important to note that, compared with the Single-Input-Single-Output (SISO) channel, the spatial diversity of VAA together with cooperative beamforming can significantly improve the quality of the transmitted signal and then enhance the PLS performance[31, 32] and channel capacity [30, 33, 34, 35, 36].
In this papar, we propose a VAA-aided D2DM (VD2DM) scheme for securing D2DM communication. In the VD2DM, UEs who cache the common contents cooperatively form a VAA system and each UE could be treated as one of the antennas in the VAA. By multiplying the signals each UE sends itself by a beamforming coefficient (i.e., the corresponding element in the beamforming vector), VAA could jointly conduct cooperative beamforming to multicast the common contents to receivers while prevent eavesdroppers from overhearing. Further, unlike the traditional D2D communications which only allow one UE as the transmitter, the VD2DM could take full use of the same the common contents cached on different UEs. The main contributions of this paper are summarized as follows:
-
1)
We propose a novel secure VD2DM transmission scheme, which integrates the VAA into the D2DM underlying cellular network. In the proposed scheme, all UEs are equipped with one antenna, and the BS is equipped with multiple antennas. A group of UEs (i.e., D2D receivers) needs a common confidential information data and in the D2D transmitter group, each UE (i.e., D2D transmitters) has cached the common confidential information desired by the D2D receivers. Under the coordination of the BS, D2D transmitters form a VAA, where each UE multiplies the signals by a complex beamforming coefficient111Amplitude control can be accomplished by power control and phase control can be accomplished by delay.to perform cooperative beamforming for multicasting the confidential information to D2D receivers. Meanwhile, a group of baleful UEs (i.e., eavesdroppers) desire to overhear the information delivered by the VAA. Since the VAA transmission reuses the downlink subcarrier resources of a CUE and hence the downlink signal transmitted by the BS could be treated as a cooperative jamming to secure VD2DM. To further limit the overhearing capacity of eavesdroppers, the BS splits a part of power to transmit an Artificial Noise (AN) to block eavesdroppers.
-
2)
We explore the difference between the VD2DM and the traditional D2D unicast, and then formulate the weighted sum rate maximization problem (WRMP) to increase the achievable rate of CUE and the achievable secrecy rate of VD2DM simultaneously by jointly optimizing the transmit beamforming of the BS, the cooperative beamforming vector of the VAA and the covariance matrix of AN. The formulated problem is non-convex and non-smooth since both max-min and min-max problem are included, i.e., the achievable performance of the multicast group is generally limited by the receiver with the lowest SINR and the secrecy performance is limited by the eavesdropper with the highest SINR. We then introduce a series of auxiliary variables to transfer the non-convex objective function and constraints into a series of convex objective function and constraints. As last, an effective iteration algorithm is designed to solve it.
-
3)
Moving beyond that, we investigate an extreme case (i.e., the worst case) in which the eavesdroppers also form a VAA and gang up together to jointly overhearing the communication of VD2DM. In our analysis, we treat eavesdroppers as one equivalent one multi-antenna eavesdropper called Eve. In this case, with the help of semidefinite relaxation and slack operation, we can decompose the WRMP into a two-level optimization problem, in which the outer level is a single-variable optimization, and the inner level is a non-convex problem, which can be recast to a SemiDefinite Problem (SDP) based on Arithmetic Geometry Mean (AGM) inequality.
The remainder of the paper is organized as follows. Section II introduces our considered system model. Section III gives our formulated WRMP problem and the detailed solution to the formulated problem. Section IV extends the considered scenario to the worst case and gives the corresponding solution. Simulation results are shown in Section V and finally Section VI concludes the paper.
: and denote the sets of complex and real numbers, respectively; , , , , and denote the rank, trace, inverse, transpose, and conjugate-transpose operations, respectively; and denote the Frobenius norm and the maximum value of its argument, respectively. Except for , bold symbols in capital letter and small letter denote matrices and vectors, respectively and is the natural constant. means is positive semidefinite matrix. and are the element of the vector and the element of the diagonal entry of the matrix , respectively. denotes the natural logarithm of its argument; denotes the complex Gaussian distribution with mean and variance ; is an identity matrix.
II System Model and Preliminary

Consider a VD2DM communication scenario which underlays over the downlink spectrum of a cellular communication network as shown in Fig. 1. A group of D2D receivers want to obtain identical confidential information, and a group of UEs who pre-cache the identical confidential information will form the transmit VAA (i.e., the D2D transmitter group) to multicast the information under the coordination of the BS. A CUE shares its downlink resource (e.g., subcarriers in OFDMA system) for the D2D link to reuse. Also, in the system, a group of baleful UEs (i.e., eavesdroppers group) try to overhear the communication between D2D transceivers222For example, in commercial corporation or research institution, colleagues could share the internal information via VD2DM in a timely and convenient manner, meanwhile the VD2DM may be under the risk of eavesdrop attack from other UEs in the cellular system., thus the physical layer security is taken into consideration. Except for the BS, all nodes are equipped with one antenna, and the BS has antennas for its downlink transmission.
