QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers

School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China, Chongqing, China Chongqing Key Laboratory of Ubiquitous Sensing and Networking, Chongqing, China Peter the Great St. Petersburg Polytechnic University, Saint Petersburg, Russia


Introduction
Recently, with the rapid development of mobile communication networks, the multimedia-oriented Internet of ings (IoT) network has shown a strong development momentum. Diversified multimedia services, such as video surveillance, make video data occupy a large proportion of multimedia IoT [1][2][3]. According to the existing data, the mobile network traffic data has increased by 42% from 2020 to 2021 [4]. By the end of 2022, the multimedia content data will account for 82% of the global mobile traffic [5]. e integration of various mobile terminals and multimedia IoT will promote the rapid growth of this number. In particular, the continuous upgrading of the multimedia IoT industry will have higher requirements for services, resulting in more video data, such as automatic driving and smart city. e resulting multimedia data brings more tremendous pressure to the uplink and downlink transmission of IoT [6]. In this regard, deploying MEC at the small base station (SBS) can bring services to the edge of the network and enable IoT users to obtain better experience [7,8]. Due to the large number of users and the diversity of video requirements, it is worth studying how to efficiently deliver videos to IoT users with limited resources.
With layered technology such as H.264/moving Picture Experts Group-4 (MPEG-4) scalable video coding (SVC), a video stream can be divided into different quality levels to provide users with more personalized services [9]. Generally, more multimedia data layers can bring users a better experience, but it also needs to pay more communication costs. When faced with many requests, some additional video enhancement data may squeeze the resources of other vulnerable users and introduce additional interference, resulting in unfair resource allocation [10]. On the other hand, users with similar needs in the network can be divided into the same multicast group through multicast transmission. Multicast transmission of SVC video can make full use of its hierarchical structure, effectively reducing the system energy consumption and significantly reducing the reception delay in the face of many IoT users [11]. With a reasonable beamforming design, SBS can use limited communication resources to serve more users on the premise of reducing resource loss [9]. However, the nature of multicast transmission makes the communication over this medium vulnerable to eavesdropping [12]. In network service, transmission security and privacy issues will directly bring terrible experiences to users. A part of the literature has studied this problem from the perspective of security protocols and encryption algorithms [11,13,14]. In addition, there are often eavesdroppers in the process of wireless transmission. Eavesdroppers trying to access multicast services without authorization will cause economic losses to operators. Using beamforming technology and SVC technology [15][16][17][18], through more accurate beamforming design, artificial noise can be introduced to reduce the channel quality of potential eavesdroppers as much as possible, making it difficult for them to obtain complete transmitted video [19]. On the other hand, if the eavesdropper cannot obtain the basic layer data, the transmission security of the complete video can be guaranteed.
In the literature, researchers usually design optimization strategies to improve the performance in the network from two directions, that is, secure transmission and cached video delivery. On the security of transmission studies, it is often assumed that there are potential eavesdroppers in the network. e transmission signals of actual users are designed from the perspective of the physical layer to improve confidentiality and prevent data leakage [20,21]. However, most studies regard security as the main goal rather than a prerequisite to optimizing network performance. An effective active caching strategy can filter out popular data from a large amount of data for caching to reduce the delay of users obtaining content and improve the user experience. However, this often depends on the screening of a large number of historical data, and the improvement of performance depends too much on the accuracy of cache. Using reasonable resource allocation strategy, the improvement of network performance will often have greater guarantee [22,23]. Many efforts have been devoted to the efficient transmission of cached content at the edge of the network. However, how to jointly consider the cost of content cache location and limited network resources to deliver video while ensuring transmission security still lacks understanding.
Motivated by this, we study a video delivery scheme to maximize the weighted sum of QoE in a multimedia IoT network. e multicast transmission model with eavesdroppers, cache cost model, and QoE model are first introduced, based on which a network QoE optimization problem is formulated. By applying the SCA technique, cooperative beamforming and video quality selection are jointly optimized to guide how to deliver videos to different IoT users. Furthermore, extensive simulation experiments are carried out to verify the QoE enhancement performance of our proposed scheme. e contributions of this paper are summarized as follows: (i) In the multimedia IoT network scenario, the corresponding transmission model and the user QoE model are designed according to the existence of eavesdroppers. e design of the beamforming model is used to prevent insecurity in the multicast process, which is reflected in the design of the optimization problem.
(ii) An alternating iterative scheme considering system beamforming design and user acquired video quality selection strategy is designed with SCA technology. e QoE optimal solution under the condition of fixed video quality is found step by step through alternating updating. (iii) A user selection scheme for video quality enhancement is designed by adding penalty parameters. e simulation results show that, combined with an iterative alternating algorithm, this mechanism can ensure that the system can use limited resources to obtain the best weighted QoE. e rest of the paper is organized as follows. e related works are reviewed in Section 2. Section 3 introduces the transmission model and the optimization problem. e algorithm is designed in Section 4. Section 5 provides and discusses the simulation results. Section 6 concludes the paper.

