We investigate a secure multiuser time division multiple access (TDMA) system with statistical delay quality of service (QoS) guarantee in terms of secure effective capacity. An optimal resource allocation policy is proposed to minimize the β-fair cost function of the average user power under the individual QoS constraint, which also balances the energy efficiency and fairness among the users. First, convex optimization problems associated with the resource allocation policy are formulated. Then, a subgradient iteration algorithm based on the Lagrangian duality theory and the dual decomposition theory is employed to approach the global optimal solutions. Furthermore, considering the practical channel conditions, we develop a stochastic subgradient iteration algorithm which is capable of dynamically learning the intended wireless channels and acquiring the global optimal solution. It is shown that the proposed optimal resource allocation policy depends on the delay QoS requirement and the channel conditions. The optimal policy can save more power and achieve the balance of the energy efficiency and the fairness compared with the other resource allocation policies.
International Science & Technology Cooperation Program of China2015DFG12580National Natural Science Foundation of China6177129161571272Key R&D Program of Shandong Province2018GGX101009Shandong University2016JC010Ministry of Science, ICT (MSIT), South KoreaIITP-2018-2014-1-007291. Introduction
Due to the broadcast nature of wireless communications, much more attention has been paid to the issues of privacy and security in wireless communication networks. Traditionally, security is achieved by cryptographic encryption protocols of the upper layers. However, the security of encryption will be invalid if the wiretappers have huge computational power. From the information-theoretic perspective, physical-layer security can guarantee the reliable secure transmission via utilizing the physical characteristics of wireless channels. The concept of information-theoretic secrecy was originally introduced by Shannon [1]. Then, a relaxed notion of secrecy was presented by Wyner in his seminal work [2] based on the concept of a wiretap channel model. It is shown that the transmitter can securely transmit the messages to the receiver with a non-zero rate (called secrecy rate) if the receiver enjoys better channel conditions than the eavesdropper. The results were subsequently extended to the broadcast channels [3] and Gaussian channel [4], respectively. Various physical-layer techniques, such as the use of interference or artificial noise to confuse the eavesdropper, the multi-antenna, beamforming, and resource allocation techniques, were proposed in [5–8] to improve the secrecy capacity, also known as the largest secrecy rate.
In recent years, a large amount of work has been devoted to the resource allocation based on physical-layer security. In [9–12], resource allocation schemes of OFDM secrecy systems were studied in the case of single-user system, two-user system, and multiuser system, respectively. Specifically, joint power and subcarrier allocation were investigated for the network with the coexistence of secure users and normal users [11]. Furthermore, a joint subcarrier and power allocation algorithm with artificial noise was designed in [12] to improve the security of the OFDM wiretap channels. In addition, the secure resource allocation was widely investigated in relay networks. Reference [13] considered an amplify-and-forward (AF) relay-aided secure multicarrier communication system and solved the resource allocation problem to maximize the sum secrecy rate. On the other hand, J. Huang proposed the cooperative jamming strategies for two-hop relay networks and investigated the optimization problem of maximizing the secrecy rate with certain power constraints and minimizing the transmit power with a fixed secrecy rate [14]. Moreover, large-scale multiple-input multiple-output (MIMO) technique was exploited by the relay system in the presence of a passive eavesdropper and an energy-efficient power allocation scheme was proposed in [15]. Recently, some researchers also focused on the secure resource allocation problem of the cognitive radio networks (CRNs) [16]. In [17], instantaneous and ergodic resource allocation problems were investigated in CRNs with guaranteed secrecy rate of the primary users. Secure robust resource allocation was taken into account for the relay-assisted CRNs in [18]. Different from the above two literatures, [19] proposed the power allocation policy for the physical-layer security in cognitive relay networks from the perspective of auction theory. Device-to-Device (D2D) communications have also been proposed recently to improve the spectral efficiency. Physical-layer security in D2D communications was studied in [20–22] and the corresponding resource allocation schemes were proposed.
It is worth mentioning that the framework employed above is not suitable for the delay-sensitive multimedia applications since Shannon theory places no restriction on the delay of the transmission scheme. However, delay-tolerant guarantee as one of the essential QoS merits plays a pivotal important role in the secure communications. Furthermore, deterministic delay bound QoS is commonly not available in wireless networks due to the unpredictable nature of the wireless fading channels. Based on the effective capacity theory proposed by Wu and Negi in [23, 24], our preliminary work has investigated the delay QoS guarantee for secrecy system [25], which took the secure effective capacity as the QoS metric. Reference [26] also discussed the security problem under the QoS constraints for CR system with similar method. Secure effective capacity framework based on the effective capacity theory is employed as a bridge for the cross-layer model, where the queue at the data link layer can be served by the resource allocation scheme of the physical layer. It is a convenient approach to investigate the QoS support mechanisms for wireless secure communications.
