Secrecy-Capacity-Optimization-Artificial-Noise in Large-Scale MIMO: Ergodic Lower Bound on Secrecy Capacity and Optimal Power Allocation

The security of wireless information transmission in large-scale multi-input and multioutput (MIMO) is the focus of research in wireless communication. Recently, a new artificial noise—SCO-AN which shows no orthogonality to the channel, is proposed to overcome the shortcomings of traditional artificial noise. In the previous research, the optimization function of SCO-AN is not convex, and its extremum cannot be obtained. Usually, nonconvex optimization algorithms or iterative relaxation algorithms are used to get the maximum value of the optimization objective function. Nonconvex optimization algorithms or iterative relaxation algorithms are greatly affected by the initial value, and the extremum cannot be obtained by a nonconvex optimization algorithm or iterative relaxation algorithm. In this paper, we creatively apply the strong law of large numbers to obtain the optimal value of the optimization function of SCO-AN under the condition of large-scale MIMO: the strong law of large numbers is applied to obtain the ergodic lower bound (ELB) expression of SC for SCO-AN. The power allocation (PA) problem of the SCO-AN system is discussed. We use a statistical method to get the formula for calculating the optimal power distribution coefficient of the SCO-AN system. The transmitter can use the optimal power ratio of PA to distribute the transmitted power without using the PA algorithm. The effect of imperfect channel state information is discussed. Through simulation, we found that more power should be generated for SCO-AN if the channel estimation is imperfect and the proposed method can achieve better security performance in the large-scale MIMO system.


