This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Secure Transmission Design for Virtual Antenna Array-aided Device-to-device Multicast Communications

Xinyue Hu, Yibo Yi, Kun Li, Hongwei Zhang and Caihong Kai This work was supported by the National Natural Science Foundation of China under Grant 61971176.(Corresponding author: Caihong Kai.)Xinyue Hu, Yibo Yi and Caihong Kai are with School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China (e-mail: {\rm{\rm{\{}}huxinyue, yiyibo2018}{\rm{\}}}@mail.hfut.edu.cn; {\rm{\rm{\{}}chkai}{\rm{\}}}@hfut.edu.cn.). Xinyue Hu is also with School of Electronic and Information Engineering, Anhui University, Hefei, China (e-mail: [email protected].) Kun Li and Hongwei Zhang are with School of Electronic and Information Engineering, Anhui University, Hefei, China (e-mail: {\rm{\rm{\{}}lik, hwzhang}{\rm{\}}}@ahu.edu.cn.).
Abstract

This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device-to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and cooperatively multicast the content to UEs who desire it. Specifically, with the target of securing the VAA-aided D2DM communication under the threat of multiple eavesdroppers, we propose a secure beamforming scheme by jointly considering the formed VAA and the Base Station (BS). For obtaining the optimal beamforing vectors, a nonsmooth and nonconvex Weight Sum Rate Maximization Problem (WRMP) is formulated and solved using Successive Convex Approximation (SCA) approach. Furthermore, we consider the worst case that eavesdroppers cooperatively form a eavesdrop VAA to enhance the overhearing capacity. In this case, we modify the securing beamforming scheme, formulate the corresponding WRMP and solve it using a two-level optimization. Simulation results validate the improvements of the VAA-aided D2DM scheme in terms of communication security compared with conventional D2DM schemes.

Index Terms:
Physical-layer security, virtual antenna array, D2D multicast communication, beamforming.

I Introduction

Device-to-Device Multicast (D2DM) communication which developed from Device-to-Device (D2D) unicast [1] communication has been regarded as one of the key technologies to improve the data rate and alleviate the workload of cellular networks [2, 3]. By allowing one transmitted information bearing signal to be received and decoded by multiple receivers, D2DM could achieve the large-scale parallel implementation of local contents sharing in high-density environments, thus can support massive connectivity and also reduce the redundancy transmission of the Base Station (BS), signaling overhead, and bandwidth waste. Due to the high spectrum utilization and transmission efficiency, D2DM is not only suitable for the data-rate-hungry mobile applications such as online conference, video streaming, mobile computing, and virtual reality, but also considered as a key enabling technique for various future cellular network services such as mobile edge computing (MEC)[4, 5, 6, 7, 8] and fog-radio access network (F-RAN) [9, 10].

Although D2DM has a wide range of applications and there have been many literatures on how to improve its network delivery efficiency[11, 12, 13, 3, 14, 15], on the other hand, as in other wireless communication systems, communication security is an important indicator to evaluate the performance of a D2DM system. Physical Layer Security (PLS), which is an essential strategy to protect the information by fully utilizing the basic characteristics of the wireless channel and noise, has been regarded as a highly promising security approach for wireless communications. Compared with the cryptography in the higher layer, PLS is independent of the computational complexity and thus more suitable for computation resource limited networks such as D2D communications. Motivated by this, many research efforts have been devoted to secure D2D communication from the physical layer security perspective [16, 17, 18, 19, 20, 21, 22, 23]. Ref. [16] attempted to increase the D2D link’s capacity while guaranteeing the security rate by controlling the transmit power of D2D pairs. Refs. [17, 18] considered that multiple D2D pairs can access the same resource block and one D2D pair is also permitted to access multiple RBs. In [19], aimed to secure CUE’s communication and increase energy efficiency of D2D communication, the condition whether D2D link could reuse a CUE’s RB was derived. Ref. [20] investigated both single-channel and multi-channel D2D communications. For providing security to CUEs and improving the spectral efficiency of the D2D links simultaneously, the authors jointly optimized the power allocation and channel assignment of the D2D links and CUEs. In [21], the model selection of a D2D link under the physical-layer security perspective was investigated. The PLS in UAV-enabled D2D communications was investigated in [22] where a UAV plays the role of flying BS. In [23], authors shown that the Non-Orthogonal Multiple Access (NOMA) technique could also be used to secure D2D communications. Note that, the above literatures are mainly focused on the D2D unicast scenarios. To the best of our knowledge, the PLS schemes in D2DM are rare [24]. No matter whether the design target is to increase network capacity or to provide PLS, the main difference between D2D unicast and D2DM is that the data rate in D2DM is limited by the worst Signal to Interference Plus Noise Ratio (SINR) UE and hence leading to a max-min optimization problem which is hard to deal with.

However, the above secure schemes in D2D communication are mainly based on cooperative jamming, in which the cellular communication signals and other D2D communication signals are utilized to interfere eavesdroppers for securing intended D2D communications, or vice versa. Constrained by the limited physical size, UEs usually have only one antenna or multiple antennas that are less distant than the coherent distance. Hence, the multiple-antenna based beamforming technologies for providing PLS [25, 26, 27] are not suitable for D2D communications. Thus, how to secure D2D communications is still an open issue and this paper makes attempt to deal with it by introducing the following Virtual Antenna Array (VAA) technique.

Recently, a novel implementation of Multiple-Input-Multiple-Output (MIMO) wireless system called VAA [28, 29, 30] was proposed as a promising approach to further increase the PLS performance and network delivery efficiency of the above D2DM scenario. The VAA system is realized by permitting adjacent single antenna mobile terminals to cooperate among each other and thus form the so called virtual antenna array. In the VAA system, as a virtual transmitter, the elements in VAA could perform cooperative beamforming to transmit information to receivers, while as a virtual receiver, the elements in VAA could exchange the received signals via some short-range communication techniques such as blue tooth and then perform some multiple-antenna receive techniques like maximum ratio combination to increase SINR. It is important to note that, compared with the Single-Input-Single-Output (SISO) channel, the spatial diversity of VAA together with cooperative beamforming can significantly improve the quality of the transmitted signal and then enhance the PLS performance[31, 32] and channel capacity [30, 33, 34, 35, 36].

In this papar, we propose a VAA-aided D2DM (VD2DM) scheme for securing D2DM communication. In the VD2DM, UEs who cache the common contents cooperatively form a VAA system and each UE could be treated as one of the antennas in the VAA. By multiplying the signals each UE sends itself by a beamforming coefficient (i.e., the corresponding element in the beamforming vector), VAA could jointly conduct cooperative beamforming to multicast the common contents to receivers while prevent eavesdroppers from overhearing. Further, unlike the traditional D2D communications which only allow one UE as the transmitter, the VD2DM could take full use of the same the common contents cached on different UEs. The main contributions of this paper are summarized as follows:

  • 1)

    We propose a novel secure VD2DM transmission scheme, which integrates the VAA into the D2DM underlying cellular network. In the proposed scheme, all UEs are equipped with one antenna, and the BS is equipped with multiple antennas. A group of UEs (i.e., D2D receivers) needs a common confidential information data and in the D2D transmitter group, each UE (i.e., D2D transmitters) has cached the common confidential information desired by the D2D receivers. Under the coordination of the BS, D2D transmitters form a VAA, where each UE multiplies the signals by a complex beamforming coefficient111Amplitude control can be accomplished by power control and phase control can be accomplished by delay.to perform cooperative beamforming for multicasting the confidential information to D2D receivers. Meanwhile, a group of baleful UEs (i.e., eavesdroppers) desire to overhear the information delivered by the VAA. Since the VAA transmission reuses the downlink subcarrier resources of a CUE and hence the downlink signal transmitted by the BS could be treated as a cooperative jamming to secure VD2DM. To further limit the overhearing capacity of eavesdroppers, the BS splits a part of power to transmit an Artificial Noise (AN) to block eavesdroppers.

  • 2)

    We explore the difference between the VD2DM and the traditional D2D unicast, and then formulate the weighted sum rate maximization problem (WRMP) to increase the achievable rate of CUE and the achievable secrecy rate of VD2DM simultaneously by jointly optimizing the transmit beamforming of the BS, the cooperative beamforming vector of the VAA and the covariance matrix of AN. The formulated problem is non-convex and non-smooth since both max-min and min-max problem are included, i.e., the achievable performance of the multicast group is generally limited by the receiver with the lowest SINR and the secrecy performance is limited by the eavesdropper with the highest SINR. We then introduce a series of auxiliary variables to transfer the non-convex objective function and constraints into a series of convex objective function and constraints. As last, an effective iteration algorithm is designed to solve it.

  • 3)

    Moving beyond that, we investigate an extreme case (i.e., the worst case) in which the eavesdroppers also form a VAA and gang up together to jointly overhearing the communication of VD2DM. In our analysis, we treat eavesdroppers as one equivalent one multi-antenna eavesdropper called Eve. In this case, with the help of semidefinite relaxation and slack operation, we can decompose the WRMP into a two-level optimization problem, in which the outer level is a single-variable optimization, and the inner level is a non-convex problem, which can be recast to a SemiDefinite Problem (SDP) based on Arithmetic Geometry Mean (AGM) inequality.

The remainder of the paper is organized as follows. Section II introduces our considered system model. Section III gives our formulated WRMP problem and the detailed solution to the formulated problem. Section IV extends the considered scenario to the worst case and gives the corresponding solution. Simulation results are shown in Section V and finally Section VI concludes the paper.

NotationsNotations: \mathbb{C} and \mathbb{R} denote the sets of complex and real numbers, respectively; Rank()\rm Rank(\bullet), Tr()\rm Tr(\bullet), []1{\left[{\bullet}\right]^{-1}}, []T{\left[{\bullet}\right]^{T}}, and []H{\left[{\bullet}\right]^{H}} denote the rank, trace, inverse, transpose, and conjugate-transpose operations, respectively; 2{\left\|\bullet\right\|_{2}} and [,]+{\left[{\bullet,\bullet}\right]^{+}} denote the Frobenius norm and the maximum value of its argument, respectively. Except for 𝐞\bf e, bold symbols in capital letter and small letter denote matrices and vectors, respectively and 𝐞\bf e is the natural constant. 𝐀𝟎\bf{A}\succeq\bf{0} means 𝐀\bf{A} is positive semidefinite matrix. 𝐚[n]{\bf{a}}[n] and 𝐀[n]{\bf{A}}[n] are the nthn^{th} element of the vector 𝐚{\bf{a}} and the nthn^{th} element of the diagonal entry of the matrix 𝐀{\bf{A}}, respectively. log()\log(\bullet) denotes the natural logarithm of its argument; 𝒞𝒩(a,b){{\cal C}{\cal N}}\left({a,b}\right) denotes the complex Gaussian distribution with mean aa and variance bb; 𝐈L{{\bf{I}}_{L}} is an L×LL\times L identity matrix.

II System Model and Preliminary

Refer to caption
Figure 1: System scenario of the considered VD2DM, in which exists MM D2D transmitters, NN D2D receivers and LL eavesdroppers.

Consider a VD2DM communication scenario which underlays over the downlink spectrum of a cellular communication network as shown in Fig. 1. A group of D2D receivers want to obtain identical confidential information, and a group of UEs who pre-cache the identical confidential information will form the transmit VAA (i.e., the D2D transmitter group) to multicast the information under the coordination of the BS. A CUE shares its downlink resource (e.g., subcarriers in OFDMA system) for the D2D link to reuse. Also, in the system, a group of baleful UEs (i.e., eavesdroppers group) try to overhear the communication between D2D transceivers222For example, in commercial corporation or research institution, colleagues could share the internal information via VD2DM in a timely and convenient manner, meanwhile the VD2DM may be under the risk of eavesdrop attack from other UEs in the cellular system., thus the physical layer security is taken into consideration. Except for the BS, all nodes are equipped with one antenna, and the BS has KK antennas for its downlink transmission.

Let =Δ{1,2,,M}{{\cal M}}\buildrel\Delta\over{=}{\rm{\{1,2,}}\ldots{\rm{,}}M{\rm{\}}} denote the set of D2D transmitters, 𝒩=Δ{1,2,,N}{{\cal N}}\buildrel\Delta\over{=}{\rm{\{1,2,}}\ldots{\rm{,}}N{\rm{\}}} denote the set of D2D receivers and =Δ{1,2,,L}{{\cal L}}\buildrel\Delta\over{=}{\rm{\{1,2,}}\ldots{\rm{,}}L{\rm{\}}} denote the set of eavesdroppers. Define 𝐡D,n{\bf{h}}_{D,n} as the channel vector between D2D transmitters and D2D receiver nn, 𝐡l{\bf{h}}_{l} as the channel vector between D2D transmitters and eavesdropper ll, 𝐡C{{\bf{h}}_{C}} as the channel vector between D2D transmitters and the CUE, 𝐡B,n{{\bf{h}}_{B,n}} as the channel vector between BS and D2D receiver nn, 𝐡B,l{{\bf{h}}_{B,l}} as the channel vector between BS and eavesdropper ll, and 𝐡BC{{\bf{h}}_{BC}} as the channel vector between BS and CUE, respectively. The Rayleigh block-fading channel model is assumed in this paper. Note that, the cellular network is considered as a kind of centralized network architecture and the eavesdroppers are also be considered as the registered active user in the cellular network, hence the BS can collect the channel state information (CSI) of all links in the network333In LTE system, the BS and D2D transmitters could perform channel quality indication estimation from the received sounding reference signal transmitted by eavesdroppers then obtain 𝐡𝐂\bf{h}_{C} and 𝐡𝐥\bf{h}_{l}, respectively. Further, D2D transmitters could report periodic or aperiodic report 𝐡𝐥\bf{h}_{l} to the BS from the physical uplink control channel. Interested readers can read [37] for the details. [1]. Also, since the channels are quasi-static over each time block, the BS could precalculate the the optimal beamforming vectors at the beginning of each time block, then forwards the beamforming vector of the VAA to each D2D transmitters via physical downlink control channel.

We first consider the scenario in which each eavesdropper overhears the confidential information independently, and there has no extra information exchanges between eavesdroppers. The transmitted signal of the BS is

𝐱B=𝐰BsB+𝐧B,{{\bf{x}}_{B}}={{\bf{w}}_{B}}{s_{B}}+{{\bf{n}}_{B}}, (1)

in which sB𝒞𝒩(0,1){s_{B}}\sim{{\cal C}{\cal N}}\left({0,1}\right) is the desired signal of CUE with beamforming vector 𝐰B{{\bf{w}}_{B}}, 𝐧B𝒞𝒩(𝟎,𝐐){{\bf{n}}_{B}}\sim{{\cal C}{\cal N}}\left({{\bf{0}},{\bf{Q}}}\right) is the AN vector to interfere eavesdroppers from overhearing with covariance matrix 𝐐K×K{\bf{Q}}\in\mathbb{C}{{}^{K\times K}}. The D2D transmitters form a VAA and employ the cooperative beamforming strategy to multicast the confidential information sD𝒞𝒩(0,1){s_{D}}\sim{{\cal C}{\cal N}}\left({0,1}\right). Specifically, the mthm^{th} D2D transmitter multiplies the identical confidential information bearing signal sDs_{D} with a complex weight wm{w_{m}}. Denote the cooperative beamforming vector by 𝐰=Δ[w1,w2,,wM]T{\bf{w}}\buildrel\Delta\over{=}{[{w_{1}},{w_{2}},\ldots,{w_{M}}]^{T}}, then the received signals of D2D receiver nn, eavesdropper ll and CUE can be respectively expressed as

yn=𝐡D,nH𝐰sD+𝐡B,nH𝐰BsB+𝐡B,nH𝐧B+nn,n𝒩,y_{n}={\bf{h}}_{D,n}^{H}{\bf{w}}{s_{D}}+{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}{s_{B}}{\rm{+}}{\bf{h}}_{B,n}^{H}{{\bf{n}}_{B}}+{n_{n}},n\in{{\cal N}}, (2)
yl=𝐡lH𝐰sD+𝐡B,lH𝐰BsB+𝐡B,lH𝐧B+nl,l,{y_{l}}={\bf{h}}_{l}^{H}{{\bf{w}}}{s_{D}}+{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}{s_{B}}+{\bf{h}}_{B,l}^{H}{{\bf{n}}_{B}}+{n_{l}},l\in{{\cal L}}, (3)

and

yC=𝐡BCH𝐰BsB+𝐡CH𝐰sD+𝐡BCH𝐧B+nC,y_{\rm{C}}={\bf{h}}_{BC}^{H}{\bf{w}}_{B}{s_{B}}+{\bf{h}}_{C}^{H}{\bf{w}}{s_{D}}{\rm{+}}{\bf{h}}_{BC}^{H}{{\bf{n}}_{B}}+{n_{C}}, (4)

where ni𝒞𝒩(0,1),i{𝒩,,C}{n_{i}}\sim{{\cal C}{\cal N}}\left({0,1}\right),i\in\left\{{{{\cal N}},{{\cal L}},C}\right\} is the Additive White Gaussian Noise (AWGN).

