 Research
 Open Access
 Published:
Artificial noiseaided biobjective transmitter optimization for service integration in multiuser MIMO broadcast channel
EURASIP Journal on Wireless Communications and Networking volume 2017, Article number: 132 (2017)
Abstract
This paper considers an artificial noise (AN)aided transmit design for multiuser MIMO systems with integrated services. Specifically, two sorts of service messages are combined and served simultaneously: one multicast message intended for all receivers and one confidential message intended for only one receiver and required to be perfectly secure from other unauthorized receivers. Our interest lies in the joint design of input covariances of the multicast message, confidential message, and artificial noise (AN), such that the achievable secrecy rate and multicast rate are simultaneously maximized. This problem is identified as a secrecy rate region maximization (SRRM) problem in the context of physicallayer service integration. Since this biobjective optimization problem is inherently complex to solve, we put forward two different scalarization methods to convert it into a scalar optimization problem. First, we propose to prefix the multicast rate as a constant, and accordingly, the primal biobjective problem is converted into a secrecy rate maximization (SRM) problem with quality of multicast service (QoMS) constraint. By varying the constant, we can obtain different Pareto optimal points. The resulting SRM problem can be iteratively solved via a provably convergent differenceofconcave (DC) algorithm. In the second method, we aim to maximize the weighted sum of the secrecy rate and the multicast rate. Through varying the weighted vector, one can also obtain different Pareto optimal points. We show that this weighted sum rate maximization (WSRM) problem can be recast into a primal decomposable form, which is amenable to alternating optimization (AO). Then, we compare these two scalarization methods in terms of their overall performance and computational complexity via theoretical analysis as well as numerical simulation, based on which new insights can be drawn.
Introduction
Background
Recently, physicallayer service integration (PHYSI), a technique of combining multicast service and confidential service into one integrated service for onetime transmission at the physical layer, has received much attention in wireless communications. For one thing, PHYSI caters to the demand for high transmission rate and secure communication, which has been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems [1]. Besides, compared to the conventional upperlayerbased approach, PHYSI enables coexisting services to share the same resources by solely exploiting the physical characteristics of wireless channels, thereby significantly increasing the spectral efficiency. This property makes PHYSI a prominent approach to satisfy the everincreasing need for radio spectrum. The technique of PHYSI could also find a wide range of applications in the commercial and military areas. For example, many commercial applications, e.g., advertisement, digital television, and Internet telephony, are supposed to provide personalized service customization. As a consequence, confidential service and public service are collectively provided to satisfy the demand of different user groups. In battlefield scenarios, it is essential to propagate commands with different security levels to the frontline. The public information should be distributed to all soldiers, while the confidential information can only be accessed by specific soldiers. Such emerging applications lead to a crucial problem: how to establish the security of confidential service while not compromising the quality of public service?
Related works
Let us first have a very brief review on physicallayer security, a technique that lays foundation for the research on PHYSI. The broadcast nature of wireless medium makes privacy an inherent concern. Physical layer security technique is playing an increasingly important role in wireless communication recently. It can secure communications informationtheoretically at the physical layer without using secret keys whose distribution or management may become difficult in, e.g., ad hoc wireless networks. Different strategies against eavesdropping have been developed with various levels of channel state information (CSI) available to the transmitter (see the comprehensive overview in [2–6]). Liu and Poor first coined the term confidential broadcasting in [7, 8] and established the corresponding secrecy capacity region. In confidential broadcasting, a transmitter broadcasts multiple confidential messages to all receivers. Each confidential message is intended for one specified receiver but required to be perfectly secret from the others. Some efforts have been made in, e.g., [9, 10] to maximize the sum secrecy rate in the scenario of confidential broadcasting.
The study of PHYSI can be traced back to Csiszár and Körner’s seminal work in [11]. In the basic model of PHYSI, a transmitter sends a common message to two receivers and simultaneously sends a confidential message intended only for one receiver and kept perfectly secure from the other one. Under discrete memoryless broadcast channel (DMBC) setup, Csiszár and Körner gave a closedform expression of the maximum rate region that can be applied reliably under the secrecy constraint (i.e., the secrecy capacity region). In recent years, this kind of approach has gained renewed interest, especially that in various multiantenna scenarios, such as Gaussian broadcast channels [12–15] and bidirectional relay channels [16, 17]. In [12], the authors extended the results in [11] to a general MIMO Gaussian case by adopting the channelenhancement argument. Further, the works [13, 14] considered the case with two confidential messages intended for two different receivers. The resulting secrecy capacity region is proved to be attainable by combining the secret dirtypaper coding (SDPC) with Gaussian superposition coding. Furthermore, in [16] and [17], Wyrembelski and Boche amalgamated broadcast service, multicast service, and confidential service in bidirectional relay networks, in which a relay adds an additional multicast message for all nodes and a confidential message for only one node besides establishing the conventional bidirectional communication. Nonetheless, the main goal of the aforementioned papers is just to obtain capacity results or to characterize coding strategies that lead to certain rate regions [18]. For implementation efficiency, it is also important to treat physical layer service integration from a signal processing point of view. In particular, optimal or complexityefficient transmit strategies have to be characterized, so that the achieved performance could reach/approach the boundary of the secrecy capacity region. Such strategies are usually given by optimization problems, which generally turn out to be nonconvex. Along with this comes the fact that most works on PHYSI end once a certain characterization of a rate region is derived.
Recently, to fill in the gap between the previous informationtheoretic results and practical implementation, there is growing interest in analyzing PHYSI from a signal processing point of view. In [12], the authors proposed a reparameterizing method to devise transmit strategies for achieving the secrecy boundary performance. However, this method is only applicable to a very simple twouser MISO scenario. Besides, it involves solving a sequence of convex feasibility problems, which is computationally expensive. To improve it, the work [19] proposed a qualityofservice (QoS)based method to seek the boundaryachieving transmit strategies. Its basic idea is to establish the tradeoff between the secrecy rate and the multicast rate by maximizing the secrecy rate while ensuring the multicast rate above a given threshold. This method is demonstrated as effective in characterizing the secrecy boundary and thus triggered research endeavors on extending the result to a more general and realistic setting. Notable results include the extension to the multiuser [20] and imperfect CSI [21, 22] settings. Even so, relatively less work focussed on the MIMO channel setup, due to the intractability of the associated optimization problems. In [23], the authors circumvented the intractability by proposing a generalized singular value decomposition (GSVD)based transmission scheme. Using GSVD, multicast message and confidential message can be perfectly decoupled and the resulting problem is easier to handle. However, this result is not applicable to the general multiuser MIMO case. In addition, it is also interesting to incorporate artificial noise (AN) into consideration, as such technique has been shown to be effective in enhancing transmission security [24–28]. Specifically, the authors in [24–27], and [28] respectively showed that AN is of paramount importance to physicallayer security when there exist multiple eavesdroppers in the network, when the CSI of eavesdropper(s) is imperfectly known at the transmitter, and/or when eavesdroppers are randomly located in the network.
Main contributions
In this paper, we delve into the ANaided transmit precoding design in PHYSI under a general multiuser MIMO case. Specifically, two sorts of service messages are combined and promulgated at the same time: a multicast message intended for all receivers, and a confidential message intended for merely one authorized receiver. The confidential message must be kept perfectly secure from all other unauthorized receivers. Meanwhile, AN is employed to degrade the potential eavesdropping of the unauthorized receivers. This paper aims to jointly optimize the input covariance matrices of the multicast message, confidential message, and AN, to maximize the achievable secrecy and multicast rates simultaneously, or, equivalently, to maximize the achievable secrecy rate region. This secrecy rate region maximization (SRRM) problem turns out to be a biobjective optimization problem. Since the reparameterizing method is invalid in a general MIMO case, we develop two effective scalarization methods to convert the biobjective problem into an easiertohandle scalar version for characterizing its Pareto boundary.

1.
