Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading

This paper considers a 2-user multiple-input single-output (MISO) interference channel with confidential messages (IFC-CM), in which the Rician channel model is assumed. The coordinated beamforming vectors at the two transmitters have the similar parameterizations as those for perfect CSI, which could be optimized jointly and achieved by agreeing on the real parameters between the two users. Our main contribution is that a quadratic relationship between the two real-valued parameters can be derived for the Rician channel to reach the ergodic secrecy rate balancing point. Simulation results present the secrecy performance over the 2-user MISO IFC-CM scenario.


Introduction
Security can be provided in the physical layer instead of using passwords or keys, where signal processing techniques can be adopted to degrade an eavesdropper's channel so that meaningful detection at the eavesdropper is difficult or even impossible.Information-theoretic security, widely known as physical-layer security, was first introduced in the 1970s by Wyner [1].In particular, the notion of secrecy capacity, which is the maximum achievable rate that can be kept confidential to the eavesdropper, was defined.Later, the work was extended to the Gaussian wiretap channel in [2].In [3], Csiszar and Korner considered a more general wiretap channel model and showed that secure communication is in fact possible without using key encryption in the presence of the eavesdropper.Recently, the advances in multiple-input multiple-output (MIMO), multicell communication and relay offer new opportunities for physical-layer security.
For MIMO wiretap channel, [4] studied the performance tradeoffs and derived upper and lower bounds on the secrecy capacity both for finite systems and in the large-system limit.Using artificial noise to confuse the eavesdropper, masked MIMO beamforming has also been considered in multicast system [5,6].For cooperative communication employing relays, [7] established the utility of user cooperation in facilitating secure communication and derived an outer-bound on the optimal rate-equivocation region based on a fourterminal relay-eavesdropper channel.In [8], the optimization of cooperative jamming (CJ) is examined to enhance the physical-layer security of a wiretap fading channel via distributed relays.Also, He and Yener in [9] provided an achievable secrecy rate region for the general channel with an untrusted relay.Most recently, physical layer secrecy has been also applied to other communication systems, such as twoway relay [10], satellite communications [11], and interference channel with confidential messages (IFC-CM) [12].
In [12], the achievable secrecy rate region and an outer bound for the IFC-CM were presented, while [13] derived the inner and outer bounds of a one-sided IFC-CM and analyzed the gap between them.A -user Gaussian IFC with secrecy constraints was investigated in [14] and by using an interference alignment scheme with secrecy precoding at each transmitter, and it was revealed that a nonzero secure degree of freedom can be achieved.The scenario was extended to the -user Gaussian many-to-one IFC in [15] where the achievable secrecy sum-rate over all users was shown to be achievable by using nested lattice codes.
From the signal-processing perspective, secure (or secret) communications has also received much attention.Literature [16] has studied the power control problem and artificial noise parameter optimization for the max-min point and the single-user point over the two-user symmetric IFC-CM International Journal of Antennas and Propagation without multiple antennas.For the two-user MISO IFC-CM, [17] analyzed the key points on the Pareto boundary of the secrecy rate region for the two-user IFC with multiple-input single-output (MISO) antennas.Also, the multiple-input multiple-output (MIMO) Gaussian IFC-CM was investigated in [18] where a game-theoretic approach was proposed to permit the two transmitters to compromise to an operating point that better balances the network performance.
The focus of this paper is on a two-user interference channel with confidential messages (IFC-CM) in which each receiver is to decode its own message but could eavesdrop the message intended for the other user, where the imperfect CSI with Rician fading is assumed.First, the beamforming vectors corresponding to the Pareto-optimal ergodic secrecy rate points are characterized similar to the perfect CSI case.The coordinated optimal beamforming vectors at the two transmitters could be achieved by agreeing on the real parameters between the two users.Further, a quadratic relationship between the two real valued parameters can be derived, and the ergodic secrecy-rate balancing point which provides a secrecy rate-fair operating point will be determined by searching only one real-valued parameter.
The remainder of this paper is organized as follows.In Section 2, we present the system model.In Section 3, the Pareto boundary of the secrecy rate region is characterized, and some special operating points are considered.Section 4 extends the work to the statistical CSI, and the closedform ergodic secrecy rate expressions are derived.Section 5 presents simulation results, and conclusions are drawn in Section 6 finally.
Notations.Throughout, vectors are denoted by boldface small letters while matrices are written in boldface capital letters.We use the superscripts (⋅) * , (⋅)  , and (⋅)  to denote, respectively, the complex conjugate, transpose and Hermitian transpose operations.An identity matrix is denoted by I.