Let denote the set of D2D transmitters, denote the set of D2D receivers and denote the set of eavesdroppers. Define as the channel vector between D2D transmitters and D2D receiver , as the channel vector between D2D transmitters and eavesdropper , as the channel vector between D2D transmitters and the CUE, as the channel vector between BS and D2D receiver , as the channel vector between BS and eavesdropper , and as the channel vector between BS and CUE, respectively. The Rayleigh block-fading channel model is assumed in this paper. Note that, the cellular network is considered as a kind of centralized network architecture and the eavesdroppers are also be considered as the registered active user in the cellular network, hence the BS can collect the channel state information (CSI) of all links in the network333In LTE system, the BS and D2D transmitters could perform channel quality indication estimation from the received sounding reference signal transmitted by eavesdroppers then obtain and , respectively. Further, D2D transmitters could report periodic or aperiodic report to the BS from the physical uplink control channel. Interested readers can read [37] for the details. [1]. Also, since the channels are quasi-static over each time block, the BS could precalculate the the optimal beamforming vectors at the beginning of each time block, then forwards the beamforming vector of the VAA to each D2D transmitters via physical downlink control channel.
We first consider the scenario in which each eavesdropper overhears the confidential information independently, and there has no extra information exchanges between eavesdroppers. The transmitted signal of the BS is
(1) |
in which is the desired signal of CUE with beamforming vector , is the AN vector to interfere eavesdroppers from overhearing with covariance matrix . The D2D transmitters form a VAA and employ the cooperative beamforming strategy to multicast the confidential information . Specifically, the D2D transmitter multiplies the identical confidential information bearing signal with a complex weight . Denote the cooperative beamforming vector by , then the received signals of D2D receiver , eavesdropper and CUE can be respectively expressed as
(2) |
(3) |
and
(4) |
where is the Additive White Gaussian Noise (AWGN).
From (2), (3) and (4), the channel capacities of D2D receiver , the eavesdropper to overhearing , the eavesdropper to decoding and the CUE are respectively
(5) |
(6) |
(7) |
and
(8) |
in which where , and
Let be the achievable secrecy rate of the D2D multicast communication and be the achievable rate of the CUE. Then an achievable rate region is given as the set of nonnegative rate pairs satisfying
(9) |
(10) |
and
(11) |
in which means the achievable rate of D2D multicast is determined by the receiver who has the minimum channel capacity. Also, means the eavesdropping rate is determind by the eavesdropper who has the maximum channel capacity, since the confidential information cannot be overheard by any eavesdropper. guarantees that the eavesdroppers could not perform non-orthogonal multiple access (NOMA) to decode and eliminate the first, hence the could jointly interfere with the eavesdroppers.
As can be seen in (5), (6), (7) and (8), the beamforming vector , cooperative beamforming vector and the covariance matrix of AN, directly determine the achievable data rates, thus our work focuses on the design of , and , under an achievable rate region maximization (RRM) formulation with power constraint. The formulated RRM is a vector maximization problem, i.e. (12), in which is an arbitrarily number greater than zero. In (12), and are the total power budgets of the VAA and the BS, respectively, the constraints C1 and C2 are the maximal power constraint of each D2D transmitter and the BS, C3, C4 and C5 are corresponding to (9), (10) and (11), respectively. The RRM problem in (12) is a non-convex vector optimization and thus difficult to solve. In the next section, we elaborate our approaches to tackle (12).
(12) |
III A Tractable Approach to Tackle the RRM Problem (WRMP)
A common approach for dealing with the vector optimization problem (12) is referred to as scalarization, whose basic idea is to transform the vector optimization into the weighted sum maximization optimization. In the rest of this section, we transform the RRM into a WRMP and then deal with it.
III-A Weighted Rate Maximization Problem
The target of WRMP is to maximize the total rate including the secrecy rate of D2D multicast communication and the rate of CUE under the total power constraints of both the D2D transmitters and the BS.
From (5), (6), (7) and (8) we can see that, the transmitted signal vector from the D2D transmitter group, i.e., the VAA, , not only could be overheard by eavesdroppers, but also interferes the CUE. Thus, the cooperative beamforming vector should be carefully designed for securing the D2D multicast communication while limiting the interference to the CUE. On the other hand, the transmitted signal vector from the BS, , could be treated as a cooperative jamming signal to interfere eavesdroppers from overhearing the D2D multicast communication. Thus we need to design the beamforming vector to increase the channel capacity of the CUE whereas decrease the channel capacities of eavesdroppers. Moreover the covariance matrix of the AN, also should be jointly designed to secure the communication while does not cause too much interference to other nodes.
Since our aim is to maximize the total rate of the system, we then rewrite (12) into the following WRMP:
(13) |
In (13), is the weighted coefficient, i.e., the larger corresponds to that we tend to maximize the secrecy rate, vice versa.
III-B Solving (13)
In the formulated WRMP, (13), although the constraints C1, C2 and the objective function are convex, the constraint C3 includes max-min and min-max structure simultaneously, which is non-convex and non-smoothness. To solve it, we next introduce a series of slack variables to transform it into convex expressions.
First, we introduce two auxiliary variables and to transform the originally constraint C3 into a smooth form. Specifically, let 444The operator ensures that is not less than zero, however for guaranteing that the objective function of (11) is linear, the operator is omitted and when , is set to zero. , (13) can be equivalently recast as
(14) |
In (14), the original non-smooth constraint C3 is decomposed into groups of smooth constraints C6 and C7. However, constraints C6, C7, C4 and C5 are still non-convex and hard to deal with. Next, we respectively process C6, C7, C4 and C5 to transform them into convex constraints.
