Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Joint Optimization for Secure and Reliable Communications in Finite Blocklength Regime

Published: 03 May 2023 Publication History

Abstract

To realize ultra-reliable low latency communications with high spectral efficiency and security, we investigate a joint optimization problem for downlink communications with multiple users and eavesdroppers in the finite blocklength (FBL) regime. We formulate a multi-objective optimization problem to maximize a sum secrecy rate by developing a secure precoder and to minimize a maximum error probability and information leakage rate. The main challenges arise from the complicated multi-objective problem, non-tractable back-off factors from the FBL assumption, non-convexity and non-smoothness of the secrecy rate, and the intertwined optimization variables. To address these challenges, we adopt an alternating optimization approach by decomposing the problem into two phases: secure precoding design, and maximum error probability and information leakage rate minimization. In the first phase, we obtain a lower bound of the secrecy rate and derive a first-order Karush-Kuhn-Tucker (KKT) condition to identify local optimal solutions with respect to the precoders. Interpreting the condition as a generalized eigenvalue problem, we solve the problem by using a power iteration-based method. In the second phase, we adopt a weighted-sum approach and derive KKT conditions in terms of the error probabilities and leakage rates for given precoders. Simulations validate the proposed algorithm.

References

[1]
M. Oh, J. Park, and J. Choi, “Secure Internet-of-Things communications: Joint precoding and power control,” in Proc. IEEE Int. Conf. Commun., May 2022, pp. 3412–3417.
[2]
P. Popovskiet al., “Wireless access in ultra-reliable low-latency communication (URLLC),” IEEE Trans. Commun., vol. 67, no. 8, pp. 5783–5801, Aug. 2019.
[3]
L. Hobert, A. Festag, I. Llatser, L. Altomare, F. Visintainer, and A. Kovacs, “Enhancements of V2X communication in support of cooperative autonomous driving,” IEEE Commun. Mag., vol. 53, no. 12, pp. 64–70, Dec. 2015.
[4]
H. Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Resource allocation for secure URLLC in mission-critical IoT scenarios,” IEEE Trans. Commun., vol. 68, no. 9, pp. 5793–5807, Sep. 2020.
[5]
G. Durisiet al., “Toward massive, ultrareliable, and low-latency wireless communication with short packets,” Proc. IEEE, vol. 104, no. 9, pp. 1711–1726, Sep. 2016.
[6]
G. Durisi, T. Koch, J. Östman, Y. Polyanskiy, and W. Yang, “Short-packet communications over multiple-antenna Rayleigh-fading channels,” IEEE Trans. Commun., vol. 64, no. 2, pp. 618–629, Feb. 2016.
[7]
Q. Zhang, P. P. Liang, Y.-D. Huang, Y. Pei, and Y.-C. Liang, “Label-assisted transmission for short packet communications: A machine learning approach,” IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8846–8859, Sep. 2018.
[8]
J. Chen, Z. Zhang, Y.-C. Liang, X. Kang, and R. Zhang, “Resource allocation for wireless-powered IoT networks with short packet communication,” IEEE Trans. Wireless Commun., vol. 18, no. 2, pp. 1447–1461, Feb. 2019.
[9]
Y. Yu, H. Chen, Y. Li, Z. Ding, and B. Vucetic, “On the performance of non-orthogonal multiple access in short-packet communications,” IEEE Commun. Lett., vol. 22, no. 3, pp. 590–593, Mar. 2018.
[10]
Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010.
[11]
M. Haghifam, M. R. Mili, B. Makki, M. Nasiri-Kenari, and T. Svensson, “Joint sum rate and error probability optimization: Finite blocklength analysis,” IEEE Wireless Commun. Lett., vol. 6, no. 6, pp. 726–729, Dec. 2017.
[12]
Y. L. Zou, J. Zhu, X. Wang, and V. Leung, “Improving physical-layer security in wireless communications using diversity techniques,” IEEE Netw., vol. 29, no. 1, pp. 42–48, Jan. 2015.
[13]
Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “IoT security: Ongoing challenges and research opportunities,” in Proc. IEEE 7th Int. Conf. Service-Oriented Comput. Appl., Nov. 2014, pp. 230–234.