From (2), (3) and (4), the channel capacities of D2D receiver nn, the eavesdropper ll to overhearing sDs_{D}, the eavesdropper ll to decoding sBs_{B} and the CUE are respectively

Cn=log(1+|𝐡D,nH𝐰|2|𝐡B,nH𝐰B|2+Tr(𝐇B,n𝐐)+1),{C_{n}}{\rm{=}}\log\left({1+\frac{{{{\left|{{\bf{h}}_{D,n}^{H}{\bf{w}}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,n}}{\bf{Q}}}\right)+1}}}\right), (5)
Cl=log(1+|𝐡lH𝐰|2|𝐡B,lH𝐰B|2+Tr(𝐇B,l𝐐)+1),{C_{l}}{\rm{=}}\log\left({1+\frac{{{{\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)+1}}}\right), (6)
Cl=log(1+|𝐡B,lH𝐰B|2|𝐡lH𝐰|2+Tr(𝐇B,l𝐐)+1),{C^{\prime}_{l}}{\rm{=}}\log\left({1+\frac{{{{\left|{{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)+1}}}\right), (7)

and

CC=log(1+|𝐡BCH𝐰B|2|𝐡CH𝐰|2+Tr(𝐇BC𝐐)+1),{C_{C}}{\rm{=}}\log\left({1+\frac{{{{\left|{{\bf{h}}_{BC}^{H}{\bf{w}}_{B}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{C}^{H}{\bf{w}}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{BC}}{\bf{Q}}}\right)+1}}}\right), (8)

in which where 𝐇B,n=Δ𝐡B,n𝐡B,nH{{\bf{H}}_{B,n}}\buildrel\Delta\over{=}{\bf{h}}_{B,n}{\bf{h}}_{B,n}^{H}, 𝐇B,l=Δ𝐡B,l𝐡B,lH{{\bf{H}}_{B,l}}\buildrel\Delta\over{=}{\bf{h}}_{B,l}{\bf{h}}_{B,l}^{H} and 𝐇BC=Δ𝐡BC𝐡BCH{{\bf{H}}_{BC}}\buildrel\Delta\over{=}{\bf{h}}_{BC}{\bf{h}}_{BC}^{H}

Let RS{R_{S}} be the achievable secrecy rate of the D2D multicast communication and RC{R_{C}} be the achievable rate of the CUE. Then an achievable rate region is given as the set of nonnegative rate pairs (RS,RC)\left({{R_{S}},{R_{C}}}\right) satisfying

RSminn𝒩CnmaxlCl,{R_{S}}\leq\mathop{\min}\limits_{n\in{{\cal N}}}{C_{n}}-\mathop{\max}\limits_{l\in{{\cal L}}}{C_{l}}, (9)
RCCC,{R_{C}}\leq{C_{C}}, (10)

and

Cl<RC,{C^{\prime}_{l}}<{R_{C}}, (11)

in which minn𝒩Cn\mathop{\min}\limits_{n\in{{\cal N}}}{C_{n}} means the achievable rate of D2D multicast is determined by the receiver who has the minimum channel capacity. Also, maxlCl\mathop{\max}\limits_{l\in{{\cal L}}}{C_{l}} means the eavesdropping rate is determind by the eavesdropper who has the maximum channel capacity, since the confidential information cannot be overheard by any eavesdropper. Cl<RC{C^{\prime}_{l}}<{R_{C}} guarantees that the eavesdroppers could not perform non-orthogonal multiple access (NOMA) to decode and eliminate the sBs_{B} first, hence the sBs_{B} could jointly interfere with the eavesdroppers.

As can be seen in (5), (6), (7) and (8), the beamforming vector 𝐰B{{\bf{w}}_{B}}, cooperative beamforming vector 𝐰{\bf{w}} and the covariance matrix of AN, 𝐐\bf{Q} directly determine the achievable data rates, thus our work focuses on the design of 𝐰B{{\bf{w}}_{B}}, 𝐰{\bf{w}} and 𝐐\bf{Q}, under an achievable rate region maximization (RRM) formulation with power constraint. The formulated RRM is a vector maximization problem, i.e. (12), in which χ\chi is an arbitrarily number greater than zero. In (12), PmaxP_{max} and PBP_{B} are the total power budgets of the VAA and the BS, respectively, the constraints C1 and C2 are the maximal power constraint of each D2D transmitter and the BS, C3, C4 and C5 are corresponding to (9), (10) and (11), respectively. The RRM problem in (12) is a non-convex vector optimization and thus difficult to solve. In the next section, we elaborate our approaches to tackle (12).

(P1)max𝐰𝐁,𝐰,𝐐𝟎,RS,RC(w.r.t.+2)([RS,0]+,[RC,0]+)s.t.C1:𝐰[m]22Pmax/M,mC2:𝐰B22PBC3:minn𝒩log(1+|𝐡D,nH𝐰|2|𝐡B,nH𝐰B|2+Tr(𝐇B,n𝐐)+1)maxllog(1+|𝐡lH𝐰|2|𝐡B,lH𝐰B|2+Tr(𝐇B,l𝐐)+1)RSC4:log(1+|𝐡BCH𝐰B|2|𝐡CH𝐰|2+Tr(𝐇BC𝐐)+1)RC0C5:RClog(1+|𝐡B,lH𝐰B|2|𝐡lH𝐰|2+Tr(𝐇B,l𝐐)+1)+χ,l.\begin{split}({\rm{P1}})&\mathop{\max}\limits_{{{\bf{w}}_{\bf{B}}},{\bf{w}},{\bf{Q}}\succeq{\bf{0}},{R_{S}},{R_{C}}}\left({{\rm{w}}{\rm{.r}}{\rm{.t}}{\rm{.\mathbb{R}}}_{+}^{2}}\right){\rm{}}\left({{\left[{{R_{S}},0}\right]^{+}},{\left[{{R_{C}},0}\right]^{+}}}\right)\\ {\rm{s}}{\rm{.t.}}&{\rm{C1:}}\left\|{{\bf{w}}[m]}\right\|_{2}^{2}\leq{P_{\max}}/M,m\in{{\cal M}}\\ &{\rm{C}}2:{\rm{}}\left\|{{{\bf{w}}_{B}}}\right\|_{2}^{2}\leq{P_{B}}\\ &{\rm{C3:}}\mathop{\min}\limits_{n\in{{\cal N}}}\log\left({1\!+\!\frac{{{{\left|{{\bf{h}}_{D,n}^{H}{\bf{w}}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}}\right|}^{2}}\!+\!{\rm{Tr}}\left({{{\bf{H}}_{B,n}}{\bf{Q}}}\right)\!+\!1}}}\right)\\ &{\;\;\;\;\;\;}-\mathop{\max}\limits_{l\in{{\cal L}}}\log\left({1\!+\!\frac{{{{\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}}\right|}^{2}}\!+\!{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)\!+\!1}}}\right)\geq{R_{S}}\\ &{\rm{C4:}}\log\left({1+\frac{{{{\left|{{\bf{h}}_{BC}^{H}{\bf{w}}_{B}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{C}^{H}{\bf{w}}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{BC}}{\bf{Q}}}\right)+1}}}\right)-{R_{C}}\geq 0\\ &{\rm{C5:}}{R_{C}}\geq\log\left({1+\frac{{{{\left|{{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)+1}}}\right)+\chi,l\in{{\cal L}}.\end{split} (12)

III A Tractable Approach to Tackle the RRM Problem (WRMP)

A common approach for dealing with the vector optimization problem (12) is referred to as scalarization, whose basic idea is to transform the vector optimization into the weighted sum maximization optimization. In the rest of this section, we transform the RRM into a WRMP and then deal with it.

III-A Weighted Rate Maximization Problem

The target of WRMP is to maximize the total rate including the secrecy rate of D2D multicast communication and the rate of CUE under the total power constraints of both the D2D transmitters and the BS.

From (5), (6), (7) and (8) we can see that, the transmitted signal vector from the D2D transmitter group, i.e., the VAA, 𝐰sD{\bf{w}}{s_{D}}, not only could be overheard by eavesdroppers, but also interferes the CUE. Thus, the cooperative beamforming vector 𝐰{\bf{w}} should be carefully designed for securing the D2D multicast communication while limiting the interference to the CUE. On the other hand, the transmitted signal vector from the BS, 𝐰BsB{{\bf{w}}_{B}}{s_{B}}, could be treated as a cooperative jamming signal to interfere eavesdroppers from overhearing the D2D multicast communication. Thus we need to design the beamforming vector 𝐰B{{\bf{w}}_{B}} to increase the channel capacity of the CUE whereas decrease the channel capacities of eavesdroppers. Moreover the covariance matrix of the AN, 𝐐\bf{Q} also should be jointly designed to secure the communication while does not cause too much interference to other nodes.

Since our aim is to maximize the total rate of the system, we then rewrite (12) into the following WRMP:

max𝐰,𝐰B,𝐐𝟎,RS,RCαRS+(1α)RCs.t.C1,C2,C3,C4,C5.\begin{split}{\rm{}}&\mathop{\max}\limits_{{\bf{w}},{{\bf{w}}_{B}},{\bf{Q}}\succeq{\bf{0}},{R_{S}},{R_{C}}}\alpha{R_{S}}{\rm{+}}\left({1-\alpha}\right){R_{C}}\\ &{\rm{s}}{\rm{.t}}{\rm{.C1,C2,C3,C4,C5}}{\rm{.}}\end{split} (13)

In (13), α[0,1]\alpha\in\left[{0,1}\right] is the weighted coefficient, i.e., the larger α\alpha corresponds to that we tend to maximize the secrecy rate, vice versa.

III-B Solving (13)

In the formulated WRMP, (13), although the constraints C1, C2 and the objective function are convex, the constraint C3 includes max-min and min-max structure simultaneously, which is non-convex and non-smoothness. To solve it, we next introduce a series of slack variables to transform it into convex expressions.

First, we introduce two auxiliary variables φ\varphi and β\beta to transform the originally constraint C3 into a smooth form. Specifically, let RS=[φβ,0]+{R_{S}}={\left[{\varphi-\beta,0}\right]^{+}} 444The [,]+{\left[{\bullet,\bullet}\right]^{+}} operator ensures that RS{R_{S}} is not less than zero, however for guaranteing that the objective function of (11) is linear, the [,]+{\left[{\bullet,\bullet}\right]^{+}} operator is omitted and when φβ<0\varphi-\beta<0, RS{R_{S}} is set to zero. , (13) can be equivalently recast as

(P2)max𝐰,𝐰B,𝐐𝟎,φ,β,RCα(φβ)+(1α)RCs.t.C1,C2,C4,C5C6:log(1+|𝐡D,nH𝐰|2|𝐡B,nH𝐰B|2+Tr(𝐇B,n𝐐)+1)φ0,n𝒩C7:βlog(1+|𝐡lH𝐰|2|𝐡B,lH𝐰B|2+Tr(𝐇B,l𝐐)+1)0,l.\begin{split}({\rm{P2}})&\mathop{\max}\limits_{{\bf{w}},{{\bf{w}}_{B}},{\bf{Q}}\succeq{\bf{0}},\varphi,\beta,{R_{C}}}{\rm{}}\alpha\left({\varphi-\beta}\right)+\left({1-\alpha}\right){R_{C}}\\ {\rm{s}}{\rm{.t.}}&{\rm{C1,C2,C4,C5}}\\ &{\rm{C6:}}\log\left({1+\frac{{{{\left|{{\bf{h}}_{D,n}^{H}{\bf{w}}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,n}}{\bf{Q}}}\right)+1}}}\right)-\varphi\geq 0,{\rm{}}\forall n\in{{\cal N}}\\ &{\rm{C7:}}\beta-\log\left({1+\frac{{{{\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}^{2}}}}{{{{\left|{{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}}\right|}^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)+1}}}\right)\geq 0,{\rm{}}\forall l\in{{\cal L}}.\end{split} (14)

In (14), the original non-smooth constraint C3 is decomposed into groups of smooth constraints C6 and C7. However, constraints C6, C7, C4 and C5 are still non-convex and hard to deal with. Next, we respectively process C6, C7, C4 and C5 to transform them into convex constraints.

III-B1 Convex approximation of C6

Let us introduce a group of auxiliary variable {a,b,c,d}\left\{{a,b,c,d}\right\}, then the constraint C6 can be further decomposed into the following constraints:

C8:log(1+a)φ1+a𝐞φC9:b2caC10:db2C11:|𝐡D,nH𝐰|2d,n𝒩C12:c|𝐡B,nH𝐰B|2+Tr(𝐇B,n𝐐)+1,n𝒩.\begin{array}[]{l}{\rm{C}}8:{\rm{log}}\left({1+a}\right)\geq\varphi\Rightarrow 1+a\geq{{\bf{e}}^{\varphi}}\\ {\rm{C}}9:{\rm{}}\frac{{b^{2}}}{{{c}}}\geq a\\ {\rm{C10}}:{\rm{}}{d}\geq b^{2}\\ {\rm{C11:}}{\left|{{\bf{h}}_{D,n}^{H}{\bf{w}}}\right|^{2}}\geq d,\forall n\in{{\cal N}}\\ {\rm{C12:}}{c}\geq{\left|{{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}}\right|^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,n}}{\bf{Q}}}\right)+1,\forall n\in{{\cal N}}.\end{array} (15)

Now, C6 has been decomposed into a series of constraints. However, although C8, C10 and C12 are convex, they are not in the simplest form. Also, C9 and C11 are still non-convex. Let us first check C8, it is an exponential cone constraint and can be solved by existing nonlinear solvers (e.g., SDPT3 in CVX). To further reduce the computational complex, C8 can be approximated in terms of a series of second order conic (SOC) constraints. Let 𝐪=Δ[q1,q2,,qU+4]T{\bf{q}}\buildrel\Delta\over{=}{\left[{{q_{1}},{q_{2}},\ldots,{q_{U+4}}}\right]^{T}} be the introduced slack variables, C8 can be approximatively rewritten as

C8:{1+aqn,U+41+qU+41qU+4,2qU+321+qi1qi,2qi12,i=5,U+3q419/72+q2+q3/241+q31q3,2q121+q21q2,5/3+φ/2U21+q11q1,2+φ/2U12,{\rm{C8^{\prime}:}}\left\{\begin{array}[]{l}1+a\geq{q_{n,U+4}}\\ 1+{q_{U+4}}\geq{\left\|{1-{q_{U+4}},2{q_{U+3}}}\right\|_{2}}\\ 1+{q_{i}}\geq{\left\|{1-{q_{i}},2{q_{i-1}}}\right\|_{2}},i=5,\ldots U+3\\ {q_{4}}\geq 19/72+{q_{2}}+{q_{3}}/24\\ 1+{q_{3}}\geq{\left\|{1-{q_{3}},2{q_{1}}}\right\|_{2}}\\ 1+{q_{2}}\geq{\left\|{1-{q_{2}},5/3+\varphi/{2^{U}}}\right\|_{2}}\\ 1+{q_{1}}\geq{\left\|{1-{q_{1}},2+\varphi/{2^{U-1}}}\right\|_{2}}\end{array}\right.{\rm{}}{\rm{,}}{} (16)

in which U+4U+4 is the number of a series auxiliary variable qq, and the approximate accuracy increases as U+4U+4 increases.

It is easy to see that constraints C10 and C12 can be directly transformed to SOC forms as

C10:d+12[b,d12]T2,n𝒩,{\rm{C10^{\prime}:}}\frac{{{d}+1}}{2}\geq{\left\|{{{\left[{{b},\frac{{d-1}}{2}}\right]}^{T}}}\right\|_{2}}{\rm{,}}\forall n\in{{\cal N}}, (17)

and

C12:cTr(𝐇B,n𝐐)2[|𝐡B,nH𝐰B|,cTr(𝐇B,n𝐐)22]T2,n𝒩,{\rm{C12^{\prime}:}}\frac{{{c-{\rm{Tr}}\left({{{\bf{H}}_{B,n}}{\bf{Q}}}\right)}}}{2}\geq{\left\|{{{\left[{\left|{{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}}\right|,\frac{{c-{\rm{Tr}}\left({{{\bf{H}}_{B,n}}{\bf{Q}}}\right)-2}}{2}}\right]}^{T}}}\right\|_{2}},\forall n\in{{\cal N}}, (18)

respectively. We next deal with C9. Based on the fact that the first-order Taylor expansion of a convex function is its lower bound, we employ the first-order Taylor series expansion of the left hand side of C9 around b0b^{0} and c0c^{0}, i.e.,

b2c2(b0c0)b(b0c0)2c.{\rm{}}\frac{{b^{2}}}{c}\geq 2\left({\frac{{b^{0}}}{{c^{0}}}}\right){b}-{\left({\frac{{b^{0}}}{{c^{0}}}}\right)^{2}}{c}. (19)

Then, C9 can be recast to

C9:2(b0c0)b(b0c0)2ca.{\rm{C}}9^{\prime}:2\left({\frac{{b^{0}}}{{c^{0}}}}\right)b-{\left({\frac{{b^{0}}}{{c^{0}}}}\right)^{2}}{c}\geq a{}. (20)

Note that, in C9{\rm{C}}9^{\prime}, we use the lower bound of the left hand side of C8 to instead itself, thus the feasible region of C9{\rm{C}}9^{\prime} must be the subset of C9.