III-B1 Convex approximation of C6
Let us introduce a group of auxiliary variable , then the constraint C6 can be further decomposed into the following constraints:
(15) |
Now, C6 has been decomposed into a series of constraints. However, although C8, C10 and C12 are convex, they are not in the simplest form. Also, C9 and C11 are still non-convex. Let us first check C8, it is an exponential cone constraint and can be solved by existing nonlinear solvers (e.g., SDPT3 in CVX). To further reduce the computational complex, C8 can be approximated in terms of a series of second order conic (SOC) constraints. Let be the introduced slack variables, C8 can be approximatively rewritten as
(16) |
in which is the number of a series auxiliary variable , and the approximate accuracy increases as increases.
It is easy to see that constraints C10 and C12 can be directly transformed to SOC forms as
(17) |
and
(18) |
respectively. We next deal with C9. Based on the fact that the first-order Taylor expansion of a convex function is its lower bound, we employ the first-order Taylor series expansion of the left hand side of C9 around and , i.e.,
(19) |
Then, C9 can be recast to
(20) |
Note that, in , we use the lower bound of the left hand side of C8 to instead itself, thus the feasible region of must be the subset of C9.
Let , the left hand side of C11 can be written to , which is a semipositive definite quadratic form in complex domain. Following [38], we define , according to eq.(15) in [38], giving a differential of , , we have
(21) |
in which and are the generalized complex gradient and the conjugate complex gradient of defined in [38], respectively.
With the help of two types of gradients, it is easy to calculate that
(22) |
Hence the first-order Taylor series expansion of the left hand side of C11 around is
(23) |
and then C11 can be approximated as
(24) |
Thus far, the non-convex constraint C6 has been decomposed to a series of convex constraints.
III-B2 Convex approximation of C7
By introducing another group of auxiliary variable , C7 can be decomposed into the following constraints:
(25) |
In (25), C13 and C15 are still non-convex and C14 can be rewritten to SOC form directly:
(26) |
By preforming the first-order Taylor series expansion, C13 and C15 can be approximated as
(27) |
and
(28) |
respectively. With the series of constrains , and , C7 has been approximated to a convex constraint.
III-B3 Convex approximation of C4 and C5
Note that C4 and C6 have the similar formation, thus with the same approach of C6 above, C4 could be approximated to the following constraints C16, C17, C18, C19 and C20 corresponding to ,,, and , respectively.
Similarly, C5 could be approximated to C21, C22 and C23 with the same approach of C7 above. For briefly, we have omitted the details of constraints C16C23.
Now, all non-convex constraints have been approximated to convex constraints, the approximated version of WRMP is given by
(29) |
Note that, for briefly, the auxiliary variables for approximating C4 and C5 are omitted in . It easy to see that is a convex problem, which can be efficiently solved by using interior point methods, or standard convex optimization tool, e.g., CVX. The detailed procedure is summarized in Algorithm 1.
Complexity and convergence: The complexity of interior point method for solving a convex optimization problem (i.e., line 3 in Algorithm 1) is [39], in which is the number of inequality constraints and is the number of optimization variables. Combining with the fact that the iterative number of Algorithm 1 is bounded by , we have the total computational complexity of Algorithm 1 is .
The convergence of Algorithm 1 could refer to Proposition 2 in [1].
Remark 1
Our formulated WRMP in both the normal case and the worst case does not include the quality of service (QoS) ensuring constraints which limit the achievable rate of CUE and the achievable secrecy rate of D2DM at least to a certain value, that is because the QoS constraints may lead to the WRMP being unsolvable. In practice, if the achievable secrecy rate of the solution, is too small, we could increase appropriately, vice visa.
IV Extension to the Worst Case
In Section III above, we only considered the scenario in which multiple eavesdroppers overhear the confidential information independently. However, in the worst case that the eavesdroppers may collude and form another VAA to jointly process the eavesdropped information (such as maximum ratio combination and MMSE receiver) to increase the overhearing capacity. We next make efforts to investigate the PLS scheme in such a scenario.
Since the eavesdroppers are ganged up together and form an eavesdrop VAA, the group of eavesdroppers i.e., the eavesdrop VAA could be treated as a virtual multi-antenna eavesdropper which is equipped with antennas. In the rest of this paper, unless particularly stated, we use Eve to represent the so-called eavesdrop VAA, i.e., the equivalent -antenna eavesdropper.
Since the eavesdroppers form the eavesdrop VAA, the channel vector from D2D transmitter group to the eavesdropper, could be treated as the channel vector from D2D transmitter group to the antenna of Eve. We use represent the channel matrix between D2D transmitter group and Eve. Similarly, we use represent the channel matrix between BS and Eve. Then the received signals of D2D receiver , Eve and CUE can be expressed as
(30) |
(31) |
and
(32) |
respectively, where is the AWGN vector at Eve. Similar with the normal case, from (30), (31) and (32), the channel capacities of D2D receiver , the eavesdropper Eve to overhearing 555 The channel capacity of Eve is obtained by calculating the mean mutual information which is the upper bound of the achievable rate of Eve, regardless of which receiving filter Eve used. Hence, the achievable secrecy rate of the worst case is a lower bound., the eavesdropper to decoding and the CUE are
(33) |
(34) |
(35) |
and
(36) |
respectively, where . It is important to note that since the eavesdroppers form another VAA, the eavesdrop channel has transformed from MISO to MIMO, and the corresponding channel capacity becomes (34) and (35).
The achievable rate region is then defined as the set of nonnegative rate pairs satisfying
(37) |
(38) |
and
(39) |
In the worst case, to reduce computational complexity, we discuss the WRMP in two subcases and formulate corresponding optimization problems. Note that, different from the WRMP in the normal case which include constraints C5 to guarantee that the eavesdroppers could not perform NOMA to decode and eliminate the first. In both subcases, we do not consider (39) into the optimization problems, the detailed reasons please see Remark 3 at last of this section.