Introduction
Security is the core issue of wireless communication [1]. In this paper, the security of wireless information transmission is discussed. Since the wireless communication signal is transmitted in broadcast ways, the wireless communication signal can be received by eavesdroppers without restriction. Since the eavesdropper cannot be prevented from obtaining the transmitted information, previous research on secure communication is focused on using the principles of encryption to prevent eavesdroppers from deciphering the obtained information. However, encryption cannot fundamentally solve secure transmission problem if the eavesdropper obtains the key of the information or has enough computing power to crack the information. The secure transmission of information based on cryptography will fail. Therefore, reducing the amount of information obtained by eavesdroppers is the correct way to achieve secure communication. In recent years, physical layer security (PLS) technology has become a new research focus.
The PLS technology was proposed in [2]. In [2], a classic model for secure communication model is proposed. In [3], the secure communication model is extended to the field of wireless communication, the channels in the secure communication models are all broadcast channels.
The application of MIMO provides an opportunity for the development of PLS. In [4], the concept of secrecy capacity (SC) is outlined by Barros and Rodrigues. The numerical expression of SC is studied in [5]. In [6], Zhu studies the SC of wiretap fading channels in a massive MIMO communication system. Zeng proposes the SC of downlink massive MIMO-NOMA networks [7]. A novel method to select the proper antenna and PA in massive MIMO is proposed in [8], the algorithm in [8] makes the wireless communication system to adjust the PA coefficient, and the communication quality of eavesdropper is reduced effectively. SC is determined by the capacity of legitimate and eavesdropping channels. Generally, increasing the capacity of the legitimate channel or decreasing the capacity of the eavesdropping channel could increase SC [9][10][11]. However, for a particular communication system, the capacity of the legitimate channel is challenging to change. Therefore, previous studies focus on reducing the capacity of eavesdropping channels [12][13][14].
Artificial noise (AN) is a specific application for PLS technology [15]. AN is orthogonal to the receiver's channel, so AN will not affect the legitimate channel. However, AN is not orthogonal to the eavesdropping channel; AN will affect the eavesdropping channel. Adding AN to the transmitted signals will raise the SC of secure transmission.
However, the design of AN is under strict restriction. H denotes the legitimate channel state information (CSI), and w k denotes the AN. By definition of AN, Hw k = 0. w k is the zero solution of homogeneous linear equation group HX = 0. The dimension of H is m × n. If X is nonzero, the rank (H) must be guaranteed that rank (HÞ<min ðm, nÞ. It means that the number of transmitting and receiving antennas has to be different. However, transmitting antennas have the same number as receiving antennas in most MIMO real-life communication systems. We have to reduce the transmitting or receiving antennas. Meanwhile, the capacity of legitimate channel is reduce.
SCO-AN is proposed in [16] to solve the problem. SCO-AN does not show orthogonality to the legitimate and eavesdropping channels. Therefore, SCO-AN is achievable in any situation. Although this method has a certain degree of negative impacts on the legitimate channel, SCO-AN has a greater degree of negative impacts on the eavesdropping channel. SCO-AN is considered to increase the SC to a greater degree when compared to the traditional AN. SCO-AN is a tool that converts the receiver's antinoise ability into SC.
Recently, intelligent reflecting surface (IRS) technology has become a research hotspot in communication technology [17,18]. Because the channel of IRS is divided into uplink and downlink. Artificial noise is only valid in the uplink or downlink so that AN cannot be applied to IRS. The nonorthogonal characteristic of SCO-AN makes it a perfect application in IRS. In 2020, [19] applied nonorthogonal artificial noise to improve the security performance of IRS systems. It should be pointed out that the idea of nonorthogonal artificial noise was first put forward in [16].
We should consider the transmission power limits. It is important to allocate the power of the SCO-AN system [20]. The objective function of SCO-AN PA is nonconvex. It has been proved that we cannot get the optimal PA coefficient of the SCO-AN system. In general, nonconvex optimization algorithm or relaxation iteration algorithm is used to optimize nonconvex functions [21][22][23][24]. The simulation result has proved that these two algorithms are greatly affected by initial states of the communication models. We can only adopt an iterative approach to calculate the maximum of the objective function in a certain range. However, in the massive MIMO communication system, we can use strong law of large numbers to approximate the ELB of SC. Based on the ELB of SC, the optimal PA coefficient of SCO-AN is obtained as well. The expression for ELB on SC in fading channels which adds SCO-AN is derived. The optimal ratio of PA of the SCO-AN system is then deduced.
Base on the optimal PA coefficient, in a large-scale MIMO system, we can allocate the power without calculating. Furthermore, the effects of the perfect CSI and the imperfect CSI on the ELB of SC are discussed. The study of this paper is highly compatible with the features of 6G networks which equip massive MIMO communication system [25]. Therefore, the application introduced in this paper is a promising solution in addressing security threats for 6G networks.
The contributions of this paper are as follows: (i) The nonconvexity of the SCO-AN PA function makes it impossible to obtain the maximum value. In this paper, the SCO-AN PA function is reconstructed creatively using statistical theory, and the reconstructed PA function approximates the theoretical limit. From the reconstructed PA function, we can deduce the channel capacity of the legitimate channel and eavesdropping channel in large-scale MIMO. Thereby, the secrecy capacity in large-scale MIMO is deduced. We reach a crucial conclusion: the PA objective function of the channel between transmitter and receiver depends mainly on the partition of power and the number of transmitting antennas (ii) Based on the reconstructed PA function, we derive the optimal PA coefficient. In large-scale MIMO, PA can be carried out according to this coefficient without calculation, and the system can achieve excellent security performance. To simplify the calculation, the precision of the traditional PA algorithm based on statistics is very low. We improve the traditional PA algorithm based on statistics and propose a new PA algorithm based on statistics. The accuracy of the PA algorithm is improved (iii) We consider the effect of the imperfect CSI. An expression for ELB of SC with imperfect CSI is derived. Based on the expression, we conclude that we should generate more power for SCO-AN once the level of imperfect CSI increases. The negative effect of imperfect CSI on PA is proved by simulation The rest of the paper is organized as follows: Section 2 introduces the related work. Section 3 defines the system, channel, and signal model. Section 4 investigates the ELB of SC. The optimal PA for the proposed system model is discussed in Section 5. The effect of the imperfect is studied in Section 6. Simulation results are given in Section 7. Finally, concluding remarks are given in Section 8.