MISO IFC-CM Model
We consider a two-user MISO IFC-CM, which may arise from a downlink cellular network with two multiantenna base stations (BSs) each transmitting to one desirable mobile station (MS).The message sent by each BS is confidential and required to be kept confidential to the other unintended MS.Due to the broadcast nature of wireless channels, however, the MSs may eavesdrop on the transmitted signals not intended for them and thus be regarded as eavesdroppers to each other, as is shown in Figure 1.Note that the two BSs trust each other so that they could design the coordinated beamformers together to optimize the secrecy rates.The MS receivers are assumed to have a single antenna, and each BS is equipped with  transmit antennas.
Based on the model, the received signals at the two MSs can be written as where h  ∈ C ×1 (,  = 1, 2) denotes the complex channel vector between BS  and MS ,   denotes the information symbol intended for MS  sent by BS ,   is the complex Gaussian noise with zero mean and variance  2 , and w  denotes the transmit beamforming vector at the th BS and, without loss of generality, satisfies the peak power constraint ‖w  ‖ ≤ 1.The noises and the channels are all independent to each other.
The received signal at each MS contains the desirable message and also the message intended for the other MS, and the channel can therefore be viewed as a virtual multiple-access channel (MAC) with the achievable rate already known in [19], which is given in the following lemma for completeness.
Lemma 1 (capacity for MAC [19]).For a -user MAC with channels {h  } and transmit covariance matrices {Σ  }, for  = 1, . . ., , joint decoding with successive interference cancelation can achieve all the corner points of the capacity region.Given a decoding order ((1), (2), . . ., ()) in which user ( 1) is decoded first, user ( 2) is decoded second, and so on, the achievable rate for user  is given by ) . ( Lemma 1 states that the decoding order has no impact on the channel sum-rate but determines the achievable rate for each user.Specifically, the decoding order for the intended message and the eavesdropped message determines the message rate and the equivocation rate.We assume that the intended message is decoded first by treating the eavesdropped message as noise, and then the eavesdropped message is decoded without any interference.Then, the eavesdropped signals at the MSs can be equivalently expressed as The level of secrecy can be quantified by secrecy rate which is given by [3] where   denotes the message rate and   denotes the equivocation rate.With the intended message being decoded first, the secrecy rates for MS 1 and MS 2 can be, respectively, written as Based on the decoding order, the smallest   and the largest   are obtained at the MS receivers, and the achievable secrecy rates in (5) correspond to the inner bound for the secrecy rates over the general Gaussian MISO IFC-CM [12], which provides a worst-case scenario for analysis and optimization of the beamforming vectors.A similar argument has been used in [18] to justify their formulation.
We can define the achievable secrecy rate region to be the set of all secrecy rate pairs where the MISO beamforming vectors satisfy the power constraints at the BSs: The outer boundary of this region is called the Pareto boundary, because it consists of the operating points ( 1 ,  2 ) for which it is impossible to improve one secrecy rate, without simultaneously decreasing the other secrecy rate.More precisely, we define the Pareto optimality of an operating point as follows.
It is noted that for a fixed channel, the secrecy rate region R  is compact because the set (w 1 , w 2 ) subject to the power constraint is compact and the mapping from (w 1 , w 2 ) to ( 1 ,  2 ) is continuous.

Ergodic Secrecy Rate Region with Rician Channel
3.1.Rician Channel Model.We consider that the channel vectors follow the Rician channel model, that is, where h  is channel mean vector, Δh  ∈ CN(0, ) denotes channel error vector and its entries are modelled as independent nonzero-mean random variables,  is the error coefficient and without losing generality, and  is assumed to be same for all the channels.

Ergodic Secrecy Rate
Region.The ergodic secrecy rates are obtained by taking the expectation over the distribution of the channels, that is, The achievable ergodic secrecy rate region can be expressed as the set of all the ergodic secrecy rates: Consider  1 first, and it has where the second and third terms could be tackled using [20] E which involves a single integral which can be effectively calculated by using high-precision numerical integral methods [21].Also note that it is monotonic increasing with |h  w| 2 .
While for the first term, it is more difficult to reexpress it with simpler expression, but we know that |h  11 w 1 | 2 + |h  21 w 2 | 2 belongs to noncentral chi-squared distribution, that is, the sum of the squares of independent Gaussian random variables having unit variance and nonzero means [22], the expectation is monotonic increasing with each mean.Although we do not present the closed form of the ergodic secrecy rate, but the monotony is very useful for us to further characterize the achievable ergodic secrecy rate region. 2 has similar monotony.
International Journal of Antennas and From the monotonicity of  1 , we see that the same conflicting situation happens as the perfect CSI case associated with the beamforming vectors.By utilizing the similar method, any beamforming vector leading to a Pareto-optimal ergodic secrecy rate tuple can be expressed as a linear combination of stochastic maximal-ratio combining (MRC) and stochastic zero-forcing (ZF) beamformers, which are defined as