In subcase 1, we consider that Eve could not decode and eliminate the first and formulate the corresponding sub-WRMP, . On the contrary, in subcase 2, we consider that Eve could decode and eliminate the first and formulate the corresponding sub-WRMP, .
We first consider subcase 1 and formulate the following to maximize the weighted sum of and
(40) |
where and is the weighted coefficient. , and are evolved from C4, C5 and C7 in (14) respectively, because of the different expressions of the channel capacity of CUE, D2D receivers and Eve.
Note that, is basically the same as , by replacing with
(41) |
can be obtained. In , only the AN could interfere with Eve since Eve could decode and eliminate first.
We first make effort to solve , it is easy to see that and have the same structure as C4 and C6, respectively, and the technique used to transform and to series of convex constraints in Section III.B could still be used to deal with and . However, due to the determinant operation, in (40) is a non-convex constraint and non-trivial to deal with.
IV-A A Semidefinite Relaxation Based Approach for handling
Observing that, , when is a complex vector and is Hermitian, to handle problem (40), we define , and ignore the non-convex constraints , 666When the optimal solution to (45) satisfies , , the corresponding maximum weight sum rate could be obtained via single-stream transmit beamforming, which facilitates the implementation of physically realizable transceiver with low complexity. However the Rank constrains is non-convex and hard to deal with, here we omit them and will discuss it in Section IV-D. to obtain a relaxed problem version of (40) as follow
(42) |
In (46), is still hard to handle. Before we deal with it, we first introduce the following lemma whose proof can be found in [40]:
Lemma 1
(43) |
For any , , , and . Furthermore, the equivalence in (47) holds if .
Replacing with C24, (42) becomes:
(44) |
It is obvious that when is fixed, C24 becomes a linear matrix inequality which is a convex constraint. Hence (44) could be deposed into a two-level optimization: the inner-level optimization is convex with a fixed , and the outer-level is a single-variable optimization with respect to .
IV-B The Inner-Level Optimization
With a fixed , the inner-level optimization can be written as
(45) |
In (45), although , and C24 are convex constraint, we still need to deal with the non-convex constraints and . Note that, the convex approximation approach in Section III.B could be used to transfer and into convex form. However, observing that the expressions inside the logarithm of and are in the form of linear fraction, hence, in the following, we give an easier approach that does not need complex domain Taylor expansion.
IV-B1 Convex approximation of
By introducing auxiliary variable , can be decomposed into
(46) |
and
(47) |
Like C8 in (15), C21 is an exponential cone constraint and can be approximated in terms of a series of SOC constraints with the same formation of . For brevity, we denote the series of SOC constraints derived from C25 by and omitting its detailed expression.
Then, arithmetic geometry mean (AGM) inequality is applied to get an approximation of the non-convex constraint, i.e., C26. We first introduce the AGM inequality. The AGM inequality is described as: , where and the equality holds if and only if when . Based the AGM inequality, C26 can be approximately recast as
(48) |
which is convex.
IV-B2 Convex approximation of
With the auxiliary variable , we decompose into
(49) |
and
(50) |
Similar with how we process C25, C27 is replaced by a series of SOC constraints, i.e., and we omit the detialed expression of it. With the help of AGM inequality, C28 can also be approximated to a convex constraint:
(51) |
Now, with the help of , , and , (45) can be recast into solving a sequence of convex optimization subproblem:
(52) |
Now, (52) is a semidefinite program (SDP) which is convex and can be solved by using interior point methods, or standard convex optimization tool, e.g., CVX. The detailed procedure is summarized in Algorithm 2.
IV-C The Outer-Level Optimization
The outer-level is a single-variable optimization with respect to . Let be the optimized value of (52) with a given , then the outer-level optimization is . Note that
(53) |
where the first inequality is due to the non-negative property of rate, the second inequality is because the secrecy rate is non-negative, and the last inequality comes from the fact that for any and . From (53), we can see that the optimization variable of the outer-level optimization has a bounded interval, and then we use one-dimensional search technology to solve the outer-level optimization.
So far, we have solved , the approach to overcome is similar to that of , except for replacing with and we omit the details here.
The whole process of solving the WRMP in the worst case is that, we first solve the and test whether (39) is satisfied. If (39) is satisfied,the solution of is the solution of the WRMP in the worst case, otherwise, we solve and set the solution of it as the solution of the WRMP in the worst case.
Remark 2
In our thousands of simulations results, the solution of (13) makes constraints C5 equal and the solution of does not satisfy (39) never happen, which means eavesdroppers can not decode with large probability, even we do not deliberately set constraints to ensure this. In other words, the constraint C5 in (13) and are redundant in most cases.
Remark 3
The reason why we do not consider (39) into the WRMP in the worst case is because (39) and have the same structure, for overcoming , we deploy one-dimensional search technology, which means for jointly solving (39) and a time-consuming two-dimensional search technology should be used. Also, as stated in remark 2, even we omit (39), the solution of still satisfy (39) with large probability.
IV-D Rank-Profile Analysis
Note that, when the optimal solution of (44) satisfies and the corresponding weighted maximum rate, i.e., could be attained via single-stream transmit beamforming, which facilitates the implementation of physically realizable transceiver with low complexity. Also the condition guarantees the relaxation from to C24 is tight, i.e., C24 equivalent to and (44) equivalent to (40). However, the rank constraint is non-convex and we omit it in (44), hence the optimal solution of (44) does not always lead to the optimal solution of the original problem (40). Apparently, if () is of rank one, then via eigenvalue decomposition, the optimal () of (40) can be easily obtained. Otherwise, some rank-one approximation procedures for () such as Gaussian randomization [41] are applied to obtain a suboptimal solution of (40).