Related Work
SCO-AN was first proposed in [16]. In this paper, the author proposes an SCO-AN to overcome the defects caused by the w k denotes AN. We find that AN can hardly be designed in the simulation. AN does not exist, especially when the number of transmitting antennas equals the number of receiving antennas. According to matrix theory, for a linear equation Hw k = 0, if H is not full rank, that is, jHj = 0, Hw k = 0 has a nonzero solution. However, in wireless communication, jHj = 0 almost does not exist. Therefore, for real-life communication, AN has only zero solutions, and AN cannot be designed.
SCO-AN is designed to solve the orthogonality defect of AN. SCO-AN is not orthogonal to channel H; that is, w m denotes SCO-AN; α is a N h × 1 vector, and each elements in α is arbitrarily small. When designing SCO-AN, α satisfies condition rank ðHÞ = rank ðH, αÞ. According to matrix theory, SCO-AN must have a nonzero design scheme. The design of SCO-AN does not meet any restrictions.
We have performed a thousand simulation experiments to design AN and SCO-AN. From Table 1, it can be seen that when rank (H) is equal to N h , in 1000 experiments, AN is not designed successfully in any experiments. Only when rank (H) is less than N h , AN can be designed successfully. The design of SCO-AN is not affected by the rankðH). Table 2 shows the number of solution vectors for AN and SCO-AN under different channel conditions, N 1 is the number of solution vectors for AN, and N 2 is the number of solution vectors for SCO-AN. When rank ðHÞ is equal to N h , the number of solution vectors for AN is 0, that is, AN cannot be designed, and the number of solution vectors of SCO-AN is 1, that is, under a specific power limit, there is only one design scheme of SCO-AN. When rank ðHÞ − N h = 1, under a specific power limit, the number of AN solution vectors is 1; that is, under a specific power limit, there is only one design solution for AN. Moreover, there are countless kinds of SCO-AN design schemes. Only when rank ðHÞ − N h > 1, the solution vectors of AN and SCO-AN are both infinite, which also shows that SCO-AN is a more designable than artificial noise.
A comparison of AN and SCO-AN secrecy performance is shown in Figure 1. The previous analysis shows that, in most cases, the design of AN is very few or even unique, so for a particular channel, the improvement of AN for SC is limited; while the number of design scheme for SCO-AN is infinite, SCO-AN has no theoretical upper limit for the improvement of SC. Therefore, the SC of SCO-AN is always higher than that of AN.
In the real-life communication environment, Alice must consider the influence of power when transmitting signals. A reasonable power allocation will effectively increase the SC of the system. After considering the transmission power, the SC of the system is as follows: In (3), H and G are legitimate channel CSI and eavesdropping channel CSI, respectively. σ 2 n and σ 2 e are the variance u . If the variables in (3) are σ 2 v and σ 2 u , the Hessian matrix of (3) is nonpositive definite so that (3) is nonconvex.
Due to the nonconvex property of the SCO-AN PA function, the extremum of the function and the optimal power allocation cannot be obtained. The iterative algorithms in [26][27][28][29] are applied to derive the maximum for PA function within a specific range. The iterative algorithms are affected by the initial value seriously and have a limited optimization effect. Figure 2 shows a comparison of the different nonconvex optimization algorithms.
From Table 3, we can see that the different initial states of the transmitted signal and SCO-AN can lead to different optimization results, which is caused by the nonconvexity of the PA function. Therefore, traditional nonconvex optimization algorithms cannot get excellent optimization results. SQP is a classic iterative optimization algorithm. In the following sections, we continue to study the optimal PA and lower bound of secrecy capacity of SCO-AN under ideal conditions.

Problem State
3.1. System Model. In Figure 3, the system model of MIMO communication with eavesdroppers is shown. The noncolluding and colluding eavesdropper cases are discussed in this paper. Therefore, the system model has two scenarios: noncolluding and colluding eavesdroppers.
Alice is the transmitter of information. The number of Alice's antennas is N K . Bob is the receiver of information. The number of Bob's antennas is N P . Eve is the eavesdropper of information.
There are N L eavesdroppers in the system. For colluding scenario, the N L eavesdroppers can eavesdrop on information, which means that the eavesdropped information will be exchanged and processed jointly. The noncolluding eavesdropper is a special scenario that these N L eavesdroppers independently eavesdrop on information. When studying this scenario, we conducted research on each independent eavesdropper, which can be considered N L = 1. Similar settings can be found in [15,30]. For the facilitation of discussion, we assumed N K > N L and N K = N P .
Here we have the following: y B is Bob's received signal, and y E is Eve's eavesdropping signal. H is the CSI matrix of the legitimate channel. The dimension of H is N K × N P . G is the CSI of eavesdropping channel. For the colluding scenario, G is a matrix and the dimension of G is N K × N L ; for the noncolluding scenario, G is a vector and the dimension of G is N K × 1. Each element in H and G is zero-mean complex Gaussian random variables and independent identically distributed (i.i.d). x is signal transmitted by Alice. n and e are the additive Gaussian white noise (AWGN) in legitimate and eavesdropping channels. The variance of n is σ 2 n . The variance of e is σ 2 e . Because AN is orthogonal to H, according to the theory of matrices, AN cannot be designed when N K = N P . The key idea of SCO-AN is to design a signal which does not show orthogonality to legitimate and eavesdropping channels. SCO-AN effectly reduces eavesdropping channel capacity while slightly reducing the capacity of legitimate channels [16]. Therefore, SCO-AN will improve the SC of the communication system.
We design the transmitted signal as below: x is a vector, the dimension of So the legitimate receiving and eavesdropping signal becomes the following: where H 1 = Hr 2 , G 1 = Gr 1 , and G 2 = Gr 2 .
From (8) and (9), we can come to the conclusion that Alice could adjust the PA strategy by adjusting ϕ.