Let 𝐇D,n=Δ𝐡D,n𝐡D,nH{{\bf{H}}_{D,n}}\buildrel\Delta\over{=}{\bf{h}}_{D,n}{\bf{h}}_{D,n}^{H}, the left hand side of C11 can be written to 𝐰H𝐇D,n𝐰{{\bf{w}}^{H}}{{\bf{H}}_{D,n}}{\bf{w}}, which is a semipositive definite quadratic form in complex domain. Following [38], we define g(𝐰,𝐰H)=𝐰H𝐇D,n𝐰g\left({{\bf{w}},{{\bf{w}}^{H}}}\right)={{\bf{w}}^{H}}{{\bf{H}}_{D,n}}{\bf{w}}, according to eq.(15) in [38], giving a differential of 𝐰{\bf{w}}, δ𝐰\delta{\bf{w}}, we have

δg=(𝐰g)Tδ𝐰+(𝐰g)Tδ𝐰=2Re((𝐰g)Hδ𝐰),\delta g{\rm{=}}{\left({{\nabla_{\bf{w}}}g}\right)^{T}}\delta{\bf{w}}+{\left({{\nabla_{{{\bf{w}}^{*}}}}g}\right)^{T}}\delta{{\bf{w}}^{*}}=2{\mathop{\rm Re}\nolimits}\left({{{\left({{\nabla_{{{\bf{w}}^{*}}}}g}\right)}^{H}}\delta{\bf{w}}}\right), (21)

in which 𝐰g{{\nabla_{\bf{w}}}g} and 𝐰g{{\nabla_{{{\bf{w}}^{*}}}}g} are the generalized complex gradient and the conjugate complex gradient of g(𝐰,𝐰H)g\left({{\bf{w}},{{\bf{w}}^{H}}}\right) defined in [38], respectively.

With the help of two types of gradients, it is easy to calculate that

𝐰g=𝐇D,n𝐰.{\nabla_{{{\bf{w}}^{*}}}}g={{\bf{H}}_{D,n}}{\bf{w}}. (22)

Hence the first-order Taylor series expansion of the left hand side of C11 around 𝐰0{\bf{w}}^{0} is

𝐰0H𝐇D,n𝐰0+2Re(𝐰0H𝐇D,n(𝐰𝐰0))=2Re(𝐰0H𝐇D,n𝐰)𝐰0H𝐇D,n𝐰0,{\bf{w}}^{0H}{{\bf{H}}_{D,n}}{{\bf{w}}^{0}}{\rm{+}}2{\mathop{\rm Re}\nolimits}\left({{\bf{w}}^{0H}{{\bf{H}}_{D,n}}\left({{\bf{w}}-{{\bf{w}}^{0}}}\right)}\right){\rm{=}}2{\mathop{\rm Re}\nolimits}\left({{\bf{w}}^{0H}{{\bf{H}}_{D,n}}{\bf{w}}}\right)-{\bf{w}}^{0H}{{\bf{H}}_{D,n}}{{\bf{w}}^{0}}, (23)

and then C11 can be approximated as

C11:2Re(𝐰0H𝐇D,n𝐰)𝐰0H𝐇D,n𝐰0d,n𝒩.{\rm{C}}11^{\prime}:2{\mathop{\rm Re}\nolimits}\left({{\bf{w}}^{0H}{{\bf{H}}_{D,n}}{\bf{w}}}\right)-{\bf{w}}^{0H}{{\bf{H}}_{D,n}}{{\bf{w}}^{0}}\geq d,\forall n\in{{\cal N}}. (24)

Thus far, the non-convex constraint C6 has been decomposed to a series of convex constraints.

III-B2 Convex approximation of C7

By introducing another group of auxiliary variable {e,f}\left\{{e,f}\right\}, C7 can be decomposed into the following constraints:

C13:βlog(1+e)0C14:e|𝐡lH𝐰|2f,lC15:|𝐡B,lH𝐰B|2+Tr(𝐇B,l𝐐)+1f,l.\begin{array}[]{l}{\rm{C}}13:{\rm{}}\beta-{\rm{log}}\left({1+e}\right)\geq 0\\ {\rm{C}}14:{\rm{}}e\geq\frac{{{{\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}^{2}}}}{f},{\rm{}}\forall l\in{{\cal L}}\\ {\rm{C}}15:{\rm{}}{\left|{{\bf{h}}_{B,l}^{H}{\bf{w}}_{B}}\right|^{2}}+{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)+1\geq{f},{\rm{}}\forall l\in{{\cal L}}.\end{array} (25)

In (25), C13 and C15 are still non-convex and C14 can be rewritten to SOC form directly:

C14:e+f2[ef2,|𝐡lH𝐰|]T2,l.{\rm{C}}14^{\prime}:{\rm{}}\frac{{{e}{\rm{+}}{f}}}{2}\geq{\left\|{{{\left[{\frac{{e-{f}}}{2},\left|{{\bf{h}}_{l}^{H}{\bf{w}}}\right|}\right]}^{T}}}\right\|_{2}},{\rm{}}\forall l\in{{\cal L}}. (26)

By preforming the first-order Taylor series expansion, C13 and C15 can be approximated as

C13:βlog(1+e0)11+e0(ee0)0,{\rm{C}}13^{\prime}:{\rm{}}\beta-{\rm{log}}\left({1+e^{0}}\right)-\frac{1}{{1+e^{0}}}\left({e-e^{0}}\right)\geq 0, (27)

and

C15:2Re(𝐰B0H𝐇B,l𝐰B)𝐰B0H𝐇B,l𝐰B0+Tr(𝐇B,l𝐐)+1f,l,{\rm{C}}15^{\prime}:2{\mathop{\rm Re}\nolimits}\left({{\bf{w}}_{B}^{0H}{{\bf{H}}_{B,l}}{\bf{w}}_{B}}\right)-{\bf{w}}_{B}^{0H}{{\bf{H}}_{B,l}}{\bf{w}}_{B}^{0}{\rm{+}}{\rm{Tr}}\left({{{\bf{H}}_{B,l}}{\bf{Q}}}\right)+1\geq{f},{\rm{}}\forall l\in{{\cal L}}, (28)

respectively. With the series of constrains C13{\rm{C}}13^{\prime}, C14{\rm{C}}14^{\prime}and C15{\rm{C}}15^{\prime}, C7 has been approximated to a convex constraint.

III-B3 Convex approximation of C4 and C5

Note that C4 and C6 have the similar formation, thus with the same approach of C6 above, C4 could be approximated to the following constraints C16, C17, C18, C19 and C20 corresponding to C8{\rm{C}}8^{\prime},C9{\rm{C}}9^{\prime},C10{\rm{C}}10^{\prime},C11{\rm{C}}11^{\prime} and C13{\rm{C}}13^{\prime}, respectively.

Similarly, C5 could be approximated to C21, C22 and C23 with the same approach of C7 above. For briefly, we have omitted the details of constraints C16{\rm{\sim}}C23.

Now, all non-convex constraints have been approximated to convex constraints, the approximated version of WRMP is given by

(P3)max𝐰,𝐰B,𝐐𝟎,RS,RC,φ,β,a,b,c,d,e,f,𝐪α(φβ)+(1α)RCs.t.C1,C2,C8,C9,C10,C11,C12,C13,C14,C15,C16,C17,C18,C19,C20,C21,C22,C23.\begin{array}[]{l}({\rm{P3}})\mathop{\max}\limits_{\scriptstyle{\bf{w}},{{\bf{w}}_{B}},{\bf{Q}}\succeq{\bf{0}},{R_{S}},{R_{C}},\varphi,\beta,a,{b},\hfill\atop\scriptstyle{c},{d},e,{f},{\bf{q}}\hfill}\alpha\left({\varphi-\beta}\right){\rm{+}}\left({1-\alpha}\right){R_{C}}\\ \;\;\;\;\;\;\;\;\;\;\;\;{\rm{s}}{\rm{.t}}{\rm{.C1,C2,C8^{\prime},C9^{\prime},C10^{\prime},C11^{\prime},C12^{\prime},}}\\ {\rm{C13^{\prime},C14^{\prime},C15^{\prime},C16,C17,C18,C19,C20,C21,C22,C23}}{\rm{.}}\end{array} (29)

Note that, for briefly, the auxiliary variables for approximating C4 and C5 are omitted in P3{\rm{P3}}. It easy to see that P3{\rm{P3}} is a convex problem, which can be efficiently solved by using interior point methods, or standard convex optimization tool, e.g., CVX. The detailed procedure is summarized in Algorithm 1.

Algorithm 1 Solving the WRMP in (13).
1:  Initialization: \bullet Setting the initial values b0b^{0}, c0c^{0}, e0e^{0}, 𝐰0{\bf{w}}^{0} and 𝐰B0{\bf{w}}_{B}^{0}. \bullet Setting maximum number of iterations JmaxJ^{\max}, iteration counter j=1j=1 and iteration termination accuracy ψ>0\psi>0.
2:  Repeat
3:  Solving the WRMP{\rm{WRMP^{\prime}}} with current b0b^{0}, c0c^{0}, e0e^{0}, 𝐰0{\bf{w}}^{0}, 𝐰B0{\bf{w}}_{B}^{0} and obtaining the optimal bb^{*}, cc^{*}, ee^{*}, 𝐰{\bf{w}}^{*}, 𝐰B{\bf{w}}_{B}^{*}.
4:  if 𝐰𝐰02+𝐰B𝐰B02ψ{\left\|{{\bf{w}}^{\rm{*}}-{\bf{w}}^{0}}\right\|_{2}}+{\left\|{{\bf{w}}_{B}^{\rm{*}}-{\bf{w}}_{B}^{0}}\right\|_{2}}\leq\psithen
5:     The optimal solutions of WRMP{\rm{WRMP^{\prime}}} are 𝐰{\bf{w}}^{*} and 𝐰B{\bf{w}}_{B}^{*}.
6:     Break
7:  else
8:     Setting b0=bb^{0}=b^{\rm{*}}, c0=cc^{0}=c^{\rm{*}}, e0=ee^{0}=e^{\rm{*}}, 𝐰0=𝐰{\bf{w}}^{0}={\bf{w}}^{*} and 𝐰B0=𝐰B{\bf{w}}_{B}^{0}={\bf{w}}_{B}^{*}.
9:  end if
10:  j=j+1j=j+1
11:  Until j>Jmaxj>J^{\max}

Complexity and convergence: The complexity of interior point method for solving a convex optimization problem (i.e., line 3 in Algorithm 1) is O(σ0.5(σ+ς)ς2)O\left({{\sigma^{0.5}}(\sigma+\varsigma){\varsigma^{2}}}\right)[39], in which σ=2U+N+4L+19\sigma{\rm{=}}{2U+N+4L+19} is the number of inequality constraints and ς=2K+4M+2U\varsigma=2K+4M+2U+24+24 is the number of optimization variables. Combining with the fact that the iterative number of Algorithm 1 is bounded by JmaxJ^{\max}, we have the total computational complexity of Algorithm 1 is O(Jmaxσ0.5(σ+ς)ς2)O\left(J^{\max}{{\sigma^{0.5}}(\sigma+\varsigma){\varsigma^{2}}}\right).

The convergence of Algorithm 1 could refer to Proposition 2 in [1].

Remark 1

Our formulated WRMP in both the normal case and the worst case does not include the quality of service (QoS) ensuring constraints which limit the achievable rate of CUE and the achievable secrecy rate of D2DM at least to a certain value, that is because the QoS constraints may lead to the WRMP being unsolvable. In practice, if the achievable secrecy rate of the solution, RSR_{S} is too small, we could increase α\alpha appropriately, vice visa.

IV Extension to the Worst Case

In Section III above, we only considered the scenario in which multiple eavesdroppers overhear the confidential information independently. However, in the worst case that the eavesdroppers may collude and form another VAA to jointly process the eavesdropped information (such as maximum ratio combination and MMSE receiver) to increase the overhearing capacity. We next make efforts to investigate the PLS scheme in such a scenario.

Since the eavesdroppers are ganged up together and form an eavesdrop VAA, the group of eavesdroppers i.e., the eavesdrop VAA could be treated as a virtual multi-antenna eavesdropper which is equipped with LL antennas. In the rest of this paper, unless particularly stated, we use Eve to represent the so-called eavesdrop VAA, i.e., the equivalent LL-antenna eavesdropper.

Since the eavesdroppers form the eavesdrop VAA, the channel vector from D2D transmitter group to the lthl^{th} eavesdropper, 𝐡l{\bf{h}}_{l} could be treated as the channel vector from D2D transmitter group to the lthl^{th} antenna of Eve. We use 𝐆E=Δ[𝐡1,𝐡2,,𝐡L]{{\bf{G}}_{E}}\buildrel\Delta\over{=}\left[{{\bf{h}}_{1},{\bf{h}}_{2},\ldots,{\bf{h}}_{L}}\right] represent the channel matrix between D2D transmitter group and Eve. Similarly, we use 𝐆B=Δ[𝐡B,1𝐡B,2,,𝐡B,L]{{\bf{G}}_{B}}\buildrel\Delta\over{=}\left[{{{\bf{h}}_{B,1}}{{\bf{h}}_{B,2}},...,{{\bf{h}}_{B,L}}}\right] represent the channel matrix between BS and Eve. Then the received signals of D2D receiver nn, Eve and CUE can be expressed as

yn=𝐡D,nH𝐰sD+𝐡B,nH𝐰BsB+𝐡B,nH𝐧B+nn,n𝒩,y_{n}={\bf{h}}_{D,n}^{H}{\bf{w}}{s_{D}}+{\bf{h}}_{B,n}^{H}{\bf{w}}_{B}{s_{B}}{\rm{+}}{\bf{h}}_{B,n}^{H}{{\bf{n}}_{B}}+{n_{n}},n\in{{\cal N}}, (30)
𝐲E=𝐆EH𝐰sD+𝐆BH𝐰BsB+𝐆BH𝐧B+𝐧E,{{\bf{y}}_{E}}={\bf{G}}_{E}^{H}{{\bf{w}}}{s_{D}}+{\bf{G}}_{B}^{H}{\bf{w}}_{B}{s_{B}}+{\bf{G}}_{B}^{H}{{\bf{n}}_{B}}+{{\bf{n}}_{E}}, (31)

and

yC=𝐡BCH𝐰BsB+𝐡BCH𝐧B+𝐡CH𝐰sD+nC,y_{\rm{C}}={\bf{h}}_{BC}^{H}{\bf{w}}_{B}{s_{B}}{\rm{+}}{\bf{h}}_{BC}^{H}{{\bf{n}}_{\rm{B}}}+{\bf{h}}_{C}^{H}{\bf{w}}{s_{D}}+{n_{C}}, (32)

respectively, where 𝐧ECN(𝟎,𝐈L){{\bf{n}}_{E}}\sim CN\left({{\bf{0}},{{\bf{I}}_{L}}}\right) is the AWGN vector at Eve. Similar with the normal case, from (30), (31) and (32), the channel capacities of D2D receiver nn, the eavesdropper Eve to overhearing sDs_{D}555 The channel capacity of Eve is obtained by calculating the mean mutual information which is the upper bound of the achievable rate of Eve, regardless of which receiving filter Eve used. Hence, the achievable secrecy rate of the worst case is a lower bound., the eavesdropper ll to decoding sBs_{B} and the CUE are

Cnworst=log(1+𝐰H𝐇D,n𝐰𝐰BH𝐇B,n𝐰B+𝐡B,nH𝐐𝐡B,n+1),C_{n}^{worst}{\rm{=}}\log\left({1+\frac{{{{\bf{w}}^{H}}{\bf{H}}_{D,n}{\bf{w}}}}{{{\bf{w}}_{B}^{H}{\bf{H}}_{B,n}{\bf{w}}_{B}+{\bf{h}}_{B,n}^{H}{\bf{Qh}}_{B,n}+1}}}\right), (33)
CEworst=log(det(𝐈L+𝐆EH𝐰𝐰H𝐆E𝐆BH𝐰B𝐰BH𝐆B+𝐆BH𝐐𝐆B+𝐈L)),C_{E}^{worst}{\rm{\!=\!}}\log\left(\!{\det\left(\!{{{\bf{I}}_{L}}\!+\!\frac{{{\bf{G}}_{E}^{H}{\bf{w}}{{\bf{w}}^{H}}{\bf{G}}_{E}}}{{{\bf{G}}_{B}^{H}{\bf{w}}_{B}{\bf{w}}_{B}^{H}{\bf{G}}_{B}\!+\!{\bf{G}}_{B}^{H}{\bf{QG}}_{B}\!+\!{{\bf{I}}_{L}}}}}\!\right)}\!\right), (34)
CEworst=log(det(𝐈L+𝐆BH𝐰B𝐰BH𝐆B𝐆EH𝐰𝐰H𝐆E+𝐆BH𝐐𝐆B+𝐈L)),{C{{}_{E}^{worst}}}^{\prime}{\rm{\!=\!}}\log\left({\det\left({{{\bf{I}}_{L}}+\frac{{{\bf{G}}_{B}^{H}{\bf{w}}_{B}{\bf{w}}_{B}^{H}{\bf{G}}_{B}}}{{{\bf{G}}_{E}^{H}{\bf{w}}{{\bf{w}}^{H}}{\bf{G}}_{E}+{\bf{G}}_{B}^{H}{\bf{QG}}_{B}+{{\bf{I}}_{L}}}}}\right)}\right), (35)

and

CCworst=log(1+𝐰BH𝐇BC𝐰B𝐡BCH𝐐𝐡BC+𝐰H𝐇C𝐰+1),C_{C}^{worst}{\rm{=}}\log\left({1+\frac{{{\bf{w}}_{B}^{H}{\bf{H}}_{BC}{\bf{w}}_{B}}}{{{\bf{h}}_{BC}^{H}{\bf{Qh}}_{BC}+{\bf{w}}^{H}{\bf{H}}_{C}{\bf{w}}+1}}}\right), (36)

respectively, where 𝐇C=Δ𝐡C𝐡CH{\bf{H}}_{C}\buildrel\Delta\over{=}{\bf{h}}_{C}{\bf{h}}_{C}^{H}. It is important to note that since the eavesdroppers form another VAA, the eavesdrop channel has transformed from MISO to MIMO, and the corresponding channel capacity becomes (34) and (35).