The investigation on rank properties of , and is still an open issue. However thankfully, we can prove that the rank one property holds for in a special case.
Proposition 1
If there exist only one satisfies , then must be of rank one.
Plase see Appendix A.
It is worth noting that, for D2D receivers it is almost impossible that, with similar , since the channel conditions of each receiver are independent with each other, which implies that holds with large probability. In fact, in our thousands of simulations results, never happens.
V Suboptimal Algorithms for High Dynamic Networks
In the above Section III and Section IV, we give the algorithms to obtain the optimal beamforming solutions for both the normal case and the worst case. However, the above algorithms need lots of auxiliary variables and contain a number of constraints, which may be time consuming and not suitable for high dynamic networks.
In this section, we propose a low complexity scheme to obtain a suboptimal beamforming solution. Let be the channel matrix from D2D transmitter group to eavesdropper group and CUE, the proposed scheme falls into two cases:.
We note that although the proposed suboptimal solutions in this section are designed for the worst case, they could be easily adjusted for the normal case.
V-A Case One:
In this case, D2D transmitter group directly put the confidential information onto the null space of the column space of , i.e., no information is leaked to all eavesdroppers or interfered with CUE. In this case, can be written as , where is the standard orthogonal basis of the solution space of the equation and is the new concerned optimization variable. It is easy to see .
For BS, it adopts the MRT beamforming to focus the signal on CUE, and puts onto the null space of the column space of , where is the channel matrix from BS to D2D receiver group. In this case the beamforming vector of BS is
(54) |
where is the orthogonal projection matrix onto the null space of the column space of . Since the transmitted signal, , does not interfere the D2D receivers, the BS can use the maximal power to transmit , i.e., the term in (60).
Since no information is leaked to eavesdroppers, the original problem could be rewritten as
(55) |
where is the achievable rate of CUE. Since is directly given by (60), we actually only optimize in (61), hence (61) can be further reduced to
(56) |
which is a simple max-min problem and can be solved by introducing an auxiliary variable and then rewrite (56) as
(57) |
It is easy to see that, C31 can be approximated to convex form with the same approach of C11.
V-B Case Tow:
In this case, D2D transmitter group can hardly perform null space beamforming directly to prevent eavesdroppers from overhearing, since there has no non-zero solution of when . Thus in this case the D2D transmitter group can hardly communication with D2D receiver group safely without the assistance of BS.
Based on the generalized singular value decomposition (GSVD), in this subsection we propose a BS-assisted scheme to guarantee that the confidential information wiretapped by Eve is protected by the jamming signal sent by BS.
Let be the beamforming vector of BS for transmitting desired by CUE. Like Section V.A, BS puts the signal onto the null space of the column space of , i.e., the transmitted does not interfere with either D2D receivers or Eve. Then can be written as
(58) |
where is the power split factor.
Let be the beamforming vector of BS for transmitting jamming signal . Since the goal of the jamming signal is to interfere with Eve, should be orthogonal to the channel vectors from BS to D2D receivers and CUE. Let the channel matrix from BS to D2D receivers and CUE be , in order for to be orthogonal to the column space of , is designed as , where is the standard orthogonal basis of the solution space of the equation and is the new concerned optimization variable.
For the D2D transmitter group, although when , the transmitted confidential information is bound to be overheard by Eve, we can prevent it from interfering CUE, i.e., , where is the standard orthogonal basis of the solution space of the equation and is the new concerned optimization variable.
Based on the above discussion, the received signal of Eve can be written as
(59) |
Define and as the equivalent channel matrixes of the eavesdrop channel from D2D transmitter group to Eve and the jamming channel from BS to Eve, respectively. For guaranteeing that the confidential information wiretapped by Eve are protected by the jamming signal sent by BS, i.e., Eve can hardly separate from , we need , which means the confidential information signal is always mixed with the jamming signal . To handle the alignment constraint, GSVD, which can yield the decoupled parallel sub channels, is applied as follow:
(60) |
where and are unitary matrices, , , and , is a diagonal matrix with ascending sort and is a diagonal matrix with descending sort. According to the definition of GSVD we obtain that and . Based on the results of GSVD, we can equivalently treat the equivalent eavesdrop channel and the equivalent jamming channel as a series of subchannels, respectively.
Let us first check the equivalent eavesdrop channel matrix . If we select the column of as the beamforming vector , then we have , and can be treated as the equivalent channel coefficient of the subchannel. Because our goal is to prevent Eve from overhearing, hence, we select the column of , i.e., as the beamforming vector , which corresponds to the smallest equivalent channel coefficient of the equivalent eavesdrop channel .
For guaranteeing the confidential information signal is protected by the jamming signal , we also choose the corresponding column of as the beamforming vector , i.e., .
Substituting the selected beamforming vectors and into (60), we have
(61) |
Next, we move forward to calculate the optimal power split factor . For simplicity, we observe that the interferences in (66) are mainly composed of the jamming signal , and hence we ignore the AWGN term in (66). With the MMSE receiver, the eavesdrop channel capacity of Eve is
(62) |
Now, the weighted rate sum becomes
(63) |
where
(64) |
and
(65) |
After the first order derivative, it is easy to obtain that the optimal to maximize (68) is
(66) |
in which
(67) |
(68) |
and
(69) |
In the suboptimal solution, we do not consider the individual power constraint of each UE in VAA. If the individual power constraint is unsatisfied, the suboptimal solution should be scaled to satisfy the individual power constraint.
