Full Text:   <537>

Summary:  <83>

CLC number: TN92

On-line Access: 2023-02-27

Received: 2022-05-05

Revision Accepted: 2023-02-27

Crosschecked: 2022-10-10

Cited: 0

Clicked: 557

Citations:  Bibtex RefMan EndNote GB/T7714


Xinyao WANG




-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.2 P.259-274


On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things

Author(s):  Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI

Affiliation(s):  School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China; more

Corresponding email(s):   zhong.zheng@bit.edu.cn

Key Words:  Cognitive radio network, Physical layer security, Cooperative multi-input multi-output (C-MIMO), Eigenspace-adaptive precoding, Difference convex programming

Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI. On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things[J]. Frontiers of Information Technology & Electronic Engineering, 2023, 24(2): 259-274.

@article{title="On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things",
author="Xinyao WANG, Xuyan BAO, Yuzhen HUANG, Zhong ZHENG, Zesong FEI",
journal="Frontiers of Information Technology & Electronic Engineering",
publisher="Zhejiang University Press & Springer",

%0 Journal Article
%T On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things
%A Xinyao WANG
%A Xuyan BAO
%A Yuzhen HUANG
%A Zhong ZHENG
%A Zesong FEI
%J Frontiers of Information Technology & Electronic Engineering
%V 24
%N 2
%P 259-274
%@ 2095-9184
%D 2023
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200188

T1 - On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things
A1 - Xinyao WANG
A1 - Xuyan BAO
A1 - Yuzhen HUANG
A1 - Zhong ZHENG
A1 - Zesong FEI
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 24
IS - 2
SP - 259
EP - 274
%@ 2095-9184
Y1 - 2023
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200188

In this paper, physical layer security techniques are investigated for cooperative multi-input multi-output (C-MIMO), which operates as an underlaid cognitive radio system that coexists with a primary user (PU). The underlaid secrecy paradigm is enabled by improving the secrecy rate towards the C-MIMO receiver and reducing the interference towards the PU. Such a communication model is especially suitable for implementing Industrial Internet of Things (IIoT) systems in the unlicensed spectrum, which can trade off spectral efficiency and information secrecy. To this end, we propose an eigenspace-adaptive precoding (EAP) method and formulate the secrecy rate optimization problem, which is subject to both the single device power constraint and the interference power constraint. This precoder design is enabled by decomposing the original optimization problem into eigenspace selection and power allocation sub-problems. Herein, the eigenvectors are adaptively selected by the transmitter according to the channel conditions of the underlaid users and the PUs. In addition, a simplified EAP method is proposed for large-dimensional C-MIMO transmission, exploiting the additional spatial degree of freedom for a low-complexity secrecy precoder design. Numerical results show that by transmitting signal and artificial noise in the properly selected eigenspace, C-MIMO can eliminate the secrecy outage and outperforms the fixed eigenspace precoding methods. Moreover, the proposed simplified EAP method for the large-dimensional C-MIMO can significantly improve the secrecy rate.


摘要:本文研究协作多输入多输出(cooperative multi-input multi-output,C-MIMO)系统中的物理层安全技术,该技术可以被用于主次用户共存的衬底式认知无线电网络,并通过提高次级C-MIMO接收机的安全速率同时减少对主用户的干扰来实现上述安全通信范式。该通信模型尤其适合应用于基于非授权频谱的工业互联网安全传输场景,可以实现频谱效率和安全速率的有效平衡和折衷。为此,我们提出一种特征空间自适应预编码(eigenspace-adaptive precoding, EAP)方法,并给出在单站发射功率约束和干扰功率约束下的安全速率优化问题。通过将原始优化问题分解为预编码特征空间选择和功率分配两个子问题,来实现安全预编码器的设计,其中,特征空间由发射机根据主用户和次级用户的信道条件进行自适应选择。此外,本文针对海量设备、大维天线系统提出一种简化的EAP方法,该方法充分利用大维天线的空间自由度来降低安全预编码优化的复杂度。仿真结果表明,在自适应选择的特征空间中传输信号和人工噪声,C-MIMO系统可以完全消除保密中断概率,获得相比固定特征空间预编码方案更高的安全速率。此外,针对大维C-MIMO提出的简化EAP方法可以显著提高安全速率。


Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article


[1]Akhyar F, Lin CY, Muchtar K, et al., 2019. High efficient single-stage steel surface defect detection. Proc 16th IEEE Int Conf on Advanced Video and Signal Based Surveillance, p.1-4.

[2]Ben-Tal A, Nemirovski A, 2001. Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications. Springer, Philadelphia, USA.

[3]Bloch MR, Laneman JN, 2013. Strong secrecy from channel resolvability. IEEE Trans Inform Theory, 59(12):8077-8098.

[4]Borges PVK, Izquierdo E, 2010. A probabilistic approach for vision-based fire detection in videos. IEEE Trans Circ Syst Video Technol, 20(5):721-731.

[5]Chen LW, Chen CR, Chen DE, 2017. VIPS: a video-based indoor positioning system with centimeter-grade accuracy for the IoT. Proc IEEE Int Conf on Pervasive Computing and Communications Workshops, p.63-65.