Characterization of Ergodic
Theorem 4. Any Pareto-optimal ergodic secrecy rate point is achievable with the beamforming strategy: where 0 ≤  1 ,  2 ≤ 1 are real-valued parameters.
Proof.The proof is essentially the same as that of its perfect CSI case.Hence, we only provide an outline here.The proof uses the method of contradiction.
To do so, we write any optimal beamforming vector as where and h * 12 .Next, we prove that the Pareto-optimal ergodic secrecy rate point can be obtained only when full power is used.
To show this, we first consider  1 and assume ‖w 1 ‖ < 1.
Based on the monotony of the associated terms, it can prove that if ‖w  ‖ < 1, then it is possible to choose a new ‖w   ‖ = 1, such that  1 is increased and  2 is unchanged.Therefore, in order to reach the Pareto boundary, the transmitter should operate at full power.And any optimal beamformer in the space of span{h * 11 , h * 12 } could be formulated as the form in (14a).See [23] for more details regarding the proof.
It is worth highlighting that previous Theorem 4 aligns with the result for the two-user MISO IFC-CM with perfect CSI [23]; this is because that they have the similar monotony with the terms associated with beamformers.This theorem also shows that we only need to vary the scalar real-valued parameters  1 and  2 in order to achieve any specific point on the Pareto boundary of the ergodic secrecy rate region.That is, these two BSs could achieve this specific points by setting  1 and  2 together.

Ergodic Secrecy Rate Balancing Point
4.1.Ergodic Secrecy Balancing.In the IFC model, user fairness is an important metric which can be achieved by balancing the user secrecy rates so that the weaker user is not overly compromised.Technically, this can be obtained by maximizing the worse-user's secrecy rate.That is, max min { 1 ,  2 } . ( The secrecy rate balancing point can be realized by setting, if a solution exists, which can be simplified as Then, a simple relationship between  1 and  2 can be achieved. Proposition 5.For any given  2 , (18) could be transformed into a quadratic equation: where the coefficients are specified as ( 25)-(28).
Proof.We first introduce the following terms [24]: Substituting w 1 in (14a) into  1 ( 1 ) and  2 ( 1 ), we have where By substituting (20) into (18), we have It can be easily seen that the left-hand-side (LHS) and the RHS of ( 23) are functions of only  1 and  2 , respectively.Let the RHS of (23) be  2 .Then, we have Inserting ( 21) and ( 22) into ( 24) and simplifying the expression, we get the quadratic equation ( 19) with the coefficients as Next, we show by the method of contradiction that the secrecy rate balancing point corresponds to a unique solution in the feasible set if (19)  ).This contradicts the assumption which completes the proof.
For a given  1 ,  2 can be determined by solving a similar quadratic equation.Through Proposition 5, the secrecy rate balancing point can be determined by searching only one real-valued parameter in the feasible set.The secrecy rate balancing point achievable by ( SRB 1 ,  SRB 2 ) is the one that gives the maximal secrecy rate among all of the points that satisfy  1 =  2 .For the special case that there is no  1 satisfying the quadratic equation (19)   = 0.The secrecy ZF point is not on the Pareto boundary but in the interior of the ergodic secrecy rate region.Also, it is clear that at high SNR or for a large number of antennas, the secrecy ZF point will not be far away from the optimal point.4.3.2.Nash Equilibrium.At the Nash equilibrium, the users (or BSs) selfishly optimize their beamforming vectors to maximize their own secrecy rates assuming that beamforming of  the other user is fixed [25].We can iteratively search optimal  1 and  2 to reach the Nash-equilibrium point.This point is not optimal and thus in the interior of the ergodic secrecy rate region.