As the extended application of the secure effective capacity for secure wireless networks, we propose a cross-layer model based power and time slot allocation policy for wiretap time division multiple access (TDMA) systems, where the delay-tolerant requirement is considered. Regarding the existence of multiple users in the system, a class of so-called β-fair cost functions was introduced to balance the energy efficiency and the fairness [27]. First, we discuss the issue of minimizing a general cost function of the average user power subjected to the delay QoS constraint of the individual user. A dual-based iterative algorithm based on the Lagrangian dual technique [28, 29] and the dual decomposition theory [30, 31] is employed to solve the optimization problem. In addition, according to the stochastic optimization theory, we develop a stochastic subgradient iterative algorithm with unknown cumulative distribution function (CDF) of the fading channel, which can dynamically learn the underlying channel distribution and approach the optimal solution. Then, we also provide the non-delayed policy without considering the delay QoS requirement for comparison.
To summarize, the main contributions of this work are as follows.
(1) The secure effective capacity based on the cross-layer framework is employed for the wiretap TDMA system.
(2) Based on the cross-layer framework, two resource allocation schemes are addressed, the optimal resource allocation policy, and the non-delayed resource allocation policy. The optimal policy adaptively allocates the power and time slot to minimize the utility functions of the average user power subjected to the delay QoS requirement. The non-delayed policy minimizes the objective function without considering the delay QoS guarantee.
(3) The optimization problem is solved and analyzed based on the Lagrangian duality theory and the stochastic optimization theory. The optimal policy can get better energy efficiency and also achieve the balance of the energy efficiency and the fairness.
The rest of the paper is organized as follows. Section 2 describes the system model and the delay QoS guarantee. The optimal resource allocation algorithm and the non-delayed resource allocation policy are proposed in Sections 3 and 4, respectively. Section 5 provides the numerical results to illustrate the performance of the proposed resource allocation schemes. Finally, conclusions and discussions are drawn in Section 6.
2. System Overview and Delay QoS Guarantee
In this section, we first present the system model of the wiretap TDMA system. Then, the issues of the statistical delay QoS guarantee are addressed based on the secure effective capacity.
2.1. System Model
In this paper, we investigate a network consisting of multiple users, one legitimate receiver, and one eavesdropper. L users communicate with the legitimate receiver in the presence of an eavesdropper, which is shown in Figure 1. All the users are equipped with single antenna, and the solid and dash lines represent the main and the wiretap links, respectively. We adopt the TDMA scheme as the multiple access scheme to eliminate the multiuser interference in the system and the channel is shared by multiple users at different time slots. For user l, let hl and gl denote the main and the wiretap channel power gains, respectively. We assume a discrete-time block-fading channel model such that hl and gl remain constant within a frame duration Tf but experience a jointly stationary and ergodic fading process from one frame to another with continuously joint known probability density function (PDF). Then, at time slot n, the received signals at the legitimate receiver and the eavesdropper from the transmit user l are given by(1)yln=hlnxln+aln,zln=glnxln+bln,respectively, where xl(n) represents the transmitted signal, and al(n) and bl(n) denote the corresponding additive white Gaussian noise (AWGN) with zero-mean and unit variance at the the legitimate receiver and the eavesdropper, respectively. Like [5, 7], we suppose that all the users have full knowledge of both the main channel state information (CSI) and the wiretap CSI which are described by the vectors h:=h1,…,hLT and g:=g1,…,gLT, respectively, where ·T denotes the transposition. Herein, we neglect the time reference for simplicity. We assume that each time slot is shared by multiple users over non-overlapping and dedicated time fractions τll=1L. Without loss of generality, each frame duration is supposed to be normalized as Tf=1 and we have ∑l=1Lτl≤1. We further assume that the users allocated no transmission time slots will not be allocated any power. Given τl and the corresponding transmit power pl, the instantaneous secrecy rate of the l-th user is given by [32, 33] as follows:(2)rsecτl,pl=τllog21+hlplτl-log21+glplτl,τl>0,hl>gl0,elsewhich shows that the secrecy can be achieved when the main channel is better than the eavesdropper channel; i.e., hl>gl.
System model of the multiuser TDMA secrecy networks.
2.2. Delay QoS Guarantee
In this subsection, we utilize the secure effective capacity to measure the throughput of the secrecy system under QoS constraint. The effective capacity characterizes the maximum constant arrival rate that the channel can support and guarantees a given delay QoS requirement.
