 Research
 Open access
 Published:
Secure massive MIMO system with twoway relay cooperative transmission in 6G networks
EURASIP Journal on Wireless Communications and Networking volumeÂ 2023, ArticleÂ number:Â 73 (2023)
Abstract
With the advent of Internet of Everything and the era of big data, massive multipleinput multipleoutput (MIMO) is considered as an essential technology to meet the growing communication requirements for beyond 5G and the forthcoming 6G networks. This paper considers a secure massive MIMO system, where the legitimate user and the base station exchange messages via twoway relays with the presence of passive eavesdroppers. To achieve the tradeoff between the physicallayer security and communication reliability, we design a cooperative transmission mode based on multiplerelay collaboration, where some relays broadcast the received signals and other relays act as friendly jammers to prevent the interception by eavesdroppers. A quantum chemical reaction optimization (QCRO) algorithm is proposed to find the most suitable scheme for multiplerelay collaboration. Simulation results highlight excellent performance of the proposed transmission mode under QCRO in different communication scenarios, which can be considered as a potential solution for the security issue in future wireless networks.
1 Introduction
In contemporary society, as the booming development of information technology and the popularity of intelligent equipment, wireless networks have become an essential part of our daily life [1]. Inheriting the benefits achieved in 5G, 6G network is expected to expand to a wider level to realize the full coverage of land and air [2,3,4,5]. As networks become denser, how to efficiently utilize the system resources and how to meet the higher transmission demands of ultrahigh speed, high quality, and low latency have become key issues in 6G networks [3,4,5]. Massive multipleinput multipleoutput (MIMO) is an effective solution for the increasing challenge of wireless data traffic since it can serve a large number of IoT devices at the same time [6,7,8,9]. By utilizing large antenna arrays, massive MIMO can offer a significant improvement in system capacity, and can serve a large variety of devices at the same time, which can greatly improve the quality of service (QoS) and spectral efficiency of communication systems [10].
The openness and sharing of nature of wireless propagation channels make it easy for any smart device to get information. Since more information will be transmitted through wireless environment in the era of 6G communications, it is crucial to build a secure communication network [11, 12]. Compared with singleantenna transmission architecture, massive MIMO has significant advantages in building secure communication networks. The characteristic of large number of antennas at the base station (BS) makes it easy to transmit several directional beams to the desired terminals. As the size of the antenna array grows infinite, the beam formed by the BS will become narrow and have high directional selectivity, thus effectively reduce the risk of information interception. However, in the actual systems, the number of antennas is finite due to huge hardware cost, and the eavesdroppers will make every effort to intercept or break the information transmission. Typically, cryptographic encryption method was used to maintain the system privacy [13,14,15], but the implementation complexity is too high due to the cumbersome process of service management. By exploiting wireless transmission properties, physicallayer security has attracted considerable attentions [16, 17]. In order to protect the transmission security, several efforts such as artificial noise [18,19,20], antenna/relay selection [21,22,23], and cooperative strategies [24,25,26,27] were employed to deal with the information leakage by eavesdroppers. The utilization of antenna correlation diversity was demonstrated to improve the secrecy rate of massive MIMO systems [19]. With the assistance of cooperative relays, the authors in [24] and [25] investigated the secure transmission problem in the presence of passive and active eavesdroppers. The secrecy performance under a practical scenario where the eavesdroppers hide their existence in the system was investigated in [26]. For secure information transmission between the BS and the destination, the authors in [21] proposed a destinationbased cooperative jamming scheme to improve the system capacity and transmission confidentiality.
Among recent works on the security issue, the combinations of cooperative relays and secure techniques have shown significant improvements on secrecy capacity and system coverage in massive MIMO networks. Due to the lowcomplexity relaying process and high spectral efficiency outperforms oneway relay network, twoway relays have attracted extensive attentions [28,29,30,31]. In twoway relay networks, eavesdroppers will receive the overlapped information when the two legitimate devices broadcast their signals at the same time [31]. In this condition, both two devices act as source and jammer to prevent the interception by eavesdroppers. By exploiting the dual property, the authors in [32, 33] investigated distributed relay selection criterion to optimize the system security performance. In order to enhance the spatial diversity gains and further improve the system performance, massive MIMO with twoway relay collaboration has become a hotspot in recent researches [34,35,36,37]. Feng et al. [35] indicated that the system performance with fullduplex operation outperforms the halfduplex mode under a certain selfloop interference. Zhang et al. [36] investigated the overall performance with hardware impairments. Pan et al. [37] adopted a power allocation strategy based on geometric programming to reduce the information interception of untrusted users. These works, however, did not consider the information leakage happens at the two phases of data transmission.
1.1 Motivation and contributions
Although existing researches have made influential achievements in improving the security performance, there are still some limitations. For better understanding, the comparison of previous works with our work is presented in Table 1. Many antieavesdropping methods [16,17,18,19,20] generally consider the case of direct transmission between the BS and the users, but itâ€™s hard to meet the QoS demands of the desired terminals where there are no direct transmission links due to the longdistance fading.
For secure transmission issues with relay collaboration, most of the existing works [21,22,23,24,25,26,27,28,29,30,31,32,33, 37] do not simultaneously address the power allocation, resource utilization, and multiple relay selection in a scenario where information leakage happens at both transmission phases in massive MIMO networks with limited timeâ€“frequency resources. In this paper, we present a cooperative transmission mode for the security issue of massive MIMO twoway relay networks. Unlike oneway relaying systems, both the two legitimate devices play the roles of source and jammer via twoway relaying operation. However, the duality has not been well exploited in [28, 29, 31] to prevent the interception by eavesdroppers. In order to break through the limitations of previous studies and obtain a higher security performance, we propose a multiplerelay collaboration strategy considering the interception of eavesdroppers during the two phases of information transmission. According to the multiplerelay selection (MRS) scheme, the relays function as receivers/transmitters or friendly jammers to reduce the information leakage between the source and the legitimate user. Considering the energy conservation and communication reliability requirements, we propose a quantum chemical reaction optimization (QCRO) algorithm to obtain the optimal MRS result. The major contributions of our work are summarized in the following:

We propose a lowcomplexity cooperative relaying and cooperative jamming (CRCJ) transmission mode to achieve the tradeoff between the communication security and reliability of a massive MIMO twoway relay system. The multiplerelay collaboration strategy is employed to enhance the secrecy performance while prevent the interception by eavesdroppers in two transmission phases.