VI Simulation Results
This section presents simulation results to validate the performance of our proposed algorithms. The transmit powers are normalized with AWGN power . That is, the transmit power dB means the transmit power is times higher than the AWGN power. All channels are considered to be independent quasi-static block Rayleigh fading with 777We do not consider the specific distribution of each node, and set all channels are rayleigh distribution to reflect the randomness distribution of each node in this paper. . The simulation results are collected from Monte Carlo simulations with 100 independent channel realizations.
We first present the impact of the number of the D2D transmitter on the achievable rate. In Fig. 2, the number of eavesdroppers, is set to zero which corresponds to the normal D2DM communication scenario without the threat of eavesdroppers. Fig. 2 shows that, when , D2DM can achieve only a certain rate through the power control of the transmitter and the BS. While when , the rate of VD2DM increases dramatically, that is because multiple D2D transmitters could form a VAA and play cooperative beamforming to focus the signal on the D2D receiver who has the worst channel conditions. We note that the number of D2D transmitter represents the traditional D2DM without the assistance of VAA, hence the results demonstrate that the VAA-aided communication can significantly improve the efficiency of D2D multicast communication compare to the traditional D2DM.
We then show the secrecy rate obtained via the aided of VAA under the threat of multiple eavesdroppers. In Fig. 3, when , D2DM can achieve a tiny secrecy rate by relying on the cooperative interference of the BS. However, when , the secrecy rate of VD2DM increases dramatically, because the multiple D2D transmitters form a VAA and play cooperative beamforming to focus the signal on the D2D receivers while prevent the eavesdroppers to overhear. Similar to Fig. 2, the number of D2D transmitter represents the traditional secrecy D2DM communication without the help of VAA, hence the results in Fig. 3 validate the secrecy improvement brought by VAA.


We next present the achievable secrecy rate of VD2DM with respect to different maximum transmit power of D2D transmitter group. As can be seen in Fig. 4, the achievable secrecy rate of VD2DM monotonously increases with the increase of the maximum transmit power of D2D transmitter group. Also, a larger will lead to a larger achievable secrecy rate. Further more, in the worst case, due to the strong overhearing capability provided by the receive VAA, the achievable secrecy rate is lower than that of the normal case. However, with the help of AN, the gap between the achievable secrecy rate of the worst case and that of the normal case is small, indicating that the proposed scheme can effectively secure the communication of VD2DM under the worst case. It is also shown in Fig.4 that the suboptimal secure solution proposed in Section V can provide a significant achievable secrecy rate, although it is not as good as the optimal solution.


In Fig. 5 we show the achievable rate of CUE as a function of the maximum transmit power of D2D transmitter group with different . It is easy to see the maximum transmit power of D2D transmitter group has little effect on CUE’s achievable rate. That is because the proposed algorithms in the normal case and the worst case are to jointly maximize the achievable secrecy rate of VD2DM and achievable rate of CUE, hence the interference at CUE caused by VD2DM keeps limited to a small level. Also, in the suboptimal algorithm, the null-space beamforming ensures that VD2DM does not interfere with CUE. On the other hand, the reason why the achievable rate of the worst case is lower than that of the normal case is because in the worst case, BS need to split some energy to transmit AN, which decreases the energy to transmit the signal CUE desired. Another interesting observation shown in Fig. 5 is that, when , the achievable rate of the suboptimal solution is higher than that of both algorithm 1 and 2. That is because when , both algorithm 1 and 2 tend to achieve a higher secrecy rate of D2DM rather then a higher data rate of CUE, which yields more interference at CUE caused by D2D transmitters, By contrast, in the suboptimal scheme, the CUE is always under the null space of D2D transmitters, which means D2D transmitters never interfere with CUE and hence the rate of CUE of the suboptimal algorithm is higher than that of algorithm 1 and 2, note that, the weight sum rates of optimal algorithms are always higher than that of the suboptimal algorithm, whatever the value of is.
In Fig. 6 we present the impacts of the number of eavesdroppers, , on the achievable secrecy rate. As the number of eavesdroppers increases, the achievable secrecy rate decreases. However, the decreasing trends of achievable secrecy rate are not obvious in both the normal case and the worst case. This is because the proposed algorithms can effectively limit the overhearing capacity of eavesdroppers by jointly optimizing the beamforming vector of the D2D transmitter group and BS. Another point of concern is that, for the suboptimal solution, when increases from 1 to 3, the decreasing trend of achievable secrecy rate is obvious, but when increases from 4 to 9, the decreasing trend is not obvious. At last, in the normal case and the worst case, the achievable data rates of CUE are almost unaffected by the number of eavesdroppers, since eavesdroppers only overhear VD2DM and the BS has enough power budget to transmit AN without affecting the transmission of .



The relationship between achievable rates and the number of D2D receivers is illustrated in Fig. 7. We can see that as the number of D2D receivers increases, the achievable secrecy rate decreases slowly. The reason why more D2D receivers result in lower achievable secrecy rate is because the larger the number of D2D receivers, the higher the probability of a poor channel condition of the worst channel receiver. However, the proposed algorithms in both the normal case and the worst case are max-min based algorithms which take care of the worst channel receivers. Hence, the trend of decreasing is slowly.
