Power Allocation for Reducing PAPR of Artificial-Noise-Aided Secure Communication System

,e research of improving the secrecy capacity (SC) of wireless communication system using artificial noise (AN) is one of the classic models in the field of physical layer security communication. In this paper, we consider the peak-to-average power ratio (PAPR) problem in this AN-aided model. A power allocation algorithm for AN subspaces is proposed to solve the nonconvex optimization problem of PAPR. ,is algorithm utilizes a series of convex optimization problems to relax the nonconvex optimization problem in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation. Furthermore, we also derive the SC of the proposed signal under the condition of the AN-aided model with a finite alphabet and the nonlinear high-power amplifiers (HPAs). Simulation results show that the proposed algorithm reduces the PAPR value of transmit signal to improve the efficiency of HPA compared with benchmark AN-aided secure communication signals in the multiple-input single-output (MISO) model.


Introduction
With the rapid development of wireless communication technology, an ever-increasing amount of sensitive data (e.g., private information and commercially confidential data) is transmitted over wireless networks. However, the broadcasting nature of the wireless communication medium makes the information particularly vulnerable to malicious interception. Currently, encryption techniques are used to guarantee confidential information without considering the physical properties of the wireless communication medium. Due to the development of computing techniques (e.g., quantum computing and cloud computing), these classic security solutions are becoming ever more challenging. Considering the physical properties of the wireless communication medium, the recently developed physical layer security (PLS) techniques based on information theory can guarantee secure transmission regardless of the eavesdropper's computational capability. As such, PLS techniques have drawn a lot of attention recently from information theory to security engineering by the research community [1][2][3][4][5].
e idea of PLS is to add structured redundancy in the transmit signal such that the legitimate user can correctly decode the confidential information, but the eavesdroppers can retrieve almost nothing from their observations [6][7][8][9]. To make PLS viable, we usually need the legitimate user's channel condition to be better than the eavesdroppers'. However, this assumption may not be always possible in practice. A more active approach is to send artificially generated noise to interfere the eavesdroppers' channel. is notion of using artificial noise (AN) to enhance PLS was first proposed by Negi and Goel in [10] and has received much attention in recent studies. In [11], Zhou derived a closedform expression for the achievable secrecy rate with the Gaussian input, based on which the power allocation (PA) between the information signal and the AN was optimized. It was shown that equal power allocation is a near-optimal strategy in terms of maximizing the secrecy rate. Instead of transmitting AN isotropically, Li and Ma in [12] considered joint optimization of the covariance matrices of the information signal and the AN for secrecy rate optimization. It was shown that transmit beamforming is optimal for secrecy rate maximization, which has been proved without using AN in [13]. Besides transmitting AN by Alice, a full-duplex Bob can also transmit AN in order to create interference to Eve, and this strategy is highly desirable in some specific practical scenarios (e.g., where Eve is close to Bob but far from Alice) [14]. To solve the problem of channel estimation, Yan in [15] proposed a new channel training (CT) scheme for this fullduplex AN-aided secure transmission in the receiver-side to prevent an eavesdropper from estimating the jamming channel from the receiver to the eavesdropper. Yang considered a practical transmission scheme (e.g., on-off transmission) with AN in [16] and optimized the system parameters to maximize the effective secrecy rate. In [17], Yan examined the secrecy performance of three typical artificial-noise-aided secure transmission schemes, namely, the partially adaptive, fully adaptive, and on-off schemes. A new analysis method was proposed to facilitate the optimization of the PA between the information signal and the AN. Liu in [18] developed an analytical framework to characterize the secrecy rate of the AN scheme as a function of the number of antennas in each terminal. In the aforementioned works about AN-aided secure transmission, it was mainly assumed that the multiple transmit antennas are independent. However, this assumption is not always held. In many practical scenarios, correlation exists among the multiple antennas at one transceiver due to limited separation between antenna elements or poor scattering conditions. In [19], Yan examined the impact of transmitter-side correlation on the AN-aided secure transmission and designed a correlation-based power allocation (CPA) for AN to optimize the minimum secrecy outage probability. In [20], a new design criterion based on the behavior of the eavesdropper's bit error probability was proposed instead of the traditional design criterion secrecy capacity (SC). e result showed that the practical secrecy can be guaranteed by the randomly distributed AN with specified power even if the eavesdropper can afford more antennas than Alice. Unlike a single eavesdropper in AN model, Zheng considered a secure transmission model with randomly located eavesdroppers in [21]. An optimization algorithm for PA ratio was designed to minimize the secrecy outage probability. In [22], Liu focused on the location information of each terminal in AN-aided secure communication model. A new location-based secure transmission scheme for wiretap channels was proposed to outline how such an estimate of the eavesdropper's location can still allow for quantitative assessment of key security metrics. Furthermore, Yan in [23] proposed a new optimal location-based beamforming scheme for the wiretap channel, where both the main channel and the eavesdropper's channel are subject to Rician fading. e secrecy outage probability of the proposed scheme is derived in an easy-to-evaluate expression that is valid for arbitrary real values of the Rician k-factors.