Exact expression for secrecy sumrate is derived considering the information leakage of two transmission phases in massive MIMO relay networks. The expression indicates that secrecy performance is affected by the transmission power of relays and MRS result with QoS and interference constraints in practical scenarios.

A novel algorithm named QCRO is proposed to tackle the complicated MRS problem for the cooperative transmission in massive MIMO networks. Simulation results illustrate the excellent performance of QCRO over conventional algorithms in various system parameters. Besides, the proposed QCRO algorithm can be considered as a potential solution for other complicated problems in communication domain.
1.2 Organization and notations
The other sections of this work are presented as follows. SectionÂ 2 presents the system architecture and the analysis of a secure massive MIMO network with multiplerelay collaboration. The QCRO algorithm for MRS is addressed in Sect.Â 3, and Sect.Â 4 presents the simulations. In the end, we conclude this work in the final section.
Notations: The uppercase boldface symbols and lowercase boldface symbols represent matrixes and the vectors, respectively. \({\mathbf{0}}\) and \({\varvec{I}}_{N}\) represent the zero vector and identity matrix, respectively. \({\mathcal{C}\mathcal{N}}(\mu ,\sigma^{2} )\) denotes the complex Gaussian distribution with mean of \(\mu\) and variance of \(\sigma^{2}\). \((.)^{{\text{T}}}\) and \((.)^{{\text{H}}}\) represent transpose operator and conjugate transpose operator, respectively. \(.\), \(.\), and \({\text{abs}}(.)\) represent modulus, Euclidean norm, and absolute value functions, respectively. \(E\{ .\}\) denotes the statistical expectation, and \([x]^{ + }\) stands for \(\max \left\{ {0,x} \right\}\).
2 System model
In this paper, we consider a secure massive MIMO twoway relay network where there is a base station (BS) with \(M_{t}\) antennas, a user, \(L\) relays, and \(K\) eavesdroppers as shown in Fig.Â 1. In order to facilitate practical implementation, the user, relays, and eavesdroppers are deployed with a single antenna. Since the direct transmission link between the BS and the user is so weak due to the longdistance fading, the BS and the user exchange their information via twoway relays. With the help of twoway relays, the information transmission can be divided into two phases. In the first phase, both the BS and the user transmit their signals to the twoway relays. In the second phase, the relays amplify and forward the received signals to the legitimate devices. The selfinterference cancellation (SIC) is performed at the BS/user side [32]. By removing their own selfinterference, both the BS and the user can get their desired signals. However, eavesdroppers cannot separate the desired information from the superimposed signal without the knowledge of prior information about the BS and the user, which makes it difficult to decipher the intended information. When eavesdroppers try to intercept the signal of the user, the signal from the BS can be regarded as interference. The same goes for the BS. However, when the eavesdropper is closely located at the legitimate device, it requires a stronger antieavesdropping mechanism to protect the transmission security. In this case, we develop a cooperative relaying and cooperative jamming (CRCJ) transmission mode, i.e., a portion of them act as cooperative relays assist in the information transmission between the BS and the user, other relays act as jammers to prevent the information leakage by the passive eavesdroppers.
Regarding propagation model, the channel state information (CSI) is defined as \({\varvec{g}}_{X,Y} = {\varvec{h}}_{X,Y} d_{X,Y}^{  \xi /2}\) [26], where \({\varvec{h}}_{X,Y} \sim {\mathcal{C}\mathcal{N}}({\mathbf{0}},{\varvec{I}}_{N} )\) denotes the smallscale fading factor, and \(d_{X,Y}^{  \xi /2}\) denotes the largescale fading factor. In it, \(\xi\) denotes the path loss exponent, and \(d_{X,Y}\) denotes the distance between the Xâ€‰âˆ’â€‰Y link. The global CSI is available by uplink training in timedivision duplexed (TDD) massive MIMO networks [11, 38]. We consider the instantaneous CSI remains unchanged in one time slot. The definitions of CSI between the terminals of secure massive MIMO twoway relay networks are as follows:

CSI from the BS to the \(i{\text{  th}}\) relay: \({\varvec{g}}_{{BS,r_{i} }} \in {\mathbb{C}}^{{1 \times M_{t} }}\).

CSI from the BS to the \(k{\text{  th}}\) eavesdropper: \({\varvec{g}}_{{BS,e_{k} }} \in {\mathbb{C}}^{{1 \times M_{t} }}\).

CSI from the user to the \(k{\text{  th}}\) eavesdropper: \(g_{{u,e_{k} }}\).

CSI from the \(i{\text{  th}}\) relay to the user: \(g_{{r_{i} ,u}}\).

CSI from the \(i{\text{  th}}\) relay to the \(k{\text{  th}}\) eavesdropper: \(g_{{r_{i} ,e_{k} }}\).