Related Work
In the literature, the service experience enhancement is usually studied through proactive caching and content delivery. When seeking the best experience, the security of transmission also needs to be considered [24]. Hence, the related works are reviewed based on the lines of security of multicast transmission and cached-enabled video delivery, respectively.
On the security of transmission study, the focus is mainly on the impact of the insecure channel model and preventing content from being eavesdropped on during multicast transmission. In [20], two cognitive single-group multicast secure beamforming (SGMC-S-BF) schemes were proposed for a scenario where there exists one eavesdropper who is actually a regular user of the legitimate communication system. However, it attempts to access unauthorized multicast services. In [25], a task-oriented user selection incentive mechanism was proposed, which clusters the similarity of users by jointly considering the security and fairness of served users to realize efficient user dynamic selection. In [26], the constant modulus (CM) signaling was studied, and beamforming is designed using the semidefinite relaxation (SDR) technique and a custom-build nonconvex alternating direction method of multipliers (ADMM) algorithm, respectively. In [27], power minimization and secrecy rate maximization were considered in the secrecy network. A closed-form solution of transmit beamforming is given by exploiting the Bernstein-type inequality and the S-Procedure to convert the probabilistic secrecy rate constraint into the determined constraint. Literatures [20][21][22][23][24][25][26][27] focus on improving security performance but ignore the improvement of user performance indicators. In [21], a SDP-based secure layered video transmission scheme was proposed, but it is not suitable for the case of multiple base stations. Hence, the improvement of video delivery performance considering a nonsecure environment still needs further study in multigroup multicast scenarios.
Research on video delivery focuses on limited resource allocation and delay optimization. In [22], a dynamic interest capture model in the Industrial Internet was proposed to mine the individual user interest, based on which a group interest aggregation algorithm is then studied to determine the content caching strategies for edge nodes. In [28], an adaptive active cache scheme combined with reinforcement learning was proposed to improve user QoE of contentcentered edge cache IoT and reduce cache cost. However, [22][23][24][25][26][27][28] mainly focus on the active cache scheme, ignoring system performance optimization by transmission strategy. In [29], the authors predicted video content requests from the perspective of the traces collected over a big city, and a joint active caching, power allocation, and user association scheme was designed to optimize the QoE of user content delivery. In [30], an active cache and user association scheme based on belief propagation was proposed to maximize the revenue of operators on the premise of ensuring the quality of service (QoS). In [31], a social-aware spectrum sharing and caching helper selection (SSC) strategy was proposed to share and cache downlink spectrum resources of multicast storage resources and unload multimedia content. In [32], the authors addressed the impact of cache on the transmission design, and a robust joint optimization strategy is designed for the case of incomplete channel information to minimize the transmission cost. In [33], a multiquality video transmission scheme based on SBS clusters division was proposed to maximize the economic efficiency (ECE) of network transmission. In summary, [29][30][31][32][33] optimized video delivery based on only unicast or multicast transmissions under the scenario with single base station. In addition, the above literature ignores the personalized demands of users, and multiquality video transmission is often more accurate to serve each user and save limited network resources.
Due to the increasingly personalized user demands and the complexity of the network environment, SVC technology is usually applied to meet the diverse requirements of video delivery in IoT network. In [34], the author used the stochastic geometry tool to increase the probability of successful transmission of multiquality video and proposed a two-stage transmission optimization algorithm based on the convex optimization and the packing problem. In [35], a matching sensing scheme considering relay selection was proposed to optimize the cooperative transmission performance of SVC video and improve the QoE of users. In [36], a multicast video transmission strategy based on the multicast subgrouping and SVC technology is proposed, and the transmission efficiency and fairness between users were discussed. In [37], the author addressed the application of multiquality video in multicast transmission and described the optimal beamforming as a power minimization problem and user experience maximization problem, respectively. In [23], cache-assisted data rate (CADR) was proposed as a performance index to measure the SVC video transmission performance in nonorthogonal channel D2D scene, and a two-stage joint optimization scheme is proposed. However, [34][35][36][37] mainly discussed the perspective of multiquality video transmission, but the cost of cache location and transmission interference in the case of multigroup multicast has not been considered. e D2D auxiliary transmission strategy proposed by [23] is difficult to apply directly in multicast transmission based on multi-SBS.
In summary, on the premise of the existence of eavesdroppers, there is still lack of deep understanding on how to meet the personalized user demands through jointly optimizing the multiquality video and multicast transmission beamforming and ensure transmission security, which motivates this paper.