The achievable rate region is then defined as the set of nonnegative rate pairs (RSworst,RCworst)\left({R_{S}^{worst},R_{C}^{worst}}\right) satisfying

RSworstminn𝒩CnworstCEworst,R_{S}^{worst}\leq\mathop{\min}\limits_{n\in{{\cal N}}}C_{n}^{worst}-C_{E}^{worst}, (37)
RCworstCCworst,R_{C}^{worst}\leq C_{C}^{worst}, (38)

and

CEworst<RCworst.{C{{}_{E}^{worst}}}^{\prime}<{\rm{}}R_{C}^{worst}. (39)

In the worst case, to reduce computational complexity, we discuss the WRMP in two subcases and formulate corresponding optimization problems. Note that, different from the WRMP in the normal case which include constraints C5 to guarantee that the eavesdroppers could not perform NOMA to decode and eliminate the sBs_{B} first. In both subcases, we do not consider (39) into the optimization problems, the detailed reasons please see Remark 3 at last of this section.

In subcase 1, we consider that Eve could not decode and eliminate the sBs_{B} first and formulate the corresponding sub-WRMP, P4_1{\rm{P4\_1}}. On the contrary, in subcase 2, we consider that Eve could decode and eliminate the sBs_{B} first and formulate the corresponding sub-WRMP, P4_2{\rm{P4\_2}}.

We first consider subcase 1 and formulate the following P4_1{\rm{P4\_1}} to maximize the weighted sum of RSworstR_{S}^{worst} and RCworstR_{C}^{worst}

(P4_1)max𝐰,𝐰B,𝐐𝟎,φworstβworst,RCworstα(φworstβworst)+(1α)RCworsts.t.C1,C2C4:log(1+𝐰BH𝐇BC𝐰B𝐡BCH𝐐𝐡BC+𝐰H𝐇C𝐰+1)RCworstC6:log(1+𝐰H𝐇D,n𝐰𝐰BH𝐇B,n𝐰B+𝐡B,nH𝐐𝐡B,n+1)φworst0,n𝒩C7:βworstlog(det(𝐈L+𝐆EH𝐰𝐰H𝐆E𝐆BH𝐰B𝐰BH𝐆B+𝐆BH𝐐𝐆B+𝐈L))0.\begin{split}({\rm{P4\_1}})&\mathop{\max}\limits_{\scriptstyle{\bf{w}},{{\bf{w}}_{B}},{\bf{Q}}\succeq{\bf{0}},\varphi^{worst}\hfill\atop\scriptstyle{\beta^{worst}},R_{C}^{worst}\hfill}{\rm{}}\alpha\left({\varphi^{worst}-{\beta^{worst}}}\right)+\left({1-\alpha}\right)R_{C}^{worst}\\ {\rm{s}}{\rm{.t}}&{\rm{.C1,C2}}\\ &{\rm{C}}4^{\prime}:\log\left({1+\frac{{{\bf{w}}_{B}^{H}{\bf{H}}_{BC}{\bf{w}}_{B}}}{{{\bf{h}}_{BC}^{H}{\bf{Q}}{\bf{h}}_{BC}+{\bf{w}}^{H}{\bf{H}}_{C}{\bf{w}}+1}}}\right)\geq R_{C}^{worst}\\ &{\rm{C6^{\prime}:}}\log\left({1+\frac{{{{\bf{w}}^{H}}{\bf{H}}_{D,n}{\bf{w}}}}{{{\bf{w}}_{B}^{H}{\bf{H}}_{B,n}{\bf{w}}_{B}+{\bf{h}}_{B,n}^{H}{\bf{Qh}}_{B,n}+1}}}\right)-\varphi^{worst}\geq 0,{\rm{}}\forall n\in{{\cal N}}\\ &{\rm{C7^{\prime}:}}{\beta^{worst}}\!-\log\!\left(\!{\det\!\left(\!{{{\bf{I}}_{L}}\!+\!\frac{{{\bf{G}}_{E}^{H}{\bf{w}}{{\bf{w}}^{H}}{\bf{G}}_{E}}}{{{\bf{G}}_{B}^{H}{\bf{w}}_{B}{\bf{w}}_{B}^{H}{\bf{G}}_{B}\!+\!{\bf{G}}_{B}^{H}{\bf{QG}}_{B}\!+\!{{\bf{I}}_{L}}}}}\!\right)}\!\right)\geq 0.\end{split} (40)

where RSworst=φworstβworstR_{S}^{worst}=\varphi^{worst}-{\beta^{worst}} and α\alpha is the weighted coefficient. C4{\rm{C}}4^{\prime}, C6{\rm{C}}6^{\prime} and C7{\rm{C}}7^{\prime} are evolved from C4, C5 and C7 in (14) respectively, because of the different expressions of the channel capacity of CUE, D2D receivers and Eve.

Note that, P4_2{\rm{P4\_2}} is basically the same as P4_1{\rm{P4\_1}}, by replacing C7{\rm{C7^{\prime}}} with

C7_2:βworstlog(det(𝐈L+𝐆EH𝐰𝐰H𝐆E𝐆BH𝐐𝐆B+𝐈L))0.{\rm{C7^{\prime}\_2:}}{\beta^{worst}}\!-\log\!\left(\!{\det\!\left(\!{{{\bf{I}}_{L}}\!+\!\frac{{{\bf{G}}_{E}^{H}{\bf{w}}{{\bf{w}}^{H}}{\bf{G}}_{E}}}{{{\bf{G}}_{B}^{H}{\bf{QG}}_{B}\!+\!{{\bf{I}}_{L}}}}}\!\right)}\!\right)\geq 0. (41)

P4_2{\rm{P4\_2}} can be obtained. In C7_2:{\rm{C7^{\prime}\_2:}}, only the AN could interfere with Eve since Eve could decode and eliminate sBs_{B} first.

We first make effort to solve P4_1{\rm{P4\_1}}, it is easy to see that C4{\rm{C}}4^{\prime} and C6{\rm{C}}6^{\prime} have the same structure as C4 and C6, respectively, and the technique used to transform C4{\rm{C}}4 and C6{\rm{C}}6 to series of convex constraints in Section III.B could still be used to deal with C4{\rm{C}}4^{\prime} and C6{\rm{C}}6^{\prime}. However, due to the determinant operation, C7{\rm{C}}7^{\prime} in (40) is a non-convex constraint and non-trivial to deal with.

IV-A A Semidefinite Relaxation Based Approach for handling C7{\rm{C}}7^{\prime}

Observing that, 𝐱H𝐑𝐱=Tr(𝐑𝐱𝐱H){{\bf{x}}^{H}}{\bf{Rx}}={\rm{Tr}}\left({{\bf{Rx}}{{\bf{x}}^{H}}}\right), when 𝐱{\bf{x}} is a complex vector and 𝐑{\bf{R}} is Hermitian, to handle problem (40), we define 𝐖B=Δ𝐰B𝐰BH{{\bf{W}}_{B}}\buildrel\Delta\over{=}{\bf{w}}_{B}{\bf{w}}_{B}^{H}, 𝐖=Δ𝐰𝐰H{\bf{W}}\buildrel\Delta\over{=}{\bf{ww}}^{H} and ignore the non-convex constraints Rank(𝐖)1{\rm{Rank}}\left({\bf{W}}\right)\leq 1, Rank(𝐖B)1{\rm{Rank}}\left({{{\bf{W}}_{B}}}\right)\leq 1 666When the optimal solution (𝐖,𝐖B)\left({{\bf{W}^{*}},{\bf{W}}_{B}^{*}}\right) to (45) satisfies Rank(𝐖)1{\rm{Rank}}\left({\bf{W}}\right)\leq 1, Rank(𝐖B)1{\rm{Rank}}\left({{{\bf{W}}_{B}}}\right)\leq 1, the corresponding maximum weight sum rate could be obtained via single-stream transmit beamforming, which facilitates the implementation of physically realizable transceiver with low complexity. However the Rank constrains is non-convex and hard to deal with, here we omit them and will discuss it in Section IV-D. to obtain a relaxed problem version of (40) as follow

(P5)max𝐖𝟎,𝐖B𝟎,𝐐𝟎,φworstβworst,RCworstα(φworstβworst)+(1α)RCworstC1:𝐖[m]Pmax/M,mC2:Tr(𝐖B)+Tr(𝐐)PBC4′′:log(1+Tr(𝐇BC𝐖B)Tr(𝐐𝐡BC𝐡BCH)+Tr(𝐇C𝐖)+1)RCworstC6′′:log(1+Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)φworst0,n𝒩C7′′:βworstlog(det(𝐈L+𝐆EH𝐖𝐆E𝐆BH𝐖B𝐆B+𝐆BH𝐐𝐆B+𝐈L))0.\begin{split}({\rm{P5}})&\mathop{\max}\limits_{\scriptstyle{\bf{W}}\succeq{\bf{0}},{{\bf{W}}_{B}}\succeq{\bf{0}},{\bf{Q}}\succeq{\bf{0}},\varphi^{worst}\hfill\atop\scriptstyle{\beta^{worst}},R_{C}^{worst}\hfill}{\rm{}}\alpha\left({\varphi^{worst}-{\beta^{worst}}}\right)+\left({1-\alpha}\right)R_{C}^{worst}\\ &{\rm{C1^{\prime}:}}{\bf{W}}[m]\leq{P_{\max}}/M,\forall m\in{{\cal M}}\\ &{\rm{C2^{\prime}:Tr}}\left({{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({\bf{Q}}\right)\leq{P_{B}}\\ &{\rm{C}}4^{\prime\prime}:\log\!\left(\!{1\!+\!\frac{{{\mathop{\rm Tr}\nolimits}\!\left(\!{{\bf{H}}_{BC}{{\bf{W}}_{B}}}\!\right)}}{{{\mathop{\rm Tr}\nolimits}\!\left(\!{{\bf{Qh}}_{BC}{\bf{h}}_{BC}^{H}}\!\right)\!+\!{\mathop{\rm Tr}\nolimits}\!\left(\!{{\bf{H}}_{C}{\bf{W}}}\!\right)\!+\!1}}}\!\right)\!\geq\!R_{C}^{worst}\\ &{\rm{C6^{\prime\prime}:}}\log\left({1+\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)}}{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,n}}\right)+1}}}\right)-\varphi^{worst}\geq 0,{\rm{}}\forall n\in{{\cal N}}\\ &{\rm{C7^{\prime\prime}:}}{\beta^{worst}}\!-\log\!\left(\!{\det\left(\!{{{\bf{I}}_{L}}\!+\!\frac{{{\bf{G}}_{E}^{H}{\bf{WG}}_{E}}}{{{\bf{G}}_{B}^{H}{{\bf{W}}_{B}}{\bf{G}}_{B}\!+\!{\bf{G}}_{B}^{H}{\bf{QG}}_{B}\!+\!{{\bf{I}}_{L}}}}}\!\right)}\!\right)\!\geq\!0.\end{split} (42)

In (46), C7′′{\rm{C7^{\prime\prime}}} is still hard to handle. Before we deal with it, we first introduce the following lemma whose proof can be found in [40]:

Lemma 1
C7′′C24:(𝐞βworst1)(𝐆BH𝐖B𝐆B+𝐆BH𝐐𝐆B+𝐈L)𝐆EH𝐖𝐆E𝟎.\begin{array}[]{l}{\rm{C}}7^{\prime\prime}\Rightarrow{\rm{C24:}}\left(\!{{{\bf{e}}^{{\beta^{worst}}}}\!-1}\!\right)\left(\!{{\bf{G}}_{B}^{H}{{\bf{W}}_{B}}{\bf{G}}_{B}\!+\!{\bf{G}}_{B}^{H}{\bf{QG}}_{B}\!+\!{{\bf{I}}_{L}}}\!\right)-{\bf{G}}_{E}^{H}{\bf{WG}}_{E}\succeq{\bf{0}}.\end{array} (43)

For any 𝐆EM×L{\bf{G}}_{E}\in^{M\times L}, 𝐆BK×L{\bf{G}}_{B}\in^{K\times L}, 𝐖B𝟎{\bf{W}}_{B}\succeq{\bf{0}}, 𝐖𝟎{\bf{W}}\succeq{\bf{0}} and 𝐐𝟎{\bf{Q}}\succeq{\bf{0}}. Furthermore, the equivalence in (47) holds if Rank(𝐖)1{\mathop{\rm Rank}\nolimits}\left({\bf{W}}\right)\leq 1.

Replacing C7′′{\rm{C7^{\prime\prime}}} with C24, (42) becomes:

(P6)max𝐖𝟎,𝐖B𝟎,𝐐𝟎,φworst,βworst,RCworstα(φworstβworst)+(1α)RCworsts.t.C1,C2,C4′′,C6′′,C24.\begin{array}[]{l}({\rm{P6}})\mathop{\max}\limits_{\scriptstyle{\bf{W}}\succeq{\bf{0}},{{\bf{W}}_{B}}\succeq{\bf{0}},{\bf{Q}}\succeq{\bf{0}},\hfill\atop\scriptstyle\varphi^{worst},{\beta^{worst}},R_{C}^{worst}\hfill}{\rm{}}\alpha\left({\varphi^{worst}-{\beta^{worst}}}\right)+\left({1-\alpha}\right)R_{C}^{worst}\\ \;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;{\rm{s}}{\rm{.t}}{\rm{.C1^{\prime},C2^{\prime},C}}4^{\prime\prime},{\rm{C6^{\prime\prime},C24}}{\rm{.}}\end{array} (44)

It is obvious that when βworst{\beta^{worst}} is fixed, C24 becomes a linear matrix inequality which is a convex constraint. Hence (44) could be deposed into a two-level optimization: the inner-level optimization is convex with a fixed βworst{\beta^{worst}}, and the outer-level is a single-variable optimization with respect to βworst{\beta^{worst}}.

IV-B The Inner-Level Optimization

With a fixed βworst{\beta^{worst}}, the inner-level optimization can be written as

(P7)max𝐖𝟎,𝐖B𝟎,𝐐𝟎,φworst,RCworstα(φworstβworst)+(1α)RCworsts.t.C1,C2,C4′′,C6′′,C24.\begin{array}[]{l}({\rm{P7}})\mathop{\max}\limits_{\scriptstyle{\bf{W}}\succeq{\bf{0}},{{\bf{W}}_{B}}\succeq{\bf{0}},{\bf{Q}}\succeq{\bf{0}},\hfill\atop\scriptstyle\varphi^{worst},R_{C}^{worst}\hfill}{\rm{}}\alpha\left({\varphi^{worst}-{\beta^{worst}}}\right)+\left({1-\alpha}\right)R_{C}^{worst}\\ \;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;{\rm{s}}{\rm{.t}}{\rm{.C1^{\prime},C2^{\prime},C}}4^{\prime\prime},{\rm{C6^{\prime\prime},C24}}{\rm{.}}\end{array} (45)

In (45), although C1{\rm{C1^{\prime}}}, C2{\rm{C2^{\prime}}} and C24 are convex constraint, we still need to deal with the non-convex constraints C4′′{\rm{C}}4^{\prime\prime} and C6′′{\rm{C}}6^{\prime\prime}. Note that, the convex approximation approach in Section III.B could be used to transfer C4′′{\rm{C}}4^{\prime\prime} and C6′′{\rm{C}}6^{\prime\prime} into convex form. However, observing that the expressions inside the logarithm of C4′′{\rm{C}}4^{\prime\prime} and C6′′{\rm{C}}6^{\prime\prime} are in the form of linear fraction, hence, in the following, we give an easier approach that does not need complex domain Taylor expansion.

IV-B1 Convex approximation of C4′′{\rm{C}}4^{\prime\prime}

By introducing auxiliary variable rworstr^{worst}, C4′′{\rm{C}}4^{\prime\prime}can be decomposed into

C25:log(1+rworst)RCworst1+rworst𝐞RCworst,{\rm{C}}25:\log\left({1+r^{worst}}\right)\geq R_{C}^{worst}\Leftrightarrow 1+r^{worst}\geq{{\bf{e}}^{R_{C}^{worst}}}, (46)

and

C26:Tr(𝐇BC𝐖B)Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1rworstTr(𝐇BC𝐖B)rworst(Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1).\begin{array}[]{l}{\rm{C}}26:\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{BC}{{\bf{W}}_{B}}}\right)}}{{{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{BC}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{C}{\bf{W}}}\right)+1}}\geq r^{worst}\Leftrightarrow{\rm{}}{\mathop{\rm Tr}\nolimits}\!\left(\!{{\bf{H}}_{BC}{{\bf{W}}_{B}}}\!\right)\!\geq\!r^{worst}\left(\!{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{QH}}_{BC}}\!\right)\!+\!{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{C}{\bf{W}}}\!\right)\!+\!1}\!\right).\end{array} (47)

Like C8 in (15), C21 is an exponential cone constraint and can be approximated in terms of a series of SOC constraints with the same formation of C8{\rm{C}}8^{\prime}. For brevity, we denote the series of SOC constraints derived from C25 by C25{\rm{C}}25^{\prime} and omitting its detailed expression.