Meanwhile, massive MIMO is emerging as a key technology enabler for future 5G wireless networks, and thus PLS in the context of massive MIMO is attracting increasing research interests. For example, in [24], the secure downlink transmission in a multicell massive MIMO system was examined, in which two AN shaping matrices were considered. e opportunities and challenges of PLS in the context of massive MIMO were discussed in [25], in which active pilot contamination attacks were revealed to be difficult to detect but of high harmfulness. In [26], Zhu investigated different precoding strategies of data and AN in secure massive MIMO system. is AN-aided scheme was also applied in many different communication systems to guarantee the security performance of private information at the physical layer, such as cognitive radio system [27][28][29], relay cooperative communication system [30][31][32][33][34], satellite communication system [35][36][37], information and power transfer system [38][39][40], and Internet of ings (IoT) network [41].
In [4], Hamamreh made a comprehensive survey for the PLS communication and pointed out the PAPR problem of AN-aided signal as a practical important issue in system design (in Section Vi (G)). is problem is similar to the PAPR problem in the traditional OFDM system or high dynamic range ratio (DRR) problem in a pattern synthesis using a phased array [42,43]. e large PAPR brings disadvantages like an increased complexity of the digital-toanalog (DA) and analog-to-digital (AD) converters and feed network, a reduced efficiency of the high-power amplifier (HPA), and signal distortion in the nonlinear region HPA. Especially in some power limited scenarios, these shortcomings are the key problem of system design, such as satellite communication system and wireless sensor network. In [44], the researchers showed that the famous ANbased technique proposed by Nagi and Goel [10] creates high PAPR in the antenna domain for a multiple-input single-output (MISO) model due to the accidental in-phase addition (superposition) of AN subspaces and the signal subspace compared with traditional OFDM signal in the time domain. To solve this problem, an angle rotation based technique was proposed to reduce the PAPR, while maintaining the SC performance as that of the original AN-aided method. In [45], Hamamreh proposed to either change the distribution of the added AN from Gaussian to uniform in flat fading environments or use an optimized AN that not only avoids PAPR increase but also helps reduce the PAPR of OFDM signal transmission in a single-input single-output (SISO) model. Different from angle rotation based technique in [44], we utilize the system redundancy of the power allocation for the AN subspaces to reduce the PAPR value of AN-aided secure communication signal. An optimization problem is also formulated to reduce the PAPR value under the constraint of the total power of AN subspaces (maintaining the optimal SC performance with Gaussian input in [11] and finite-alphabet input in [46,47]). Unfortunately, the formulated optimization problem is a nonconvex problem due to the objective function for PAPR with a fractional form and the constraint for total AN power with a quadratic equality form. To solve this optimization problem, we propose a triple-iterative algorithm to relax the nonconvex optimization problem into a series of convex optimization problems based on fractional programming, difference of convex (DC) functions programming, and quadratic equality relaxing. Simulation results show that the proposed algorithm reduces the PAPR value of AN-aided signal to improve the efficiency of HPA compared with benchmark AN-aided secure communication signals in the multipleinput single-output (MISO) model. e rest of this paper is organized as follows. Section 2 details the AN-aided secure transmission model and the optimization problem of PAPR. Section 3 presents the nonconvex relaxing algorithm for the optimization problem. Section 4 assesses the performance of the proposed signal. Section 5 provides numerical results to confirm our analysis and gives useful insights into the impact of PAPR problem. Section 6 draws concluding remarks.
Notations. Scalar variables are denoted by italic symbols. Vectors are denoted by lowercase boldface italic symbols. Matrices are denoted by uppercase boldface italic symbols. R and C represent the real and complex number fields, respectively. Given a complex number x, |x|, Re(x), and Im(x) denote the modulus, real part, and imaginary part of x. Given a complex vector y, ‖y‖ and ‖y‖ ∞ denote the Euclidean norm and infinite norm of y, respectively. Given a matrix Z, Z T and Z † denote the transpose and conjugate transpose of Z. e L × L identity matrix is referred to as I L and E h [·] denotes expectation of a random variable h.