System Model
In this section, we present a multimedia IoT network architecture, transmission model with eavesdroppers, cache model, and delay cost and QoE model, and the modeling of the optimization problem is introduced. Figure 1, we focus on a cached-enabled radio access network that includes multiple densely deployed SBSs and multiple IoT users and eavesdroppers indicated by

Transmission Model. As depicted in
. . , U E , respectively, where videos can be transmitted through nonorthogonal multicast mode. In addition, each of SBS is configured with A k antennas and can cache popular content in the equipped MEC storage unit at the network edge, so that IoT user requests can be responded to quickly. Based on the content and the quality level of a video request, the IoT users are divided into several multicast groups G � 1, . . . , g, . . . , G . In this regard, wireless resources can be saved by multicasting the videos to users with identical content and quality request in a group.
In this paper, SBS k can be associated with multiple groups k g , and the user in such group is represented by g u . e channel power gain between IoT user u, eavesdroppers j, and SBS k is denoted by represents the artificial noise generated by SBS by beamforming, which is used to further reduce the channel conditions of eavesdroppers. Besides, P k > 0 is used to denote the maximum transmission power of SBS k; there holds For multicast group g, we use w g � [w H 1,g , . . . , w H K,g ] H to represent the beamforming vector group it receives. For simplicity, the SVC technology encodes a video into two layers, and SBSs will store different quality files of a video in the cache space. To deal with the quality level of each video, the base layer (BL) and the enhancement layer (EL) are used to characterize the basic video quality and the enhancement video quality, respectively. e multimedia contents quality requested by IoT user u is represented by l u � 1, 2 { }, where l u � 1 represents that IoT user requests low-quality multimedia contents and l u � 2 represents that IoT user requests high-quality multimedia contents. Besides, the requested video content and the video quality of the multicast group g are represented as g f and g l , respectively. Note that highquality multimedia contents include both BL data and EL data at the same time. A video content cannot be decoded with only EL data. Let l req u denote the quality level requested by user u; there holds In order to improve the multimedio content delivery efficiency, a user can be assigned to at most two groups where one group only receives BL data and the other receives EL data, as depicted in Figure 2. e network only needs to allocate a multicast beamforming vector to provide BL data to users requesting low-quality video and users requesting high-quality video simultaneously. On the other hand, when SBS transmits data to multicast group users, eavesdroppers can receive broadcast information and obtain unauthorized video content. By reducing its signal-to-interference-to-noise ratio (SINR), it cannot restore the complete video, so as to prevent the content from being intercepted. In this sense, the network only needs to assign only one multicast beamforming vector to provide BL version video to the users requesting low-quality videos and those requesting high-quality videos at the same time. e received signals of IoT user u and eavesdropper j are given by, respectively, where G u represents the multicast group set assigned by the user u. s g with E|s g | 2 � 1 represents the precoding binary symbols of the video requested by group g, and n u ∼ CN(0, σ 2 u ) denotes the additive white Gaussian noise (AWGN). Applying Shannon's theory, the transmission rate of u when requesting a video f with quality level l holds as e SINR is denoted by where In (5), w g,f l denotes the multicast group beamforming vector which provides content f with quality level l. In (6), the first term denotes higher-quality version signal  interference to the same video content, and the second term denotes the other group signal interference. Since SBS actively generates artificial noise, the coded information can be transmitted to the user in advance, so it will not be regarded as noise. In addition, to ensure the user fairness in group g, the transmission rate should depend on the user with the worst channel condition in the group, and the group transmission rate thus holds On the other hand, the transmission rate of eavesdropper j can be obtained as where In (9), the noise can inform the authorized user in advance, and it will not cause additional interference to the target user. Due to the characteristics of SVC, we can ensure the security of multicast video transmission only by ensuring that the video of BL layer is not completely eavesdropped. erefore, we give a maximum tolerance Γ u E ,f < Γ toler of the eavesdropper, so that it cannot obtain the complete video.