Then, arithmetic geometry mean (AGM) inequality is applied to get an approximation of the non-convex constraint, i.e., C26. We first introduce the AGM inequality. The AGM inequality is described as: xy0.5(ηx)2+0.5(y/η)2xy\leq 0.5\left({\eta x}\right)^{2}+0.5\left({y/\eta}\right)^{2}, where η0\eta\neq 0 and the equality holds if and only if when η=y/x\eta=\sqrt{y/x}. Based the AGM inequality, C26 can be approximately recast as

C26:Tr(𝐇BC𝐖B)12(η0rworst)2+12(Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1η0)2,\begin{array}[]{l}{\rm{C26^{\prime}}}:{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{BC}{{\bf{W}}_{B}}}\right)\geq\frac{1}{2}{\left({{\eta_{0}}r^{worst}}\right)^{2}}+\frac{1}{2}{\left({\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{BC}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{C}{\bf{W}}}\right)+1}}{{{\eta_{0}}}}}\right)^{2}},\end{array} (48)

which is convex.

IV-B2 Convex approximation of C6′′{\rm{C}}6^{\prime\prime}

With the auxiliary variable aworsta^{worst}, we decompose C6′′{\rm{C6^{\prime\prime}}} into

C27:log(1+aworst)φworst1+aworst𝐞φworst,{\rm{C}}27:\log\left({1+a^{worst}}\right)\geq\varphi^{worst}\Leftrightarrow 1+a^{worst}\geq{{\bf{e}}^{\varphi^{worst}}}, (49)

and

C28:Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1aworstTr(𝐇D,n𝐖)aworst(Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1),nN.\begin{array}[]{l}{\rm{C}}28:\frac{{{\rm{Tr}}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)}}{{{\rm{Tr}}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\rm{Tr}}\left({{\bf{QH}}_{B,n}}\right)+1}}\geq a^{worst}\Leftrightarrow\\ {\rm{Tr}}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)\geq a^{worst}\left({{\rm{Tr}}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\rm{Tr}}\left({{\bf{QH}}_{B,n}}\right)+1}\right),\forall n\in N.\end{array} (50)

Similar with how we process C25, C27 is replaced by a series of SOC constraints, i.e., C27{\rm{C27^{\prime}}} and we omit the detialed expression of it. With the help of AGM inequality, C28 can also be approximated to a convex constraint:

C28:Tr(𝐇D,n𝐖)12(ηnaworst)2+12(Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1ηn)2,n𝒩.\begin{array}[]{l}{\rm{C}}28^{\prime}:{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)\geq\frac{1}{2}{\left({{\eta_{n}}a^{worst}}\right)^{2}}+\frac{1}{2}{\left({\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,n}}\right)+1}}{{{\eta_{n}}}}}\right)^{2}},{\rm{}}\forall n\in{{\cal N}}.\end{array} (51)

Now, with the help of C25{\rm{C}}25^{\prime}, C26{\rm{C}}26^{\prime}, C27{\rm{C}}27^{\prime} and C28{\rm{C}}28^{\prime}, (45) can be recast into solving a sequence of convex optimization subproblem:

(P8)max𝐖𝟎,𝐖B𝟎,𝐐𝟎,φworst,RCworst,aworst,rworstα(φworstβworst)+(1α)RCworsts.t.C1,C2,C24,C25,C26,C27,C28.\begin{array}[]{l}({\rm{P8}})\mathop{\max}\limits_{\scriptstyle\;\;\;\;{\bf{W}}\succeq{\bf{0}},{{\bf{W}}_{B}}\succeq{\bf{0}},{\bf{Q}}\succeq{\bf{0}},\hfill\atop\scriptstyle{\rm{}}\varphi^{worst},R_{C}^{worst},a^{worst},r^{worst}\hfill}{\rm{}}\alpha\left({\varphi^{worst}-{\beta^{worst}}}\right)+\left({1-\alpha}\right)R_{C}^{worst}\\ {\rm{\;\;\;\;\;\;\;\;\;\;\;\;s}}{\rm{.t}}{\rm{.C1^{\prime},C2^{\prime},C24}},{\rm{C25^{\prime},C26^{\prime},C27^{\prime},C28^{\prime}}}{\rm{.}}\end{array} (52)

Now, (52) is a semidefinite program (SDP) which is convex and can be solved by using interior point methods, or standard convex optimization tool, e.g., CVX. The detailed procedure is summarized in Algorithm 2.

Algorithm 2 Solving (40).
1:  Initialization: \bullet Setting the initial values 𝐖0{\bf{W}}^{0}, , 𝐖B0{\bf{W}}_{B}^{0}, 𝐐0{\bf{Q}}^{0}, η0{\eta_{0}} and ηn,n𝒩{\eta_{n}},n\in{{\cal N}}. \bullet Setting maximum number of iterations JmaxJ^{\max}, iteration counter j=1j=1 and iteration termination accuracy ψ>0\psi>0.
2:  Repeat
3:  Solving (52) with current η0{\eta_{0}}, ηn,n𝒩{\eta_{n}},n\in{{\cal N}} and obtaining the optimal 𝐖{\bf{W}}^{\rm{*}}, 𝐖B{\bf{W}}_{B}^{\rm{*}} and 𝐐{\bf{Q}}^{\rm{*}}.
4:  if 𝐖𝐖02+𝐖B𝐖B02+𝐐𝐐𝟎2ψ{\left\|\!{{\bf{W}}^{\rm{*}}\!-\!{\bf{W}}^{0}}\!\right\|_{2}}\!+\!{\left\|\!{{\bf{W}}_{B}^{\rm{*}}\!-\!{\bf{W}}_{B}^{0}}\!\right\|_{2}}\!+\!{\left\|\!{{\bf{Q}}^{\bf{*}}{\bf{-Q}}^{\bf{0}}}\!\right\|_{2}}\!\leq\!\psithen
5:     The optimal solutions of (56) are 𝐖{\bf{W}}^{\rm{*}}, 𝐖B{\bf{W}}_{B}^{\rm{*}} and 𝐐{\bf{Q}}^{\rm{*}}.
6:     Break
7:  else
8:     Setting η0=Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1rworst{\eta_{0}}=\sqrt{\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{Q}}^{*}{\bf{H}}_{BC}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{C}{\bf{W}}^{*}}\right)+1}}{{r^{worst*}}}}, ηn=Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1aworst,n𝒩{\eta_{n}}=\sqrt{\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{\bf{W}}_{B}^{*}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{Q}}^{\rm{*}}{\bf{H}}_{B,n}}\right)+1}}{{a^{worst*}}}},\forall n\in{{\cal N}}, 𝐖0=𝐖{\bf{W}}^{0}={\bf{W}}^{*}, 𝐖B0=𝐖B{\bf{W}}_{B}^{0}={\bf{W}}_{B}^{*} and 𝐐0=𝐐{\bf{Q}}^{0}={\bf{Q}}^{*}.
9:  end if
10:  j=j+1j=j+1
11:  Until j>Jmaxj>J^{\max}

IV-C The Outer-Level Optimization

The outer-level is a single-variable optimization with respect to βworst{\beta^{worst}}. Let Y(βworst){\rm{Y}}\left({{\beta^{worst}}}\right) be the optimized value of (52) with a given βworst{\beta^{worst}}, then the outer-level optimization is maxβworstY(βworst)\mathop{{\rm{max}}}\limits_{{\beta^{worst}}}{\rm{Y}}\left({{\beta^{worst}}}\right). Note that

0βworstminn𝒩log(1+Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)minn𝒩log(1+Tr(𝐇D,n𝐖))minn𝒩log(1+MPmax𝐡D,n22).\begin{array}[]{l}0\leq{\beta^{worst}}\leq\mathop{\min}\limits_{n\in{{\cal N}}}\log\left({1+\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)}}{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,n}}\right)+1}}}\right)\leq\\ \mathop{\min}\limits_{n\in{{\cal N}}}\log\left({1+{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)}\right)\leq\mathop{\min}\limits_{n\in{{\cal N}}}\log\left({1+MP_{\max}\left\|{{\bf{h}}_{D,n}}\right\|_{2}^{2}}\right).\end{array} (53)

where the first inequality is due to the non-negative property of rate, the second inequality is because the secrecy rate is non-negative, and the last inequality comes from the fact that Tr(𝐇D,n𝐖)Tr(𝐖)𝐡D,n22{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)\leq{\mathop{\rm Tr}\nolimits}\left({\bf{W}}\right)\left\|{{\bf{h}}_{D,n}}\right\|_{2}^{2} for any 𝐖𝟎{\bf{W}}\succeq{\bf{0}} and 𝐖[m]Pmax{\bf{W}}[m]\leq{P_{\max}}. From (53), we can see that the optimization variable of the outer-level optimization has a bounded interval, and then we use one-dimensional search technology to solve the outer-level optimization.

So far, we have solved P4_1{\rm{P4\_1}}, the approach to overcome P4_2{\rm{P4\_2}} is similar to that of P4_1{\rm{P4\_1}}, except for replacing C7{\rm{C7^{\prime}}} with C7_2{\rm{C7^{\prime}\_2}} and we omit the details here.

The whole process of solving the WRMP in the worst case is that, we first solve the P4_1{\rm{P4\_1}} and test whether (39) is satisfied. If (39) is satisfied,the solution of P4_1{\rm{P4\_1}} is the solution of the WRMP in the worst case, otherwise, we solve P4_2{\rm{P4\_2}} and set the solution of it as the solution of the WRMP in the worst case.

Remark 2

In our thousands of simulations results, the solution of (13) makes constraints C5 equal and the solution of P4_1{\rm{P4\_1}} does not satisfy (39) never happen, which means eavesdroppers can not decode sBs_{B} with large probability, even we do not deliberately set constraints to ensure this. In other words, the constraint C5 in (13) and P4_2{\rm{P4\_2}} are redundant in most cases.

Remark 3

The reason why we do not consider (39) into the WRMP in the worst case is because (39) and C7\rm C7^{\prime} have the same structure, for overcoming C7\rm C7^{\prime}, we deploy one-dimensional search technology, which means for jointly solving (39) and C7\rm C7^{\prime} a time-consuming two-dimensional search technology should be used. Also, as stated in remark 2, even we omit (39), the solution of P4_1{\rm{P4\_1}} still satisfy (39) with large probability.

IV-D Rank-Profile Analysis

Note that, when the optimal solution (𝐖,𝐖B)\left({{\bf{W}}^{*},{\bf{W}}_{B}^{*}}\right) of (44) satisfies Rank(𝐖)1{\rm{Rank}}\left({{\bf{W}}^{*}}\right)\leq 1 and Rank(𝐖B)1{\rm{Rank}}\left({{\bf{W}}_{B}^{*}}\right)\leq 1 the corresponding weighted maximum rate, i.e., αRSworst+(1α)RCworst\alpha R_{S}^{worst}+\left({1-\alpha}\right)R_{C}^{worst} could be attained via single-stream transmit beamforming, which facilitates the implementation of physically realizable transceiver with low complexity. Also the condition Rank(𝐖)1{\rm{Rank}}\left({{\bf{W}}^{*}}\right)\leq 1 guarantees the relaxation from C7′′{\rm{C}}7^{\prime\prime} to C24 is tight, i.e., C24 equivalent to C7′′{\rm{C}}7^{\prime\prime} and (44) equivalent to (40). However, the rank constraint is non-convex and we omit it in (44), hence the optimal solution of (44) does not always lead to the optimal solution of the original problem (40). Apparently, if 𝐖{\bf{W}}^{*} (𝐖B{\bf{W}}_{B}^{*}) is of rank one, then via eigenvalue decomposition, the optimal 𝐰{\bf{w}}^{*} (𝐰B{\bf{w}}_{B}^{*}) of (40) can be easily obtained. Otherwise, some rank-one approximation procedures for 𝐖{\bf{W}}^{*} (𝐖B{\bf{W}}_{B}^{*}) such as Gaussian randomization [41] are applied to obtain a suboptimal solution of (40).

The investigation on rank properties of 𝐖{\bf{W}}^{*}, 𝐖B{\bf{W}}_{B}^{*} and 𝐐{{\bf{Q}}^{\bf{*}}} is still an open issue. However thankfully, we can prove that the rank one property holds for 𝐖{\bf{W}}^{*} in a special case.

Proposition 1

If there exist only one n𝒩\forall n\in{{\cal N}} satisfies log(1+Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)φworst=0\log\left(\!{1\!+\!\frac{{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{D,n}{\bf{W}}^{*}}\!\right)}}{{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{B,n}{\bf{W}}_{B}^{\bf{*}}}\!\right)\!+\!{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{QH}}_{B,n}}\!\right)\!+\!1}}}\!\right)\!-\!{\varphi^{worst*}}{\rm{\!=\!}}0, then 𝐖{\bf{W}}^{*} must be of rank one.

proof:proof: Plase see Appendix A.

It is worth noting that, for D2D receivers it is almost impossible that, Cn=Cm,n,m𝒩,nm{C_{n}}={C_{m}},{\rm{}}n,m\in{{\cal N}},n\neq m with similar (𝐖,𝐖B,𝐐)\left({{\bf{W}}^{*},{\bf{W}}_{B}^{*},{{\bf{Q}}^{*}}}\right), since the channel conditions of each receiver are independent with each other, which implies that Rank(𝐖)=1{\rm{Rank}}\left({{\bf{W}}^{*}}\right)=1 holds with large probability. In fact, in our thousands of simulations results, Rank(𝐖)>1{\rm{Rank}}\left({{\bf{W}}^{*}}\right)>1 never happens.

V Suboptimal Algorithms for High Dynamic Networks

In the above Section III and Section IV, we give the algorithms to obtain the optimal beamforming solutions for both the normal case and the worst case. However, the above algorithms need lots of auxiliary variables and contain a number of constraints, which may be time consuming and not suitable for high dynamic networks.

In this section, we propose a low complexity scheme to obtain a suboptimal beamforming solution. Let 𝐆EC=Δ[𝐡1,𝐡2,,𝐡L,𝐡C]{{\bf{G}}_{EC}}\buildrel\Delta\over{=}\left[{{\bf{h}}_{1},{\bf{h}}_{2},\ldots,{\bf{h}}_{L},{\bf{h}}_{C}}\right] be the channel matrix from D2D transmitter group to eavesdropper group and CUE, the proposed scheme falls into two cases:1)M>Rank(𝐆EC);2)M<=Rank(𝐆EC)1)M>{\rm{Rank}}\left({{{\bf{G}}_{EC}}}\right);2)M<={\rm{Rank}}\left({{{\bf{G}}_{EC}}}\right).

We note that although the proposed suboptimal solutions in this section are designed for the worst case, they could be easily adjusted for the normal case.

V-A Case One: M>Rank(𝐆EC)M>{\rm{Rank}}\left({{{\bf{G}}_{EC}}}\right)

In this case, D2D transmitter group directly put the confidential information onto the null space of the column space of 𝐆EC{{\bf{G}}_{EC}}, i.e., no information is leaked to all eavesdroppers or interfered with CUE. In this case, 𝐰{\bf{w}} can be written as 𝐰=𝐆EC𝐰^{\bf{w}}={\bf{G}}_{EC}^{\bot}{\bf{\hat{w}}}, where 𝐆ECM×(ML1){\bf{G}}_{EC}^{\bot}\in{\rm{\mathbb{C}}}{{}^{M\times(M-L-1)}} is the standard orthogonal basis of the solution space of the equation 𝐆ECH𝐰=𝟎{\bf{G}}_{EC}^{H}{\bf{w}}={\bf{0}} and 𝐰^(ML1)×1{\bf{\hat{w}}}\in{\rm{\mathbb{C}}}{{}^{(M-L-1)\times 1}} is the new concerned optimization variable. It is easy to see 𝐆EC𝐰=𝐆EC𝐆EC𝐰^=𝟎{{\bf{G}}_{EC}}{\bf{w}}={{\bf{G}}_{EC}}{\bf{G}}_{EC}^{\bot}{\bf{\hat{w}}}{\rm{=}}{\bf{0}}.

For BS, it adopts the MRT beamforming to focus the signal sB{s_{B}} on CUE, and puts sB{s_{B}} onto the null space of the column space of 𝐆BN{{\bf{G}}_{BN}}, where 𝐆BN=Δ[𝐡B,1,𝐡B,2,,𝐡B,N]{{\bf{G}}_{BN}}\buildrel\Delta\over{=}\left[{{\bf{h}}_{B,1},{\bf{h}}_{B,2},\ldots,{\bf{h}}_{B,N}}\right] is the channel matrix from BS to D2D receiver group. In this case the beamforming vector of BS is

𝐰Bsubopt=(𝐈𝐆BN(𝐆BNH𝐆BN)1𝐆BNH)𝐡BC(𝐈𝐆BN(𝐆BNH𝐆BN)1𝐆BNH)𝐡BCPB{\bf{w}}_{B}^{subopt}\!=\!\frac{{\left({{\bf{I}}\!-\!{{\bf{G}}_{BN}}{{\left({{\bf{G}}_{BN}^{H}{{\bf{G}}_{BN}}}\right)}^{-1}}{\bf{G}}_{BN}^{H}}\right){{\bf{h}}_{BC}}}}{{\left\|{\left({{\bf{I}}\!-\!{{\bf{G}}_{BN}}{{\left({{\bf{G}}_{BN}^{H}{{\bf{G}}_{BN}}}\right)}^{-1}}{\bf{G}}_{BN}^{H}}\right){{\bf{h}}_{BC}}}\right\|}}\sqrt{{P_{B}}} (54)

where (𝐈𝐆BN(𝐆BNH𝐆BN)1𝐆BNH)\left({{\bf{I}}-{{\bf{G}}_{BN}}{{\left({{\bf{G}}_{BN}^{H}{{\bf{G}}_{BN}}}\right)}^{-1}}{\bf{G}}_{BN}^{H}}\right) is the orthogonal projection matrix onto the null space of the column space of 𝐆BN{{\bf{G}}_{BN}}. Since the transmitted signal, sB{s_{B}}, does not interfere the D2D receivers, the BS can use the maximal power to transmit sB{s_{B}}, i.e., the PB\sqrt{{P_{B}}} term in (60).