CSI from the \(i{\text{  th}}\) relay to the \(j{\text{  th}}\) relay (\(i \ne j\)): \(g_{{r_{i} ,r_{j} }}\).
In the following, we will introduce the policy of the CRCJ mode for the secure massive MIMO twoway relay network.
2.1 CRCJ policy
Under CRCJ policy, the relays are divided into two classes for different purposes, i.e., some relays are selected to receive the mixed signal from the BS and the user, while the remaining relays act as jammers to transmit jamming signals to the eavesdroppers. For simplicity, the MRS scheme is expressed by a binary vector \({\varvec{b}} = [b_{1} ,b_{2} ,...,b_{L} ]\), where \(b_{i} \in \{ 0,1\}\), \(i = 1,2,...,L\). If \(b_{i} = 1\), the \(i{\text{  th}}\) relay is selected to assist information transmission between the legitimate devices.
In the first phase, the BS and the user simultaneously broadcast their signals with transmit power \(p_{BS}\) and \(p_{u}\). The signal received at the \(i{\text{  th}}\) relay is given by
where \(p_{{r_{j} }}\) is the transmit power of the jth jammer; \({\varvec{V}}\) is the precoding matrix at the BS; \({\varvec{s}}_{BS}\), \(s_{u}\), and \(s_{{r_{j} }}\) are unitpower signals with \(E\{ {\varvec{s}}_{BS} ^{2} \} = 1\), \(E\{ s_{u} ^{2} \} = 1\), and \(E\{ s_{{r_{j} }} ^{2} \} = 1\), respectively; \(\eta_{{r_{i} }}\) is the additive white Gaussian noise (AWGN). For the \(k{\text{  th}}\) eavesdropper, the intercepted signal in the first phase can be expressed as
where \(\eta_{{e_{k} }}^{(1)}\) is the AWGN. The signaltointerference plus noise ratio (SINR) received at the \(k{\text{  th}}\) eavesdropper from the two legitimate devices (BS and user) can be respectively given by
where \(\sigma_{0}^{2}\) denotes the power of AWGN.
In the second phase of data transmission, the selected relays broadcast their received signals to the legitimate devices. We denote \(p_{i}\) as the transmit power of the \(i{\text{  th}}\) relay. For the \(i{\text{  th}}\) relay, the normalized transmission signal is expressed as
where \(G_{i} = \left( {p_{BS} \left\ {{\varvec{g}}_{{BS,r_{i} }} {\varvec{V}}} \right\^{2} + p_{u} g_{{r_{i} ,u}} ^{2} + \sum\nolimits_{j = 1}^{L} {\left( {1  b_{j} } \right)p_{{r_{j} }} \left {g_{{r_{i} ,r_{j} }} } \right^{2} } + \sigma_{0}^{2} } \right)^{  1}\) is the normalization factor. Since the BS and the user can distinguish their transmitted signals, by removing their own selfinterference, the corresponding signals at the BS and the user can be respectively expressed by
and
where \({\varvec{W}}\) is the receiving matrix at the BS; \({\varvec{\eta}}_{BS}\) and \(\eta_{u}\) are AWGN. The SINRs of the BS and the user are respectively shown by
and
Then, the instantaneous transmission rates of the BS and the user are respectively given by
and
Without the knowledge of the CSI between the legitimate devices and cooperative relays, the eavesdroppers cannot separate the superimposed signal [32]. For the \(k{\text{  th}}\) eavesdropper, the intercepted signal in the second phase can be given by
where \(\eta_{{e_{k} }}^{(2)}\) is the AWGN. According to (12), the SINR received at the \(k{\text{  th}}\) eavesdropper from the BS and the user can be respectively shown by
Consider the situation that the eavesdroppers are independent of each other, the total received SINR at the passive eavesdroppers from the BS and the user can be respectively expressed by [21].
The information leakage from the BS and the user are respectively shown by
Hence, the secrecy transmission rates of the BS and the user can be given by
Finally, the secrecy sumrate of the secure massive MIMO twoway relay network can be expressed by
2.2 Problem formulation
Based on the CRCJ policy, the problem of secrecy sumrate maximization based on MRS is formulated as
subject to
where \(p_{\max }\) denotes the maximum transmission power of relays. The relay selection constraints are shown in (22b) and (22c), where (22b) indicates that each relay acts as a jammer or a cooperator to participate in transmission, and (22c) indicates that at least one relay is selected to broadcast confidential signals to the legitimate devices. (22d) denotes the power constraints of cooperative relays and cooperative jammers. (22e) and (22f) are interference constraints, and \(Interference\) denotes the maximum interference allowed to the legitimate device. Due to the cooperative relaying and cooperative jamming policy, the jamming signals transmitted to eavesdroppers can also cause interference to the BS and the legitimate user. Therefore, in order to guarantee the transmission communication quality of the BS and the legitimate user, we consider interference constraints as in (22e) and (22f). However, these constraints are too complicated to address, which make the problem more difficult to solve. Since the interference is caused by the jammers, itâ€™s more convenient to restrict the interference of jammers to the cooperative relays. Hence, to guarantee the system communication quality, we make the interference from the cooperative jammers should not exceed the maximum interference threshold \(I_{{{\text{th}}}}\) of cooperative relays. For the sake of simplifying (22e) and (22f), we can convert them by limiting the transmit power of the relays as follows
where \(L^{\prime}\) denotes the number of cooperative jammers. In this way, the interference constraint can be satisfied for any multiplerelay selection results. Then, we can obtain a higher secrecy rate while ensuring the quality of information transmission, thus achieving the tradeoff between communication security and reliability.
Obviously, the optimization problem of (22) is a multiconstraint nonlinear programming problem, and the computational complexity exponentially increases with the number of relays, which is NPhard to solve. However, traditional algorithms are difficult to get the good performance due to the slow convergence speed and poor convergence accuracy. To efficiently tackle the complicated problem, we propose a quantum chemical reaction optimization (QCRO) algorithm to obtain the appropriate solution.