Cache Model.
e limited video content library is denoted by F � 1, . . . , f, . . . , F , where F is the library size.
e size of a unit video block with quality l of different content f is denoted by S f,l . In order to facilitate the experiment, different video blocks of the same quality are assumed to have the same size S l , which can be realized by adaptive slicing of video. e popularity of all contents is assumed to follow the Zipf distribution [38], that is, the probability that content f − th being requested is given by where α denotes the Zipf parameter. e larger α, the more significant the popularity skewness between different contents. Suppose that each SBS will cache contents according to the popularity ranking until the cache space is full, and the cache state of content f at SBS k can be obtained as

Delay Cost and QoE Model.
As the cache capacity of each MEC is finite, only some popular videos can be precached. If a video is not cached in the MEC of the local SBS, the content must be obtained from the neighbor SBS or cloud center, which will introduce the extra delay in the video transmission process. Since multiple SBSs cooperate to transmit multimedia content to IoT users simultaneously, let D f u denote the extra delay; there holds

Security and Communication Networks
Equation (12) indicates that there is no extra delay if the video is stored in all MEC cache equipped with SBS. If the video is only cached in the MEC of a part of SBSs, the extra delay equals a fixed value d f . It is caused by the video content sharing between SBSs using Xn interface in the 5G networks [39]. A fixed extra delay d 0 (d 0 ≫ d f ) is needed if the video can only be obtained in the cloud center [40]. Furthermore, taking the video transmission delay from the local SBS to the user into account, the total video delivery delay is given by Compared with other factors, the startup delay of the video often directly affects the willingness of the user to play the video. In addition, from the practical experience, the benefits of reducing the startup delay meet the feature of diminishing margins rather than a fixed value. e lower the delay is, the lower the QoE improvement that can be achieved. Hence, we apply a logarithm to characterize the impact of startup delay of the video on the QoE in this paper [41]. On the other hand, a higher-quality level of video is able to improve the QoE compared to the one with low-quality level. Hence, the QoE of user u can be modelled by where η ∈ [0, 1] is a weight factor that characterizes the importance of the video quality and that of the delay on the QoE. Besides, β is a positive parameter used to control the marginal benefit of the startup delay. e first term indicates the impact of the definition of the user u-requested video on the overall QoE. e second term indicates the impact of the transmission delay on the overall QoE, where max l≤l u D u represents the maximum transmission delay of all the video data received by user u.

Problem Formulation.
In this paper, the aim is to maximize the sum of the QoE of each user that is called network QoE through jointly optimizing the video version selection and multicast group beamforming; there holds In order to improve the QoE of the IoT user, an efficient beamforming strategy can effectively reduce the transmission delay in the wireless transmission process. At the same time, the eavesdropper should provide the poor channel conditions designed to hinder its action. On the premise of ensuring the basic demands of users, providing users with video quality enhancement services at a low enhancement cost also helps to improve the QoE of the network. However, the improvement of video quality will bring additional interference to the same frequency transmission. erefore, video quality selection and multicast group beamforming are jointly optimized. e optimization problem is formulated as follows: In problemP 1 , (16b) is the fairness constraint within the multicast group, (16c) represents the video bit rate constraint to ensure the QoS requirements of each, where R req l is the bit rate threshold corresponding to the video quality, (16d) is to the power constraint of each SBS, (16e) is SINR constraint of eavesdropper, (16f ) means that the quality level of the video obtained by each user should be not lower than the corresponding requested one.