As above mentioned, as the number of receivers increase, it becomes more difficult to ensure communication security. Thus, the proposed algorithms trend to use the BS’s signals (such as signal desired by CUE and AN) to interfere with eavesdroppers for increasing the achievable secrecy rate, which makes the achievable rate of CUE decrease slowly.
At last, the overall convergence process of the proposed algorithms is shown in Fig. 8. It can be see that, setting the maximum iteration number of Algorithm 1 and 2 as five is enough to achieve the near optimal solution, which means the proposed algorithms can converge quickly.
VII Conclusion
This paper has studied the secure transmission design for a VAA-aided D2D multicast communication system under the threat of multiple eavesdroppers. By treating eavesdroppers as either independent ovearhearing or joint overhearing, respectively, two different non-convex optimization problems have been proposed and solved to achieve the sum data rate of both the cellular user equipment and the achievable secrecy rate of the D2D multicast communication. Also a time-saving suboptimal beamforming scheme has been proposed to adapt to the high dynamic network. Simulation results have validated the advantages of the VAA-aided D2D multicast scheme from the perspective of wireless communication security.
(70) |
(71) |
Appendix A Proof of Proposition 1
Let be the optimal solution of the outer-level optimization problem, and be the optimal solution of the inner-level problem (45) with fixed (in this case, and are also the optimal solution of (44)). Then, we formulate the following power minimization problem (54) on the top of this page. Let and be the optimal solutions of (54), following Appendix B in [40], we have and are also the optimal solution of (45) with fixed .
Then, we write the Lagrangian associated with (54) as (55) on the top of previous page, in which and are the dual variables corresponding to primal constraints in (54). Let , the KKT conditions that are relevant to are given by
(72) |
(73) |
(74) |
(75) |
Postmultiplying (56) by and making use of (59) yield
(76) |
Since , we have
(77) |
From (61) we still can hardly calculate the rank of , since the rank of is hardly to be known. However, combining complementary relaxation condition (57) and in (54), we can conclude that for any
(78) |
Hence, if there has only one that makes , we have which is of rank one and then we can drive the following inequation (63) from (61), which implies . Because means all zero matrix which is meaningless, we have .
(79) |
References
- [1] C. Kai, H. Li, L. Xu, Y. Li, and T. Jiang, “Energy-efficient device-to-device communications for green smart cities,” IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1542–1551, 2018.
- [2] M. Peer, V. A. Bohara, and A. Srivastava, “Cache selection in dynamic d2d multicast networks using inhomogeneous markov model,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 3235–3245, 2020.
- [3] M. Elnourani, S. Deshmukh, and B. Beferull-Lozano, “Distributed resource allocation in underlay multicast d2d communications,” IEEE Transactions on Communications, vol. 69, no. 5, pp. 3409–3422, 2021.
- [4] J. Peng, H. Qiu, J. Cai, W. Xu, and J. Wang, “D2d-assisted multi-user cooperative partial offloading, transmission scheduling and computation allocating for mec,” IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 4858–4873, 2021.
- [5] T. Fang, F. Yuan, L. Ao, and J. Chen, “Joint task offloading, d2d pairing and resource allocation in device-enhanced mec: A potential game approach,” IEEE Internet of Things Journal, pp. 1–1, 2021.
- [6] M. Mehrabi, D. You, V. Latzko, H. Salah, M. Reisslein, and F. H. P. Fitzek, “Device-enhanced mec: Multi-access edge computing (mec) aided by end device computation and caching: A survey,” IEEE Access, vol. 7, pp. 166 079–166 108, 2019.
- [7] S. Yu, B. Dab, Z. Movahedi, R. Langar, and L. Wang, “A socially-aware hybrid computation offloading framework for multi-access edge computing,” IEEE Transactions on Mobile Computing, vol. 19, no. 6, pp. 1247–1259, 2020.
- [8] D. Wang, Y. Lan, T. Zhao, Z. Yin, and X. Wang, “On the design of computation offloading in cache-aided d2d multicast networks,” IEEE Access, vol. 6, pp. 63 426–63 441, 2018.
- [9] R. Karasik, O. Simeone, and S. Shamai Shitz, “How much can d2d communication reduce content delivery latency in fog networks with edge caching?” IEEE Transactions on Communications, vol. 68, no. 4, pp. 2308–2323, 2020.
- [10] M. S. Al-Abiad and M. J. Hossain, “A low-complexity multicast scheduling for d2d-aided f-rans using network coding,” IEEE Wireless Communications Letters, vol. 10, no. 11, pp. 2484–2488, 2021.
- [11] F. Jiang, L. Zhang, C. Sun, and Z. Yuan, “Clustering and resource allocation strategy for d2d multicast networks with machine learning approaches,” China Communications, vol. 18, no. 1, pp. 196–211, 2021.
- [12] L. Yang, D. Wu, S. Xu, G. Zhang, and Y. Cai, “Social-energy-aware user clustering for content sharing based on d2d multicast communications,” IEEE Access, vol. 6, pp. 36 092–36 104, 2018.
- [13] L. Yang, D. Wu, Y. Cai, X. Shi, and Y. Wu, “Learning-based user clustering and link allocation for content recommendation based on d2d multicast communications,” IEEE Transactions on Multimedia, vol. 22, no. 8, pp. 2111–2125, 2020.
- [14] A. Bhardwaj and S. Agnihotri, “Energy- and spectral-efficiency trade-off for d2d-multicasts in underlay cellular networks,” IEEE Wireless Communications Letters, vol. 7, no. 4, pp. 546–549, 2018.