In the first method, we propose to fix the multicast rate as a constant. Through varying the value of the constant, this method could yield different secrecy boundary points. Since the Pareto optimal points must reside on the boundary of the achievable rate region, this method is bound to provide a complete set of the Pareto optimal points. Though the resultant secrecy rate maximization (SRM) problem is nonconvex by nature, we show this problem actually falls into the context of differenceofconcave (DC) programming [29]. Hence, it can be handled by classical DC algorithm with convergence guarantee.

2.
As for the second method, a weighted sumbased scalarization is introduced. The crux of this scalarization method is to optimize the weighted sum of the two objectives with different weight vectors. By varying the weight vector, this method gives rise to different Pareto optimal solution. To solve this weighted sum rate maximization (WSRM) problem, we reveal its hidden decomposability by recasting it as an equivalent form amenable to alternating optimization (AO). AO algorithm is naturally employed to solve the WSRM problem. It can be proved that this AO algorithm must converge to one stationary point of the WSRM problem.

3.
It is particularly worth mentioning that though the DC and AO algorithms have been applied to address the issue of physicallayer security before in, e.g., [24, 30, 31], none of these works considered integrating an additional multicast message. Our paper is an initial attempt to study the application of DC and AO to the emerging PHYSI system, which turns out to be a harder task than its counterpart in physicallayer security due to the coexisting multicast service.
Then, we compare these two sorts of scalarization methods in terms of their overall performance and computational complexity. The comparison results reveal that the first method is more efficacious in finding all Pareto optimal points than the second one. The advantage of the second method lies in its problem structure, which provides the service provider a solution to maximizing the overall revenue. Besides, we show that the DC algorithm is more timeefficient at low transmit power than the AO algorithm. Interestingly, the numerical results indicate that at high transmit power, the AO algorithm becomes the more timeefficient one.
Organization and notations
This paper is organized as follows. Section 2 provides the system model description and problem formulation. The optimization aspects of our formulated problems are addressed in Sections 3 and 4, corresponding to the first and the second scalarization methods, respectively. The comparison results are given in Section 5. Section 6 presents simulation results to show the efficacy of our proposed methods. Finally, conclusions are drawn in Section 7.
The notation of this paper is as follows. Bold symbols in capital letter and small letter denote matrices and vectors, respectively. (·)^{H}, rank(·), and Tr(·) represent conjugate transpose, rank, and trace of a matrix, respectively. \({\mathbb {R}}_{+}\) and \({\mathbb {H}}_{+}^{n}\) denote the set of nonnegative real numbers and of nbyn Hermitian positive semidefinite (PSD) matrices. The n×n identity matrix is denoted by I _{ n }. \(\mathbf {x}\sim \mathcal {CN}(\mathbf {\mu },\boldsymbol {\Omega })\) denotes that x is a complex circular Gaussian random vector with mean μ and covariance Ω. A≽0(A≻0) implies that A is a Hermitian positive semidefinite (definite) matrix. ∥·∥ represents the vector Euclidean norm. K represents a proper cone, and K ^{∗} represents a dual cone associated with K.
System model and problem formulation
We consider the downlink of a multiuser system in which a multiantenna transmitter serves K receivers, and each receiver is equipped with multiple antennas. Assume that all receivers have ordered the multicast service and receiver 1 further ordered the confidential service^{1}. To enhance the security performance, the transmitter utilizes a fraction of its transmit power to send artificially generated noise to interfere the unauthorized receivers (eavesdroppers), i.e., receiver 2 to receiver K. We assume in this paper that all receivers are static and that all the communication links undergo slow frequencyflat fading.
The received signal at receiver k is modeled as
where \({{\mathbf {H}}_{k}}\in {{\mathbb {C}}^{{{N}_{r,k} \times {N}_{t}}}}\) is the channel response between the transmitter and receiver k; N _{ t } and N _{ r,k } are the number of transmit antennas employed by the transmitter and kth receiver, respectively. z _{ k } is independent identically distributed (i.i.d.) complex Gaussian noise with zero mean and unit variance. \({{\mathbf {x}}}\in {{\mathbb {C}}^{{{N}_{t}}}}\) is the coded transmit message, which consists of three independent components, i.e.,
where x _{0} is the multicast message intended for all receivers, x _{ c } is the confidential message intended for receiver 1, and x _{ a } is the artificial noise. We assume \(\mathbf {x}_{0} \sim \mathcal {CN}(\mathbf {0},\mathbf {Q}_{0})\), \(\mathbf {x}_{c} \sim \mathcal {CN}(\mathbf {0},\mathbf {Q}_{c})\) [12], where Q _{0} and Q _{ c } are the transmit covariance matrices. The AN x _{ a } follows a distribution \(\mathbf {x}_{a} \sim \mathcal {CN}(\mathbf {0},\mathbf {Q}_{a})\), where Q _{ a } is the AN covariance. The CSI on all links is assumed to be perfectly known at the corresponding transmitter and receivers in that all receivers have to register in the network for subscribing the multicast service. In practice, the CSI at the receivers can be obtained from the channel estimation of the downlink pilots. CSI at the transmitter can be acquired via uplink channel estimation in time division duplex (TDD) systems. The design of a highquality channel estimation scheme is beyond the scope of this paper. Note that the full CSI assumption is commonly adopted in the area of physical layer security/multicasting, especially in MIMO channels [10, 24, 30, 32–36].
For ease of exposition, let us define \({\mathcal {K}} \buildrel \Delta \over = \{1,2,\ldots,K\}\) and \({{\mathcal {K}}_{e}} \buildrel \Delta \over = {\mathcal {K}}/\{ 1\} \), which denote the indices of all receivers and of all unauthorized receivers, respectively. Denote R _{0} and R _{ c } as the achievable rates associated with the multicast and confidential messages, respectively. Then, an achievable secrecy rate region \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\) is given as the set of nonnegative rate pairs (R _{0},R _{ c }) satisfying [12]
where
and Tr(Q _{0}+Q _{ c }+Q _{ a })≤P with P being total transmit power budget at the transmitter.
The secrecy rate region (3) implies that all receivers first decode their common multicast message by treating the confidential message as noise, and then receiver 1 acquires a clean link for the transmission of its exclusive confidential message, where there is no interference from the multicast message.
To maximize this achievable secrecy rate region, our goal is to find the boundaryachieving Q _{0}, Q _{ a } and Q _{ c }, which are also known as Pareto optimal solutions to this SRRM problem. Specifically, we must first solve the following optimization problem, which is a biobjective maximization problem with cone \(K=K^{*}={\mathbb {R}}_ +^{2}\),
where, with a slight abuse of notations but for notational simplicity, the explicit dependence of C _{ m,k }, C _{ b } and C _{ e,k } on (Q _{0},Q _{ c },Q _{ a }) is omitted. Since the SRRM problem is a biobjective maximization problem, it is necessary to harness some methods of scalarization to convert it into an easiertohandle scalar version.
Remark 1
It is also viable to consider the scenario where all receivers order the confidential service and all confidential messages are propagated concurrently by the transmitter, i.e., the integration of multicasting and confidential broadcasting. The merit of this scheme lies in its higher spectral efficiency and low latency. However, this comes at the expense of much higher operational complexity at the transmitter, especially when the number of users increases. Thus, our considered PHYSI scheme is particularly desired in delaytolerant applications or when the transmitter possesses limited computational capacity for securityrelated computations.
A DCbased approach to the SRRM problem
In this section, we develop our first scalarization method to solve (4). The resultant scalar problem is a secrecy rate maximization (SRM) with imposed quality of multicast service (QoMS) constraints.
Scalarization
In particular, our method is to move the part of multicast rate maximization to the constraint, i.e., we fix at the time being the multicast rate as a constant τ _{ ms }≥0. As a result, the biobjective SRRM problem (4) will be degraded into a scalar maximization problem, which is shown in (5).