System
Model. According to [10,11,44,47], we consider the transmission from Alice to Bob in the presence of an eavesdropper Eve as shown in Figure 1. Alice is equipped with multiple transmit antennas N A (N A ≥ 2), while each of Bob and Eve has one receive antenna. us, the channel from Alice to Bob or Eve is MISO model. We assume a nonline-of-sight rich scattering environment and, as such, model all channels as uncorrelated Rayleigh fading. It is also assumed that Bob can estimate his channel h AB ∈ C N A ×1 accurately and use a perfect feedback link to inform Alice about his instantaneous CSI. Eve is considered as a passive eavesdropper; the instantaneous CSI g AE ∈ C N A ×1 of Eve is thereby unavailable to Alice. e entries of h AB and g AE are assumed to be independent and identically distributed (i.i.d.) zero-mean complex Gaussian variables with unit variance. e authors in [10] introduced the concept of generating artificial noise to guarantee secure transmission.
e key idea is outlined as follows. Alice adopts multiple antennas to transmit the information bearing signal into Bob's channel, at the same time generating the artificial noise into the null space of Bob's channel. us, only Eve's channel is degraded by the artificial noise. Generally, the null space of Bob's channel is calculated based on the singular value decomposition (SVD) as h AB � QΣW, where the weighting matrix W ∈ C N A ×N A for transmit signal is written as where w n ∈ C N A ×1 denote the nth column vector of W, w 1 is used for weighting information signal, and us, the transmit signal x ∈ C N A ×1 is expressed as Mobile Information Systems where x n denotes the transmit signal in nth antenna, denotes the AN vector, the entries of v are assumed to be independent and identically distributed (i.i.d.) zero-mean complex Gaussian variables with unit variance, the total transmit power available at Alice is denoted by P � αP + (1 − α)P, the PA parameter α is defined as the fraction of the information bearing signal power to the total transmit power, the vari- and s n � [s n,1 , · · · , s n,N A ] T ∈ C N A ×1 , n � 2, · · · , N A denote the information subspace and the AN subspaces, respectively. It is noted that the index number of antenna appeared peak value is random for the mth transmit symbol because of random characteristics of AN vector. For the practical multiantenna system, the PA is the same for each antenna. erefore, we focus on reducing the peak value of the transmit signal in AN-aided secure communication system. e most aforementioned papers about the PA were mainly focused on the PA parameter α to optimize the SC of this AN-aided method, such as [11] for Gaussian input and [47] for finitealphabet input. Meanwhile, the PA matrix Ω for AN subspaces was equal distribution Ω� Ι N A − 1 , named EPA strategy, because of Alice without the a priori knowledge of eavesdropper's channel g AE . It is noted that the power allocation algorithm does not influence the independence of the N A − 1 artificial-noise source. In this paper, we utilize the redundancy of PA matrix Ω of AN subspaces to optimize the PAPR value for relaxing the linear range requirement of amplifiers.