3 Methods
In this section, a novel intelligent algorithm named QCRO is proposed for multiplerelay selection in a secure massive MIMO twoway relay network. Inspired by the chemical reaction optimization (CRO) algorithm [39] and quantum evolutionary theory [9], QCRO employs a set of quantum molecules, which is varied by different quantum evolutionary rules. Here we introduce the principle of QCRO.
3.1 QCRO for optimization problem
In an \(L\)dimensional space, (where \(L\) is the maximal dimension of the problem), there exist \(N\) quantum molecules. The \(n\)th quantum molecule (\(n = 1,2, \ldots ,N\)) of the \(t{\text{  th}}\) iteration is given by
where \(0 \le x_{n,l}^{t} \le 1\); \(n = 1,2,...,N\); \(l = 1,2,...,L\); \(x_{n,l}^{t}\) denotes the \(l{\text{  th}}\) quantum bit of the \(n{\text{  th}}\) quantum molecule. For each quantum molecule, the quantum bits should be measured to the solution domain. The measurement state of the nth quantum molecule can be obtained by the following rule:
where \(\overline{x}_{n,l}^{t}\) denotes the \(l{\text{  th}}\) measurement state of the nth quantum molecule, and \(\alpha_{n,l}^{t}\) is a random number distributed in [0,1].
The fitness value of the \(n{\text{  th}}\) quantum molecule is calculated by the fitness function, which can be expressed as \(f(\overline{\user2{x}}_{n}^{t} )\). For the maximum optimization problem, the global optimal solution \(\overline{\user2{\rho }}_{{{\text{best}}}}^{t} = \left[ {\overline{\rho }_{{{\text{best}},1}}^{t} ,\overline{\rho }_{{{\text{best}},2}}^{t} , \ldots ,\overline{\rho }_{{{\text{best}},L}}^{t} } \right]\) is denoted as the measurement state of the quantum molecule with the maximum fitness value until the \(t{\text{  th}}\) iteration.
In QCRO, the quantum molecules are updated by collision, decomposition, and synthesis. These processes are related to the kinetic energy (KE) of quantum molecules, where the top \(\mu_{1} N\) quantum molecules with the highest KE are updated by collision, \(\mu_{2} N\) quantum molecules with the smallest KE are updated by synthesis, and the remaining \(\mu_{3} N\) quantum molecules are updated by decomposition. \(\mu_{1}\), \(\mu_{2}\), and \(\mu_{3}\) are constants which respectively represent the reaction ratio of collision, synthesis, and decomposition. To make it easy, we sort the quantum molecules in a descending order according to the level of KE, and the \(n^{\prime}{\text{  th}}\) quantum molecule is denoted by \({\varvec{x}}_{{n^{\prime}}}^{t} = \left[ {x_{{n^{\prime},1}}^{t} ,x_{{n^{\prime},2}}^{t} , \ldots ,x_{{n^{\prime},L}}^{t} } \right]\) with the KE of \(e_{{n^{\prime}}}^{t}\). The generation of new quantum molecules is related to the quantum rotation angle and measurement states of previous quantum molecules. For collision, the \(n^{\prime}{\text{  th}}\) quantum molecule is updated to a quantum molecule \(m\), the quantum rotation angle and KE are given by
where \(m = n^{\prime}\); \(n^{\prime} = 1,2, \ldots ,\mu_{1} N\); \(l = 1,2, \ldots ,L\); \(\overline{x}_{g,l}^{t}\) denotes the \(l{\text{  th}}\) measurement state of the \(g{\text{  th}}\) quantum molecule with higher fitness value in the \(t{\text{  th}}\) iteration,\(g \in \left\{ {1,2, \ldots ,N} \right\}\), \(g \ne n^{\prime}\). \(c_{1}\) represents the weight coefficient, and \(\vartriangle e\) represents the loss rate of KE.
For decomposition, the \(n^{\prime}{\text{  th}}\) quantum molecule is decomposed into quantum molecule \(m\) and \(m + 1\), and the quantum rotation angles are respectively shown as
where \(m = 2n^{\prime}  \mu_{1} N  1\); \(n^{\prime} = \mu_{1} N + 1,\mu_{1} N + 2,...,\mu_{1} N + \mu_{3} N\); \(l = 1,2,...,L\); \(g \in \{ 1,2,...,N\}\), \(g \ne n^{\prime}\); \(\overline{x}_{a,l}^{t}\) denotes the \(l{\text{  th}}\) measurement state of a random quantum molecule in the \(t{\text{  th}}\) iteration, \(a \in \{ 1,2,...,N\}\), \(a \ne n^{\prime}\); \(c_{2}\), \(c_{3}\) and \(c_{4}\) are weight coefficients. \(\kappa_{1}\) is the mutation probability which is a fixed parameter that determines the decomposition style, \(\varphi_{m,l}^{t + 1}\) and \(\varphi_{m + 1,l}^{t + 1}\) are random variables distributed from 0 to 1. The KE of quantum molecule \(m\) and \(m + 1\) can be expressed by
For synthesis, the \(n^{\prime}{\text{  th}}\) quantum molecule and the \((n^{\prime} + 1){\text{  th}}\) quantum molecule are synthesized into a new quantum molecule \(m\), the quantum rotation angle and KE are given by
where \(m = (n^{\prime} + \mu_{1} N + 3\mu_{3} N + 1)/2\); \(n^{\prime} = \mu_{1} N + \mu_{3} N + 1,\mu_{1} N + \mu_{3} N + 3,...,N  1\); \(l = 1,2,...,L\); \(c_{5}\) represents the weight coefficient; and \(\omega_{m,l}^{t}\) is a random variable distributed from 0 to 1.
The \(m{\text{  th}}\) and \((m + 1){\text{  th}}\) updated quantum molecules can be respectively obtained by
where \(\hat{\varphi }_{m,l}^{t + 1}\) and \(\hat{\varphi }_{m + 1,l}^{t + 1}\) are random variables distributed from 0 to 1, \(\kappa_{2}\) denotes the conversion probability, and \({\text{abs}}(.)\) represents the absolute value function. For collision, \(m = n^{\prime}\); \(n^{\prime} = 1,2,...,\mu_{1} N\). For decomposition, \(m = 2n^{\prime}  \mu_{1} N  1\); \(n^{\prime} = \mu_{1} N + 1,\mu_{1} N + 2,...,\mu_{1} N + \mu_{3} N\). For synthesis, \(m = (n^{\prime} + \mu_{1} N + 3\mu_{3} N + 1)/2\); \(n^{\prime} = \mu_{1} N + \mu_{3} N + 1,\mu_{1} N + \mu_{3} N + 3, \ldots ,N  1\).
Then, we obtain the corresponding measurement states of the updated quantum molecules and calculate the fitness value. The measurement state of the quantum molecule with the maximum fitness value until the \((t + 1){\text{  th}}\) iteration is updated as the global optimal solution \(\overline{\user2{\rho }}_{{{\text{best}}}}^{t + 1}\). The iteration ends when the QCRO algorithm achieves the terminal condition.
3.2 Computational complexity analysis