In (5), R(τ _{ ms }) is the optimal objective value, τ _{ ms } can be interpreted as the preset requirement on the multicast rate, and accordingly, the constraint (5a) can be interpreted as a QoMS constraint. To guarantee the feasibility of problem (5), τ _{ ms } cannot exceed a threshold τ _{max} given by
The value of τ _{max} can be numerically obtained by solving (6) via the convex optimization solver CVX [37].
This sort of scalarization method, in fact, enables us to find one boundary point (τ _{ ms },R(τ _{ ms })) of the secrecy rate region \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\) by solving (5). All boundary points of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\) can be found if we traverse all possible τ _{ ms }’s lying within [0,τ _{max}] and store the corresponding optimal objective values. Since the Pareto optimal solution to (4) must reside on the boundary of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\), i.e., the Pareto optimal set of (4) is a subset of the boundary set of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\), all Pareto optimal solution to (5) can also be found by this means.
However, problem (5) is nonconvex. Especially, the determinant equality constraint (5a) is very difficult to handle. To circumvent this difficulty, we pay our attention to the following relaxed problem of (5), in which the equality constraint (5a) is replaced by the inequality constraint (7a).
Apparently, any optimal solution to (5) is feasible to (7) in the sense that replacing (5a) with (7a) yields a larger feasible solution set. Hence, problem (7) has \(R(\tau _{ms}) \le \tilde R(\tau _{ms})\) in general. Interestingly, we show that \(R(\tau _{ms}) = \tilde R(\tau _{ms})\) can always be achieved without loss of optimality to (7).
Lemma 1
Problem (7) is a tight relaxation to problem (5). In other words, the rate pair \(({\tau _{ms}},\tilde R(\tau _{ms}))\) must be a boundary point of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\).
Proof
The proof can be easily accomplished by construction. Suppose that the constraint (7a) is satisfied with strict inequality, we can always multiply Q _{0} by a scalar ν (ν<1) to make (7a) active, yet without decreasing the objective value of (7) and violating the total power constraint (7b). This fact implies that there always exists an optimal solution to (7) such that the constraint (7a) is satisfied with equality and thus accomplishes the proof. □
Lemma 1 implies that problem (7) admits an optimal \(({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})\) with \(\mathop {\min }\limits _{k \in {\mathcal {K}}}C_{m,k}({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})={\tau _{ms}}\). Hence, \(({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})\) is also optimal to (5). The proof of Lemma 1 reveals that such an optimal \(({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})\) can always be constructed algorithmically based on the following procedures.
Corollary 1
Suppose that \(({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})\) is an optimal solution returned by solving problem (7). If \(\mathop {\min }\limits _{k \in {\mathcal {K}}}C_{m,k}({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})={\tau _{ms}}\), then output \(({\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})\) as an optimal solution of problem (5). Otherwise, solve the following equation with regard to ν, i.e., \(\mathop {\min }\limits _{k \in {\mathcal {K}}}C_{m,k}(\nu {\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})={\tau _{ms}}\), via bisection search within the unit interval [0,1], and output \((\nu {\mathbf {Q}^{*}_{0}},{\mathbf {Q}^{*}_{c}},{\mathbf {Q}^{*}_{a}})\) as an optimal solution of problem (5).
Next, we will point out two special cases, under which problem (7) is equivalent to problem (5) or, equivalently, any optimal solution to (7) is achieved with constraint (7a) active. This is described in the following proposition.
Proposition 1
Suppose that the system configurations satisfy either one of the following conditions:
Condition 1: The number of antennas at the transmitter is larger than that at the authorized receiver, i.e., N _{ t }>N _{ r,1}.
Condition 2: The number of antennas at the transmitter is larger than the sum of the antenna number at the unauthorized receivers, i.e., \(N_{t} > {\sum \nolimits }_{k \in {{\mathcal {K}}_{e}}} N_{r,k}\).
Then, the rate pair \(({\tau _{ms}},\tilde R(\tau _{ms}))\) must be a Pareto optimal point of (4), and all Pareto optimal points of (4) can be obtained by solving (5) with different τ _{ ms }’s lying within the interval [0,τ _{max}].
Proof
The proof can be found in Appendix A. □
Remark 2
Proposition 1 bridges the Pareto optimal points of (4) to the boundary points of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\). When either Condition 1 or Condition 2 is satisfied, all Pareto optimal points of (4) are also the boundary points of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\) and vice versa.
DC iterative algorithm
We now focus on solving the relaxed problem (7) derived in the last subsection. Problem (7) still remains nonconvex due to its objective function and constraint (7a). To deal with it, we first equivalently transform it into its epigraph form by introducing a slack variable η, i.e.,
Next, we will show that problem (8) constitutes a DCtype programming problem, which can be iteratively solved by the DC algorithm.
To begin with, we reformulate the capacity functions C _{ b }(Q _{ c },Q _{ a }), C _{ e,k }(Q _{ c },Q _{ a }), and C _{ m,k }(Q _{0},Q _{ c },Q _{ a }) into a DCtype form, given by
in which we define
Substituting (9) into problem (8), we obtain
Since ϕ _{ k }(Q _{ c },Q _{ a }), φ _{ k }(Q _{ a }) and η _{ k }(Q _{0},Q _{ c },Q _{ a }) are all concave w.r.t. (Q _{0},Q _{ c },Q _{ a }), one can easily notice that the objective function of (5) and constraints (11a) and (11b) are all in a differenceofconcave form. This property makes problem (4) fall into the context of DC program [29], which can be iteratively solved via DC algorithm.
Our next endeavor is to show the DC approach to (11) mathematically. Its basic idea is to locally linearize the nonconcave parts in (11) at some feasible point via Taylor series expansion (TSE) and then iteratively solve the linearized problem. To this end, we introduce the TSE via the following lemma.
Lemma 2
(Chu et al. [ 31 ]) An affine Taylor series approximation of a function \(f({\mathbf {X}}):{{\mathbb R}^{M \times N}} \to {\mathbb R}\) can be expressed at \(\tilde {\mathbf {X}}\) as below.
The TSE above enables us to reformulate the primal nonconcave parts of (11) into a linear form. In particular, by applying Lemma 2 and the fact ∂(logX)=Tr(X ^{−1} ∂ X), φ _{1}(Q _{ a }) can be approximated as
in the objective function of (11), where \({\tilde {\mathbf {Q}}_{a}}\) is a given transmit covariance matrix,
and the equality (a) is due to the fact that Tr(A ^{H} B)=(vec(A))^{H}vec(B) for appropriate dimensions of A and B. Likewise, ϕ _{ k }(Q _{ c },Q _{ a }), appearing in the constraints (11a) and (11b), can be approximated as
in which U is determined by
Based on the approximations above, the original QoMSconstrained SRM problem (11) can be reformulated as
where \({\bar {R}}(\tau _{ms})\) is the optimal objective value of (8), serving as an approximation to R(τ _{ ms }). According to the relationship between a concave function and its Taylor series expansion, it is immediate to get
As a consequence, any feasible solution to (16) should also be feasible to (11), and \({\bar {R}}(\tau _{ms}) \le {R}(\tau _{ms})\) must hold.
This approximated problem (16) is convex with regard to (w.r.t.) (Q _{0},Q _{ c },Q _{ a }) and hence (Q _{0},Q _{ c },Q _{ a }) can be iteratively obtained by solving problem (16) via the offtheshelf interiorpoint algorithm, i.e., CVX. We summarize our proposed iterative algorithm for solving (11) in Algorithm 1. To acquire the secrecy rate region, we need to traverse τ _{ ms } lying within the interval [0,τ _{max}] and store the corresponding objective value of (16).