PAPR Definition and Optimization Problem Formulation.
Following (2), the second term represents a series of summations of AN subspaces, whose value depends on the random AN vector v. erefore, it is possible that peak value appears for the transmit signal x when the AN subspaces s n and information subspace s 1 are added with the same phase. According to the definition in [44], the PAPR value of the transmit signal x by multiple antennas is expressed as From (3), it is clear that the PAPR value is associated with two PA parameters, α and Ω. In [47], the authors proposed a gradient search algorithm to obtain the value of PA parameter α for approaching the optimal SC with a finite-alphabet input. Following these results, we focus on reducing the PAPR value of transmit signal to improve the efficiency of HPA by the system redundancy of the PA matrix Ω in the following optimization problem.
Compared with angle rotation based technique in [44], we formulate an optimization problem for PAPR by the PA matrix Ω as follows: where τ denotes the feasible region of the optimization problem. e physical meaning of the optimization problem (4) is to optimize PAPR value of the transmit vector signal x � [x 1 , x 2 , . . . , x N A ] T under the total power constraint of AN subspaces to approach the optimal SC with a finite-alphabet input. e objective function expressed by a nonconvex fractional form is used to reduce the peak value of the transmit vector signal x from multiple transmit antennas for relaxing the linear range requirement of amplifiers.
e convex constraint C 1 denotes the linear range of PA matrix element θ n , which is used to optimize the PAPR value by allocating different power value to different AN subspace compared with the angle rotation based technique proposed in [44]. e nonconvex constraint C 2 denotes the total power constraint for the AN subspaces to maintain the optimal SC performance.
e value of PA parameter α has been addressed in many papers to obtain the optimal SC performance, such as [11] for Gaussian input and [47] for finite-alphabet input. It is noted that the PA parameter α in the constraint C 2 as a constant in this paper is obtained by the gradient search algorithm proposed in [47]. In this paper, we focus on the PA matrix Ω to relax the linear range requirement of amplifiers.
us, the formulated problem (4) is a nonconvex optimization problem.

Optimization Problem Solution
In this section, we use a series of convex optimization problems to relax the nonconvex optimization problem (4) in a convex way based on fractional programming, difference of convex (DC) functions programming, and nonconvex quadratic equality constraint relaxation.

Fractional Programming.
e fractional objective function in (4) can be classified as a nonlinear fractional programming [48]. Without loss of generality, we define the minimum PAPR value p * and corresponding PA matrix Following (5), we introduce eorem 1.

Theorem 1.
e optimal PA strategy Ω * ∈ τ achieves the minimum PAPR value p * if and only if Proof:. See Appendix. eorem 1 reveals that, for an objective function in fractional form, there exists an equivalent objective function in subtractive form, for example, As a result, we can focus on the equivalent optimization problem as follows: For solving the optimization problem (6), we employ an iterative algorithm (known as the Dinkelbach method [49]) via the equivalent optimization problem (7). e iterative algorithm is summarized in Algorithm 1 as follows.
In the following subsection, we will focus on the solution to the main loop problem (7) in Algorithm 1.  (7), the objective function is expressed by a difference of two functions forms. According to DC programming [50], this nonconvex objective function can be replaced by its convex majorant form as shown in the following equation: where Ω j denotes the (j − 1)th solution in DC programming, ∇(1/N A )‖x(Ω j )‖ 2 denotes the gradient function at the point Ω j , and 〈·, ·〉denotes the inner product of vectors. Following (2) and (8), we can obtain where z(1/N A )‖x(Ω j )‖ 2 /zθ n , n � 1, 2, . . . , N A − 1 is expressed as e iterative algorithm for solving the nonconvex optimization problem (7) is summarized in Algorithm 2 as follows.
is iterative algorithm relies on the fact that the term − L 2 (p i , Ω) in the objective function of (7) is replaced by its e objective function in (8) is solved iteratively to approach the optimal solution. It should be noted that there is no guarantee that Algorithm 2 will return a global optimum of a DC problem. However, there exist related branch-and-bound approaches based on outer approximations, which are indeed globally optimal [51]. e provable convergence to a global optimum of these methods is accompanied though with an increase in computational complexity.