Algorithm Design
Since P 1 is an MINLP problem, it is difficult to solve by convex technique directly. erefore, it is promising to decouple the process of video quality selection and that of multicast group beamforming. First, the video quality selection parameter is fixed as l. e optimization problem P 1 can then be transformed as However, the quadratic term of w in constraint (16b) appears in both the numerator and the denominator, resulting in its nonconvex nature. On the other hand, since the right side of (16e) is a constant term, it is still a convex term, and the artificial noise part v can be solved directly. To extract the fractional part, we introduce auxiliary variables in the SINR part of (16b) and modify the original constraint into Consequently, the nonconvex constraint (16b) of the original problem is replaced by (18) and (21). Nevertheless, constraint (18) is still a nonconvex constraint. In this regard, we design an approximate convex lower bound to relax constraint (18). Let f(w g u , I u ) � ‖h H u w g u ‖ 2 2 /I u and perform 6 Security and Communication Networks Taylor's first-order expansion of f(w g u , c u ) at feasible points w (t) g u and c (t) u ; constraint (18) can then be replaced by an auxiliary function as where Re(·) represents the real part and t represents the number of iterations. For any (w (t) g u , I (t) u ) that satisfies the constraint, there are f(w (t) g u , I (t) u ) � ψ(w (t) g u , I (t) u ) and ∇f(w g u , I u ) � ∇ψ(w g u , I u ). erefore, constraint (18) is transformed into a second-order cone (SOC) constraint as Since the second derivative of (21) is more than zero, the transformed constraint has the convex property. rough iteration, the problem can be solved using the CVX tool and MATLAB. To substitute w with w (t) in problem P 1,1 , parameters I (t) , Γ (t) , and ψ (t) can be obtained. In this way, all constraints are still satisfied since w (t) is a feasible point. Further applying I (t) , Γ (t) , and ψ (t) to solve problem P 1,1 , the solution w (t+1) can be further regarded as the input of the (t + 1)-th iteration. In the iterative process, the construction of ψ (t) requires the same gradient value as the original function, the objective function value of the t − th iteration must not be greater than that of the (t + 1) − th iteration, there holds u , and the iterative process is monotonically decreasing. In addition, considering that the system power is limited, the convergence of the iterative solution can be guaranteed according to the monotone boundedness theorem. When w (t) � w (t+1) holds, the iteration converges and the optimal multicast group beamforming can be achieved. Generally, the convergence speed of the optimization problem is strongly related to the initial beamforming value in the first iteration, that is, w (0) . In what follows, an auxiliary problem is further formulated to guide how to determine w (0) : where δ � min u∈U R u,l /R req l , which is called the rate satisfaction. δ ≥ 1 indicates that the corresponding solution w * satisfies (16c) and (16d). e solution approach of problem P 1,2 is summarized in Algorithm 1. By setting w 0 � w * , problem P 1,1 can be solved iteratively by convex tools.
In step 3, Algorithm 1 solves a second-order cone programming problem, calculated by the interior point method, and its computational complexity can be expressed as O(((G + 3)(A k K + 4)) 3.5 ). In addition, the computation cost in each iteration is bounded by O(T 1 ((G + 3)(A k K + 4)) 3.5 ), where T 1 is the number of iterations in Algorithm 1.
In the video quality selection process, in order to degrade the interference from the signal of EL video to other groups, a heuristic algorithm is designed as follows. For a given user u, an auxiliary variable z u is introduced to measure the cost of quality enhancement, which can further help to select the video quality level.
e QoS constraint (16c) is then transformed into (R g,l − R u,l ) ≤ z u , where larger z u results in more costs to enhance the video quality for user u, and vice versa. erefore, we further formulate the following optimization problem to minimize the sum of z u of each user: (16b), (16c), (16e), (19), (21), where U BL represents the user who initially requested the low-quality multimedia content. In (23c), the corresponding enhancement cost of IoT users requesting high-quality multimedia content are all set to 0. By solving problem P 1,3 , the video quality enhancement cost set z can be obtained, which is further used to select the user in U BL with the smallest z to provide EL videos to improve the QoE performance.
Based on Algorithm 1, the complexity of Algorithm 2 is mainly determined by the user selection process in step 5 and the maximization process of QoE in step 10. T 2 and T 3 represent the iteration times of the above two steps, respectively, and the computational complexity of Algorithm 2 can be expressed as O((T 1 + U BL (T 2 + T 3 ))((G + 3) (A k K + 4)) 3.5 ), where U BL is the number of IoT users requesting low-quality video.