Remark 3
In Algorithm 1, the initialization of \(({\tilde {\mathbf {Q}}_{c,0}},{\tilde {\mathbf {Q}}_{a,0}})\) plays a crucial role in influencing the total iteration times. Let us define \(\left ({\mathbf {Q}^{i}_{c}},{\mathbf {Q}^{i}_{a}}\right)\) as the output solution in ith traversal of τ _{ ms }. The following “warmstart operation” could be adopted to initialize \(({\tilde {\mathbf {Q}}_{c,0}},{\tilde {\mathbf {Q}}_{a,0}})\) for achieving a fast convergence rate:
Warmstart operation: We start the traversal of τ _{ ms } from τ _{ ms }=τ _{max}. In the first traversal, \({\tilde {\mathbf {Q}}_{c,0}}\) and \({\tilde {\mathbf {Q}}_{a,0}}\) are both initialized as 0. In the ith (i>1) traversal, \(({\tilde {\mathbf {Q}}_{c,0}},{\tilde {\mathbf {Q}}_{a,0}})\) is initialized as the solution output by Algorithm 1 in the (i−1)th traversal.
Convergence analysis
As one can see, the basic merit of DC lies in its tractability, which caters to the numerical optimization using the parsersolver. As an additional merit, the proposed DC approach has a theoretically provable guarantee on its solution convergence, which will be demonstrated in the following proposition.
Proposition 2
Every limit point of \(\left ({{\mathbf {Q}_{0}^{*}},{\mathbf {Q}_{c}^{*}}} \right)\) is a stationary point of problem (7)
Proof
The proof is a direct application of ([29], Th 10) and thus omitted here for simplicity. □
An AObased approach to the SRRM problem
In this section, we develop our other scalarization method, referred to as weightedsum method, to solve (4). The resulting problem is essentially a WSRM problem, which can be solved via an AObased approach. Here, we should point out that the application of AO to SRM problem has been observed in some existing papers, i.e., [24]. Nonetheless, the AO algorithm we used in this section is a nontrivial extension of that in [24]. Specifically, the objective function in [24] only contains a single secrecy rate term. While in our considered scenario, an extra multicast rate term is incorporated, which brings some new issues, say, the convergence proof, that should be tackled.
Scalarization
The basic idea of the weightedsum method is to introduce a socalled weight vector [38] that is positive in the dual cone \(K^{*}={\mathbb {R}}_ +^{2}\) and then to transform the primal vector optimization problem into a scalar optimization problem. By varying the vector, we can obtain different Pareto optimal solutions of (4).
To put into context, the Pareto boundary of (3) can be characterized by the solution of
in which λ _{ c }∈ [0,+∞) and λ=[1,λ _{ c }] are our introduced weight vector. In general, the optimal (R _{0},R _{ c }) to (5) is the point where a straight line with slope −1/λ _{ c } is tangent to the Pareto boundary. Before proceeding, let us first point out some special cases of problem (5).

1.
When λ=[1,1], the optimal (R _{0},R _{ c }) turns out to be the socalled utilitarian point, also referred to as “sumrate” point in communications.

2.
The singleservice points are the two points where R _{0}=0 and where R _{ c }=0, respectively. When R _{0}=0, problem (5) is degraded into a conventional ANaided SRM problem in MIMO wiretap channel. When R _{ c }=0, the maximum R _{0} can be derived by solving the same convex optimization problem as (6).
AO iterative algorithm
We are now in a position to determine the tractable approaches to the WSRM problem (18). First, one can notice that by discarding R _{0} and R _{ c } as slack variables, problem (18) is equivalent to the following optimization problem.
The obstacle of solving (19) mainly lies in the nonsmoothness of its objective function, which negates the use of many derivativerelated iterative algorithms. As a result, we next develop a derivativefree AO iterative algorithm to solve (19). To this end, we will first need to transform the WSRM problem (19) into a form amenable to AO.
Lemma 3
(Li et al. [24]) Let \(\mathbf {E} \in {{\mathbb {C}}^{N \times N}}\) be any matrix satisfying E≻0. Define the function f(S)=−Tr(S E)+ logS+N. Then,
and the optimal solution to the righthand side (RHS) of (33) is S ^{∗}=E ^{−1}.
Applying Lemma 3 to C _{ b }, C _{ e,k }, and C _{ m,k }, one can obtain
where we define
in which \(\{\mathbf {S}_{k}\}_{k \in {\mathcal {K}}}\) and \(\{\mathbf {U}_{k}\}_{k \in {\mathcal {K}}}\) are slack variables satisfying S _{ k }≽0 and U _{ k }≽0 for \(\forall k \in {\mathcal {K}}\).
Following the matrix manipulations in [24], we have
and
Substituting (21) into (19) and making use of (23) and (24), one can check that problem (19) is equivalent to the following optimization problem.
in which we define
The upshot of this reformation is that problem (19) becomes primal decomposable. Specifically, problem (25) is convex w.r.t. either (Q _{0},Q _{ c },Q _{ a })or \((\left \{ \mathbf {S}_{k} \right \}_{k \in {\mathcal {K}}},\left \{ \mathbf {U}_{k} \right \}_{k \in {\mathcal {K}}})\). Hence, AO is naturally employed to solve (25). With (Q _{0},Q _{ c },Q _{ a }) fixed, the optimal solution of \((\left \{ \mathbf {S}_{k} \right \}_{k \in {\mathcal {K}}},\left \{ \mathbf {U}_{k} \right \}_{k \in {\mathcal {K}}})\) admits an analytical expression, according to Lemma 3, given by
in which we utilize the fact that \(\left \{ \mathbf {S}_{k} \right \}_{k \in {\mathcal {K}}}\) and \(\left \{ \mathbf {U}_{k} \right \}_{k \in {\mathcal {K}}}\) are decoupled among φ _{ b }, φ _{ e,k }, and φ _{ m,k }. Comparatively, with \((\left \{ \mathbf {S}_{k} \right \}_{k \in {\mathcal {K}}},\left \{ \mathbf {U}_{k} \right \}_{k \in {\mathcal {K}}})\) fixed, the optimal solution of (Q _{0},Q _{ c },Q _{ a }) can be obtained by solving a convex optimization problem as below, i.e.,
where \({\mathcal {F}}\) denotes the feasible set of (19), which is convex.
The whole AO process for solving (25) is given in Algorithm 2. In line 6 of Algorithm 2, the convex subproblem can be solved via CVX. Following the similar warmstart operation introduced in Remark 3, the iteration times of Algorithm 2 can be significantly decreased.
Convergence analysis
It can be verified that the AO algorithm produces a nondecreasing objective value of (25). Besides, the following convergence result is always guaranteed.
Proposition 3
Suppose that \((\mathbf {Q}_{0}^ n,\mathbf {Q}_{c}^ n,\mathbf {Q}_{a}^ n)\) is the solution generated by the AO algorithm in nth iteration, then the sequence \(\{(\mathbf {Q}_{0}^ n,\mathbf {Q}_{c}^ n,\mathbf {Q}_{a}^ n)\}_{n}\) must converge to one stationary point (i.e., KarushKuhnTucker (KKT) point) of the primal WSRM problem (19).
Proof
The proof can be found in Appendix B. □
Comparison of the proposed methods
In the previous sections, we present two tractable convex formulations of the SRRM problem (4). This naturally leads to the question about the relative performance of the two formulations. In the following subsections, we address this question by comparing their performance and computational complexity in solving (4).
Performance analysis
As introduced in the preceding sections, the QoMSbased scalarization can yield a complete set of boundary points of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\), which contains all Pareto optimal points of (4). The resulting scalar problem (7) aims to maximize the secrecy rate and meanwhile maintain the QoMS above a given threshold. Predictably, the use of AN should be effective merely at low QoMS region, since AN exerts a negative effect on the multicasting performance. To guarantee the high demand for QoMS, AN has to be prohibitive at high QoMS region. This QoMSconstrained SRM is a generalization of traditional SRM in physicallayer security and provides the transmitter with some insights in how to tradeoff the security performance and the multicasting performance.