ELB of SC for SCO-AN
The ELB of SC for SCO-AN is derived in this section. The legitimate channel capacity is as follows: In (10), for the facilitation of discussion, we hypothesize the signal-noise-ratio (SNR) of communication is high enough, so P ≫ 1. Therefore, the kHk 2 P is much larger than σ 2 n so σ 2 n /ðkHk 2 PÞ is an arbitrarily small number which can be ignored. (10) is written as follows: From (11), we can conclude that the capacity of the legitimate channel is mainly related to N k and ϕ in a high SNR regime. Alice can adjust the capacity of the legitimate channel by adjusting ϕ and N K .
Alice has no knowledge of SNR of G. In order to enable secure communication, we assume that σ 2 e is arbitrarily tiny, which means the eavesdropper has the best communication environment.
Therefore, the upper bound on the eavesdropping channel capacity without considering σ 2 e is as follows: r is the inverse of ϕ, r = ϕ −1 . R = ½r 1 r 2 is a unitary matrix. GR = ½G 1 G 2 is a complex Gaussian matrix, and G 1 and G 2 are independent. Therefore, G † 1 ðG 2 G † 2 ÞG 1 is equivalent to the signal-to-interference ratio of a N L − branch mininum mean square error (MMSE) diversity combiner with N K − 1 interferers. According to [30,31], the complementary cumulative distribution function of X = G † 1 ðG 2 G † 2 Þ −1 G 1 is as follows:

Wireless Communications and Mobile Computing
According to (13), we can rewrite (12) as follows: In (14), Betð·Þ is the function of beta distribution and Betða, bÞ = ΓðaÞΓðbÞ/Γða + bÞ. K 1 ð·Þ is Gaussian hypergeometric function. Formula (14) uses conclusion in [31]. From [5], the ELB of SC is C = ½C 1 − C 2 + and ½a + denotes max f0, αg. The ELB of SC is as follows: In the following sections, the simplified and approximated expressions on ELB of SC will be discussed.
In (15), from [32], here we have where ðmÞ n is the rising factorial. So, In [32], we know K 1 ð1, 1 ; 2 ; yÞ = −ln ð1 − yÞ/y. Therefore, here, we have Substituting (19) into (18), we can obtain the following: From (20), it is easy to obtain 4.1. The Noncolluding Eavesdropper Case for SC. In the noncolluding eavesdroppers case, there is no cooperation between each eavesdropper; therefore, N L = 1. Then, (22) is derived by applying the Gaussian hypergeometric function. The ELB of SC for noncolluding eavesdroppers is given by the following: 4.2. The Colluding Eavesdropper Case for SC. In this subsection, the ELB of SC is discussed when N K is large enough.
Wireless Communications and Mobile Computing We know that lim N K ⟶∞ G 2 G † 2 /ðN K − 1Þ = I when we use the strong law of large numbers. So (12) can be written as follows: where E k ðÞ is the generalized exponential integral. The channel response of Rayleigh fading channel is an exponential function. So kG 1 k 2 is a Gamma function. The paramater of kG 1 k 2 is ðN L , 1Þ.
When N K is large enough, the ELB of SC is From (25), we can conclude that the ELB of SC relates to N k and r. The optimal PA can be obtained by deriving the ELB of SC. The optimal PA is a function of N k and r.

Optimal PA of SCO-AN
The ELB of SC is discussed in the last section. In this section, the optimal PA of the SCO-AN system is studied. The ELB of SC for noncolluding eavesdroppers and infinite N K are obtained by (23) and (25). For the facilitation of calculation and discussion, the expressions obtained in the last sections will be applied in this section.