For the iterations of quantum molecules in QCRO, it is required to rank the kinetic energy of quantum molecules. The computational complexity is \(O(N)\). According to their kinetic energy, the quantum molecules are updated by collision, decomposition, or synthesis reactions separately. The quantum rotation angles and new quantum molecules are generated according to different reactions, with the computational complexity of \(O(2N \times L)\). These reactions also change the kinetic energy of quantum molecules, and the computational complexity is \(O(N)\). Based on (25), the measurement states of the updated quantum molecules can be obtained. The computational complexity is \(O(N \times L)\). Then, calculate the fitness value of the updated quantum molecules and update the global optimal solution of QCRO. The computational complexity is \(O(2N)\).
When the QCRO algorithm terminates after running \(t\) iterations, the computational complexity is \(O_{{{\text{iteration}}}} = O(t \times N \times (4 + 3L))\).
3.3 Process of multiplerelay selection based on QCRO
In order to tackle the MRS problem of (22) in secure massive MIMO twoway relay networks, the fitness function of QCRO algorithm is set as \(f\left( {\overline{\user2{x}}_{n}^{t} } \right) = \left\{ {\begin{array}{*{20}l} {C_{{{\text{sum}}}} (\overline{\user2{x}}_{n}^{t} ),} \hfill & {{\text{satisfy}}\;{\text{constraint}}\;{\text{conditions}}} \hfill \\ {0,} \hfill & {{\text{else}}} \hfill \\ \end{array} } \right.\). For each quantum molecule, the measurement state is corresponding to a MRS result, the global optimal solution of QCRO algorithm corresponds to the optimal MRS result. Then, the problem of finding the best MRS vector with the maximized secrecy sumrate can be transformed into finding the global optimal solution of QCRO. Based on the iteration process of QCRO, we can easily get the global optimal solution. In general, the process of MRS based on QCRO for secrecy sumrate optimization can be shown in Algorithm 1.
4 Results and discussion
Here we present the secrecy performance in the secure massive MIMO twoway relay network. We consider a twodimensional network topology where the BS and the legitimate user are located at the positions (0, 0) and (100, 0) (unit: meters), respectively, \(L\) relays are randomly located at (50, 0) with the radius of 20, and \(K\) eavesdroppers are randomly located in the system. We set \(L = 20\), \(I_{{{\text{th}}}} =  20\,{\text{dBm}}\),Â \(\xi = 3.8\), and \(M_{t} = 128\) [9]. The system bandwidth \(B = 1\,{\text{MHz}}\), and noise power spectral density \(N_{0} =  174\,{\text{dBm/Hz}}\) [7]. To reduce the implementation complexity, maximum ratio transmission (MRT) and maximum ratio combining (MRC) methods are adopted at the BS for precoding and receiving [6]. The comparisons of the proposed QCRO algorithm, existing intelligent algorithms and relay selection strategies are presented in the first part. For the second part, we illustrate the impact on the secrecy sumrate of the cooperative transmission mode based on QCRO algorithm with various system parameters. All results are the average of 200 MonteCarlo simulations.
4.1 Performance comparisons with QCRO
The comparisons of QCRO algorithm, particle swarm optimization (PSO) algorithm [40], chemical reaction optimization (CRO) algorithm [39], singlerelay selection (SRS) strategy [32], and random multiplerelay selection (RMRS) strategy on the secrecy performance are presented in this section. To tackle the MRS problem of (22), the PSO, CRO, SRS, and RMRS adopt the same fitness function as QCRO. The specific operations of PSO, CRO, and SRS are depicted in [40], [39], and [32],Â respectively. For the SRS, only one relay is selected to forward the received signal, while other relays transmits jamming signals. For the RMRS, all relays are randomly predefined as helper or jammer. To facilitate comparison, we set the maximum number of iterations for QCRO, PSO, and CRO algorithms to the same value, and all these algorithms are set to the same population size. The other parameters of PSO and CRO algorithms are set to the optimal values cited in [40] and [39],Â respectively. For QCRO algorithm, all quantum bits are initialized to 0.5 and the initial kinetic energy each quantum molecule is set to 1000. The parameter settings of QCRO algorithm are shown in Table 2.
The convergence performance of QCRO algorithm, PSO algorithm, CRO algorithm, SRS, and RMRS strategies are presented in Fig.Â 2 with \(p_{BS} = 35\,{\text{dBm}}\), \(p_{u} = 30\,{\text{dBm}}\), \(p_{\max } = 30\,{\text{dBm}}\), and \(K = 1\). For the MRS problem, both PSO and CRO fall into the local optimum. We observe that QCRO algorithm has a rather fast convergence speed (converges after 30 iterations) and a higher convergent accuracy throughout the iterations. The reason is that QCRO algorithm combines the merit of chemical reaction process and the thought of quantum intelligence computation theory. In QCRO, the quantum molecules are updated via different quantum evolution strategies of collision, decomposition, and synthesis. The designed quantum evolution strategies can make full use of the interactions of quantum molecules, which increases the diversity of solutions. In addition, the searching speed and searching accuracy can be greatly improved by designing new quantum evolutionary rules (28) and (29). Simulation result shows that QCRO has strong search ability and ideal convergence compared with other algorithms. The results also illustrate that the prominent advantage of QCRO over the SRS and RMRS strategies on secrecy sumrate in a massive MIMO system.