[6]Chettri L, Bera R, 2020. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Int Things J, 7(1):16-32.

[7]Chiurtu N, Rimoldi B, Telatar E, 2001. On the capacity of multi-antenna Gaussian channels. Proc IEEE Int Symp on Information Theory, p.53-57.

[8]Csiszar I, Körner J, 1978. Broadcast channels with confidential messages. IEEE Trans Inform Theory, 24(3):339-348.

[9]Deng YS, Wang LF, Zaidi SAR, et al., 2016. Artificial-noise aided secure transmission in large scale spectrum sharing networks. IEEE Trans Commun, 64(5):2116-2129.

[10]Fang B, Qian ZP, Shao W, et al., 2016. Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans Veh Technol, 65(8):6753-6758.

[11]Goel S, Negi R, 2008. Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun, 7(6):2180-2189.

[12]Hampel G, Li C, Li JY, 2019. 5G ultra-reliable low-latency communications in factory automation leveraging licensed and unlicensed bands. IEEE Commun Mag, 57(5):117-123.

[13]He X, Yener A, 2014. MIMO wiretap channels with unknown and varying eavesdropper channel states. IEEE Trans Inform Theory, 60(11):6844-6869.

[14]Hořejší P, Novikov K, Šimon M, 2020. A smart factory in a smart city: virtual and augmented reality in a smart assembly line. IEEE Access, 8:94330-94340.

[15]Horst R, Tuy H, 1996. Global Optimization (3rd Ed.). Springer, Berlin, Heidelberg, Germany.

[16]Hu TT, Xiong J, Ma DT, et al., 2018. Optimal and robust AN-aided precoding design for cognitive MIMOME wiretap channels. Proc IEEE/CIC Int Conf on Communications in China, p.500-505.

[17]Hussain T, Muhammad K, Del Ser J, et al., 2020. Intelligent embedded vision for summarization of multiview videos in IIoT. IEEE Trans Ind Inform, 16(4):2592-2602.

[18]Lin PH, Lai SH, Lin SC, et al., 2013. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J Sel Areas Commun, 31(9):1728-1740.

[19]Lu X, Petrov V, Moltchanov D, et al., 2019. 5G-U: conceptualizing integrated utilization of licensed and unlicensed spectrum for future IoT. IEEE Commun Mag, 57(7):92-98.

[20]Nguyen DC, Ding M, Pathirana PN, et al., 2022. 6G Internet of Things: a comprehensive survey. IEEE Int Things J, 9(1):359-383.

[21]Ozgur A, Leveque O, Tse D, 2013. Spatial degrees of freedom of large distributed MIMO systems and wireless ad hoc networks. IEEE J Sel Areas Commun, 31(2):202-214.

[22]Pei YY, Liang YC, Zhang L, et al., 2010. Secure communication over MISO cognitive radio channels. IEEE Trans Wirel Commun, 9(4):1494-1502.

[23]Rajashekar R, Hanzo L, 2017. Iterative matrix decomposition aided block diagonalization for mm-wave multi- user MIMO systems. IEEE Trans Wirel Commun, 16(3):1372-1384.

[24]Sibomana L, Tran H, Zepernick HJ, 2015. On physical layer security for cognitive radio networks with primary user interference. Proc IEEE Military Communications Conf, p.281-286.

[25]Simon SH, Moustakas AL, Marinelli L, 2006. Capacity and character expansions: moment-generating function and other exact results for MIMO correlated channels. IEEE Trans Inform Theory, 52(12):5336-5351.

[26]Sternberg S, 1995. Group Theory and Physics. Cambridge University Press, Cambridge, UK.

[27]Wang HM, Wang C, Ng DWK, et al., 2016. Artificial noise assisted secure transmission for distributed antenna systems. IEEE Trans Signal Process, 64(15):4050-4064.

[28]Wyner AD, 1975. The wire-tap channel. Bell Syst Techn J, 54(8):1355-1387.

[29]Zhang X, Zhou XY, McKay MR, 2013. On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. IEEE Trans Veh Technol, 62(5):2170-2181.

[30]Zheng TX, Wang HM, Yuan JH, et al., 2015. Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers. IEEE Trans Commun, 63(11):4347-4362.

[31]Zheng Z, Haas ZJ, 2017. On the performance of reconfigurable distributed MIMO in mobile networks. IEEE Trans Commun, 65(4):1609-1622.

[32]Zheng Z, Haas ZJ, Kieburg M, 2019. Secrecy rate of cooperative MIMO in the presence of a location constrained eavesdropper. IEEE Trans Commun, 67(2):1356-1370.

[33]Zhou XY, McKay MR, 2010. Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans Veh Technol, 59(8):3831-3842.

[34]Zhu FC, Yao ML, 2016. Improving physical-layer security for CRNs using SINR-based cooperative beamforming. IEEE Trans Veh Technol, 65(3):1835-1841.

[35]Zhu Y, Zhou YK, Patel S, et al., 2013. Artificial noise generated in MIMO scenario: optimal power design. IEEE Signal Process Lett, 20(10):964-967.

Open peer comments: Debate/Discuss/Question/Opinion


Please provide your name, email address and a comment

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2023 Journal of Zhejiang University-SCIENCE