As for the weightedsum scalarization method, the necessary condition for it to find all Pareto optimal points is that the secrecy rate region should be convex. Besides, its performance is also dependent on the precision of λ _{ c }. The traversal of λ _{ c } should span from zero to an extremely large number with appropriate step, so that each Pareto optimal points can be detected. Nonetheless, the weightedsum problem structure has an interesting pricing interpretation from the field of economics. To elaborate a little further, let us define p _{0} and p _{ c } as the unit price for the secrecy rate and the multicast rate, respectively, charged by the service provider. To maximize its revenue, the service provider should be concerned about how to solve the WSRM problem in (18) with setting λ _{ c }=p _{ c }/p _{0}. The use of AN could also be explained in this context. It is evident to see when p _{0}≫p _{ c }, the revenue from multicasting transmission would dominate the objective function of (18), and thus, eliminating AN would be helpful in increasing the overall revenue.
In all, these two scalarization methods are suitable for different application scenarios and provide different insights. Nonetheless, the QoMSbased scalarization could yield all Pareto optimal points, while the weightedsum scalarization might only yield some of them, dependent on the shape of the secrecy rate region.
Remark 4
Besides the QoMSbased and weightedsum scalarization methods, some other scalarization methods have been proposed in literature to find the complete Pareto set for biobjective optimization, e.g., the weighted Tchebycheff method [39]. However, to implement this method, one has to first obtain the singleservice point of the confidential message (cf. (29)) and then solve a highly nonconvex maxmin optimization problem.
Unfortunately, problem (29) is nonconvex, and so the optimal solution to (29) may not be obtained, which invalidates the use of the weighted Tchebycheff method.
Complexity analysis
The major computational complexity of the two scalarization methods comes from solving the problems (16) and (28). While both of problems (16) and (28) are convex, they are not in a standard semidefinite programming (SDP) form, owing to the logarithm functions therein. To solve them, a successive approximation method embedded with a primaldual interiorpoint method (IPM) is employed, say by CVX. As is known, the arithmetic complexity for the generic primaldual IPM to solve a standard SDP is \({\mathcal {O}}(\max {\{ m,n\}^{4}}{n^{1/2}}\log (1/\varepsilon))\) [40], in which m, n, and ε represent the number of linear constraints, the dimension of the positive semidefinite cone, and the solution accuracy, respectively. Therefore, the complexity of solving (16) or (28) is \({\mathcal {O}}({L_{SA}}\max {\{ 2K,{N_{t}}\}^{4}}N_{t}^{1/2}\log (1/\varepsilon))\), where L _{ SA } denotes the number of successive approximations used. Since we are not aware of the relation between L _{ SA } and N _{ t }, this complexity expression is rather rough.
However, by utilizing the following approximation [41]:
all logarithm terms in problems (16) and (28) can be approximated by a trace function at low transmit power. This approximation further converts the convex problems (16) and (28) into SDP ones, which makes it possible to acquire a more accurate bigO expression of the computational complexity for low transmit power.
Specifically, consider (16), which has three linear matrix inequality (LMI) constraints of size N _{ t }, and 2K LMI constraints of size 1 after introducing the approximation (30). Moreover, for (16), the number of decision variables is on the order \(n_{1}=3N_{t}^{2}+1\). Then, when a generic pathfollowing IPM is used to solve problem (16), the total arithmetic computation cost is on the order of [42]
with \(n_{1}={\mathcal {O}}\left (3N_{t}^{2}+1\right)\).
On the other hand, for solving (28), we need to introduce two additional slack variables to move the maximum and minimum terms in the objective function of (28) to the constraints. Hence, the number of decision variables is on the order of \(n_{2}=3N_{t}^{2}+2\), and (28) also has three LMI constraints of size N _{ t }, and 2K LMI constraints of size 1. The total arithmetic computation cost for solving (28) is in the order of
with \(n_{2}={\mathcal {O}}\left (3N_{t}^{2}+2\right)\).
Comparing (31) and (32), one can note that the total arithmetic computation cost of solving the two problems is comparable, with T _{2} slightly greater than T _{1} due to n _{2}>n _{1}. This observation implies that the QoMSbased scalarization is more timeefficient at low transmit power. This is also consistent with our following simulation results, as we shall see in Section 6.
Numerical results
In this section, we provide numerical results to illustrate the secrecy rate region derived from the two proposed methods, compared with two other existing strategies. The first one is the noAN transmission, i.e., prefixing Q _{ a } as 0 in problem (4). Thus, its achieved secrecy rate region can also be derived via the DC and AO algorithms. Another one is the traditional service integration using time division multiple address (TDMA), which assigns the confidential message and multicast message to two orthogonal time slots. Its maximum secrecy rate and multicast rate can be obtained by seeking the singleservice points of \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\). For the fairness of comparison, the secrecy rate and multicast rate achieved by this TDMAbased strategy should be halved[17].
In the first subsection, the convergence results of both algorithms are presented. The second subsection gives the comparison between these two algorithms in terms of achievable performance and computational complexity.
Convergence results
In this subsection, we assume N _{ t }=5, N _{ r,k }=3 for all \(k \in \mathcal {K}\), and K=4. The channel matrices are randomly generated from an i.i.d. complex Gaussian distribution with zero mean and unit variance. According to Proposition 1, since N _{ t }>N _{ r,1}, the optimal solution to (7) is attained when the constraint (7a) holds with equality.
First, we evaluate the convergence of the DC algorithm. Especially, we are concerned about whether the primal constraint (7a) is violated by our approximation. Setting τ _{ ms } as 2 bps/Hz, Fig. 1 shows the convergence of the multicast rate in the iteration with different transmit power. \({\tilde {\mathbf {Q}}_{c,0}}\) and \({\tilde {\mathbf {Q}}_{a,0}}\) are both initiated as 0. The algorithm stops iterating when the difference between two successive values of \({\bar {R}}(\tau _{ms})\) returned by the algorithm is less than or equal to 10^{−4}. One can observe that the multicast rates ultimately converge to our predefined multicast rate with a limited number of iterations in all tested transmit powers. This observation indicates the efficacy of TSE in approximating the multicast rate. Then, we also plot the achieved secrecy rates and the approximated secrecy rates in Fig. 2. The general observation of Fig. 1 is also applicable to Fig. 2.
The convergence results of the AO algorithm are presented in Fig. 3. In Fig. 3, we set λ _{ c }=1 to seek the sumrate point. \(\mathbf {Q}_{c}^{0}\) and \(\mathbf {Q}_{a}^{0}\) are both initialized as \((P/(2N_{t}))\mathbf {I}_{N_{t}}\phantom {\dot {i}\!}\). The algorithm stops iterating when the difference between two successive values of \({\bar {R}}(\lambda _{c})\) is less than or equal to 10^{−4}. As one can observe from Fig. 3, the achieved weighted sum rate is monotonically increasing and finally converges with a limited number of iterations in all tested transmit powers. In addition, we find out that the AN covariance matrix Q _{ a } output by AO is no longer diagonal. This implies that the associated AN design is spatially selective rather than isotropic, which blocks the eavesdroppers much more effectively. One can also note that the increase in the weighted sum rate is particularly remarkable when the transmit power is high. After all, higher transmit power means that the transmitter can allocate more power to the confidential message transmission, while not compromising the multicast performance. The extra power allocated to the confidential message can be used to generate more interference at the eavesdropper and/or strengthen the signal reception at the intended receiver, whereby more remarkable improvement is observed.
Performance comparison
In this subsection, we focus on two sorts of system configuration. The first one is the same as that in the last subsection. Besides, we consider another sort of system configuration: N _{ t }=N _{ r,1}=4, N _{ r,k }=5 for all \(k \in {\mathcal {K}}_{e}\), and K=4. Under the second system configuration, neither Condition 1 nor Condition 2 is satisfied.