Nonconvex Constraint Relaxing.
e nonconvex objective function in the original optimization problem (4) was solved by fractional programming in subsection 3.1 and DC programming in subsection 3.2. In this subsection, we will focus on the solution method for nonconvex constraint C 2 . Following (4), the nonconvex constraint C 2 is transformed as where ζ denotes infinitely small quantity. To relax this nonconvex constraint, the classic approach in the field of array pattern synthesis [52] is to utilize a sequence of linear convex optimizations to approximate the original optimization problem. Inspired by this classic approach, we define an iteration variable u n , n � 1, 2, . . . , N A − 1 to transform the optimization problem (8) as where u k n denotes the iteration variable in the kth iterative process, C 2 denotes the transform constraint, and τdenotes the transform feasible region. e iterative algorithm for solving the nonconvex constraint in (12) is summarized in Algorithm 3 as follows.
e core idea of the algorithm is described as follows: First, a reasonable starting point for Algorithm 3 is u 0 n � ��������������� � (1 − α)P/(N A − 1). en, Ω k is computed by solving the optimization problem (12). e step to the (k + 1)th iteration variable u k+1 n is an "averaging" or "smoothing" operation to ensure that asymptotically the difference between u k n and θ k n vanishes. Indeed, at the first iteration u k+1 n is set to 0.7θ k n + 0.3u k n , and along the iterations, this averaging is modified with χ to approximate 0.5θ k n + 0.5u k n . Finally, the optimal PA strategy is obtained when the difference value between kth PAPR value and (k + 1)th PAPR value is less than the maximum tolerance η. e convergence of Algorithm 3 is shown in [53].

Summary of the Proposed Algorithm.
We formulated a nonconvex optimization problem (4) to solve the PAPR problem of AN-aided secure communication signal. To solve this nonconvex optimization problem, we use a series of convex optimization problems to approximate the optimal solution. e triple-iterative algorithm is summarized in Algorithm 4. e parameters transmission diagram of the proposed algorithm is shown in Figure 2. e complexity of the proposed algorithm depends on solution method of the convex optimization problem (12). According to the fast gradient method in [54], the complexity of a convex problem is where ψ ≥ 0 is a Lipschitz constant to guarantee that the gradient of objective function satisfies the Lipschitz condition, ρ denotes the convexity parameter, and c denotes a given convergence precision. e proposed algorithm in Algorithm 3 contains triple loops with the loop times N η , N δ , and N ε for achieving the given convergence precisions η, δ, and ε, respectively. erefore, the proposed algorithm has a polynomial time complexity as follows:
(1) Initialize the PA matrix Ω 0 � I N A − 1 , the maximum tolerance δ and the iteration index j � 1; (2) Repeat {Main Loop} (3) Solve the problem (8) for a given p i and Ω j− 1 to obtain the jth PA strategy Ω j � argmin Ω∈τ f(p i , Ω j− 1 ); (4) j⟵j + 1; and the other is SC performance with a finite alphabet. To compare the metrics with the proposed signal, we also consider two benchmark AN-aided signals: one is original signal with EPA strategy x(Ω � I N A − 1 )proposed in [47] and the other is angle rotation based technique proposed in [44].