[14]
M. B. M. Noor and W. H. Hassan, “Current research on Internet of Things (IoT) security: A survey,” Comput. Netw., vol. 148, pp. 283–294, Jan. 2018.
[15]
Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, Apr. 2018.
[16]
A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
[17]
I. Csiszár and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339–348, May 1978.
[18]
W. Yang, R. F. Schaefer, and H. V. H. V. Poor, “Finite-blocklength bounds for wiretap channels,” in Proc. IEEE Int. Sym. Inf. Theory, Jul. 2016, pp. 3087–3091.
[19]
W. Yang, R. F. Schaefer, and H. V. Poor, “Wiretap channels: Nonasymptotic fundamental limits,” IEEE Trans. Inf. Theory, vol. 65, no. 7, pp. 4069–4093, Jul. 2019.
[20]
C. Feng and H.-M. Wang, “Secure short-packet communications at the physical layer for 5G and beyond,” IEEE Commun. Standards Mag., vol. 5, no. 3, pp. 96–102, Sep. 2021.
[21]
I. Krikidis and B. Ottersten, “Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling,” IEEE Signal Process. Lett., vol. 20, no. 2, pp. 141–144, Feb. 2013.
[22]
Z. Sheng, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Beamforming optimization for physical layer security in MISO wireless networks,” IEEE Trans. Signal Process., vol. 66, no. 14, pp. 3710–3723, Jul. 2018.
[23]
A. Khisti and G. Womell, “Secure transmission with multiple antennas—Part II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, Nov. 2010.
[24]
Q. Shi, W. Xu, J. Wu, E. Song, and Y. Wang, “Secure beamforming for MIMO broadcasting with wireless information and power transfer,” IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2841–2853, May 2015.
[25]
W. Wang, K. C. Teh, and K. H. Li, “Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 3, pp. 505–515, Mar. 2017.
[26]
J. Choi and J. Park, “Sum secrecy spectral efficiency maximization in downlink MU-MIMO: Colluding eavesdroppers,” IEEE Trans. Veh. Technol., vol. 70, no. 1, pp. 1051–1056, Jan. 2021.
[27]
W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Diversity versus channel knowledge at finite block-length,” in Proc. IEEE Inf. Theory Workshop, Sep. 2012, pp. 572–576.
[28]
W. Yang, G. Durisi, T. Koch, and Y. Polyanskiy, “Quasi-static multiple-antenna fading channels at finite blocklength,” IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 4232–4265, Jun. 2014.
[29]
Y. Hu, J. Gross, and A. Schmeink, “On the capacity of relaying with finite blocklength,” IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1790–1794, Mar. 2016.
[30]
J. Chen, L. Zhang, Y.-C. Liang, and S. Ma, “Optimal resource allocation for multicarrier NOMA in short packet communications,” IEEE Trans. Veh. Technol., vol. 69, no. 2, pp. 2141–2156, Feb. 2020.
[31]
W. R. Ghanem, V. Jamali, Y. Sun, and R. Schober, “Resource allocation for multi-user downlink MISO OFDMA-URLLC systems,” IEEE Trans. Commun., vol. 68, no. 11, pp. 7184–7200, Nov. 2020.
[32]
J. Choi and J. Park, “MIMO design for Internet of Things: Joint optimization of spectral efficiency and error probability in finite blocklength regime,” IEEE Internet Things J., vol. 8, no. 20, pp. 15512–15521, Oct. 2021.
[33]
C. Sheet al., “A tutorial on ultrareliable and low-latency communications in 6G: Integrating domain knowledge into deep learning,” Proc. IEEE, vol. 109, no. 3, pp. 204–246, Mar. 2021.
[34]
H. Wanget al., “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wireless Commun., vol. 18, no. 5, pp. 2565–2578, May 2019.
[35]
D. Xu and H. Zhu, “Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength,” IEEE Trans. Commun., vol. 70, no. 11, pp. 7505–7519, Nov. 2022.
[36]
L. Wei, Y. Yang, and B. Jiao, “Secrecy throughput in full-duplex multiuser MIMO short-packet communications,” IEEE Wireless Commun. Lett., vol. 10, no. 6, pp. 1339–1343, Jun. 2021.
[37]
N. Ari, N. Thomos, and L. Musavian, “Performance analysis of short packet communications with multiple eavesdroppers,” IEEE Trans. Commun., vol. 70, no. 10, pp. 6778–6789, Oct. 2022.
