Abstract

In this paper, we consider secure transmission in the downlink of a multicell multiple-input multiple-output (MIMO) system with cells; each cell consists of an -antenna base station (BS) and single-antenna users. Coordinated beamforming (CBf) is employed for secrecy enhancement. For CBf, the BSs can jointly design their respective beamformers to control intercell interference and information leakage. Based on regularized channel inversion (RCI) precoding structures, we derive the concise formulas for the signal-to-interference-plus-noise ratio (SINR) for the legitimate users and the colluding malicious users and the achievable secrecy sum rate for the CBf. Furthermore, we obtain a novel closed-form expression of the secrecy sum in the large-system regime where and tend to infinity with a fixed ratio . Based on the large-system regime result, the regularization parameter is optimized to maximize the secrecy sum rate. It shows that the optimal regularization parameter decreases with the signal-to-noise ratio (SNR) and stays constant at high SNR if . Compared with single-cell processing (SCP) without BS cooperation, simulation results show that the secrecy performance can be significantly enhanced by exploiting CBf. The analytical results are validated with the finite-size system by simulation.

1. Introduction

Multicell multiuser multiple-input and multiple-output (MIMO) has been considered a classical scenario for 5G networks. Due to the unalterable open nature of the wireless medium, wireless multicell multiantenna communications are very susceptible to secrecy outage caused by cochannel interference and intercell information leakage. Thus, security becomes a more crucial issue in the downlink multicell MIMO systems. In addition to the widely used cryptographic approach, information-theoretic security by exploiting the physical layer to achieve perfect secrecy, known as physical layer security, has attracted attention widely [13]. The pioneering work made by Wyner introduced the wiretap channel in [4], and secrecy capacity was defined to measure the performance of physical layer security. Then, it was extended to the broadcast channel with a confidential message [5] and the Gaussian wiretap channel [6].

In recent years, wireless communication has grown rapidly due to MIMO techniques. Many studies investigated the physical layer security in MIMO wiretap channels [79], where the transmitter, the receiver, and/or the eavesdropper were equipped with multiple antennas. Physical layer security for single-cell multiuser MIMO communications was first studied in the broadcast channel, where a multiantenna BS transmitted confidential messages to multiple users at the same time. The secrecy capacity region for MIMO broadcast channel was characterized in [10, 11]. Secret communication in the single-cell multiuser MIMO systems has been elaborately studied, particularly in the downlink [1215]. The primary challenge to achieve confidential broadcasting in the single cell system is to deal with the intracell interference. Linear precoding based on regularized channel inversion (RCI) has been proven to be an effective transmission scheme to control intrauser interference [16, 17].

Most practical systems have more than one cell, e.g., the 4G and 5G wireless cellular network. When the base station (BS) in each cell uses the same frequency, the main challenge that limits the secure transmission, besides intracell interference and leakage, is the extra intercell interference and leakage; i.e., the intercell interference will cause information leakage to inter-cell malicious users, which cannot be controlled by the BS. It was shown that intercell interference could result in the secrecy outage probability to tend to 1 in high signal-to-noise ratio (SNR) regime [18]. In the existing literature, base station (BS) cooperation has been exploited to suppress the intercell interference to improve the secrecy performance in [1923]. There are two different forms of BS cooperation, namely, multicell processing (MCP) and coordinated beamforming (CBf). In the MCP, the BSs fully cooperate to share both their channel state information (CSI) and messages to transmit. However, in the CBf, the BSs only share the CSI, but they do not share the messages to transmit. Many studies, such as [1922], employed the MCP to improve the secrecy rate in multicell MIMO systems. However, the MCP needs high-capacity backhaul links, which are hard for practical settings. However, the CBf is suitable for the networks where such high-capacity backhaul links are not available. Different from the existing studies (see, e.g., [20, 22]), in our work, we exploit the CBf cooperation scheme. The coordinated beamforming was optimized in the relay networks [23, 24]. Although the authors in [19, 25] investigated the secrecy performance for multicell networks with the CBf, the two-cell special scenario was considered and the path loss was not taken into account. Hence, the results presented in [19, 25] are not directly applicable to the multicell system with M cells () studied in this paper.