The information source stream from the upper layers and the service process driven by the resource control scheme at the physical layer are matched via the queue at the data link layer. It is assumed that the source message stream has a specified delay bound Dmax [23, 24] and the violation probability of the delay bound should not be larger than a certain nonnegative value ε as(3)PrD∞>Dmax≤ε,where D(∞) is the delay experienced by a source message stream in a steady state. Then, we mark the QoS requirement of the source message stream as {Dmax,ε}. As shown in [24], the effective capacity is related to the theory of large deviations. The probability of D(∞) exceeding the delay bound Dmax can be expressed as follows:(4)PrD>Dmax≈e-θ∗EBDmax,where EB is defined as the effective bandwidth of the source message stream, θ∗ is a value obtained by solving the function EC(θ)=EB, and EC(θ) represents the effective capacity denoted as(5)ECθ=limM→∞-1MθlogEexp-θ∑n=0MRn,where θ is a positive constant termed as QoS exponent and R[n],n=0,1,2,… is a discrete-time, stationary, and ergodic stochastic service process. E[·] is the expectation operator. When the service processes are uncorrelated, the effective capacity can be expressed as(6)ECθ=-1θlogEexp-θRn.
Note that, for the secrecy system mentioned in this paper, if the channel gains during one frame satisfy hl>gl, the transmit data can be securely transferred at the non-zero secrecy rate. Thus, the secure effective capacity can be mathematically calculated as(7)Esecθ=-1θlogEe-θRsec.
Obviously, the secure effective capacity bounded by the minimal service rate is a monotonically decreasing function of θ. Given the delay bound Dmax, the delay violation probability can be characterized by the QoS exponent θ. A small θ corresponds to a loose violation probability requirement, while a large θ matches a strict QoS requirement. For multimedia applications, the secure effective capacity can be calculated with given θ. Only if Esec(θ)≥EB holds, the delay QoS guarantee can be satisfied.
3. Resource Allocation Policy with Delay QoS Guarantee
In this section, we investigate the joint power and time slot allocation policy to minimize the total cost of average power subjected to the given delay QoS constraint specified by the secure effective capacity of each user. The cost function is a β-fair cost function with a nonnegative parameter β which can be employed to formulate the fair energy-efficient resource allocation and it is shown as(8)Vβ·=·1+β1+β.It is a convex and monotonically increasing function. The β-fairness is achieved by distributing the power to the user link that has consumed the smallest amount of power. The function achieves power minimization which seeks the most energy-efficient resource allocation with β=0 and min-max fairness with β→∞ as two special cases.
To guarantee the QoS requirement of the secrecy system, the secure effective capacity with the corresponding delay QoS exponent should be no less than the effective bandwidth denoted as E:=E1,…,ELT. Let p¯:=p¯1,…,p¯LT, τ(h,g):=τ1h,g,…,τLh,gT, and p(h,g):=p1h,g,…,pLh,gT represent the average user power vector, the time fraction vector, and the power vector adapted to the CSI h and g, respectively. Thus, we can formulate the optimization problem as(9)minp¯,τh,g,ph,g∑l=1LVβp¯ls.t.p¯l≥Eh,gplh,g,-1θllogEh,ge-θlrsecτlh,g,plh,g≥El,∑l=1Lτlh,g≤1,τlh,g≥0,plh,g≥0,where θl represents the QoS exponent of the l-th user and l=1,…,L. We find that the objective function in (9) is convex with respect to pl¯ and the second constraint can be converted into(10)Eh,ge-θlrsecτlh,g,plh,g≤e-θlEl.
By evaluating the Hessian matrix rsecτlh,g,plh,g at τl(h,g) and pl(h,g), we can prove that rsecτlh,g,plh,g is a jointly concave function of τl(h,g) and pl(h,g). Since the expectation and exponent operations preserve the concavity, the constraint in (10) is also convex. In addition, the remaining constraints are all convex. Hence, (9) is a convex optimization problem with unique optimal solution.
3.1. Optimal Resource Allocation Algorithm
In this subsection, an optimal time slot and power allocation algorithm for the optimization problem (9) is proposed based on the Lagrangian dual technique in [28]. Let λ:=λ1,…,λLT and ξ:=ξ1,…,ξLT be the Lagrange multipliers associated with the average power constraint and the delay QoS constraint, respectively. For convenience, we set X:={p¯,p(·),τ(·)}, Ψ:={λ,ξ}, and Υ:={h,g}. Then, the average power constraint and delay QoS constraint are relaxed to form the Lagrangian function as(11)LX,Ψ=∑l=1LVβp¯l+∑l=1LλlEΥplΥ-p¯l+∑l=1Lξl·EΥe-θlrsecτlΥ,plΥ-e-θlEl=∑l=1LVβp¯l-λlp¯l+∑l=1LEΥλlplΥ+ξl·e-θlrsecτlΥ,plΥ-∑l=1Lξle-θlEl.