First, we will show the secrecy rate regions achieved by the first system configuration. Overall results are shown in Fig. 4, with P set as 10 and 20 dB, respectively. Figure 4 reveals two general trends. First, our ANaided scheme achieves a secrecy rate region larger than the noAN one. The striking gap indicates the efficacy of AN in expanding the secrecy rate region. However, the gap between these two strategies dramatically reduces when R _{0} increases. This phenomenon agrees with our conjecture in Section 5.1. The second observation is that our proposed strategies, though only attain a lower bound on \(R_{s}({\left \{ {\mathbf {H}_{k}} \right \}_{k \in {\mathcal {K}}}},P)\), is sufficient to achieve significantly larger secrecy rate regions than the TDMAbased one. This observation also implies that PHYSI is an effective approach to improve the spectral efficiency. Then, let us compare the achievable performance of the two proposed scalarization methods. One can notice that the performance gap between these two methods is negligible in the tested system configuration, especially when P=10 dB.
Figure 5 plots the secrecy rate regions achieved by the second system configuration. Still, the secrecy rate region with AN is larger than the one without AN and the one achieved by TDMA. Besides, we can observe two very interesting phenomena. First, when we increase the transmit power from 10 to 20 dB, the secrecy rate regions practically expand in the horizontal direction. That is, under the second system configuration, the increasing transmit power mainly contributes to the multicast message transmission, rather than the confidential message transmission. This can be interpreted from the transmit degree of freedom (d.o.f.). The total d.o.f. of unauthorized receivers is \({\sum \nolimits }_{k=2}^{K1}{N_{r,k}}=15\), much higher than the transmit d.o.f. N _{ t }=4. The high d.o.f. at the unauthorized receivers leads to the d.o.f. bottleneck at the transmitter and thus compromises the overall secrecy performance. Second, one can notice that when P=20 dB,
1) There exist some boundary points residing on a line, marked by the red dashed lines, that are not Pareto optimal to (4). Apparently, these points cannot be detected by the weightedsum scalarization but can be easily detected by the QoMSbased scalarization.
2) The QoMSbased scalarization detects more Pareto optimal points than the weightedsum scalarization. This is attributed to the insensitivity of the weightedsum scalarization to the points residing on an approximately horizontal boundary. To detect these boundary points, one has to precisely adjust the value of λ _{ c } to get different tangent points.
Complexity comparison
Finally, we tabulated the averaged running times of DC and AO for obtaining a boundary point in Table 1 under the same setting as Fig. 4. As seen, the DC algorithm runs faster than the AO algorithm when the transmit power is low. This phenomenon is consistent with our preceding analysis in Section 5.2. However, at high transmit power, the DC algorithm scales nearly exponentially with P and gradually spends more time converging in each iteration than the AO algorithm. This observation indicates that the two proposed scalarization methods might exhibit a performancecomplexity tradeoff at high transmit power.
Conclusions
In this paper, we considered the ANaided transmit design for multiuser MIMO broadcast channel with confidential service and multicast service. The transmit covariance matrices of confidential message, multicast message, and AN were designed to maximize the achievable secrecy rate and achievable multicast rate simultaneously. To deal with this biobjective optimization problem, two different sorts of scalarization were introduced to transform this SRRM problem into a scalar optimization problem. In the QoMSbased scalarization, the scalar problem is an SRM problem with QoMS constraints, while in the weightedsum scalarization, the scalar problem is a WSRM problem. DC and AO algorithms were utilized to solve the QoMSconstrained SRM problem and the WSRM problem, respectively. Both algorithms can converge to a stationary point of the primal problems. Further, we gave a detailed comparison between the two proposed scalarization methods. The comparison results indicated that at low transmit power, the QoMSbased scalarization is superior to the weightedsum one in terms of achievable performance and computational complexity. On the other hand, at high transmit power, these two methods exhibit a tradeoff between achievable performance and computational complexity. Numerical results also confirmed the effectiveness of AN in expanding the secrecy rate region.
As a future direction, it would be interesting to analyze the robust service integration scheme to combat the possible CSI uncertainties caused by channel aging and to take into account some applicationspecific requirements in 5G wireless communication system, e.g., the mobility of terminals and the overhead in CSI acquisition.
Endnote
^{1} In this paper, we assume that only one receiver orders the confidential service within a single time slot. In practice, this assumption is valid under the case where the confidential service is provided to all receivers in a roundrobin manner, i.e., the time slots are assigned to each subscriber of the confidential service in equal portions and in circular order.
Appendix A: proof of Proposition 1
First, we claim that problem (7) has a following interesting property provided that Condition 1 or Condition 2 is satisfied.
Property 1
The maximum objective value of problem (7), R(τ _{ ms }), is obtained only when the equality in (7a) holds.
Proof
The proof of Property 1 can be accomplished by contradiction. Assume that the maximum value of problem (7) is obtained at the solution \(({\hat {\mathbf {Q}}_{0}},{\hat {\mathbf {Q}}_{c}},{\hat {\mathbf {Q}}_{a}})\) and the equality in (7a) does not hold, i.e.,
Our next step is to construct a new solution \(({\bar {\mathbf {Q}}_{0}},{\bar {\mathbf {Q}}_{c}}, {\bar {\mathbf {Q}}_{a}})\) from \(({\hat {\mathbf {Q}}_{0}},{\hat {\mathbf {Q}}_{c}},{\hat {\mathbf {Q}}_{a}})\), which achieves a larger objective value and satisfies the constraint (7a) with equality. Let us first elaborate upon the construction method under Condition 1.
1) Case for Condition 1: Specifically, we multiply \({\hat {\mathbf {Q}}_{0}}\) by a scaling factor ξ (0<ξ<1), add a positive semidefinite (PSD) matrix \(\mathbf {E}=\rho \mathbf {I}  \rho \mathbf {H}_{1}^{H}{\left ({\mathbf {H}_{1}}\mathbf {H}_{1}^{H}\right)^{ 1}}{\mathbf {H}_{1}}\) to \({\hat {\mathbf {Q}}_{a}}\), and keep \({\hat {\mathbf {Q}}_{c}}\) constant, i.e., \({\bar {\mathbf {Q}}_{0}}=\xi \hat {\mathbf {Q}}_{0}\), \({\bar {\mathbf {Q}}_{a}}={\hat {\mathbf {Q}}_{a}}+\mathbf {E}\) and \({\bar {\mathbf {Q}}_{c}}=\hat {\mathbf {Q}}_{c}\), where the coefficient ρ controls the power of E. Note that E is the orthogonal complement projector of \(\mathbf {H}_{1}^{H}\), and its existence is guaranteed by Condition 1. To keep the total transmit power constant, the coefficient ρ should be chosen to satisfy \((1  \xi){\text {Tr}}({\hat {\mathbf {Q}}_{0}}) = {\text {Tr}}(\mathbf {E}) = \rho ({N_{t}}  {N_{r,1}})\), that is, \(\rho = \frac {{(1  \xi){\text {Tr}}({\hat {\mathbf {Q}}_{0}})}}{{{N_{t}}  {N_{r,1}}}}\). To proceed, we need the following lemma.
Lemma 4
(Weingarten et al. [43]) For matrices A,Δ≽0 and B≻0, the following inequality hold:
Then, by applying Lemma 1, one can obtain
for any \(k \in {\mathcal {K}}\). Thus, by adjusting the value of ξ, the equality in (7) could be achieved.
To proceed, we will show that a larger objective value could always be achieved by \(({\bar {\mathbf {Q}}_{0}},{\bar {\mathbf {Q}}_{c}},{\bar {\mathbf {Q}}_{a}})\). By reapplying Lemma 1, it is easy to get
Meanwhile, due to \({\mathbf {H}_{1}}\mathbf {E}\mathbf {H}_{1}^{H}=\boldsymbol {0}\), it is easy to see
Combining (35) with (36), we obtain
i.e., a larger objective value can be found with \(({\bar {\mathbf {Q}}_{0}},{\bar {\mathbf {Q}}_{c}},{\bar {\mathbf {Q}}_{a}})\). This fact is contrary to the primal assumption.