The secrecy performance of QCRO, PSO, CRO, RMRS and SRS with the variation of \(p_{BS}\), \(p_{u}\), \(p_{\max }\), and \(K\) are shown in Figs. 3, 4, 5, and 6. In Fig.Â 3, for most strategies, the secrecy sumrate of the massive MIMO system increases along with \(p_{BS}\). For QCRO, the rising tendency begins to slow down when \(p_{BS}\) is over 15Â dBm. This phenomenon is caused by information leakage. Since the eavesdropper tries to intercept the desired signals during the information transmission process, the signal strength received at the eavesdropper will become stronger as \(p_{BS}\) increases. According to (3) and (13), the eavesdropper may obtain more information from the BS in a higher \(p_{BS}\). When the level of \(p_{BS}\) exceeds a certain threshold, the increment of the eavesdropping rate will be greater than that of legitimate transmission rate, which will lead to the reduction of secrecy sumrate. From the simulation result, we can conclude that the secrecy sumrate may tends to decrease when \(p_{BS}\) is over 25Â dBm. Compared with other schemes, QCRO can achieve the highest secrecy sumrate in any \(p_{BS}\).
FiguresÂ 4 and 5 illustrate the impact of different transmit power of the user and maximum transmit power of the cooperative relays on the security performance. For all strategies in Fig.Â 4, a higher secrecy sumrate can be achieved by increasing \(p_{u}\). The results in Fig.Â 5 also illustrate that increasing \(p_{\max }\) can boost the security performance. The reason is that a larger \(p_{\max }\) will permit relays to broadcast the signals at a higher transmission power under certain interference conditions. After selfinterference elimination, the increment of SINR at the legitimate devices is higher than that of the eavesdroppers.
The impact of different number of eavesdroppers on the secrecy sumrate is presented in Fig.Â 6. The result shows that the existence of eavesdroppers has an adverse effect on the secrecy performance, and the information leakage increases along with \(K\). That is because by increasing \(K\), the probability of emerging an eavesdropper with a higher channel gain increases accordingly. For the noncolluding eavesdroppers, the information leakage is determined by the maximum received SINR at the eavesdroppers during the two transmission phases. From Figs. 3, 4, 5, and 6, we conclude that QCRO has great advantages over other strategies in improving the communication security of secure massive MIMO twoway relay networks.
4.2 Impact of different system parameters
The performance of the proposed cooperative transmission mode based on QCRO algorithm in different \(p_{u}\) and \(p_{BS}\) is studied in Fig.Â 7, where \(p_{u}\) increases from 0 to 40Â dBm, \(p_{BS}\)â€‰=â€‰0Â dBm, 3Â dBm, 5Â dBm, and 10Â dBm, respectively. From the simulations, the system can obtain a higher secrecy sumrate with a larger level of \(p_{u}\) at first. But when \(p_{u}\) is over 30Â dBm, the increment of secrecy sumrate begins to slow down. For the cases of \(p_{BS}\)â€‰=â€‰3Â dBm, 5Â dBm, and 10Â dBm, the secrecy sumrate decreases with \(p_{u}\) when \(p_{u}\) is over 35Â dBm. The reason is that the SINR received at the eavesdropper increases with \(p_{u}\), which may cause more information leakage. Hence, we can appropriately increase \(p_{BS}\) to confuse the eavesdroppers.
In Fig.Â 8, we investigate the impact of different \(p_{\max }\) and \(p_{u}\) levels with \(p_{\max }\) varying from 0 to 40Â dBm, \(p_{u}\)â€‰=â€‰0Â dBm, 5Â dBm, 10Â dBm, 20Â dBm, and 30Â dBm, respectively. From the simulations, the increasing trend of secrecy sumrate with \(p_{u}\) is in accordance with the results of Fig.Â 4. We also observe that both higher levels of \(p_{\max }\) and \(p_{u}\) can help boost the communication security. The reason is that a higher \(p_{\max }\) can permit each relay to use more power for its own transmission. With the increment of \(p_{\max }\), the desired terminals can obtain higher transmission rates than that of the eavesdroppers according to the SIC criterion.
The influence of \(p_{BS}\) and number of eavesdroppers are studied in Fig.Â 9. In simulations, \(p_{BS}\) varying from â€“Â 10 to 20Â dBm, and \(K\)â€‰=â€‰1, 3, 10, 20, respectively. The results indicate that a larger number of eavesdroppers can cause more information leakage, which jeopardizes the communication security of massive MIMO system. For a certain value of \(K\), we can see that the secrecy sumrate increases with \(p_{BS}\) at first. However, the growth starts to slow down as \(p_{BS}\) increases. Take \(K = 1\) as an example, there is a dropping trend in the secrecy sumrate when \(p_{BS}\) is over 15Â dBm. Since the eavesdropper may intercept more information from the BS at a higher \(p_{BS}\), when the increment of the eavesdropping rate exceeds the increment of legitimate transmission rate, the secrecy sumrate will no longer increase with \(p_{BS}\). Therefore, appropriate \(p_{BS}\) plays a significant role in improving the secrecy sumrate.
The influence of different \(p_{\max }\) and \(L\) in single and multiple eavesdropper cases are investigated in Fig.Â 10. We consider \(K = 1\) and \(K = 10\), \(p_{\max }\) varies fromâ€‰âˆ’â€‰10Â to 20Â dBm, and \(L\) increases from 5 to 20. The simulation results indicate that both higher \(p_{\max }\) and more relays can boost the transmission security. Obviously, the secrecy sumrate in the case of single eavesdropper is higher than that of multiple eavesdroppers.
5 Conclusions
In this paper, we have designed a cooperative transmission mode to achieve the tradeoff between the communication security and reliability in a massive MIMO system with twoway relay cooperation. Based on the multiplerelay collaboration strategy, some relays function as helper while other relays act as jammer to against the interception of eavesdroppers. Considering the system capacity, energy conservation, and QoS requirements, we have formulated the MRS problem in a secure massive MIMO twoway relay network. Then, we have introduced the implementation of multiplerelay collaboration strategy based on QCRO to optimize the secrecy sumrate and simulation results have demonstrated its effectiveness in different communication scenarios. In future research, we will incorporate the efforts of this work with energy harvesting, network slicing, and ultradense heterogeneous networks to meet the increasing demands of future wireless communication systems.
Availability of data and materials
All data generated or analysed during this study are included in this article.
Abbreviations
 IoE:

Internet of Everything
 MIMO:

Multipleinput multipleoutput
 BS:

Base station
 QCRO:

Quantum chemical reaction optimization
 QoS:

Quality of service
 DT:

Direct transmission
 OWR:

Oneway relaying
 TWR:

Twoway relaying
 MRS:

Multiplerelay selection
 CSI:

Channel state information
 TDD:

Timedivision duplexed
 CRCJ:

Cooperative relaying and cooperative jamming
 AWGN:

Additive white Gaussian noise
 SINR:

Signaltointerference plus noise ratio
 SIC:

Selfinterference cancellation
 CRO:

Chemical reaction optimization
 KE:

Kinetic energy
 MRT:

Maximum ratio transmission
 MRC:

Maximum ratio combining
 PSO:

Particle swarm optimization
 SRS:

Singlerelay selection
 RMRS:

Random multiplerelay selection
References
S. Verma, S. Kaur, M.A. Khan et al., Toward green communication in 6Genabled massive Internet of Things. IEEE Internet Things J. 8(7), 5408â€“5415 (2021)
D.C. Nguyen, M. Ding, P.N. Pathirana et al., 6G Internet of Things: A comprehensive survey. IEEE Internet Things J. 9(1), 359â€“383 (2022)
P. Yang, Y. Xiao, M. Xiao et al., 6G wireless communications: Vision and potential techniques. IEEE Netw. 33(4), 70â€“75 (2019)
H. Viswanathan, P.E. Mogensen, Communications in the 6G era. IEEE Access 8, 57063â€“57074 (2020)
L. Zhang, Y.C. Liang, D. Niyato, 6G visions: Mobile ultrabroadband, super InternetofThings, and artificial intelligence. China Commun. 16(8), 1â€“14 (2019)
H.Y. Gao, Y.M. Su, S.B. Zhang et al., Joint antenna selection and power allocation for secure cotime cofrequency fullduplex massive MIMO systems. IEEE Trans. Veh. Technol. 70(1), 655â€“665 (2021)
A. Zappone, L. Sanguinetti, G. Bacci, E. Jorswieck et al., Energyefficient power control: a look at 5G wireless technologies. IEEE Trans. Signal Process. 64(7), 1668â€“1683 (2016)
B.M. Lee, Cellfree massive MIMO for massive lowpower Internet of Things networks. IEEE Internet Things J. 9(9), 6520â€“6535 (2022)
H.Y. Gao, Y.M. Su, S.B. Zhang et al., Antenna selection and power allocation design for 5G massive MIMO uplink networks. China Commun. 16(4), 1â€“15 (2019)
B.M. Lee, H. Yang, Energyefficient massive MIMO in massive industrial Internet of Things networks. IEEE Internet Things J. 9(5), 3657â€“3671 (2022)
L.X. Li, A.P. Petropulu, Z. Chen, MIMO secret communications against an active eavesdropper. IEEE Trans. Inf. Forensic Secur. 12(10), 2387â€“2401 (2017)
K.W. Jiang, T. Jing, Y. Huo et al., SICbased secrecy performance in uplink NOMA multieavesdropper wiretap channels. IEEE Access 6, 19664â€“19680 (2018)
S.Y. Liu, Y. Hong, E. Viterbo, Unshared secret key cryptography. IEEE Trans. Wirel. Commun. 13(12), 6670â€“6683 (2014)
S.X. Wang, W. Li, J. Lei, Physicallayer encryption in massive MIMO systems with spatial modulation. China Commun. 15(10), 159â€“171 (2018)
I. Grigg, P. Gutmann, The curse of cryptographic numerology. IEEE Secur. Priv. 9(3), 70â€“72 (2011)
R. Zi, J. Liu, L. Gu et al., Enabling security and high energy efficiency in the Internet of Things with massive MIMO hybrid precoding. IEEE Internet Things J. 6(5), 8615â€“8625 (2019)
Y.O. Basciftci, C.E. Koksal, A. Ashikhmin, Physicallayer security in TDD massive MIMO. IEEE Trans. Inf. Theory 64(11), 7359â€“7380 (2018)
F.C. Zhu, F.F. Gao, H. Lin et al., Robust beamforming for physical layer security in BDMA massive MIMO. IEEE J. Sel. Areas Commun. 36(4), 775â€“787 (2018)
Y.P. Wu, R. Schober, D.W.K. Ng et al., Secure massive MIMO transmission with an active eavesdropper. IEEE Trans. Inf. Theory 62(7), 3880â€“3900 (2016)
W. Xu, B. Li, L. Tao et al., Artificial noise assisted secure transmission for uplink of massive MIMO systems. IEEE Trans. Veh. Technol. 70(7), 6750â€“6762 (2021)
A. Kuhestani, A. Mohammadi, M. Mohammadi, Joint relay selection and power allocation in largescale MIMO systems with untrusted relays and passive eavesdroppers. IEEE Trans. Inf. Forensic Secur. 13(2), 341â€“355 (2018)
Y.L. Zou, X.B. Wang, W.M. Shen et al., Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63(6), 2653â€“2661 (2014)
C. Wang, H.M. Wang, X.G. Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans. Wirel. Commun. 14(2), 589â€“605 (2015)