The master dual function is further expressed as(12)DΨ=minXLX,Ψs.t.∑l=1Lτlh,g≤1,and the dual problem of (9) can be expressed as maxΨ⪰0D(Ψ). To find the optimal joint power and time slot allocation (p¯∗,τ∗,p∗) by solving the master dual function (12), we need to solve the decoupled subfunctions below:(13)minp¯l∑l=1LVβp¯l-λlp¯l,and(14)minp,τ∑l=1LEΥλlplΥ+ξl·e-θlrsecτlΥ,plΥ-∑l=1Lξle-θlEls.t.∑l=1LτlΥ≤1.
For each user l, (13) can be decoupled as(15)minp¯lVβp¯l-λlp¯l.It is clear that solving (15) is equivalent to solve (13). For given λl, (15) is a deterministic convex optimization problem. Hence, we can readily solve it and get the optimal solution as(16)p¯l∗Ψ=λl1/β.
For the subfunction (14) associated with (p,τ), it can be decoupled as subfunctions under each channel realization like h and g. Hence, the solution of (14) can be reduced to solve the following function:(17)minp,τ∑l=1LλlplΥ+ξl·e-θlrsecτlΥ,plΥs.t.∑l=1LτlΥ≤1.It is easily proved that (17) is a convex optimization problem and its optimal solutions pl∗(Υ,Ψ) and τl∗(Υ,Ψ) can be obtained via the algorithms given in the following subsection. For ∀l=1,…,L, the dual problem of maxΨ⪰0D(Ψ) can be solved by the subgradient iterative algorithm as(18)λln+1=λln+αnEΥpl∗Υn,Ψn-p¯l∗Ψn,ξln+1=ξln+αnEΥe-θlrsecτl∗Υn,Ψn,pl∗Υn,Ψn-e-θlEl,where n represents the time index and α[n] is the step size.
3.2. Joint Power and Time Slot Allocation Policy for Each Channel Realization
In this subsection, we aim to investigate the convex optimization function (17) and propose an optimal joint power and time slot allocation policy for each channel realization with given λ and ξ. By relaxing the time slot constraint, the Lagrangian function becomes(19)JτlΥ,plΥ=∑l=1LλlplΥ+ξl·e-θlrsecτlΥ,plΥ+η·∑l=1LτlΥ-1,where η denotes the Lagrangian multiplier associated with the time slot constraint. Then, we propose the optimal time slot and power assignment policy.
Define pl∗(Υ,Ψ) and τl∗(Υ,Ψ) as the desired optimal solutions. Applying the Karush-Kuhn-Tucker (KKT) conditions, for ∀l=1,…,L, we can derive the following necessary and sufficient conditions on pl∗(Υ,Ψ) and τl∗(Υ,Ψ) as(20)∂JτlΥ,plΥ∂pl∗Υ,Ψ=0,pl∗Υ,Ψ>0<0,pl∗Υ,Ψ=0,(21)∂JτlΥ,plΥ∂τl∗Υ,Ψ>0,τl∗Υ,Ψ=0=0,0<τl∗Υ,Ψ<1<0,τl∗Υ,Ψ=1.Equation (21) means that the derivative at the minimum point is zero if the minimum lies within the constraint region (0,1). If the minimum is located on the boundary of the constraint region, the derivative is either positive or negative pointing towards the interior of the constraint region along all directions. With the above two optimality conditions, we can calculate the optimal power and time slot allocation arithmetically. From (20), we can obtain(22)λl-ξlθllog2·e-θlτlΥlog21+hlplΥ/τlΥ/1+glpl/τlΥ·hl-gl1+hlplΥ/τlΥ1+glplΥ/τlΥ=0.Let {τl∗(Υ,Ψ),∀l} be the optimal time slot assignment; then the corresponding power allocation pl∗(Υ,Ψ) satisfies the following formula:(23)1+glpl∗Υ,Ψ/τl∗Υ,ΨB-11+hlp∗Υ,Ψ/τl∗Υ,ΨB+1=γ0hl-gl,γ0<hl-gl,τl∗Υ,Ψ>0,pl∗Υ,Ψ=0,γ0≥hl-gl,τl∗Υ,Ψ=0,with B≜θlτl∗Υ,Ψ/log(2) and γ0≜λl·log(2)/ξlθl. It is observed that the power allocation of the active user has the same form as that for the single-user QoS-driven secrecy system [25, eq.(15)] with different cutoff thresholds at each channel realization. Furthermore, we analyze the time slot allocation policy which follows Lemma 1.