2) Case for Condition 2: The only difference between the proof for Condition 1 and Condition 2 lies in the construction method of \(({\bar {\mathbf {Q}}_{0}},{\bar {\mathbf {Q}}_{c}},{\bar {\mathbf {Q}}_{a}})\). To begin with, let us first define a matrix \({\mathbf {H}_{ua}} \buildrel \Delta \over = {[\mathbf {H}_{2}^{H},\mathbf {H}_{3}^{H}, \cdots,\mathbf {H}_{K}^{H}]^{H}} \in {{\mathbb {C}}^{{\sum \nolimits }_{k \in {{\mathcal {K}}_{e}}} {{N_{r,k}}} \times {N_{t}}}}\), which stacks all of the unauthorized receivers’ channel matrices. Then, we multiply \({\hat {\mathbf {Q}}_{0}}\) by a scaling factor ξ (0<ξ<1), add a PSD matrix \(\mathbf {E}=\rho \mathbf {I}  \rho \mathbf {H}_{ua}^{H}{\left ({\mathbf {H}_{ua}}\mathbf {H}_{ua}^{H}\right)^{ 1}}{\mathbf {H}_{ua}}\) to \({\hat {\mathbf {Q}}_{c}}\), and keep \({\hat {\mathbf {Q}}_{a}}\) constant, i.e., \({\bar {\mathbf {Q}}_{0}}=\xi \hat {\mathbf {Q}}_{0}\), \({\bar {\mathbf {Q}}_{c}}={\hat {\mathbf {Q}}_{c}}+\mathbf {E}\) and \({\bar {\mathbf {Q}}_{a}}=\hat {\mathbf {Q}}_{a}\), where the coefficient ρ controls the power of E. E is the orthogonal complement projector of \(\mathbf {H}_{ua}^{H}\), the existence of which is guaranteed by Condition 2. The coefficient ρ should be chosen to satisfy \(\rho = \frac {{(1  \xi){\text {Tr}}({\hat {\mathbf {Q}}_{0}})}}{{N_{t}}  {\sum \nolimits }_{k \in {{\mathcal {K}}_{e}}} {{N_{r,k}}}}\) to keep the total transmit power constant.
Again, by exploiting Lemma 1 and carrying out some matrix manipulations, one can verify that \(({\bar {\mathbf {Q}}_{0}},{\bar {\mathbf {Q}}_{c}},{\bar {\mathbf {Q}}_{a}})\) can achieve a larger objective value than \(({\hat {\mathbf {Q}}_{0}},{\hat {\mathbf {Q}}_{c}},{\hat {\mathbf {Q}}_{a}})\) with the constraint (7a) active. This fact contradicts the primal assumption.
Summarizing the conclusions drawn from the two cases above, we have accomplished the proof of Property 1.
Property 1 makes the proof of ([19], Theorem 1) fully applicable to the proposition here. The remaining parts of the proof can be found in [19] and are omitted here for simplicity.
Appendix B: proof of Proposition 3
Firstly, we introduce slack variables α and β to reexpress (8) as
Equivalently, it suffices to prove that every limit point \((\tilde {\mathbf {Q}}_{0},\tilde {\mathbf {Q}}_{c},\tilde {\mathbf {Q}}_{a})\) of the iterates generated by the AO algorithm, together with \(\tilde \alpha = \mathop {\min }\limits _{k \in {\mathcal {K}}} {C_{m,k}}(\tilde {\mathbf {Q}}_{0},\tilde {\mathbf {Q}}_{c},\tilde {\mathbf {Q}}_{a})\) and \(\tilde \beta = \mathop {\max }\limits _{k \in {\mathcal {K}}_{e}} {C_{e,k}}(\tilde {\mathbf {Q}}_{0},\tilde {\mathbf {Q}}_{c},\tilde {\mathbf {Q}}_{a})\), is a KKT point of (38).
Due to the compactness of (Q _{0},Q _{ c },Q _{ a }), there must exist a subsequence, denoted by
such that \({\left \{ \left (\mathbf {Q}_{0}^{{n_{l}}},\mathbf {Q}_{c}^{{n_{l}}},\mathbf {Q}_{a}^{{n_{l}}},\left \{ \mathbf {S}_{k}^{{n_{l}}}\right \}_{k = 1}^{K},\left \{ \mathbf {U}_{k}^{{n_{l}}}\right \}_{k = 1}^{K}\right)\right \}_{l}}\) converges to a limit point \(\left (\tilde {\mathbf {Q}}_{0},\tilde {\mathbf {Q}}_{c},\tilde {\mathbf {Q}}_{a},\{\tilde {\mathbf {S}}_{k}\}_{k = 1}^{K},\{\tilde {\mathbf {U}}_{k}\}_{k = 1}^{K}\right)\) as l→∞. Next, our proof is composed of two steps. First, we will show that the limit point
satisfies the following properties.
Second, we will check the KKT conditions of problems (39a)–(39d) to build a bridge between (39) and the KKT conditions of problem (38).
Step 1. By noting that
we have
and for any \(({\mathbf {Q}_{0}},{\mathbf {Q}_{c}},{\mathbf {Q}_{a}}) \in {\mathcal {F}}\), the following inequality holds, i.e.,
where the second inequality of (42) holds for the reason that AO algorithm yields nondescending objective values. Then, letting l→∞ in (41) and (42) will lead to (39a)–(39d).
Step 2. Then, it follows from (39a) to (39d) and the positive definiteness of \(\{ {\tilde {\mathbf {S}}_{k}}\}_{k = 1}^{K}\) and \(\{ {\tilde {\mathbf {U}}_{k}}\}_{k = 1}^{K}\) that
By carrying out some matrix manipulations to (43), it is easy to obtain that
Meanwhile, by introducing slack variables α and β, (39d) is shown to be equivalent to
It is easy to see that \(({\tilde {\mathbf {Q}}_{0}},{\tilde {\mathbf {Q}}_{c}},{\tilde {\mathbf {Q}}_{a}})\), together with \(\tilde \beta = \mathop {\max }\limits _{k \in {\mathcal {K}}_{e}} {\varphi _{e,k}}(\tilde {\mathbf {Q}}_{c},\tilde {\mathbf {Q}}_{a},{\tilde {\mathbf {S}}_{k}})\) and \(\tilde \alpha = \mathop {\min }\limits _{k \in {\mathcal {K}}} {\varphi _{m,k}}(\tilde {\mathbf {Q}}_{0},\tilde {\mathbf {Q}}_{c},\tilde {\mathbf {Q}}_{a},{\tilde {\mathbf {U}}_{k}})\), is an optimal solution of problem (11). Consequently, \(({\tilde {\mathbf {Q}}_{0}},{\tilde {\mathbf {Q}}_{c}},{v{\mathbf {Q}}_{a}},\tilde \beta,\tilde \alpha)\) satisfy the KKT conditions of (45), shown in (46).
In (46), \(\left (\{{\rho _{k}}\}_{k \in {\mathcal {K}}_{e}},\{{\mu _{k}}\}_{k \in {\mathcal {K}}},\gamma,\mathbf {A},\mathbf {B},\mathbf {C}\right)\) are all dual variables pertaining to the constraints in (45).
To proceed, by applying Danskin’s theorem [44], one can verify that the following equalities must hold.
Then, substituting (44b) and (44c) into \({\varphi _{e,k}}({\tilde {\mathbf {Q}}_{c}},{\tilde {\mathbf {Q}}_{a}},{\tilde {\mathbf {S}}_{k}})\) and \({\varphi _{m,k}}({\tilde {\mathbf {Q}}_{0}},{\tilde {\mathbf {Q}}_{c}},{\tilde {\mathbf {Q}}_{a}},{\tilde {\mathbf {U}}_{k}})\), one can obtain
Finally, by plugging (47) and (48) into (46), we obtain
Remarkably, (49), together with the last six lines of (46), represents the KKT conditions of the WSRM problem (38). This fact completes the proof.
References
 1
JG Andrews, S Buzzi, W Choi, SV Hanly, A Lozano, ACK Soong, JC Zhang, What will 5G be?IEEE J. Sel. Areas Commun. 32(6), 1065–1082 (2014).
 2
YS Shiu, SY Chang, HC Wu, SCH Huang, HH Chen, Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2), 66–74 (2011).