Mobile Information Systems 7 then the output signal is y out (t) � G[A(t)]exp j[ϕ(y)t + Φ[A(t)]]
, (15) where G[·] and Φ[·] are known as the AM/AM and AM/PM conversions, respectively. According to the Rapp model, we consider a solid-state power amplifier (SSPA) model as follows: where G(A) denotes the normalized output signal amplitude, A sat is the input saturation level, and q determines the AM/AM sharpness of the saturation region. e AM/PM conversion is assumed to be negligibly small. In practical HPAs, output sharpness parameter is usually set at q � 2 or 3 [55], and we set q � 3 in this paper. We also consider the input saturation level A sat � ���� � 1/N A to assess the performance for different transmit antenna numberN A , where 1 denotes the normalized power of transmitter. It is noted that we use the total power with uniform distribution in each RF chain to evaluate PAPR characteristic of the transmit signal. For a given AN-aided signal, we need to adjust the average input power so that the peaks of the transmit signal rarely fall into the nonlinear range of HPA. e input back-off (IBO) is expressed as Figure 3 shows the normalized AM/AM conversion when N A equals 8 and signal-to-noise ratio (SNR) equals 30 dB. It is shown that the dynamic amplitude range of the AN-aided signal with proposed strategy is more concentrated compared with two benchmark AN-aided signals. Under the constraint of the normalized transmit power, the IBO value equals 6.25 dB, 2.47 dB, and 0 dB, respectively. It is noted that high IBO value will cause low efficiency of the HPAs.

Secrecy Capacity Performance with a Finite Alphabet.
According to the aforementioned SSPA model, the output signal x n 1 in the n 1 th transmit antenna can be written as x n 1 s n,n 1 s n,n 1 .

√√√√√√ √ √√√√√√ √ √√√√√√√√√√√√√√√√√ √√√√√√√√√√√√√√√√√ (18)
After passing the HPAs, the information space s 1 , the AN spaces s n , and the transmit signal x can be denoted by s 1 � [s 1,1 , . . . , s 1,N A ] T , s n � [s 2,1 , . . . , s 2,N A ] T , and x � [x 1 , . . . , x N A ] T , respectively. We consider that the modulation symbol u belongs to a symbol set Λ with M modulation symbols. In [47], a gradient search algorithm was proposed to approximate the optimal value of PA parameter α in different SNR values. Following this conclusion, we will analyze the SC performance when the transmitter is equipped with the nonlinear HPAs in the following part. Based on (18), the transmit signal x is affected by two factors: one is the orthogonal between the AN subspaces and the legal channel h AB in the second term and the other is the capacity of the legal channel in the first term. For the transmit signal x, the receive signals of Bob and Eve can be written as follows: where v b and v e are the AWGN at Bob and Eve satisfying respectively, μ Bob � h AB ( n�N A n�2 s n ) and μ Eve � g AE ( n�N A n�2 s n ) denote the AN subspaces projecting into the legal channel and wiretap channel, respectively. us, the average SNR losses at Bob and Eve are given by Motivated by the AN signal processing method in [56], the interference plus noise at Bob and Eve can be written as which have zero mean and variance.
us, we can whiten the AN interference term as Without affecting the mutual information of the legal channel and wiretap channel, we apply a linear transformation on y Bob and y Eve , respectively, to whiten the interference plus noise as follows: where v b and v e have zero mean and variance σ 2 b and σ 2 e , respectively. Following (24), the values of K Bob and K Eve are determined by two factors: one is the AN power projecting into the legal channel or wiretap channel and the other is noise variance of AWGN. Taking K Bob as example, when σ 2 b is much larger than |μ Bob | 2 , its value mainly depends on the noise variance and tends to σ b (σ 2 b ) − 1/2 � 1 (ideal HPAs); when σ 2 b has the same order of |μ Bob | 2 , its value depends on these two factors and there appears inflection point of SC performance; when σ 2 b is much less than |μ Bob | 2 , its value mainly depends on the ratio of the noise variance to the AN power projecting into the legal channel and represents the decreasing gradient of SC performance.
According to the aforementioned processing method, the mutual information of the legal channel and wiretap channel is written as follows: us, the SC of AN-aided model with the nonlinear HPAs is written as follows: Following (21)-(27), the SC value is mainly determined by the parameters K Bob , K Eve , and noise variance σ 2 b . In Section 5, we will give useful insights into the impact of SC performance.