Lemma 1.
Assume that, for each channel realization, i.e., h and g; in the context of secure transmission, there exists at most one user allocated with a strictly positive power and we assert it the “winner-takes-all" policy.
The users in the system whose channel gains may not satisfy the secrecy communication condition hl>gl will not participate in the time slot allocation; i.e., τl∗(Υ,Ψ)=0 for hl<gl. The following derivations are all satisfied with hl>gl. Taking the partial derivative of (19) with respect to τl(Υ), we have(24)∂JτlΥ,plΥ∂τlΥ=η-ξlθl·e-θlτlΥlog2τlΥ+hlplΥ/τlΥ+glplΥ·log21+hlplΥ/τlΥ1+glplΥ/τlΥ+1log2·gl-hl·plΥτlΥ+hlplΥτlΥ+glplΥ.
Here, we substitute pl∗(Υ,Ψ) obtained by (23) into (24) and simplify it with (22). According to the KKT condition (21), for ∀l=1,…,L, we can get(25)τl∗Υ,Ψ=1,η<QlΥ,Ψ0,η>QlΥ,Ψ,where Ql(Υ,Ψ) is termed as the quality function and written as(26)QlΥ,Ψ=λllog21+hlpl∗Υ,Ψ1+glpl∗Υ,Ψhl-gllog21+hlpl∗Υ,Ψ1+glpl∗Υ,Ψ-λlpl∗Υ,Ψ.
Since the constraint must be satisfied, only the user whose Ql(Υ,Ψ) is the smallest can occupy the whole time slot. In detail, we write(27)τl∗∗Υ,Ψ=1,τl∗Υ,Ψ=0,l≠l∗,with(28)l∗=argmaxlQlΥ,Ψ.
Given a time slot, there will be a set {Q1(Υ,Ψ),Q2(Υ,Ψ),…,QL(Υ,Ψ)} with L elements related to different corresponding users. The user l whose Ql(Υ,Ψ) is the minimum in the set will occupy the whole time slot. That is to say, we can easily derive the time slot allocation scheme with the obtained set {Q1(Υ,Ψ),Q2(Υ,Ψ),…,QL(Υ,Ψ)}.
3.3. Stochastic Joint Time Slot and Power Allocation Algorithm
According to Lagrangian duality theory [30], the strong duality of the primary problem (9) should hold, which guarantees the solution of the primary problem through the dual problem maxΨ⪰0D(Ψ). To solve this dual problem, we need the explicit knowledge of the CDF of the fading channel in order to evaluate the expected values EΥ[·], whereas for some practical wireless communication environments, it is impractical or impossible to obtain the CDF of the fading channels. Thus, the joint power and time slot allocation algorithm which can operate without the knowledge of the channel CDF and approach the optimal strategy by learning the channel statistics should be achieved urgently. The above issue can be solved via the utilization of the stochastic optimization theory in [34]. Note that D(Ψ) is a convex function of Ψ; thus maxΨ⪰0D(Ψ) is a stochastic convex optimization problem. Hence, employing the stochastic subgradient iterative method [35] with unknown channel CDF, we can get a stochastic subgradient iteration algorithm based on the channel realizations (h[n] and g[n]) at time slot n for ∀l=1,…,L as(29)λ^ln+1=λ^ln+αnpl∗Υn,Ψ^n-p¯l∗Ψ^n,ξ^ln+1=ξ^ln+αne-θlrsecτl∗Υn,Ψ^n,pl∗Υn,Ψ^n-e-θlEl,where ∧ denotes the stochastic estimation, compared with (18). Equations (29) and (18) correspond to the primary and averaged systems, respectively. We can prove the convergence of the stochastic subgradient iteration by employing the stochastic locking theorem in [36]. The stochastic locking theorem holds only if certain regularity conditions are satisfied, such as the stochastic Lipschitz conditions for system perturbations. According to [37], we have the following Lemma 2 which confirms that these regularity conditions are satisfied for the primary and average systems with TDMA scheme, provided that the continuous channel CDF can be obtained.
Lemma 2.
For ergodic fading channel with continuous CDF, if the primary system (18) and its averaged system (29) are both initialized with Ψ^[0]≡Ψ[0], then, for any time interval T, it holds that(30)max1≤n≤T/cΨ^n-Ψn≤cTc,withpossibility1,with cT(c)→0 as c→0.