Optimal PA: Noncolluding Eavesdropper.
For the noncolluding case, the N L = 1, and the ELB of SC C = ½C 1 − C 2 + in last sections helps us to find the optimal values for the PA coefficients r and ϕ.
The first derivatives of (23)-the ELB of SC-concerning the PA coefficient r will help us to find the optimal PA coefficient. Therefore, the first derivative of (23) satisfies the following: From (26), the optimal PA coefficient should satisfy (27) is a higher-order equation of r on N K . Its closed-form solution is challenging to find or even nonexistent. Moreover, according to the difference of N K , its root-finding formula is also different. Therefore, in the following research content, we provide some of the optimal PA coefficients with a particular number of commonly used antennas.

Optimal PA: Colluding Eavesdroppers.
In this subsection, the colluding eavesdropper's case is studied. We improve the optimal PA coefficient algorithm under colluding eavesdroppers in the classic paper [30].
In [30], for the convenience of calculation, exp ðr − 1Þ ∑ have been omitted. This will cause large errors in the calculation results. So we will improve this formula in order to get better calculation results.
Considering the expression of C in (25) and taking its derivative concerning r, the optimal r satisfies the following: Hence, we have shown that for sufficiently large N K , the optimal PA is given by (28). The solution of Equation (28) is the optimal PA coefficient. The optimal ratio of PA depends on N L and N K . In Table 4, we provide the optimal PA coefficients for some commonly used transmitting and eavesdropping antennas. Alice can allocate power to the transmitted signal by looking up the table instead of using an algorithm for power allocation. From Table 4, we can also see that when the number of eavesdropping antennas increases, it is wise to allocate more power to the SCO-AN to confuse the eavesdropper. At the same time, when N K increases, the capacity of the legitimate channel increases, which can reduce the power allocated for SCO-AN.

Secrecy Capacity: Imperfect Channel State Information
The previous section explored the ELB of SC obtained with the perfect CSI. We will continue to discuss the effect of the imperfect CSI.

Wireless Communications and Mobile Computing
The CSI estimation error introduces extra noise into the legitimate channel. Bob uses the channel estimation algorithm to get the CSI. The CSI is imperfect due to the Gaussian noise. Therefore, whereĤ denotes the channel state information obtained by MMSE channel estimate andH denotes the channel estimation error.Ĥ andH are uncorrelated due to the property of the MMSE estimation. Therefore, r 1 is designed as r 1 = H∧ † /kĤk, and the symbol received by Bob is where H 1 = Hr 2 . R is a unitary matrix, so the distribution of hR andh is the same. Therefore, the ELB of SC for the legitimate channel iŝ With σ 2 H normalized to unity, we have σ 2 H + σ 2 H = 1. Each subchannel between Alice and Bod obeys exponential distribution. Therefore, kH∧k 2 follows a Gamma distribution with parameter (N K , 1 − σ 2 H ). Here, we havê In (33), hðxÞ is the inverse function (kH∧k 2 = x) of (32), and gðxÞ is the first derivative of hðxÞ. Therefore, The error of channel estimation does not affect Eve's channel. Therefore, the ELB of SC is as follows: where ΓðÞ denotes the Gamma function and Ψ ðnÞ ðÞ denotes the n th derivative of the polygamma function.

Simulation Parameters.
In the simulation, the legitimate and eavesdropping channels are Rayleigh fading channels. The relevant simulation parameters are shown in Table 5.

Simulation
Results and Discussion. Figure 4 shows how ELB of SC changes with N k and N l . The ELB of SC is calculated by (15) with the optimal ϕ. It can be seen from Figure 4 that when the number of transmitting antennas N k increases, the SC also increases. It can also be seen from (15) that N k is located on the molecule, and N k plays a positive role in the promotion of SC. Similarly, the increase in the number of eavesdropping antennas will reduce the SC of the system. The above conclusions are easy to understand. The increase in the number of transmitting antennas represents an increase in the capacity of the legitimate channel. Therefore,    Wireless Communications and Mobile Computing the SC will increase. Similarly, the increase in the number of eavesdropping antennas will result in a decrease in the SC. Figure 5 shows the effect of the number of eavesdropping antennas on the SC. It can be seen that with the increase in the number of eavesdropping antennas, the SC of the wireless communication system decreases under the condition that the legitimate channel remains unchanged. At the same time, Figure 5 shows the SC of the wireless communication system for AN and SCO-AN when N approaches infinity. It can be seen that the ELB on SC of SCO-AN is higher than that of AN. Figure 6 shows the ELB of SC in (15) with the optimal ϕ. For comparison, the ELB of SC for AN with equal power allocation is indicated by solid lines. ELB of SC for SCO-AN is always greater than that for AN. The SC increases as N K grows. The optimal ϕ of SCO-AN is much smaller than that of SC for AN, which means SCO-AN has a better secrecy performance with less power for extra artificial noise. It proves that SCO-AN is a better artificial noise when compared to AN. The SC of the wireless communication system decreases, which shows that the channel estimation error has a SNR (dB)