Simulation Results
In this section, we evaluate the system performance through simulations.
e simulation conditions are supposed as follows. We consider that the modulation symbol u belongs to a BPSK symbol set with Λ � ± 1 { }. We focus on the PAPR problem of the transmitter. us, we suppose that Bob and Eve have the same noise variance σ 2 b � σ 2 E � σ 2 . We use two HPA models in simulations: one is ideal HPA model with infinite linear range and the other is nonlinear HPA model. e total transmitter power P is normalized as 1. e value of PA parameter α is derived via gradient search algorithm in [47] as a constant value for different SNR values. Monte Carlo simulations with 100 repetitions are used to obtain the average SC performance by equation (27). Figure 4 shows the PAPR performance of the AN-aided signal with proposed PA strategy by complementary cumulative distribution function (CCDF) compared with the ANaided signal with EPA strategy proposed in [47] and ANaided signal with angle rotation based technique proposed in [44]. e following are found: (1) For the proposed signal in [47], the PAPR performance degrades with the transmit antenna number increasing. When transmit antenna number N A equals 64, the PAPR value is greater than 10.5 dB with the probability of 10 − 4 , which is similar to the performance of traditional OFDM signal with 64 subcarriers and BPSK modulation [57]. (2) For the proposed signal in [44], the PAPR value is decreased by 3.8 dB, 4 dB, and 4.2 dB when N A equals 8, 16, and 64, respectively. (3) For the AN-aided signal with proposed PA strategy, the PAPR value is decreased by 4 dB, 7 dB, and 8.5 dB when N A equals 8, 16, and 64, respectively. (4) For a fixed transmit antenna number, the PAPR curves for proposed signal in [44,47] almost coincide for different SNR values. Meanwhile the PAPR reducing performance for the AN-aided signal with proposed PA strategy increases with SNR values because more power of the transmitter is used in AN subspaces to keep the optimal SC performance. e PAPR simulation results reveal that the effect of PAPR reducing by proposed PA strategy is better than the angle rotation based technique proposed in [44] to improve the efficiency of the HPAs because more AN subspaces and transmitter power can be used to adjust the PAPR value. Figure 5 shows the average SNR loss of AN-aided signals at Bob and Eve. e following are found: (1) At Bob, the SNR loss increases with the transmit signal SNR and transmit antenna number both for EPA strategy in [47] and proposed PA strategy. e gradient of curves for the proposed PA strategy is much smaller than AN-aided signal with EPA strategy. e performance difference of these two AN-aided signals reaches about 6 dB for N A � 8 and 11 dB for N A � 16 when SNR equals 30 dB. (2) At Eve, the SNR loss almost equals 0 dB and coincides with different SNR values and transmit antennas because the nonlinear characteristic of HPA not only reduces the power of the information subspace but also degrades the interference effect of AN subspaces. is average SNR loss simulation results illustrate that the proposed PA strategy can improve the channel capacity performance with the transmit antenna number increasing. Furthermore, the SC performance is mainly determined by the capacity of legal channel. Figure 6 shows the SC performance of the AN-aided signals when N A equals 8 and 16, respectively. e key parameterK Bob is defined by the AN subspaces power projecting into the legal channel μ Bob . e relationship between |μ Bob | 2 and σ 2 determines the inflection point of the SC performance. If |μ Bob | 2 is much larger than σ 2 , it means that the AN subspaces power projecting into the legal channel plays the main role in the value of K Bob , which will result in the SC performance degrading obviously. If |μ Bob | 2 is much smaller than σ 2 in K Bob , it means less AN subspaces power projecting into the legal channel, which will result in the SC performance being similar to the AN-aided model with ideal HPA. From the subfigure in (a) and (b), the value of |μ Bob | 2 is reduced by the proposed PA strategy compared with proposed signal in [44,47]. erefore, the inflection point will appear later with the transmit signal SNR increasing.