Trajectory locking is the key of the asymptotic optimality of the stochastic iterations. Lemma 2 rigorously establishes that the trajectories of the primary and average systems, corresponding to (29) and (18), respectively, remain close to each other over any time interval T for small enough step size c. That is to say, the distance of the two trajectories is bounded in probability by a constant cT(c) which will vanish as c→0. Hence, the stochastic power and time slot allocation scheme will approach the global optimal solution of (11). The detailed theoretical analysis of the stochastic optimization algorithm is a complex and tedious work and it is not the main purpose of our paper. In addition, for any stochastic approximation scheme, the Lagrange multipliers in (19) converge to the optimal values or hover within a small neighborhood around the optimal values with the size proportional to the step size c.
4. Non-Delayed Resource Allocation Policy
The optimal resource allocation which satisfies the delay QoS constraint has been investigated above. In this section, we also present a non-delayed resource allocation scheme without considering the delay QoS requirement for comparison. When the delay QoS constraint of the optimization problem (9) becomes the secrecy rate constraint, the jointly power and time slot allocation (pl+,τl+) will obey the following equations:(31)pl+=121hl-1gl2+4νl1gl-1hl-1hl+1gl,νl<hl-gl,τl+>00,else(32)τl++=1,τl+=0,l≠l+,l+=argminlζlpl+-εllog21+hlpl+-1+hlpl+,where ζl and εl are the Lagrangian multipliers associated with the average power constraint and the secrecy rate constraint for the l-th user, respectively, and νl≜ζlτl+log2/εl.
In fact, for a given time slot, the power allocation algorithm (31) is the same as the scheme [33, eq.(7)] of the single-user secrecy system. Besides, considering the power allocation scheme (23) which supports the QoS requirement with θ→0, the optimal power allocation factor pl∗ converges to (31). This phenomenon illustrates that the optimal QoS-driven resource allocation policy merges with the non-delayed policy when we relax the QoS requirement.
5. Numerical Results and Analysis
In this section, the numerical results of the proposed optimal resource allocation policy and non-delayed policy are provided to verify the foregoing theoretical analysis. We assume that the TDMA secrecy networks include three transmit users, one legitimate receiver, and one eavesdropper. The fading channels of different users are independent to each other. Besides, the channel power gains of the main user channels hl and the wiretap channels gl obey Rayleigh fading distributions with variance h¯l and g¯l, respectively, and hl>gl(l=1,2,3). For simplicity, we assume that all the links suffer from the same delay impact. Specific system parameters are given in the corresponding figures.
The convergence performance of the Lagrange multipliers of the proposed optimal resource allocation policy is shown in Figure 2. In the simulation, six Lagrange multipliers, (λ1,λ2,λ3) and (ξ1,ξ2,ξ3), which are associated, respectively, with the average power constraint and the delay QoS constraint, are chosen arbitrarily to make the example. It can be observed from Figure 2 that all the six multipliers become stable after 12 iterations. Thus, we can get the same conclusion as what we have discussed in the end of Section 3 that the convergence of the proposed optimal policy can be guaranteed.
Convergence of Lagrange multipliers.
Figure 3 shows the power consumption of the user links 1-3 which adopt the optimal policy under different β-fairness (β=0.01,3,6). In addition, two comparative schemes, non-delayed scheme and fixed-access scheme, are also included for β=0.01. Here, the average normalized channel power gains for different user links are set to be h¯1=3, h¯2=0, h¯3=-3, g¯1=g¯2=g¯1=-3 dBW, and the QoS exponents for the user links 1-3 are θ1=θ2=θ3=1. From the individual average power in Figure 3, we observe that, for smaller β such as β=0.01, the power gaps between different users are apparent and the resource allocation scheme assigns more power to the worst channel (link 3), which illustrates that we can increase the transmit power to maintain the system throughput if the channel becomes worse. It is also seen that the power consumed by different user links gets close to each other when β becomes larger. Meanwhile, the total average power increases if β increases. Hence, we can draw the conclusion that the fairness can be improved by consuming much more total power.
Total average power and individual average power.
For comparison, Figure 3 also presents the total average power consumption of the fixed-access scheme and the non-delayed scheme. The fixed-access scheme assigns equal time fractions (τ1=τ2=τ3=1/3) to the three links and each link still adopts the optimal power allocation strategy. We notice that much more total power is required for the fixed-access scheme than that of the optimal policy due to the neglect of the multiuser diversity and fairness. Since the non-delayed policy does not consider the delay QoS requirement during the joint power and time slot allocation, more total power is also needed to achieve the delay QoS guarantee. In a word, the proposed optimal policy can save much more power and the β-fair cost function can balance the energy efficiency and the fairness well.