10
Wireless Communications and Mobile Computing counterproductive effect on the security performance of the wireless communication system, which is also in line with reality. The imperfect CSI will cause Alice to error in the distribution of transmitting power, which will leads to a decrease in the SC. The AWGN produces the CSI estimation error. So the CSI estimation error decreases with SNR. The deviation of the PA ratio between the practical system and the perfect CSI system becomes smaller with the increase of SNR. We should consider the channel estimation error when SNR is low in a practical system. Figure 7 shows the SC with optimal ϕ and different types of σ 2 H (LS and MMSE) [31]. MMSE and LS are classic channel estimation algorithms. It can be seen that for the influence of different levels of imperfect CSI on SC, the influence of wireless communication systems using MMSE channel estimation is always less than that of LS, which is because the MMSE channel estimation accuracy is higher than that of the LS, so the MMSE channel estimation has less influence on Alice's power allocation. At the same time, the increase of the channel estimation error level will cause the decrease of SC.  Figure 8 shows the ELB of SC with different PA methods. We use SQP and BPA algorithms [26] to compare with the optimal PA coefficient presented in this paper. We can see from Figure 8 that under the condition that transmitting antennas' number is small, the ELB of SC using the optimal power distribution coefficient is smaller than that of SQP; when the number of antennas increases, the SC using the optimal power distribution coefficient increases significantly, which is consistent with the theory in this paper. Since the conclusions derived in this paper are derived using the strong law of large numbers, which is a statistical theory, the larger the number of samples, the more accurate the results of the theoretical derivation. Therefore, in the case of a small number of antennas, the algorithm in this paper is not as good as the traditional iterative optimization algorithm. But when the number of antennas is large enough, the algorithm in this paper is far better than the traditional iterative optimization algorithm. Since the optimal power distribution coefficient is based on statistics, the optimal power distribution coefficient can be used well for massive MIMO. Figures 9 and 10 show optimal power distribution coefficient in (28) with different N K and N L . Figures 9 and 10 show

12
Wireless Communications and Mobile Computing optimal ϕ reduces as N L grows; we should allocate more power to SCO-AN as N L increases. On the contrary, when N K increases, less power should be allocated to SCO-AN. Figures 9 and 10 also show that we should generate more power to the information-bearing signal with the SNR increase. Figure 11 shows the comparison between the algorithm in this paper and the algorithm in the classic paper [30]. The solid line SC in Figure 11 is calculated by the optimal PA coefficient obtained by (28). The dotted SC is calculated by the best PA coefficient obtained in the classic paper [30]. Under the same conditions of N k and N L , the algorithm in this paper has a better improvement on SC, while the algorithm in the classic paper [30] discards too many items, resulting in a significant error in the optimal PA coefficient, and the effect of improving the SC is reduced.

Conclusion
This paper researches ELB of SC under large-scale MIMO. Aiming at the problem that traditional optimization algorithms cannot find the maximum value of nonconvex PA function, this paper uses statistical methods to study the PA technology of SCO-AN in large-scale MIMO systems. First, this paper derives the expression of ELB of SC. Then, the best PA coefficient function based on this expression of ELB of SC is derived. According to the optimal PA coefficient function, the optimal PA coefficient under the conditions of different transmitting antennas and the number of eavesdropping antennas can be deduced. The application of the PA coefficient can significantly improve the SC without the optimization algorithm. This paper also considers the impact of imperfect CSI on PA; when N K increases or N L decreases, the power of SCO-AN should be reduced. At the same time, when the level of imperfect CSI increases, more power should be allocated to SCO-AN.

AN:
Artificial noise SCO-AN: Secrecy capacity optimization artificial noise MIMO: Multiple-input multiple-output CSI: Channel state information SC: Secrecy capacity PA: Power allocation ELB: Ergodic lower bound IRS: Intelligent reflecting surface.

Data Availability
The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request.