Since no information is leaked to eavesdroppers, the original problem could be rewritten as

max𝐰^,RDsuboptαRDsubopt+(1α)RCsubopts.t.C29:𝐰^2PmaxC30:log(1+|𝐡D,nH𝐆EC𝐰^|2)RDsubopt0,n𝒩\begin{array}[]{l}\mathop{\max}\limits_{{\bf{\hat{w}}},R_{D}^{subopt}}{\rm{}}\alpha R_{D}^{subopt}+\left({1-\alpha}\right)R_{C}^{subopt}\\ {\rm{s}}{\rm{.t}}{\rm{.C29:}}{\left\|{{\bf{\hat{w}}}}\right\|^{2}}\leq{P_{max}}\\ \;\;\;\;\;{\rm{C30:}}\log\left({1+{{\left|{{\bf{h}}_{D,n}^{H}{\bf{G}}_{EC}^{\bot}{\bf{\hat{w}}}}\right|}^{2}}}\right)-R_{D}^{subopt}\geq 0,{\rm{}}\forall n\in{{\cal N}}\end{array} (55)

where RCsubopt=log(1+|𝐡BCH𝐰Bsubopt|2)R_{C}^{subopt}{\rm{=}}\log\left({1+{{\left|{{\bf{h}}_{BC}^{H}{\bf{w}}_{B}^{subopt}}\right|}^{2}}}\right) is the achievable rate of CUE. Since 𝐰Bsubopt{\bf{w}}_{B}^{subopt} is directly given by (60), we actually only optimize 𝐰^{\bf{\hat{w}}} in (61), hence (61) can be further reduced to

max𝐰^minn𝒩|𝐡D,nH𝐆EC𝐰^|2s.t.C29:𝐰^2Pmax\begin{array}[]{l}\mathop{\max}\limits_{{\bf{\hat{w}}}}{\rm{}}\mathop{{\rm{min}}}\limits_{\forall n\in{{\cal N}}}{\rm{}}{\left|{{\bf{h}}_{D,n}^{H}{\bf{G}}_{EC}^{\bot}{\bf{\hat{w}}}}\right|^{2}}\\ {\rm{s}}{\rm{.t}}{\rm{.C29:}}{\left\|{{\bf{\hat{w}}}}\right\|^{2}}\leq{P_{max}{\rm{}}}\end{array} (56)

which is a simple max-min problem and can be solved by introducing an auxiliary variable κ\kappa and then rewrite (56) as

max𝐰^,κκs.t.C29:𝐰^2PmaxC31:|𝐡D,nH𝐆EC𝐰^|2κ,n𝒩\begin{array}[]{*{20}{l}}\;\;\;{\mathop{\max}\limits_{{\bf{\hat{w}}},\kappa}{\rm{}}\kappa}\\ \begin{array}[]{l}{\rm{s}}.{\rm{t}}.{\rm{C29}}:{\left\|{{\bf{\hat{w}}}}\right\|^{2}}\leq{P_{max}}\\ \;\;\;\;\;{\rm{C31}}:{\left|{{\bf{h}}_{D,n}^{H}{\bf{G}}_{EC}^{\bot}{\bf{\hat{w}}}}\right|^{2}}\geq\kappa,\forall n\in{{\cal N}}\end{array}\end{array} (57)

It is easy to see that, C31 can be approximated to convex form with the same approach of C11.

V-B Case Tow: MRank(𝐆EC)M\leq{\rm{Rank}}\left({{{\bf{G}}_{EC}}}\right)

In this case, D2D transmitter group can hardly perform null space beamforming directly to prevent eavesdroppers from overhearing, since there has no non-zero solution of 𝐆ECH𝐱=𝟎{\bf{G}}_{EC}^{H}{\bf{x}}={\bf{0}} when MRank(𝐆EC)M\leq{\rm{Rank}}\left({{{\bf{G}}_{EC}}}\right). Thus in this case the D2D transmitter group can hardly communication with D2D receiver group safely without the assistance of BS.

Based on the generalized singular value decomposition (GSVD), in this subsection we propose a BS-assisted scheme to guarantee that the confidential information wiretapped by Eve is protected by the jamming signal sent by BS.

Let 𝐰Bi{\bf{w}}_{B}^{i} be the beamforming vector of BS for transmitting sBCN(0,1){s_{B}}\sim CN(0,1) desired by CUE. Like Section V.A, BS puts the signal onto the null space of the column space of 𝐆BNE=[𝐆BN,𝐆B]{{\bf{G}}_{BNE}}{\rm{=}}\left[{{{\bf{G}}_{BN}},{{\bf{G}}_{B}}}\right], i.e., the transmitted sB{s_{B}} does not interfere with either D2D receivers or Eve. Then 𝐰Bi{\bf{w}}_{B}^{i} can be written as

𝐰Bi=(𝐈𝐆BNE(𝐆BNEH𝐆BNE)1𝐆BNEH)𝐡BC(𝐈𝐆BNE(𝐆BNEH𝐆BNE)1𝐆BNEH)𝐡BC(1θ)PB\begin{array}[]{l}{\bf{w}}_{B}^{i}=\\ \frac{{\left({{\bf{I}}-{{\bf{G}}_{BNE}}{{\left({{\bf{G}}_{BNE}^{H}{{\bf{G}}_{BNE}}}\right)}^{-1}}{\bf{G}}_{BNE}^{H}}\right){{\bf{h}}_{BC}}}}{{\left\|{\left({{\bf{I}}-{{\bf{G}}_{BNE}}{{\left({{\bf{G}}_{BNE}^{H}{{\bf{G}}_{BNE}}}\right)}^{-1}}{\bf{G}}_{BNE}^{H}}\right){{\bf{h}}_{BC}}}\right\|}}\sqrt{\left({1-\theta}\right){P_{B}}}\end{array} (58)

where θ[0,1]\theta\in\left[{0,1}\right] is the power split factor.

Let 𝐰BAN{\bf{w}}_{B}^{AN} be the beamforming vector of BS for transmitting jamming signal nBCN(0,1)n_{B}\sim CN(0,1). Since the goal of the jamming signal is to interfere with Eve, 𝐰BAN{\bf{w}}_{B}^{AN} should be orthogonal to the channel vectors from BS to D2D receivers and CUE. Let the channel matrix from BS to D2D receivers and CUE be 𝐆BNC=[𝐆BN,𝐡BC]{{\bf{G}}_{BN{\rm{C}}}}{\rm{=}}\left[{{{\bf{G}}_{BN}},{\bf{h}}_{BC}}\right], in order for 𝐰BAN{\bf{w}}_{B}^{AN} to be orthogonal to the column space of 𝐆BNC{{\bf{G}}_{BN{\rm{C}}}}, 𝐰BAN{\bf{w}}_{B}^{AN} is designed as 𝐰BAN=𝐆BNC𝐰^BAN𝐆BNC𝐰^BANθPB{\bf{w}}_{B}^{AN}{\rm{=}}\frac{{{\bf{G}}_{BNC}^{\bot}{\bf{\hat{w}}}_{B}^{AN}}}{{\left\|{{\bf{G}}_{BNC}^{\bot}{\bf{\hat{w}}}_{B}^{AN}}\right\|}}\sqrt{\theta{P_{B}}}, where 𝐆BNCK×(KN1){\bf{G}}_{BNC}^{\bot}\in{\rm{\mathbb{C}}}{{}^{K\times(K-N-1)}} is the standard orthogonal basis of the solution space of the equation 𝐆BNC𝐰BAN=0{{\bf{G}}_{BN{\rm{C}}}}{\bf{w}}_{B}^{AN}=0 and 𝐰^BAN(KN1)×1{\bf{\hat{w}}}_{B}^{AN}\in{\rm{\mathbb{C}}}{{}^{(K-N-1)\times 1}} is the new concerned optimization variable.

For the D2D transmitter group, although when M<=L+1M<=L+1, the transmitted confidential information sD{s_{D}} is bound to be overheard by Eve, we can prevent it from interfering CUE, i.e., 𝐰=𝐡C𝐰^𝐡C𝐰^Pmax{\bf{w}}{\rm{=}}\frac{{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}}{{\left\|{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}\right\|}}\sqrt{{P_{\max}}}, where 𝐡CM×(M1){\bf{h}}_{C}^{\bot}\in\mathbb{C}{{}^{M\times(M-1)}} is the standard orthogonal basis of the solution space of the equation 𝐡CH𝐰=𝟎{\bf{h}}_{C}^{H}{\bf{w}}={\bf{0}} and 𝐰^M1{\bf{\hat{w}}}\in\mathbb{C}{{}^{M-1}} is the new concerned optimization variable.

Based on the above discussion, the received signal of Eve can be written as

𝐲E=𝐆EH𝐡C𝐰^𝐡C𝐰^PtotsD+𝐆BH𝐆BNC𝐰^BAN𝐆BNC𝐰^BANθPBnB+𝐧E.\begin{array}[]{l}{{\bf{y}}_{E}}={\bf{G}}_{E}^{H}\frac{{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}}{{\left\|{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}\right\|}}\sqrt{{P_{tot}}}{s_{D}}\\ \;\;\;\;\;\;+{\bf{G}}_{B}^{H}\frac{{{\bf{G}}_{BNC}^{\bot}{\bf{\hat{w}}}_{B}^{AN}}}{{\left\|{{\bf{G}}_{BNC}^{\bot}{\bf{\hat{w}}}_{B}^{AN}}\right\|}}\sqrt{\theta{P_{B}}}{n_{B}}+{{\bf{n}}_{E}}.\end{array} (59)

Define E=𝐆EH𝐡C{\bf{{\rm E}}}{\rm{=}}{\bf{G}}_{E}^{H}{\bf{h}}_{C}^{\bot} and 𝐅=𝐆BH𝐆BNC{\bf{F}}={\bf{G}}_{B}^{H}{\bf{G}}_{BNC}^{\bot} as the equivalent channel matrixes of the eavesdrop channel from D2D transmitter group to Eve and the jamming channel from BS to Eve, respectively. For guaranteeing that the confidential information wiretapped by Eve are protected by the jamming signal sent by BS, i.e., Eve can hardly separate sD{s_{D}} from 𝐲E{{\bf{y}}_{E}}, we need span(𝐄𝐰^)=span(𝐅𝐰^BAN){\mathop{\rm span}\nolimits}\left({{\bf{E\hat{w}}}}\right){\rm{=span}}\left({{\bf{F\hat{w}}}_{B}^{AN}}\right), which means the confidential information signal sD{s_{D}} is always mixed with the jamming signal nB{n_{B}}. To handle the alignment constraint, GSVD, which can yield the decoupled parallel sub channels, is applied as follow:

[𝐔,𝐕,𝐗,𝐑,𝐒]=gsvd(𝐅H,𝐄H)\left[{{\bf{U,V,X,R,S}}}\right]={\mathop{\rm gsvd}\nolimits}\left({{\bf{F}}^{H}{\rm{,}}{\bf{E}}^{H}}\right) (60)

where 𝐔(KN1)×(KN1){\bf{U}}\in\mathbb{C}^{(K-N-1)\times(K-N-1)} and 𝐕(M1)×(M1){\bf{V}}\in\mathbb{C}^{(M-1)\times(M-1)} are unitary matrices, 𝐗L×L{\bf{X}}\in\mathbb{C}{{}^{L\times L}}, 𝐑(KN1)×L=[𝚲1𝟎]{\bf{R}}\in\mathbb{C}^{(K-N-1)\times L}{\rm{=}}\left[\begin{array}[]{l}{{\bf{\Lambda}}_{1}}\\ {\bf{0}}\end{array}\right], and 𝐒(M1)×L=[𝚲2,𝟎]{\bf{S}}\in\mathbb{C}^{(M-1)\times L}{\rm{=}}\left[{{{\bf{\Lambda}}_{2}},{\bf{0}}}\right], 𝚲1=diag(Λ1,1,Λ1,2,Λ1,L){{\bf{\Lambda}}_{1}}{\rm{=diag}}\left({\Lambda_{1,1},\Lambda_{1,2},\ldots\Lambda_{1,L}}\right) is a diagonal matrix with ascending sort and 𝚲2=diag(Λ2,1,Λ2,2,Λ2,M1){{\bf{\Lambda}}_{2}}{\rm{=diag}}\left({\Lambda_{2,1},\Lambda_{2,2},\ldots\Lambda_{2,M-1}}\right) is a diagonal matrix with descending sort. According to the definition of GSVD we obtain that 𝐅=𝐗𝐑H𝐔H=𝐗[𝚲1,𝟎]𝐔H{\bf{F}}={\bf{XR}}^{H}{{\bf{U}}^{H}}={\bf{X}}\left[{{{\bf{\Lambda}}_{1}},{\bf{0}}}\right]{{\bf{U}}^{H}} and 𝐄=𝐗𝐒H𝐕H=𝐗[𝚲2𝟎]𝐕H{\bf{E}}={\bf{XS}}^{H}{{\bf{V}}^{H}}={\bf{X}}\left[\begin{array}[]{l}{{\bf{\Lambda}}_{2}}\\ {\bf{0}}\end{array}\right]{{\bf{V}}^{H}}. Based on the results of GSVD, we can equivalently treat the equivalent eavesdrop channel and the equivalent jamming channel as a series of subchannels, respectively.

Let us first check the equivalent eavesdrop channel matrix 𝐄{\bf{E}}. If we select the xthx^{th} column of 𝐕{\bf{V}} as the beamforming vector 𝐰^{\bf{\hat{w}}}, then we have 𝐄𝐰^=𝐗(:,x)Λ2,x{\bf{E\hat{w}}}={\bf{X}}\left({:,x}\right)\Lambda_{2,x}, and Λ2,x\Lambda_{2,x} can be treated as the equivalent channel coefficient of the xthx^{th} subchannel. Because our goal is to prevent Eve from overhearing, hence, we select the (M1)th(M-1)^{th} column of 𝐕{\bf{V}}, i.e., 𝐕(:,M1){\bf{V}}\left({:,M-1}\right) as the beamforming vector 𝐰^{\bf{\hat{w}}}, which corresponds to the smallest equivalent channel coefficient of the equivalent eavesdrop channel 𝐄{\bf{E}}.

For guaranteeing the confidential information signal sD{s_{D}} is protected by the jamming signal nB{n_{B}}, we also choose the corresponding (M1)th(M-1)^{th} column of 𝐔{\bf{U}} as the beamforming vector 𝐰^BAN{\bf{\hat{w}}}_{B}^{AN}, i.e., 𝐰^BAN=𝐔(:,M1){\bf{\hat{w}}}_{B}^{AN}={\bf{U}}\left({:,M-1}\right).

Substituting the selected beamforming vectors 𝐰^{\bf{\hat{w}}} and 𝐰^BAN{\bf{\hat{w}}}_{B}^{AN} into (60), we have

𝐲E=𝐗(:,M1)Λ2,M1PmaxsD𝐡C𝐰^+𝐗(:,M1)Λ1,M1θPBnB𝐆BNC𝐰^BAN+𝐧E.\begin{array}[]{l}{{\bf{y}}_{E}}={\bf{X}}\left({:,M-1}\right)\Lambda_{2,M-1}\frac{{\sqrt{{P_{max}}}{s_{D}}}}{{\left\|{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}\right\|}}\\ \;\;\;\;\;\;+{\bf{X}}\left({:,M-1}\right)\Lambda_{1,M-1}\frac{{\sqrt{\theta{P_{B}}}{n_{B}}}}{{\left\|{{\bf{G}}_{BNC}^{\bot}{\bf{\hat{w}}}_{B}^{AN}}\right\|}}+{{\bf{n}}_{E}}.\end{array} (61)

Next, we move forward to calculate the optimal power split factor θ\theta. For simplicity, we observe that the interferences in (66) are mainly composed of the jamming signal nB{{{n}}_{B}}, and hence we ignore the AWGN term 𝐧E{{\bf{n}}_{E}} in (66). With the MMSE receiver, the eavesdrop channel capacity of Eve is

CEsubopt=log(1+Λ2,M12PmaxΛ1,M12θPB)C_{E}^{subopt}{\rm{=}}\log\left({1{\rm{+}}\frac{{\Lambda_{2,M-1}^{2}{P_{max}}}}{{\Lambda_{1,M-1}^{2}\theta{P_{B}}}}}\right) (62)

Now, the weighted rate sum becomes

α(minn𝒩(log(1+IPmax))log(1+Λ2,M12PmaxΛ1,M12θPB))+(1α)log(1+J(1θ)PB)\begin{array}[]{l}\alpha\left({\mathop{\rm{min}}\limits_{\forall n\in{{\cal N}}}\left({\log\left({1+I{P_{max}}}\right)}\right)-\log\left({1{\rm{+}}\frac{{\Lambda_{2,M-1}^{2}{P_{max}}}}{{\Lambda_{1,M-1}^{2}\theta{P_{B}}}}}\right)}\right)\\ +\left({1-\alpha}\right)\log\left({1{\rm{+}}J\left({1-\theta}\right){P_{B}}}\right)\end{array} (63)

where

I=|𝐡D,nH𝐡C𝐰^𝐡C𝐰^|2I{\rm{=}}{\left|{{\bf{h}}_{D,n}^{H}\frac{{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}}{{\left\|{{\bf{h}}_{C}^{\bot}{\bf{\hat{w}}}}\right\|}}}\right|^{2}} (64)

and

J=|𝐡BCH(𝐈𝐆BNE(𝐆BNEH𝐆BNE)1𝐆BNEH)𝐡BC(𝐈𝐆BNE(𝐆BNEH𝐆BNE)1𝐆BNEH)𝐡BC|2.J={\left|{{\bf{h}}_{BC}^{H}\frac{{\left({{\bf{I}}-{{\bf{G}}_{BNE}}{{\left({{\bf{G}}_{BNE}^{H}{{\bf{G}}_{BNE}}}\right)}^{-1}}{\bf{G}}_{BNE}^{H}}\right){{\bf{h}}_{BC}}}}{{\left\|{\left({{\bf{I}}-{{\bf{G}}_{BNE}}{{\left({{\bf{G}}_{BNE}^{H}{{\bf{G}}_{BNE}}}\right)}^{-1}}{\bf{G}}_{BNE}^{H}}\right){{\bf{h}}_{BC}}}\right\|}}}\right|^{2}}. (65)

After the first order derivative, it is easy to obtain that the optimal θ\theta to maximize (68) is

θ=min(BB24AC2A,1)\theta^{*}{\rm{=}}\min(\frac{{-B-\sqrt{{B^{2}}-4AC}}}{{2A}},1) (66)

in which

A=(1α)JΛ1,M14PB3A=-(1-\alpha)J\Lambda_{1,M-1}^{4}P_{B}^{3} (67)
B=Λ2,M12PmaxΛ1,M12PB2JB=-\Lambda_{2,M-1}^{2}{P_{max}}\Lambda_{1,M-1}^{2}P_{B}^{2}J (68)

and

C=αΛ2,M12PmaxΛ1,M12PB2J+αΛ1,M12PBΛ2,M12PmaxC=\alpha\Lambda_{2,M-1}^{2}P_{\max}\Lambda_{1,M-1}^{2}P_{B}^{2}J+\alpha\Lambda_{1,M-1}^{2}{P_{B}}\Lambda_{2,M-1}^{2}P_{\max} (69)

In the suboptimal solution, we do not consider the individual power constraint of each UE in VAA. If the individual power constraint is unsatisfied, the suboptimal solution should be scaled to satisfy the individual power constraint.