In Figures 4 and 5, we plot the total average transmit power as a function of the delay QoS exponent under different resource allocation policies. We consider two cases with different eavesdropper conditions. The total average transmit power with better eavesdropper channel condition is shown in Figure 4. Figure 5 shows the total average transmit power with worse eavesdropper channel condition. The average main user channel gains are assumed to be h¯1=3, h¯2=0, and h¯3=-3 for the two conditions. We can observe from Figures 4 and 5 that the total average transmit power increases if the delay QoS exponent increases. As expected, the proposed optimal resource allocation policy commonly consumes the minimal total average transmit power compared with the non-delayed policy and the fixed-access policy. In addition, the optimal resource allocation policy converges to the non-delayed policy under a relatively small QoS exponent, which is coherent with the theoretical analysis above. Furthermore, by comparing the two figures, we find that the gap between the optimal policy and the non-delayed policy becomes significant when the eavesdropper channel becomes worse, which shows the advantages of the proposed optimal allocation policy under the worse eavesdropper channel condition.
Total average power versus delay QoS exponent with wiretap channel conditions g¯1=g¯2=g¯3=-3 dBW.
Total average power versus delay QoS exponent with wiretap channel conditions g¯1=g¯2=g¯3=-20 dBW.
We provide the performance of the total average power versus the violation probability with delay bound Dmax in Figure 6. In the simulation, we set the delay boundary as Dmax=20ms. Given the delay boundary Dmax, the violation probability will arise if the delay requirement θ decreases according to (4). Under a certain violation probability, the proposed optimal resource allocation policy can achieve the minimum total average power among the three policies. Furthermore, it can be observed from Figure 6 that the total average transmit power will decrease when the violation probability increases. That is to say, a smaller delay requirement will lead to a lower total average power, which is in agreement with our theoretical analysis above and also matches the results in Figure 5.
Total average power versus violation probability with delay boundary Dmax=20ms.
6. Conclusions
In this paper, we propose a fair energy-efficient resource allocation policy for the multiuser TDMA secrecy system. The system model is established for the secure transmission in the presence of an eavesdropper. By employing the secure effective capacity and β-fair cost function, we analytically study the joint power and time slot allocation policy which minimizes the β-fair cost function of the average transmit power while fulfilling the individual delay QoS requirement. A subgradient iterative algorithm is employed to solve the optimal resource allocation problem based on the convex optimization theory. In addition, the stochastic optimization is utilized to solve the problem. The limits of the total average power with the delay QoS constraint are derived based on the analytical results. The proposed optimal resource allocation scheme exhibits excellent energy efficiency compared with the suboptimal non-delayed scheme and the fixed-access scheme, especially in the case of stringent delay QoS requirement and worse eavesdropper channel condition. It also illustrates that the proposed stochastic iterative algorithm can approach the optimal strategy.
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was supported in part by International Science & Technology Cooperation Program of China (2015DFG12580), National Science Foundation of China (61771291 and 61571272), Key R&D Program of Shandong Province (2018GGX101009), the Fundamental Research Funds of Shandong University (2016JC010), and the Ministry of Science, ICT (MSIT), South Korea, supervised by the IITP through the ITRC support program (IITP-2018-2014-1-00729).
ShannonC. E.Communication theory of secrecy systems19492865671510.1002/j.1538-7305.1949.tb00928.xMR0032133Zbl1200.94005WynerA. D.The wire-tap channel19755481355138710.1002/j.1538-7305.1975.tb02040.xMR0408979Zbl0316.94017CsiszarI.KornerJ.Broadcast channels with confidential messages197824333934810.1109/TIT.1978.1055892MR493646HellmanM.The Gaussian wire-tap channel1978244451456KhistiA.WornellG. W.Secure transmission with multiple antennas I: the MISOME wiretap channel20105673088310410.1109/TIT.2010.2048445MR2798976GuanX.CaiY.WangY.YangW.Increasing secrecy capacity via joint design of cooperative beamforming and jammingProceedings of the IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '11)September 2011Toronto, Canada1279128310.1109/PIMRC.2011.6139705CumananK.DingZ.SharifB.TianG. Y.LeungK. K.Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper2014634167816902-s2.0-8490355499510.1109/TVT.2013.2285244ChuZ.CumananK.DingZ.JohnstonM.Le GoffS. Y.Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer20156451833184710.1109/TVT.2014.2336092JorswieckE. A.WolfA.Resource allocation for the wire-tap multi-carrier broadcast channelProceedings of the International Conference on TelecommunicationsJune 20081610.1109/ICTEL.2008.4652697LiZ.YatesR.TrappeW.Secrecy capacity of independent parallel channelsProceedings of the 44th Annual Allerton Conference on Communication, Control, and ComputingSeptember 2006841848WangX.TaoM.MoJ.XuY.Power and subcarrier allocation for physical-layer security in ofdma networksProceedings of the IEEE International Conference on Communications (ICC '11)June 2011Kyoto, Japan1510.1109/icc.2011.5963493QinH.ChenX.ZhongX.HeF.ZhaoM.WangJ.Joint power allocation and artificial noise design for multiuser wiretap OFDM channelsProceedings of the IEEE International Conference on Communications (ICC '13)June 2013Budapest, Hungary786791JindalA.BoseR.Resource allocation for secure multicarrier AF relay system under total power constraint20151922312342-s2.0-8492321846110.1109/LCOMM.2014.2379652HuangJ.SwindlehurstA. L.Cooperative jamming for secure communications in MIMO relay networks201159104871488410.1109/TSP.2011.2161295MR2882989ChenJ.ChenX.LiuT.LeiL.Energy-efficient power allocation for secure communications in large-scale MIMO relaying systemsProceedings of the IEEE/CIC International Conference on Communications in China (ICCC '14)October 20143853902-s2.0-84922569391ZhangH.JiangC.BeaulieuN. C.ChuX.WangX.QuekT. Q. S.Resource allocation for cognitive small cell networks: a cooperative bargaining game theoretic approach20151463481349310.1109/twc.2015.24073552-s2.0-84930270512MokariN.ParsaeefardS.SaeediH.AzmiP.Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users2014132105810732-s2.0-8489632878310.1109/TWC.2013.010214.130929MokariN.ParsaeefardS.SaeediH.AzmiP.HossainE.Secure robust ergodic uplink resource allocation in relay-assisted cognitive radio networks201563229130410.1109/TSP.2014.2370949MR32994642-s2.0-84919786115WangT.SongL.HanZ.ChengX.JiaoB.Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networksProceedings of the IEEE International Conference on Communications (ICC '12)June 20121683168710.1109/ICC.2012.63644912-s2.0-84871978301ZhangH.WangT.SongL.HanZ.Radio resource allocation for physical-layer security in D2D underlay communicationsProceedings of the 1st IEEE International Conference on Communications (ICC '14)June 2014231923242-s2.0-84907003865ChitiF.GiacomoD. D.FantacciR.PierucciL.Interference aware approach for D2D communicationsProceedings of the IEEE International Conference on Communications (ICC '16)June 201616GandotraP.JhaR. K.JainS.A survey on device-to-device (D2D) communication: architecture and security issues20177892910.1016/j.jnca.2016.11.0022-s2.0-84997497763WuD.2003Carnegie Mellon UniversityWuD.NegiR.Effective capacity: a wireless link model for support of quality of service20032463064310.1109/twc.2003.8143532-s2.0-0347458181WangT.MaP.MaY.Adaptive power allocation with quality-of-service guarantees in secure wireless communicationsProceedings of the 9th International Conference on Communications and Networking in China (CHINACOM '14)August 2014Maoming, China50851210.1109/CHINACOM.2014.7054348PeiQ.LiH.ZhaoH.LiN.MinY.Security in cognitive radio networks20131144158WangX.WangD.ZhuangH.MorgeraS. D.Fair energy-efficient resource allocation in wireless sensor networks over fading TDMA channels2010287106310722-s2.0-7795619864010.1109/JSAC.2010.100911BoydS.VandenbergheL.2004Cambridge University PressMR2061575BertsekasD. P.19992ndBelmont, Mass, USAAthena ScientificPalomarD.ChiangM.A tutorial on decomposition methods and distributed network resource allocation200624814391451ChiangM.LowS. H.CalderbankA. R.DoyleJ. C.Layering as optimization decomposition: a mathematical theory of network architectures200795125531210.1109/jproc.2006.8873222-s2.0-64149123172CheongS. L. Y.HellmanM. E.The Gaussian wire-tap channel197824445145610.1109/TIT.1978.1055917MR0504361GopalaP. K.LaiL.GamalH. E.On the secrecy capacity of fading channels200854104687469810.1109/TIT.2008.928990MR2591128KallP.WallaceS. W.1994Chichester, UKJohn Wiley & SonsMR1315300RockafellarR. T.WetsR. J.Stochastic convex programming: basic duality1976621173195MR041658210.2140/pjm.1976.62.173Zbl0339.900482-s2.0-84972582476SoloV.KongX.1995Prentice HallWangX.GiannakisG. B.Resource allocation for wireless multiuser OFDM networks20115774359437210.1109/TIT.2011.2145770MR2840459