- [15] H. Meshgi, D. Zhao, and R. Zheng, “Optimal resource allocation in multicast device-to-device communications underlaying lte networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 8357–8371, 2017.
- [16] J. Yue, C. Ma, H. Yu, and W. Zhou, “Secrecy-based access control for device-to-device communication underlaying cellular networks,” IEEE Communications Letters, vol. 17, no. 11, pp. 2068–2071, 2013.
- [17] R. Zhang, X. Cheng, and L. Yang, “Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5651–5663, 2016.
- [18] M. Ahmed, H. Shi, X. Chen, Y. Li, M. Waqas, and D. Jin, “Socially aware secrecy-ensured resource allocation in d2d underlay communication: An overlapping coalitional game scheme,” IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 4118–4133, 2018.
- [19] J. Wang, Q. Tang, C. Yang, R. Schober, and J. Li, “Security enhancement via device-to-device communication in cellular networks,” IEEE Signal Processing Letters, vol. 23, no. 11, pp. 1622–1626, 2016.
- [20] J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, “Resource management for device-to-device communication: A physical layer security perspective,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946–960, 2018.
- [21] Y. Zhang, Y. Shen, X. Jiang, and S. Kasahara, “Mode selection and spectrum partition for d2d inband communications: A physical layer security perspective,” IEEE Transactions on Communications, vol. 67, no. 1, pp. 623–638, 2019.
- [22] P. Chen, X. Zhou, J. Zhao, F. Shen, and S. Sun, “Energy-efficient resource allocation for secure d2d communications underlaying uav-enabled networks,” IEEE Transactions on Vehicular Technology, pp. 1–1, 2022.
- [23] M. Alibeigi, A. Taherpour, and S. Gazor, “Improving secrecy rate and social welfare by noma technique in d2d communications network,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 2, pp. 907–916, 2022.
- [24] S. Yan, Y. Shang, and Y. Huang, “Social-aware jamming allocation for physical-layer security in d2d multicast network,” in 2018 IEEE Conference on Communications and Network Security (CNS), 2018, pp. 1–7.
- [25] A. Qu, X. Zhang, K. An, G. Zheng, and S. Chatzinotas, “Secure transmission in massive mimo system with specular component-based beamforming and artificial noise over ricean fading channel,” IEEE Wireless Communications Letters, vol. 10, no. 11, pp. 2479–2483, 2021.
- [26] A. Mukherjee, B. Ottersten, and L.-N. Tran, “On the secrecy capacity of mimo wiretap channels: Convex reformulation and efficient numerical methods,” IEEE Transactions on Communications, vol. 69, no. 10, pp. 6865–6878, 2021.
- [27] Q. Shi, W. Xu, J. Wu, E. Song, and Y. Wang, “Secure beamforming for mimo broadcasting with wireless information and power transfer,” IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp. 2841–2853, 2015.
- [28] D. M, “Virtual antenna arrays,” Ph.D. dissertation, King’s College London (University of London), 2003.
- [29] S. J. Shattil, “Cooperative beam-forming in wireless networks,” 2014.
- [30] G. Jakllari, S. V. Krishnamurthy, M. Faloutsos, P. V. Krishnamurthy, and O. Ercetin, “A cross-layer framework for exploiting virtual miso links in mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 579–594, 2007.
- [31] H. Jung and I.-H. Lee, “Secrecy rate of analog collaborative beamforming with virtual antenna array following spatial random distributions,” IEEE Wireless Communications Letters, vol. 7, no. 4, pp. 626–629, 2018.
- [32] H. Jung, S.-W. Ko, and I.-H. Lee, “Secure transmission using linearly distributed virtual antenna array with element position perturbations,” IEEE Transactions on Vehicular Technology, vol. 70, no. 1, pp. 474–489, 2021.
- [33] H. Ding, C. Xing, S. Ma, G. Yang, and Z. Fei, “Transmission capacity of clustered ad hoc networks with virtual antenna array,” IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 6926–6939, 2016.
- [34] C. Buratti and A. Zanella, “Capacity analysis of two-hop virtual mimo systems in a poisson field of nodes,” in VTC Spring 2009 - IEEE 69th Vehicular Technology Conference, 2009, pp. 1–6.
- [35] H.-C. Lu and W. Liao, “Cooperative strategies in wireless relay networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 323–330, 2012.
- [36] S.-C. Wang and W. Liao, “Cooperative multicasting for wireless scalable video transmissions,” IEEE Transactions on Communications, vol. 61, no. 9, pp. 3980–3989, 2013.
- [37] L. Lei, Z. Zhong, C. Lin, and X. Shen, “Operator controlled device-to-device communications in lte-advanced networks,” IEEE Wireless Communications, vol. 19, no. 3, pp. 96–104, 2012.
- [38] Brandwood and H. D., “A complex gradient operator and its application in adaptive array theory,” Microwaves, Optics and Antennas, IEE Proceedings H, 1983.
- [39] C. Kai, H. Li, L. Xu, Y. Li, and T. Jiang, “Joint subcarrier assignment with power allocation for sum rate maximization of d2d communications in wireless cellular networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 5, pp. 4748–4759, 2019.
- [40] Q. Li and W.-K. Ma, “Spatially selective artificial-noise aided transmit optimization for miso multi-eves secrecy rate maximization,” IEEE Transactions on Signal Processing, vol. 61, no. 10, pp. 2704–2717, 2013.
- [41] Z.-q. Luo, W.-k. Ma, A. M.-c. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20–34, 2010.