VI Simulation Results

This section presents simulation results to validate the performance of our proposed algorithms. The transmit powers are normalized with AWGN power N0=1{N_{0}}=1. That is, the transmit power PP dB means the transmit power is 10P/10{10^{P/10}} times higher than the AWGN power. All channels are considered to be independent quasi-static block Rayleigh fading with 𝒞𝒩(0,1){\cal{CN}}(0,1)777We do not consider the specific distribution of each node, and set all channels are rayleigh distribution to reflect the randomness distribution of each node in this paper. . The simulation results are collected from Monte Carlo simulations with 100 independent channel realizations.

We first present the impact of the number of the D2D transmitter on the achievable rate. In Fig. 2, the number of eavesdroppers, LL is set to zero which corresponds to the normal D2DM communication scenario without the threat of eavesdroppers. Fig. 2 shows that, when M=1M=1, D2DM can achieve only a certain rate through the power control of the transmitter and the BS. While when M>1M>1, the rate of VD2DM increases dramatically, that is because multiple D2D transmitters could form a VAA and play cooperative beamforming to focus the signal on the D2D receiver who has the worst channel conditions. We note that the number of D2D transmitter M=1M=1 represents the traditional D2DM without the assistance of VAA, hence the results demonstrate that the VAA-aided communication can significantly improve the efficiency of D2D multicast communication compare to the traditional D2DM.

We then show the secrecy rate obtained via the aided of VAA under the threat of multiple eavesdroppers. In Fig. 3, when M=1M=1, D2DM can achieve a tiny secrecy rate by relying on the cooperative interference of the BS. However, when M>1M>1, the secrecy rate of VD2DM increases dramatically, because the multiple D2D transmitters form a VAA and play cooperative beamforming to focus the signal on the D2D receivers while prevent the eavesdroppers to overhear. Similar to Fig. 2, the number of D2D transmitter M=1M=1 represents the traditional secrecy D2DM communication without the help of VAA, hence the results in Fig. 3 validate the secrecy improvement brought by VAA.

Refer to caption
Figure 2: The achievable rate of D2DM versus PmaxP_{\rm{max}} with respect to different number of D2D transmitters, in which K=15,N=5,L=0K=15,N=5,L=0 and PB=40P_{B}=40 dB.
Refer to caption
Figure 3: The achievable secrecy rate of D2DM versus PmaxP_{\rm{max}} with respect to different number of D2D transmitters, in which K=15,N=5,L=5K=15,N=5,L=5 and PB=40P_{B}=40 dB.

We next present the achievable secrecy rate of VD2DM with respect to different maximum transmit power of D2D transmitter group. As can be seen in Fig. 4, the achievable secrecy rate of VD2DM monotonously increases with the increase of the maximum transmit power of D2D transmitter group. Also, a larger α\alpha will lead to a larger achievable secrecy rate. Further more, in the worst case, due to the strong overhearing capability provided by the receive VAA, the achievable secrecy rate is lower than that of the normal case. However, with the help of AN, the gap between the achievable secrecy rate of the worst case and that of the normal case is small, indicating that the proposed scheme can effectively secure the communication of VD2DM under the worst case. It is also shown in Fig.4 that the suboptimal secure solution proposed in Section V can provide a significant achievable secrecy rate, although it is not as good as the optimal solution.

Refer to caption
Figure 4: The achievable secrecy rate of D2DM versus PmaxP_{\rm{max}}, in which K=15,M=5,N=5,L=5K=15,M=5,N=5,L=5 and PB=40P_{B}=40 dB.
Refer to caption
Figure 5: The achievable rate of CUE with respect to PmaxP_{\rm{max}}, where K=15,M=5,N=5,L=5K=15,M=5,N=5,L=5 and PB=40P_{B}=40 dB.

In Fig. 5 we show the achievable rate of CUE as a function of the maximum transmit power of D2D transmitter group with different α\alpha. It is easy to see the maximum transmit power of D2D transmitter group has little effect on CUE’s achievable rate. That is because the proposed algorithms in the normal case and the worst case are to jointly maximize the achievable secrecy rate of VD2DM and achievable rate of CUE, hence the interference at CUE caused by VD2DM keeps limited to a small level. Also, in the suboptimal algorithm, the null-space beamforming ensures that VD2DM does not interfere with CUE. On the other hand, the reason why the achievable rate of the worst case is lower than that of the normal case is because in the worst case, BS need to split some energy to transmit AN, which decreases the energy to transmit the signal CUE desired. Another interesting observation shown in Fig. 5 is that, when α=0.9\alpha{\rm{=}}0.9, the achievable rate of the suboptimal solution is higher than that of both algorithm 1 and 2. That is because when α=0.9\alpha{\rm{=}}0.9, both algorithm 1 and 2 tend to achieve a higher secrecy rate of D2DM rather then a higher data rate of CUE, which yields more interference at CUE caused by D2D transmitters, By contrast, in the suboptimal scheme, the CUE is always under the null space of D2D transmitters, which means D2D transmitters never interfere with CUE and hence the rate of CUE of the suboptimal algorithm is higher than that of algorithm 1 and 2, note that, the weight sum rates of optimal algorithms are always higher than that of the suboptimal algorithm, whatever the value of α\alpha is.

In Fig. 6 we present the impacts of the number of eavesdroppers, LL, on the achievable secrecy rate. As the number of eavesdroppers increases, the achievable secrecy rate decreases. However, the decreasing trends of achievable secrecy rate are not obvious in both the normal case and the worst case. This is because the proposed algorithms can effectively limit the overhearing capacity of eavesdroppers by jointly optimizing the beamforming vector of the D2D transmitter group and BS. Another point of concern is that, for the suboptimal solution, when LL increases from 1 to 3, the decreasing trend of achievable secrecy rate is obvious, but when LL increases from 4 to 9, the decreasing trend is not obvious. At last, in the normal case and the worst case, the achievable data rates of CUE are almost unaffected by the number of eavesdroppers, since eavesdroppers only overhear VD2DM and the BS has enough power budget to transmit AN without affecting the transmission of sBs_{B}.

Refer to caption
Figure 6: Achievable rates with respect to different number of eavesdropper LL, where K=15,M=5,N=5K=15,M=5,N=5, α=0.5\alpha=0.5, Pmax=20{P_{\max}}=20 dB and PB=40{P_{B}}=40 dB.
Refer to caption
Figure 7: Achievable rates with respect to different number of D2D receivers NN, where K=15,M=5,L=5K=15,M=5,L=5, α=0.5\alpha=0.5, Pmax=20{P_{\max}}=20 dB and PB=40{P_{B}}=40 dB.
Refer to caption
Figure 8: Convergence behavior for the achievable rates, where K=15K=15, M=5M=5, N=5N=5, L=5L=5, α=0.5\alpha=0.5, Pmax=20{P_{\max}}=20 dB and PB=40{P_{B}}=40 dB.

The relationship between achievable rates and the number of D2D receivers is illustrated in Fig. 7. We can see that as the number of D2D receivers increases, the achievable secrecy rate decreases slowly. The reason why more D2D receivers result in lower achievable secrecy rate is because the larger the number of D2D receivers, the higher the probability of a poor channel condition of the worst channel receiver. However, the proposed algorithms in both the normal case and the worst case are max-min based algorithms which take care of the worst channel receivers. Hence, the trend of decreasing is slowly.

As above mentioned, as the number of receivers increase, it becomes more difficult to ensure communication security. Thus, the proposed algorithms trend to use the BS’s signals (such as signal desired by CUE and AN) to interfere with eavesdroppers for increasing the achievable secrecy rate, which makes the achievable rate of CUE decrease slowly.

At last, the overall convergence process of the proposed algorithms is shown in Fig. 8. It can be see that, setting the maximum iteration number of Algorithm 1 and 2 as five is enough to achieve the near optimal solution, which means the proposed algorithms can converge quickly.

VII Conclusion

This paper has studied the secure transmission design for a VAA-aided D2D multicast communication system under the threat of multiple eavesdroppers. By treating eavesdroppers as either independent ovearhearing or joint overhearing, respectively, two different non-convex optimization problems have been proposed and solved to achieve the sum data rate of both the cellular user equipment and the achievable secrecy rate of the D2D multicast communication. Also a time-saving suboptimal beamforming scheme has been proposed to adapt to the high dynamic network. Simulation results have validated the advantages of the VAA-aided D2D multicast scheme from the perspective of wireless communication security.

min𝐖𝟎,𝐖B𝟎,𝐐𝟎Tr(𝐖)+Tr(𝐖B)+Tr(𝐐)s.t.C1,C2C4′′′:log(1+Tr(𝐇BC𝐖B)Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1)RCworst𝐞RCworst(Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1)Tr(𝐇BC𝐖B+𝐐𝐇BC+𝐇C𝐖)10C6′′′:log(1+Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)φworst0𝐞φworst(Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)Tr(𝐇B,n𝐖B+𝐐𝐇B,n+𝐇D,n𝐖)10,n𝒩C24:(𝐞βworst1)(𝐆BH𝐖B𝐆B+𝐆BH𝐐𝐆B+𝐈L)𝐆EH𝐖𝐆E𝟎.\begin{array}[]{l}\mathop{\min}\limits_{{\bf{W}}\succeq{\bf{0}},{{\bf{W}}_{B}}\succeq{\bf{0}},{\bf{Q}}\succeq{\bf{0}}}{\rm{Tr}}\left({{{\bf{W}}}}\right)+{\rm{Tr}}\left({{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({\bf{Q}}\right)\\ {\rm{s}}{\rm{.t}}{\rm{.C1^{\prime},C2^{\prime}}}\\ {\rm{C}}4^{\prime\prime\prime}:\log\left({1+\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{BC}{{\bf{W}}_{B}}}\right)}}{{{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{BC}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{C}{\bf{W}}}\right)+1}}}\right)\geq R_{C}^{worst*}\\ {\Leftrightarrow{{\bf{e}}^{R_{C}^{worst*}}}\left({{\rm{Tr}}\left({{\bf{QH}}_{BC}}\right)+{\rm{Tr}}\left({{\bf{H}}_{C}{\bf{W}}}\right)+1}\right)-{\rm{Tr}}\left({{\bf{H}}_{BC}{{\bf{W}}_{B}}+{\bf{QH}}_{BC}+{\bf{H}}_{C}{\bf{W}}}\right)-1\leq 0}\\ {\rm{C6^{\prime\prime\prime}:}}\log\left({1+\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)}}{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,n}}\right)+1}}}\right)-\varphi^{worst*}\geq 0\\ {\Leftrightarrow{{\bf{e}}^{\varphi^{worst*}}}\left({{\rm{Tr}}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\rm{Tr}}\left({{\bf{QH}}_{B,n}}\right)+1}\right)-{\rm{Tr}}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}+{\bf{QH}}_{B,n}+{\bf{H}}_{D,n}{\bf{W}}}\right)-1\leq 0,\forall n\in\cal{N}}\\ {\rm{C24^{\prime}:}}\left({{{\bf{e}}^{{\beta^{worst*}}}}-1}\right)\left({{\bf{G}}_{B}^{H}{{\bf{W}}_{B}}{\bf{G}}_{B}+{\bf{G}}_{B}^{H}{\bf{QG}}_{B}+{{\bf{I}}_{L}}}\right)-{\bf{G}}_{E}^{H}{\bf{WG}}_{E}\succeq{\bf{0}}.\end{array} (70)
L(𝐖,𝐖B,𝐐,ε,λ,μ,νn,𝐀,𝐁,𝐂,𝐃)=Tr(𝐖)+Tr(𝐖B)+Tr(𝐐)+m=1Mεm(𝐖[m]Pmax/M)+λ(Tr(𝐖B)+Tr(𝐐)PB)+μ(𝐞RCworst(Tr(𝐐𝐇BC)+Tr(𝐇C𝐖)+1)Tr(𝐇BC𝐖B+𝐐𝐇BC+𝐇C𝐖)1)+n=1Nνn(𝐞φworst(Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)Tr(𝐇B,n𝐖B+𝐐𝐇B,n+𝐇D,n𝐖)1)+Tr(𝐀(1𝐞βworst)(𝐆BH𝐖B𝐆B+𝐆BH𝐐𝐆B+𝐈L)+𝐀𝐆EH𝐖𝐆E)Tr(𝐁𝐖)Tr(𝐂𝐖B)Tr(𝐃𝐐).\begin{array}[]{l}L\left({{\bf{W}},{{\bf{W}}_{B}},{\bf{Q}},\varepsilon,\lambda,\mu,{\nu_{n}},{\bf{A}},{\bf{B,C,D}}}\right)=\\ {\rm{Tr}}\left({{{\bf{W}}}}\right)+{\rm{Tr}}\left({{{\bf{W}}_{B}}}\right)\!+\!{\mathop{\rm Tr}\nolimits}\left(\!{\bf{Q}}\!\right){\rm{\!+\!}}\sum\limits_{m=1}^{M}{{\varepsilon_{m}}\left({{\bf{W}}\left[m\right]-{P_{\max}}/M}\right)}\!+\!\lambda\left(\!{{\rm{Tr}}\left(\!{{{\bf{W}}_{B}}}\!\right)\!+\!{\mathop{\rm Tr}\nolimits}\left(\!{\bf{Q}}\!\right)\!-\!{P_{B}}}\!\right)\\ {+\mu\left({{{\bf{e}}^{R_{C}^{worst*}}}\left({{\rm{Tr}}\left({{\bf{QH}}_{BC}}\right)+{\rm{Tr}}\left({{\bf{H}}_{C}{\bf{W}}}\right)+1}\right)-{\rm{Tr}}\left({{\bf{H}}_{BC}{{\bf{W}}_{B}}+{\bf{QH}}_{BC}+{\bf{H}}_{C}{\bf{W}}}\right)-1}\right)}\\ {+\sum\limits_{n=1}^{N}{{\nu_{n}}\left({{{\bf{e}}^{\varphi^{worst*}}}\left({{\rm{Tr}}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{\rm{Tr}}\left({{\bf{QH}}_{B,n}}\right)+1}\right)-{\rm{Tr}}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}+{\bf{QH}}_{B,n}+{\bf{H}}_{D,n}{\bf{W}}}\right)-1}\right)}}\\ +{\mathop{\rm Tr}\nolimits}\left({{\bf{A}}\left({1-{{\bf{e}}^{{\beta^{worst*}}}}}\right)\left({{\bf{G}}_{B}^{H}{{\bf{W}}_{B}}{\bf{G}}_{B}+{\bf{G}}_{B}^{H}{\bf{QG}}_{B}+{{\bf{I}}_{L}}}\right)+{\bf{AG}}_{E}^{H}{\bf{WG}}_{E}}\right)-{\mathop{\rm Tr}\nolimits}({\bf{BW}})-{\mathop{\rm Tr}\nolimits}({\bf{C}}{{\bf{W}}_{B}})-{\mathop{\rm Tr}\nolimits}({\bf{DQ}}).\end{array} (71)

Appendix A Proof of Proposition 1

Let βworst{\beta^{worst}}^{*} be the optimal solution of the outer-level optimization problem, 𝐖,𝐖B,𝐐{\bf{W}}^{*},{\rm{}}{\bf{W}}_{B}^{*},{\rm{}}{\bf{Q}}^{*} and φworst\varphi^{worst*} be the optimal solution of the inner-level problem (45) with fixed βworst{\beta^{worst}}^{*} (in this case, 𝐖,𝐖B,𝐐{\bf{W}}^{*},{\rm{}}{\bf{W}}_{B}^{*},{\rm{}}{\bf{Q}}^{*} and φworst\varphi^{worst*} are also the optimal solution of (44)). Then, we formulate the following power minimization problem (54) on the top of this page. Let 𝐖¯,𝐖¯B{\bf{\bar{W}}},{\rm{}}{\bf{\bar{W}}}_{B} and 𝐐¯{\bf{\bar{Q}}} be the optimal solutions of (54), following Appendix B in [40], we have 𝐖¯,𝐖¯B{\bf{\bar{W}}},{\rm{}}{\bf{\bar{W}}}_{B} and 𝐐¯{\bf{\bar{Q}}} are also the optimal solution of (45) with fixed βworst{\beta^{worst*}}.