Simulation Results
Simulation results are provided to study the ergodic secrecy rate region for the two-user Gaussian MISO IFC-CM by the Pareto-boundary characterization for the cases with Rician channel.In the simulations, unless specified otherwise, we assume that the number of transmit antennas at each BS is 2 and the channel mean vector is randomly generated from an i.i.d.complex Gaussian distribution with zero mean and unit variance.Note that  is set as 0.1 in the all simulations.and the stochastic ZF point are in the interior of the secrecy rate region, that is, not Pareto optimal.Figure 3 provides another example of the ergodic secrecy rate region but with SNR at 5 dB with same channel realization.As can be seen, when the SNR is increased, the corresponding ergodic secrecy rates are all improved and the stochastic ZF point in particular gets closer to the Pareto boundary.
Figure 4 considers the special case that the ergodic secrecy rate balancing point reduces to the single-user ergodic secrecy rate maximal point, which occurs when there is no solution to (18) for ( 1 ,  2 ).Geometrically, the Pareto boundary of R  has no intersection point with the straight line  = , which can be observed in the figure.Thus, the ergodic secrecy rate balancing point is reduced to the closest single-user ergodic secrecy rate maximal point.

Conclusion
In this paper, we studied the two-user MISO IFC-CM with Rician fading assumption.We revealed that the optimal beamforming vectors corresponding to the Pareto optimal point have the same parameterizations as those for perfect CSI.The secrecy rate balancing point, which provides the highest user fairness, was investigated.In particular, a quadratic relationship between the two real-valued parameters can be derived for the Rician channel to reach the ergodic secrecy rate balancing point.Simulation results show the secrecy performance of the proposed method.

Figure 1 :
Figure 1: Coordinated beamforming with two BSs and two untrusted MSs.
rate by searching  1 and  2

Figure 2 :
Figure 2: Ergodic secrecy rate region with 0 dB SNR for a random channel realization.

4. 3 . 3 .
Sum Ergodic Secrecy Rate.The sum secrecy rate point is the point at which  1 +  2 is maximized.Geometrically, this is where the Pareto boundary of the secrecy rate region, R  , osculates a straight line with slope −1 [26].It goes without saying that the sum secrecy rate point is on the Pareto boundary of R  .

Figure 2 Figure 3 :
Figure 3: Ergodic secrecy rate region with 5 dB SNR for a random channel realization.

Figure 4 :
Figure 4: Ergodic secrecy rate region with 0 dB SNR for a random channel realization where the ergodic secrecy rate balancing point aligns with the single-user secrecy rate maximal point.
Secrecy Rate Region.It shows that any point on the Pareto boundary should be achieved with full power and the corresponding beamforming vectors have the same characterization as perfect CSI case.To proceed, we first state the following lemma, which deals with the monotony of   .The lemma is stated for  1 ; similar results hold for  2 .Proof .From discussions in the previous subsection, we know that E h 12 [log 2 (1 + |h  12 w 1 | 2 )] is monotonic increasing with |h  12 w 1 |, and E h 11 ,h 21 [log 2 (1 + |h  11 w 1 | 2 + |h  21 w 2 | 2 )] is monotonic increasing with |h  11 w 1 | and |h  21 w 2 |.Thus, it is easy to see  1 is monotonic increasing with |h |, which is included in both the first term and second term in (10).We will show it using the method that for fixed |h  11 w 1 | > 0, it has that  1 is monotonic decreasing with |h  21 w 2 |.Further for any positive random variable |h  11 w 1 | > 0, the monotony still holds, that is, the term 21 w 2 |, which completes the proof.
is solvable.Assume that (19) has two solutions,  1 and   1 , both corresponding to the secrecy balancing point, that is,  1 =  2 ( 1 ,  2 ) =  2 (  1 ,  2 ).However, from Lemma 3,  2 ( 1 ,  2 ) is a continuous monotonously decreasing function of  1 which means that for different  1 and   1 ,  2 ( 1 ,  2 ) ̸ =  2 (  1 ,  2 for any  2 in the feasible set, it reduces to the single-user ergodic secrecy rate maximal point where the worse-user's secrecy rate is maximized.The singleuser ergodic secrecy rate maximal point is where   1 , and  ZF 1 corresponds to the case that the BS 1 chooses the stochastic ZF beamforming to minimize the interference for the other link.4.2.Single-User Maximal Ergodic Secrecy Rate.At the singleuser ergodic secrecy rate maximal point, one BS should choose the stochastic ZF beamforming strategy while the other BS tries to maximize the ergodic secrecy rate.In our two-user IFC-CM model, there are two single-user ergodic secrecy rate maximal points for  1 and  2 , respectively.As the special case of secrecy balancing, the operating point is where   1 can be formulated as a function of  1 with  2 = 0.In this case, there always exists an optimal  1 ,  Similarly, the single-user secrecy rate maximal point for  2 can be derived by setting  1 = 0 and  2 =  rate maximal points for  1 and  1 are endpoints on the Pareto boundary of the ergodic secrecy rate region.It can be also understood since there are no other operating points that could improve 2