J. Chen, X.M. Chen, T. Liu et al., Toward green and secure communications over massive MIMO relay networks: joint source and relay power allocation. IEEE Access 5, 869â€“880 (2017)
D. Kudathanthirige, S. Timilsina, G.A.A. Baduge, Secure communication in relayassisted massive MIMO downlink with active pilot attacks. IEEE Trans. Inf. Forensic Secur. 14(11), 2819â€“2833 (2019)
T.M. Hoang, T.Q. Duong, H.D. Tuan et al., Secure massive MIMO relaying systems in a Poisson field of eavesdroppers. IEEE Trans. Commun. 65(11), 4857â€“4870 (2017)
X.M. Chen, J. Chen, T. Liu, Secure transmission in wireless powered massive MIMO relaying systems: performance analysis and optimization. IEEE Trans. Veh. Technol. 65(10), 8025â€“8035 (2016)
T. Mekkawy, R.G. Yao, N. Qi et al., Secure relay selection for two way amplifyandforward untrusted relaying networks. IEEE Trans. Veh. Technol. 67(12), 11979â€“11987 (2018)
D. Wang, B. Bai, W. Chen et al., Secure green communication via untrusted twoway relaying: A physical layer approach. IEEE Trans. Commun. 64(5), 1861â€“1874 (2016)
K. Lee, J.P. Hong, H.H. Choi et al., Wirelesspowered twoway relaying protocols for optimizing physical layer security. IEEE Trans. Inf. Forensic Secur. 14(1), 162â€“174 (2019)
J.C. Chen, R.Q. Zhang, L.Y. Song et al., Joint relay and jammer selection for secure twoway relay networks. IEEE Trans. Inf. Forensic Secur. 7(1), 310â€“320 (2012)
C.S. Zhang, J.H. Ge, F.K. Gong et al., Improving physicallayer security for wireless communication systems using dualityaware twoway relay cooperation. IEEE Syst. J. 13(2), 1241â€“1249 (2019)
C.S. Zhang, J.H. Ge, J. Li, F.K. Gong et al., Complexityaware relay selection for 5G largescale secure twoway relay systems. IEEE Trans. Veh. Technol. 66(6), 5462â€“5466 (2017)
B. Dutta, R. Budhiraja, R.D. Koilpillai et al., Analysis of quantized MRCMRT precoder for FDD massive MIMO twoway AF relaying. IEEE Trans. Commun. 67(2), 988â€“1003 (2019)
J.J. Feng, S.D. Ma, G.H. Yang et al., Power scaling of fullduplex twoway massive MIMO relay systems with correlated antennas and MRC/MRT processing. IEEE Trans. Wirel. Commun. 16(7), 4738â€“4753 (2017)
J.Y. Zhang, X.P. Xue, E. Bjornson et al., Spectral efficiency of multipair massive MIMO twoway relaying with hardware impairments. IEEE Wirel. Commun. Lett. 7(1), 14â€“17 (2018)
X. Pan, L. Guo, C. Dong, et al., in Proc. IEEE International Conference on Communications (ICC), Secure multipair massive MIMO twoway amplifyandforward relay network with power allocation scheme (IEEE, Paris, 2017), pp. 1â€“5.
R. Hamdi, E. Driouch, W. Ajib, Energy management in hybrid energy largescale MIMO systems. IEEE Trans. Veh. Technol. 66(11), 10183â€“10193 (2017)
Y. Liu, H. Zhang, K. Long et al., Fog computing vehicular network resource management based on chemical reaction optimization. IEEE Trans. Veh. Technol. 70(2), 1770â€“1781 (2021)
X. Liu, Z. Li, P. Xu et al., Joint optimization for bandwidth utilization and delay based on particle swarm optimization. IEEE Access 9, 92125â€“92133 (2021)
Acknowledgements
The authors would like to acknowledge the anonymous reviewers and editors for their efforts in valuable comments and suggestions.
Funding
This work was supported by the National Natural Science Foundation of China (No. 61571149), the Special China Postdoctoral Science Foundation (2015T80325), Fundamental Research Funds for the Central Universities (HEUCFP201808 and HEUCF190801), and the China Postdoctoral Science Foundation (2013M530148).
Author information
Authors and Affiliations
Contributions
YS conceived of the study, and participated in its network design, and was a major contributor in writing the manuscript. HG mainly provided the guidance for deriving these expressions. SZ carried out experiments and theoretical analysis. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Su, Y., Gao, H. & Zhang, S. Secure massive MIMO system with twoway relay cooperative transmission in 6G networks. J Wireless Com Network 2023, 73 (2023). https://doi.org/10.1186/s13638023022801
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638023022801