Then, we write the Lagrangian associated with (54) as (55) on the top of previous page, in which 𝐀𝟎,𝐁𝟎,𝐂𝟎,𝐃𝟎,εm0,λ0,μ0{\bf{A}}\succeq{\bf{0}},{\bf{B}}\succeq{\bf{0}},{\bf{C}}\succeq{\bf{0}},{\bf{D}}\succeq{\bf{0}},\varepsilon_{m}\geq 0,\lambda\geq 0,\mu\geq 0 and νn0,n𝒩{\nu_{n}}\geq 0,{\rm{}}\forall n\in{{\cal N}} are the dual variables corresponding to primal constraints in (54). Let 𝐈ε=diag([ε1,ε2,,εM]){{\bf{I}}_{\varepsilon}}{\rm{=diag([}}{\varepsilon_{1}}{\rm{,}}{\varepsilon_{2}},\ldots,{\varepsilon_{M}}{\rm{])}}, the KKT conditions that are relevant to 𝐖¯{\bf{\bar{W}}} are given by

𝐈+𝐈ε+μ(𝐞RCworst1)𝐇Cn=1Nνn𝐇D,n+𝐆E𝐀𝐆EH𝐁=𝟎{\bf{I}}+{{\bf{I}}_{\varepsilon}}+\mu\left({{{\bf{e}}^{R_{C}^{worst*}}}-1}\right){\bf{H}}_{C}-\sum\limits_{n=1}^{N}{{\nu_{n}}{\bf{H}}_{D,n}}+{\bf{G}}_{E}{\bf{AG}}_{E}^{H}-{\bf{B}}=\bf{0} (72)
νn(𝐞φworstTr(𝐇B,n𝐖B)+𝐞φworstTr(𝐐𝐇B,n)+𝐞φworstTr(𝐇B,n𝐖B)Tr(𝐐𝐇B,n)Tr(𝐇D,n𝐖)1)=0\begin{array}[]{l}{\nu_{n}}\left({}\right.{{\bf{e}}^{\varphi^{worst*}}}{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)+{{\bf{e}}^{\varphi^{worst*}}}{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,n}}\right)+{{\bf{e}}^{\varphi^{worst*}}}\\ -{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\right)-{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,n}}\right)-{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,n}{\bf{W}}}\right)-1\left.{}\right){\rm{=}}0\end{array} (73)
𝐖¯𝟎{\bf{\bar{W}}}\succeq{\bf{0}} (74)
𝐁𝐖¯=𝟎.{\bf{B\bar{W}}}{\rm{=}}{\bf{0}}. (75)

Postmultiplying (56) by 𝐖¯{\bf{\bar{W}}} and making use of (59) yield

(𝐈+𝐈ε+μ(𝐞RCworst1)𝐇C+𝐆E𝐀𝐆EH)𝐖¯=(n=1Nνn𝐇D,n)𝐖¯.\left({{\bf{I}}+{{\bf{I}}_{\varepsilon}}+\mu\left({{{\bf{e}}^{R_{C}^{worst*}}}-1}\right){\bf{H}}_{C}{\rm{+}}{\bf{G}}_{E}{\bf{AG}}_{E}^{H}}\right){\bf{\bar{W}}}=\left({\sum\limits_{n=1}^{N}{{\nu_{n}}{\bf{H}}_{D,n}}}\right){\bf{\bar{W}}}. (76)

Since 𝐈+𝐈ε+μ(𝐞RCworst1)𝐇C+𝐆E𝐀𝐆EH0{\bf{I}}+{{\bf{I}}_{\varepsilon}}+\mu\left({{{\bf{e}}^{R_{C}^{worst*}}}-1}\right){\bf{H}}_{C}{\rm{+}}{\bf{G}}_{E}{\bf{AG}}_{E}^{H}\succ 0, we have

Rank(𝐖¯)=Rank((n=1Nνn𝐇D,n)𝐖¯)min(Rank(n=1Nνn𝐇D,n),Rank(𝐖¯)).\begin{array}[]{l}{\rm{Rank}}\left({{\bf{\bar{W}}}}\right){\rm{=Rank}}\left({\left({\sum\limits_{n=1}^{N}{{\nu_{n}}{\bf{H}}_{D,n}}}\right){\bf{\bar{W}}}}\right)\leq\min\left({{\rm{Rank}}\left({\sum\limits_{n=1}^{N}{{\nu_{n}}{\bf{H}}_{D,n}}}\right),{\rm{Rank}}\left({{\bf{\bar{W}}}}\right)}\right).\end{array} (77)

From (61) we still can hardly calculate the rank of 𝐖¯{\bf{\bar{W}}}, since the rank of n=1Nνn𝐇D,n\sum\limits_{n=1}^{N}{{\nu_{n}}{\bf{H}}_{D,n}} is hardly to be known. However, combining complementary relaxation condition (57) and C6′′′{\rm{C6^{\prime\prime\prime}}}in (54), we can conclude that for any n𝒩\forall n\in{{\cal N}}

{νn0,iflog(1+Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)φworst=0νn=0,iflog(1+Tr(𝐇D,n𝐖)Tr(𝐇B,n𝐖B)+Tr(𝐐𝐇B,n)+1)φworst>0.\left\{\begin{array}[]{l}{\nu_{n}}\!\geq\!0,\!{\rm{if}}\!\log\!\left(\!{1\!+\!\frac{{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{D,n}{\bf{W}}}\!\right)}}{{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\!\right)\!+\!{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{QH}}_{B,n}}\!\right)\!+1}}}\!\right)\!-\!\varphi^{worst*}\!=\!0\\ {\nu_{n}}\!=\!0,\!{\rm{if}}\log\!\left(\!{1\!+\!\frac{{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{D,n}{\bf{W}}}\!\right)}}{{{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{H}}_{B,n}{{\bf{W}}_{B}}}\!\right)\!+\!{\mathop{\rm Tr}\nolimits}\left(\!{{\bf{QH}}_{B,n}}\!\right)\!+\!1}}}\!\right)\!-\!\varphi^{worst*}\!>\!0.\end{array}\right. (78)

Hence, if there has only one n~\tilde{n} that makes log(1+Tr(𝐇D,n~𝐖)Tr(𝐇B,n~𝐖B)+Tr(𝐐𝐇B,n~)+1)φworst=0\log\left({1+\frac{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{D,\tilde{n}}{\bf{W}}}\right)}}{{{\mathop{\rm Tr}\nolimits}\left({{\bf{H}}_{B,\tilde{n}}{{\bf{W}}_{B}}}\right)+{\mathop{\rm Tr}\nolimits}\left({{\bf{QH}}_{B,\tilde{n}}}\right)+1}}}\right)-\varphi^{worst*}{\rm{=}}0, we have n=1Nνn𝐇D,nνn~𝐇D,n~or 0\sum\limits_{n=1}^{N}{{\nu_{n}}{\bf{H}}_{D,n}}\to{\nu_{\tilde{n}}}{\bf{H}}_{D,\tilde{n}}{\rm{\;or\;}}{\bf{0}} which is of rank one and then we can drive the following inequation (63) from (61), which implies Rank(𝐖¯)= 1or 0{\rm{Rank}}\left({{\bf{\bar{W}}}}\right){\rm{=}}\;1\;{\rm{or\;0}}. Because Rank(𝐖¯)=0{\rm{Rank}}\left({{\bf{\bar{W}}}}\right){\rm{=0}} means all zero matrix which is meaningless, we have Rank(𝐖¯)=1{\rm{Rank}}\left({{\bf{\bar{W}}}}\right){\rm{=}}1.

Rank(𝐖¯)min(Rank(νn~𝐇D,n~)or 0,Rank(𝐖¯))min(1or 0,Rank(𝐖¯)).\begin{array}[]{l}{\rm{Rank}}\left({{\bf{\bar{W}}}}\right)\leq\min\left({{\rm{Rank}}\left({{\nu_{\tilde{n}}}{\bf{H}}_{D,\tilde{n}}}\right){\rm{\;or\;0,Rank}}\left({{\bf{\bar{W}}}}\right)}\right)\min\left({1\;{\rm{or\;0}},{\rm{Rank}}\left({{\bf{\bar{W}}}}\right)}\right).\end{array} (79)

References

  • [1] C. Kai, H. Li, L. Xu, Y. Li, and T. Jiang, “Energy-efficient device-to-device communications for green smart cities,” IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1542–1551, 2018.
  • [2] M. Peer, V. A. Bohara, and A. Srivastava, “Cache selection in dynamic d2d multicast networks using inhomogeneous markov model,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 3235–3245, 2020.
  • [3] M. Elnourani, S. Deshmukh, and B. Beferull-Lozano, “Distributed resource allocation in underlay multicast d2d communications,” IEEE Transactions on Communications, vol. 69, no. 5, pp. 3409–3422, 2021.
  • [4] J. Peng, H. Qiu, J. Cai, W. Xu, and J. Wang, “D2d-assisted multi-user cooperative partial offloading, transmission scheduling and computation allocating for mec,” IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 4858–4873, 2021.
  • [5] T. Fang, F. Yuan, L. Ao, and J. Chen, “Joint task offloading, d2d pairing and resource allocation in device-enhanced mec: A potential game approach,” IEEE Internet of Things Journal, pp. 1–1, 2021.
  • [6] M. Mehrabi, D. You, V. Latzko, H. Salah, M. Reisslein, and F. H. P. Fitzek, “Device-enhanced mec: Multi-access edge computing (mec) aided by end device computation and caching: A survey,” IEEE Access, vol. 7, pp. 166 079–166 108, 2019.
  • [7] S. Yu, B. Dab, Z. Movahedi, R. Langar, and L. Wang, “A socially-aware hybrid computation offloading framework for multi-access edge computing,” IEEE Transactions on Mobile Computing, vol. 19, no. 6, pp. 1247–1259, 2020.
  • [8] D. Wang, Y. Lan, T. Zhao, Z. Yin, and X. Wang, “On the design of computation offloading in cache-aided d2d multicast networks,” IEEE Access, vol. 6, pp. 63 426–63 441, 2018.
  • [9] R. Karasik, O. Simeone, and S. Shamai Shitz, “How much can d2d communication reduce content delivery latency in fog networks with edge caching?” IEEE Transactions on Communications, vol. 68, no. 4, pp. 2308–2323, 2020.
  • [10] M. S. Al-Abiad and M. J. Hossain, “A low-complexity multicast scheduling for d2d-aided f-rans using network coding,” IEEE Wireless Communications Letters, vol. 10, no. 11, pp. 2484–2488, 2021.
  • [11] F. Jiang, L. Zhang, C. Sun, and Z. Yuan, “Clustering and resource allocation strategy for d2d multicast networks with machine learning approaches,” China Communications, vol. 18, no. 1, pp. 196–211, 2021.
  • [12] L. Yang, D. Wu, S. Xu, G. Zhang, and Y. Cai, “Social-energy-aware user clustering for content sharing based on d2d multicast communications,” IEEE Access, vol. 6, pp. 36 092–36 104, 2018.
  • [13] L. Yang, D. Wu, Y. Cai, X. Shi, and Y. Wu, “Learning-based user clustering and link allocation for content recommendation based on d2d multicast communications,” IEEE Transactions on Multimedia, vol. 22, no. 8, pp. 2111–2125, 2020.
  • [14] A. Bhardwaj and S. Agnihotri, “Energy- and spectral-efficiency trade-off for d2d-multicasts in underlay cellular networks,” IEEE Wireless Communications Letters, vol. 7, no. 4, pp. 546–549, 2018.
  • [15] H. Meshgi, D. Zhao, and R. Zheng, “Optimal resource allocation in multicast device-to-device communications underlaying lte networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 8357–8371, 2017.
  • [16] J. Yue, C. Ma, H. Yu, and W. Zhou, “Secrecy-based access control for device-to-device communication underlaying cellular networks,” IEEE Communications Letters, vol. 17, no. 11, pp. 2068–2071, 2013.
  • [17] R. Zhang, X. Cheng, and L. Yang, “Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5651–5663, 2016.
  • [18] M. Ahmed, H. Shi, X. Chen, Y. Li, M. Waqas, and D. Jin, “Socially aware secrecy-ensured resource allocation in d2d underlay communication: An overlapping coalitional game scheme,” IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 4118–4133, 2018.
  • [19] J. Wang, Q. Tang, C. Yang, R. Schober, and J. Li, “Security enhancement via device-to-device communication in cellular networks,” IEEE Signal Processing Letters, vol. 23, no. 11, pp. 1622–1626, 2016.
  • [20] J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, “Resource management for device-to-device communication: A physical layer security perspective,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946–960, 2018.
  • [21] Y. Zhang, Y. Shen, X. Jiang, and S. Kasahara, “Mode selection and spectrum partition for d2d inband communications: A physical layer security perspective,” IEEE Transactions on Communications, vol. 67, no. 1, pp. 623–638, 2019.
  • [22] P. Chen, X. Zhou, J. Zhao, F. Shen, and S. Sun, “Energy-efficient resource allocation for secure d2d communications underlaying uav-enabled networks,” IEEE Transactions on Vehicular Technology, pp. 1–1, 2022.
  • [23] M. Alibeigi, A. Taherpour, and S. Gazor, “Improving secrecy rate and social welfare by noma technique in d2d communications network,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 2, pp. 907–916, 2022.
  • [24] S. Yan, Y. Shang, and Y. Huang, “Social-aware jamming allocation for physical-layer security in d2d multicast network,” in 2018 IEEE Conference on Communications and Network Security (CNS), 2018, pp. 1–7.
  • [25] A. Qu, X. Zhang, K. An, G. Zheng, and S. Chatzinotas, “Secure transmission in massive mimo system with specular component-based beamforming and artificial noise over ricean fading channel,” IEEE Wireless Communications Letters, vol. 10, no. 11, pp. 2479–2483, 2021.
  • [26] A. Mukherjee, B. Ottersten, and L.-N. Tran, “On the secrecy capacity of mimo wiretap channels: Convex reformulation and efficient numerical methods,” IEEE Transactions on Communications, vol. 69, no. 10, pp. 6865–6878, 2021.
  • [27] Q. Shi, W. Xu, J. Wu, E. Song, and Y. Wang, “Secure beamforming for mimo broadcasting with wireless information and power transfer,” IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp. 2841–2853, 2015.
  • [28] D. M, “Virtual antenna arrays,” Ph.D. dissertation, King’s College London (University of London), 2003.
  • [29] S. J. Shattil, “Cooperative beam-forming in wireless networks,” 2014.
  • [30] G. Jakllari, S. V. Krishnamurthy, M. Faloutsos, P. V. Krishnamurthy, and O. Ercetin, “A cross-layer framework for exploiting virtual miso links in mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 579–594, 2007.
  • [31] H. Jung and I.-H. Lee, “Secrecy rate of analog collaborative beamforming with virtual antenna array following spatial random distributions,” IEEE Wireless Communications Letters, vol. 7, no. 4, pp. 626–629, 2018.
  • [32] H. Jung, S.-W. Ko, and I.-H. Lee, “Secure transmission using linearly distributed virtual antenna array with element position perturbations,” IEEE Transactions on Vehicular Technology, vol. 70, no. 1, pp. 474–489, 2021.
  • [33] H. Ding, C. Xing, S. Ma, G. Yang, and Z. Fei, “Transmission capacity of clustered ad hoc networks with virtual antenna array,” IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 6926–6939, 2016.
  • [34] C. Buratti and A. Zanella, “Capacity analysis of two-hop virtual mimo systems in a poisson field of nodes,” in VTC Spring 2009 - IEEE 69th Vehicular Technology Conference, 2009, pp. 1–6.
  • [35] H.-C. Lu and W. Liao, “Cooperative strategies in wireless relay networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 323–330, 2012.
  • [36] S.-C. Wang and W. Liao, “Cooperative multicasting for wireless scalable video transmissions,” IEEE Transactions on Communications, vol. 61, no. 9, pp. 3980–3989, 2013.
  • [37] L. Lei, Z. Zhong, C. Lin, and X. Shen, “Operator controlled device-to-device communications in lte-advanced networks,” IEEE Wireless Communications, vol. 19, no. 3, pp. 96–104, 2012.
  • [38] Brandwood and H. D., “A complex gradient operator and its application in adaptive array theory,” Microwaves, Optics and Antennas, IEE Proceedings H, 1983.
  • [39] C. Kai, H. Li, L. Xu, Y. Li, and T. Jiang, “Joint subcarrier assignment with power allocation for sum rate maximization of d2d communications in wireless cellular networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 5, pp. 4748–4759, 2019.
  • [40] Q. Li and W.-K. Ma, “Spatially selective artificial-noise aided transmit optimization for miso multi-eves secrecy rate maximization,” IEEE Transactions on Signal Processing, vol. 61, no. 10, pp. 2704–2717, 2013.
  • [41] Z.-q. Luo, W.-k. Ma, A. M.-c. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20–34, 2010.