 3
B He, X Zhou, TD Abhayapala, Wireless physical layer security with imperfect channel state information: a survey (2013). http://arxiv.org/abs/1307.4146. Accessed June 2013.
 4
YWP Hong, PC Lan, CCJ Kuo, Enhancing physicallayer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process. Mag. 30(5), 29–40 (2013).
 5
A Mukherjee, SA Fakoorian, J Huang, AL Swindlehurst, et al, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tuts. 16(3), 1550–1573 (2014).
 6
Y Liu, HH Chen, L Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tuts. 19(1), 347–376 (2017).
 7
R Liu, HV Poor, Secrecy capacity region of a multiantenna Gaussian broadcast channel with confidential messages. IEEE Trans. Inf. Theory. 55(3), 1235–1249 (2009).
 8
R Liu, T Liu, HV Poor, S Shamai, Multipleinput multipleoutput Gaussian broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 56(9), 4215–4227 (2010).
 9
SAA Fakoorian, AL Swindlehurst, On the optimality of linear precoding for secrecy in the MIMO broadcast channel. IEEE J. Sel. Areas Commun. 31(9), 1701–1713 (2013).
 10
D Park, Weighted sum rate maximization of MIMO broadcast and interference channels with confidential messages. IEEE Trans. Wirel. Commun. 15(3), 1742–1753 (2016).
 11
I Csiszár, J Körner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 24(3), 339–348 (1978).
 12
HD Ly, T Liu, Y Liang, Multipleinput multipleoutput Gaussian broadcast channels with common and confidential messages. IEEE Trans. Inf. Theory. 56(11), 5477–5487 (2010).
 13
E Ekrem, S Ulukus, Capacity region of gaussian MIMO broadcast channels with common and confidential messages. IEEE Trans. Inf. Theory. 58(9), 5669–5680 (2012).
 14
R Liu, T Liu, HV Poor, S Shamai, in Proc. IEEE Int. Symp. Inf. Theory (ISIT’2010). MIMO Gaussian broadcast channels with confidential and common messages (IEEEAustin, 2010), pp. 2578–2582.
 15
R Liu, T Liu, HV Poor, S Shamai (Shitz), New results on multipleinput multipleoutput broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 59(3), 1346–1358 (2013).
 16
RF Wyrembelski, H Boche, in Proc. IEEE Global Communication Conf. Workshops. Service integration in multiantenna bidirectional relay networks: public and confidential messages (IEEEHouston, 2011), pp. 884–888.
 17
RF Wyrembelski, H Boche, Physical layer integration of private, common, and confidential messages in bidirectional relay networks. IEEE Trans. Wirel. Commun. 11(9), 3170–3179 (2012).
 18
R Schaefer, H Boche, Physical layer service integration in wireless networks: signal processing challenges. IEEE Signal Process. Mag. 31(3), 147–156 (2014).
 19
W Mei, Z Chen, J Fang, Secrecy capacity region maximization in Gaussian MISO channels with integrated services. IEEE Signal Process. Lett. 23(8), 1146–1150 (2016).
 20
W Mei, L Li, Z Chen, C Huang, in Proc. IEEE Global Conf. Signal Info. Process. (GlobalSIP). Artificialnoise aided transmit design for multiuser MISO systems with integrated services (IEEEOrlando, 2015), pp. 1382–1386.
 21
W Mei, Z Chen, C Huang, in Proc. IEEE ICASSP. Robust artificialnoise aided transmit design for multiuser MISO systems with integrated services (IEEEShanghai, 2016), pp. 3856–3860.
 22
W Mei, L Li, Z Chen, C Huang, in Proc. IEEE Int. Conf. Commun. Artificialnoise aided transmit design for outage constrained service integration (Kuala Lumpur, 2016), pp. 1–7.
 23
W Mei, Z Chen, J Fang, GSVDbased precoding in MIMO systems with integrated services. IEEE Signal Process. Lett. 23(11), 1528–1532 (2016).
 24
Q Li, M Hong, HT Wai, YF Liu, WK Ma, ZQ Luo, Transmit solutions for MIMO wiretap channels using alternating optimization. IEEE J. Sel. Areas Commun. 31(9), 1714–1727 (2013).
 25
Q Li, WK Ma, Spatially selective artificialnoise aided transmit optimization for MISO multiEves secrecy rate maximization. IEEE Trans. Signal Process. 61(10), 2704–2717 (2013).
 26
Z Chu, K Cumanan, Z Ding, M Johnston, SY Le Goff, Robust outage secrecy rate optimizations for a MIMO secrecy channel. IEEE Wirel. Commun. Lett. 4(1), 86–89 (2015).
 27
Z Chu, H Xing, M Johnston, SY Le Goff, Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers. IEEE Trans. Wirel. Commun. 15(1), 283–297 (2016).
 28
TX Zheng, HM Wang, J Yuan, D Towsley, MH Lee, Multiantenna transmission with artificial noise against randomly distributed eavesdroppers. IEEE Trans. Commun. 63(11), 4347–4362 (2015).
 29
GR Lanckriet, BK Sriperumbudur, in Proc. Advances Neural Inf. Process. Syst. On the convergence of the concaveconvex procedure (NIPS FoundationVancouver, 2009), pp. 1759–1767.
 30
B Fang, Z Qian, W Shao, W Zhong, Precoding and artificial noise design for cognitive MIMOME wiretap channels. IEEE Trans. Veh. Technol. 65(8), 6753–6758 (2016).
 31
Z Chu, K Cumanan, Z Ding, M Johnston, SY Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 64(5), 1833–1847 (2015).
 32
J Yang, IM Kim, DI Kim, Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 12(6), 2840–2852 (2013).
 33
SX Wu, WK Ma, AMC So, Physicallayer multicasting by stochastic transmit beamforming and Alamouti spacetime coding. IEEE Trans. Signal Process. 61(17), 4230–4245 (2013).
 34
H Zhu, N Prasad, S Rangarajan, Precoder design for physical layer multicasting. IEEE Trans. Signal Process. 60(11), 5932–5947 (2012).
 35
W Lee, H Park, HB Kong, JS Kwak, I Lee, A new beamforming design for multicast systems. IEEE Trans. Veh. Technol. 62(8), 4093–4097 (2013).
 36
B Du, Y Jiang, X Xu, X Dai, Optimum beamforming for MIMO multicasting. EURASIP J. Adv. Signal Process. 2013(121), 1–15 (2013).
 37
M Grant, S Boyd, CVX: Matlab software for disciplined convex programming (2011). http://cvxr.com/cvx. Accessed Apr 2011.
 38
S Boyd, L Vandenberghe, Convex optimization (Cambridge university press, Cambridge, 2009).
 39
RT Marler, JS Arora, Survey of multiobjective optimization methods for engineering. Struct. Multidiscip. Optim. 26(6), 369–395 (2004).
 40
ZQ Luo, WK Ma, AMC So, Y Ye, S Zhang, Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 27(3), 20–34 (2010).
 41
K Cumanan, Z Ding, B Sharif, GY Tian, KK Leung, Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper. IEEE Trans. Veh. Technol. 63(4), 1678–1690 (2014).
 42
A BenTal, A Nemirovski, Lectures on modern convex optimization: analysis, algorithms, and engineering applications. vol. 2 (SIAM, Philadelphia, 2001).
 43
H Weingarten, Y Steinberg, S Shamai (Shitz), The capacity region of the Gaussian multipleinput multipleoutput broadcast channel. IEEE Trans. Inf. Theory. 52(9), 3936–3964 (2006).
 44
D Bertsekas, Nonlinear programming, 2nd edn. (Athena Scientific, Belmont, 1999).
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under grant 61571089 and by the HighTech Research and Development (863) Program of China under grant 2015AA01A707.
Author information
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Received
Accepted
Published
DOI
Keywords
 Physicallayer service integration
 Artificial noise
 Convex optimization
 Secrecy rate region