Simulation Results
In this section, simulation results are presented and discussed. Without other highlights, the simulation parameters are set as follows. e simulation scenario includes 7 SBSs with A k � 2 that are distributed on the vertex and center of a regular hexagon with a side length of 100 m, and 40 IoT users and 3 eavesdroppers that are randomly distributed on a circle with a radius of 200 m. e channel gain from SBS k to the user u is defined as h k,u � ������������� 1/(1 + d k,u /d 0 ) ρ h k,u , where the path loss factor is set as ρ � 3, the standard distance is set as d 0 � 50m, and the noise power is set as 1. According to the transmission unit size requirements in IEEE 802.11, we set the EL data to 2 Mbit, corresponding to 1080 p definition video, and set the BL data to 1 Mbit, corresponding to 720 p video. e remaining simulation parameters are shown in Table 1. e network performance is evaluated in terms of average network rate, multicast group rate, and network QoE. Figure 3 shows the convergence performance of Algorithm 1 under four different random channel realizations (RCR) from the average transmission rate. All the simulation results are under the condition of secure communication. Under the interference of artificial noise, the eavesdropper cannot obtain the content at the lowest decoding rate. e beamforming of the multicast group is initialized to v H k,a , w H k,g,a � rand × where ran d is a random factor within [0, 1]. It is observed that, after the first 5 iterations, the average rate in four different RCR can reach the 96.72% level obtained in the 20th iteration, which verifies the convergence performance of Algorithm 1. Moreover, the convergence performance of Algorithm 1 proposed is insensitive to the channel conditions, which verifies the robustness of the proposed scheme.
In Figure 4, four multicast groups are randomly selected, and the rate performance of multicast groups with different delay costs and intra group video request quality is compared. Input: Channel condition and QoS threshold of multi-quality video. Output: Optimal beamforming vector and rate satisfaction.
Input: Channel condition, cache transmission delay, delay satisfaction factor and QoS threshold of multi-quality video. Output: Optimal beamforming vector, optimal version selection set and maximum network QoE.
ALGORITHM 2: Maximize QoE algorithm. In the first five iterations, the proposed scheme tries to find out the appropriate initial parameters for subsequent optimization. After that, the QoE is maximized iteratively. First, group 2 and group 4 changed significantly near the fifth and 12th iterations. is is because they have high video quality requirements. Allocating additional resources helps improve the previous item of QoE, which is more advantageous than the optimization of delay. For group 4, because there are few users in the group and the channel conditions are poor, it is only necessary to maintain a minimum QoS requirement at the end to save limited resources. Group 1 selects the multicast group with the most members in the group and allocates resources to it, helping to improve the efficiency of beamforming and optimize network QoE. For group 3, although the delay cost D f � 0.2, this makes the QoE delay part have a large room for improvement, so it is still in a slow rising state. e above shows that, with the optimization of network QoE, the resource scheduling of different groups will still be adjusted adaptively according to iteration. Figure 5 shows the trend of network QoE weighted sum. Although the allocation of resources between different multicast groups fluctuates in Figure 4, the QoE of the whole network increases monotonically. e allocation of resources will only change the growth rate of network QoE, which shows the effectiveness of the proposed algorithm for network QoE optimization.
In Figure 6, the network QoE performance was depicted under different cache capabilities of SBSs. In order to validate the effectiveness of the proposed scheme, three baseline schemes, namely, QoE-Max, QoS-Only, and Unicast, are introduced. e QoE-Max scheme maximizes the network QoE based on multicast group beamforming optimization only, without considering the enhancement of video quality.
e QoS-Only scheme only guarantees the basic QoS requirement of video quality of each user. e Unicast-QoE algorithm will transmit multimedia content to users through unicast cooperative transmission, producing additional interference. e cache ratio in Figure 5 indicates the proportion of the content library that an MEC can cache. e network QoE of the four schemes shows an increasing trend, but there are still some fluctuations due to the uncertainty of users' requests for popular content. In addition, as the MEC cache ratio increases, more space is used to store infrequently used content. Furthermore, compared with the Unicast-QoE algorithm with the worst performance, the proposed algorithm improves the network QoE by 23.59% on average. And compared with the QoE-Max algorithm, which ignores video quality enhancement, the proposed algorithm improves by 6.68% because the additional video quality brings users a better experience. During the experiment, the Unicast-QoE algorithm needs to design beamforming separately for all users, which will produce additional resource consumption and interference. In addition, among the four algorithms, the proposed algorithm also has the best performance because the proposed algorithm is optimized for video quality and beamforming simultaneously.

Conclusions
In this paper, a QoE-aware video delivery scheme was studied in multimedia IoT network with potential eavesdroppers. A joint video quality selection and multicast group beamforming scheme were proposed to maximize the network QoE while preventing data eavesdropping as much as possible. Extensive simulation results validated the effectiveness of the proposed scheme in terms of user satisfaction, multicast group rate, and network QoE [42].

Data Availability
e relevant data used to support the results of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding the publication of this paper.