[38]
C. Feng, H.-M. Wang, and H. V. Poor, “Reliable and secure short-packet communications,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1913–1926, Mar. 2022.
[39]
M. Zhanget al., “Artificial noise aided secrecy information and power transfer in OFDMA systems,” IEEE Trans. Wireless Commun., vol. 15, no. 4, pp. 3085–3096, Apr. 2016.
[40]
J. Scarlett, V. Y. F. Tan, and G. Durisi, “The dispersion of nearest-neighbor decoding for additive non-Gaussian channels,” IEEE Trans. Inf. Theory, vol. 63, no. 1, pp. 81–92, Jan. 2017.
[41]
S. Schiessl, J. Gross, M. Skoglund, and G. Caire, “Delay performance of the multiuser MISO downlink under imperfect CSI and finite-length coding,” IEEE J. Sel. Areas Commun., vol. 37, no. 4, pp. 765–779, Apr. 2019.
[42]
R. T. Marler and J. S. Arora, “Survey of multi-objective optimization methods for engineering,” Struct. Multidisciplinary Optim., vol. 26, no. 6, pp. 369–395, Apr. 2004.
[43]
C. Shen and H. Li, “On the dual formulation of boosting algorithms,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 12, pp. 2216–2231, Dec. 2010.
[44]
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
[45]
J. Choi, N. Lee, S.-N. Hong, and G. Caire, “Joint user selection, power allocation, and precoding design with imperfect CSIT for multi-cell MU-MIMO downlink systems,” IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 162–176, Jan. 2020.
[46]
S. S. Christensen, R. Agarwal, E. De Carvalho, and J. M. Cioffi, “Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4792–4799, Dec. 2008.
[47]
W. Mei, Z. Chen, L. Li, J. Fang, and S. Li, “On artificial-noise-aided transmit design for multiuser MISO systems with integrated services,” IEEE Trans. Veh. Technol., vol. 66, no. 9, pp. 8179–8195, Sep. 2017.
[48]
G. Shi, Y. Li, W. Cheng, X. Gao, and W. Zhang, “An artificial-noise-based approach for the secrecy rate maximization of MISO VLC wiretap channel with multi-eves,” IEEE Access, vol. 9, pp. 651–659, 2021.
[49]
V.-D. Nguyen, T. Q. Duong, O. A. Dobre, and O.-S. Shin, “Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2609–2623, Nov. 2016.
[50]
S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004.
[51]
H. Joudeh and B. Clerckx, “Sum-rate maximization for linearly precoded downlink multiuser MISO systems with partial CSIT: A rate-splitting approach,” IEEE Trans. Commun., vol. 64, no. 11, pp. 4847–4861, Aug. 2016.
[52]
Q. Zhang, S. Jin, K. K. Wong, H. Zhu, and M. Matthaiou, “Power scaling of uplink massive MIMO systems with arbitrary-rank channel means,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 966–981, May 2014.
[53]
A. Dalir and H. Aghaeinia, “Maximizing first-order approximate mean of SINR under imperfect channel state information for throughput enhancement of MIMO interference networks,” Iranian J. Sci. Technol., Trans. Electr. Eng., vol. 43, no. S1, pp. 121–132, Jul. 2019.
[54]
A. Adhikary, J. Nam, J.-Y. Ahn, and G. Caire, “Joint spatial division and multiplexing—The large-scale array regime,” IEEE Trans. Inf. Theory, vol. 59, no. 10, pp. 6441–6463, Oct. 2013.
[55]
X. Zhao, S. Geng, and B. M. Coulibaly, “Path-loss model including LOS-NLOS transition regions for indoor corridors at 5 GHz [wireless corner],” IEEE Trans. Antennas Propag., vol. 55, no. 3, pp. 217–223, Jun. 2013.
[56]
J. Choi, J. Park, and B. L. Evans, “Spectral efficiency bounds for interference-limited SVD-MIMO cellular communication systems,” IEEE Wireless Commun. Lett., vol. 6, no. 1, pp. 46–49, Jan. 2017.

Index Terms

  1. Joint Optimization for Secure and Reliable Communications in Finite Blocklength Regime
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Wireless Communications
    IEEE Transactions on Wireless Communications  Volume 22, Issue 12
    Dec. 2023
    1425 pages

    Publisher

    IEEE Press

    Publication History

    Published: 03 May 2023

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media