Secrecy Capacity Performances.
From Figures 6(a) and 6(b), the following are found: (1) For the AN-aided signal with EPA strategy in [47], the SC performance degrades with the transmit signal SNR increasing when the power of AN subspaces projecting into the legal channel plays the main role in K Bob . Furthermore, the SC performance reduces with the transmit antennas increasing, for example, 0.55 bit/s/Hz for N A � 8 and 0.45 bit/s/Hz for N A � 16, almost half of the ideal HPAs scenario at P/σ 2 � 30dB. Transmit signal SNR P/σ 2 (dB) Bob, proposed signal, N A = 8 Bob, original signal [47], N A = 8 Eve, proposed signal, N A = 8 Eve, original signal [47], N A = 8 Bob, proposed signal, N A = 16 Bob, original signal [47], N A = 16 Eve, proposed signal, N A = 16 Eve, original signal [47], N A = 16 Original signal [47] Angle rotation based signal [44] Proposed signal Original signal [47] Angle rotation based signal [44] Proposed signal Prob (PAPR > PAPR angle rotation based technique in [44], the PAPR reducing algorithm improves the SC performance, for example, 0.86 bit/s/Hz for N A � 8 and 0.90 bit/s/Hz for N A � 16. (3) For the AN-aided signal with the proposed PA strategy, the degradation gradient of SC performance is smooth compared with proposed signal in [44,47]. Furthermore, the SC performance is similar to the AN-aided model with ideal HPAs by the transmit antenna number increasing, for example, 0.92 bit/s/Hz for N A � 8 and 0.99 bit/s/Hz for N A � 16, almost coinciding with the ideal HPAs scenario at P/σ 2 � 30 dB. On the assumption of larger transmit antenna numbers, the nonlinear characteristic of HPA does not affect the SC performance of AN-aided signal by the proposed PA strategy because the amplitude of transmit signal is close to uniform distribution. Fortunately, this assumption is beneficial to the SC performance when eavesdropper equips multiple antennas [18].

Conclusion
In this paper, we have formulated the AN power allocation for PAPR problem of the AN-aided secure communication system as a mixed nonconvex optimization problem. By exploiting the properties of fractional programming, DC programming, and nonconvex constraint relaxing, the considered problem was transformed into an equivalent problem with a tractable solution. An efficient triple-iterative AN power allocation algorithm was derived for minimization of the PAPR value of transmit signal. Compared with the benchmark AN-aided signals, simulation results showed that the proposed algorithm can reduce the PAPR value of the transmit signal to improve the efficiency of HPAs in AN-aided secure communication model.
Interesting topics for future work include studying better algorithm for achieving the transmit signal with low PAPR characteristic, other system redundancy parameters to reduce PAPR value of transmit signal, and the complexity of PAPR reducing algorithm. Original signal [47] with ideal HPAs Original signal [47] with nonlinear HPAs Angle rotation based signal [44] with nonlinear HPAs Proposed signal with nonlinear HPAs Original signal [47] with ideal HPAs Original signal [47] with nonlinear HPAs Angle rotation based signal [44] with nonlinear HPAs Proposed signal with nonlinear HPAs erefore, we conclude that ‖x(Ω)‖ 2 ∞ − p * (1/N A )‖x(Ω)‖ 2 � 0 and it is achievable by power allocation strategy Ω * . is completes the forward implication.
Next, we prove the converse implication of eorem 1. For any feasible power allocation strategy Ω ∈ τ, we can obtain the following inequality: e preceding inequality implies x Ω * ( ) In other words, the optimal power allocation strategy Ω * for the equivalent objective function is also the optimal power allocation strategy for the original objective function.
is completes the proof of the converse implication of eorem 1. In summary, the optimization of the original objective function and the optimization of the equivalent objective function result in the same power allocation strategy.

Data Availability
Some or all data, models, and codes generated or used during the study are available in a repository or online in accordance with the funder data retention policies.

Conflicts of Interest
e authors declare that they have no conflicts of interest.