In our work, we extend to study the achievable ergodic secrecy sum rate in the downlink multicell MIMO system with cells, where there are one -antenna BS and single-antenna users in each cell. We focus on the CBf scheme, and the BSs partially cooperate based on the CSI of all users. From a worst-case perspective, we assume that the unintended users in the same cell and the cross cells are regarded as malicious users, and they can collude to eavesdrop the transmitted message for the intended user. The main contributions of the work can be summarized as follows:(i)We investigate the secrecy performance in the downlink multicell () MIMO system with the CBf cooperation scheme. RCI precoding is considered to trade off the intracell and intercell interference and information leakage. Based on CBf and RCI, we derive a novel closed-form expression for the secrecy sum rate in the large-system regime, where and tend to infinity with a fixed ratio . It is sufficiently accurate for the finite-size system and can reduce the computational complexity entailed by the large-scale matrix inversions of RCI.(ii)We use the closed-form expression of the secrecy sum rate as an objective function to optimize the regularization parameter of the RCI. It shows that the regularization parameter decreases with SNR and stays constant at the high SNR if , i.e., .(iii)We also characterize the secrecy sum rate with respect to key parameters , , and . These theoretical results can provide useful insights into practical system design.

The remainder of the paper is organized as follows: Section 2 presents the system model. Sections 3 and 4 describe our main work in detail. Based on RCI precoding, we derive the achievable secrecy sum rate with coordinated beamforming. Simulation and numerical results are presented in Section 5. Section 6 gives concluding remarks.

Notations. and denote the transpose and conjugate transpose of a vector or a matrix, respectively. denotes complex-valued vector. A capital bold letter and lower bold letter represent a matrix and a vector, respectively. denotes a complex Gaussian vector with zero mean and covariance 1. denotes the expectation operation. The trace of a matrix is denoted by , denotes the inversion operator, and denotes almost sure convergence.

2. System Model

We consider the downlink of a multicell MIMO cellular network with cells. Each BS is equipped with antennas and transmits -independent confidential messages to K users at the same time. We denote the small-scale fading channel between the user k in the cell i and the BS in the cell j by row vector . We assume that the antennas at the BSs and the users are sufficiently spaced apart such that all links between the transmitter and receiver antennas are uncorrelated. We assume that the users undergo independent Rayleigh fading, where the coherence time of the channel is larger than the system interval. The Rayleigh fading is one of the most comment and effective statistical channel model for wireless communication. Many studies such as [17, 1921] (and the references therein) had considered the Rayleigh fading channel. Without loss of generality, the entries of are modeled as independent and identically distributed (i. i. d.) complex Gaussian random variables with zero mean and unit variance [19, 21], i.e., . For simplicity, we denote the typical cell as Cell 1, as shown in Figure 1. Thus, the received signal of the user in Cell 1 can be written aswhere and are the transmitted data from BS in Cell 1 and from BS in Cell , respectively. represents the path loss from the BS in the cell to the user in the cell , and is the noise at the user .

We consider the RCI precoding, which performs better than other linear precoding (i.e., zero-forcing (ZF)) [17]. The transmitted vectors and can be obtained at BS in Cell 1 and in Cell by performing a linear processing on the vector of confidential messages and , respectively. It is assumed that the messages to be transmitted to each user are independent identically distributed, satisfying and . The same power constraint for each BS is considered.

For conventional downlink cellular networks, single-cell processing (SCP) is employed, i.e., each BS serves its own users with the out-of-cell interference being treated as noise. For the CBf scheme, each BS sends messages to users in its own cell, as done in SCP, but the CSI is shared among BSs. Taking the intercell interference into consideration, the BSs can do a beamformer-lever coordination. Thus, for Cell 1 and Cell , the transmitted data vectors and can be expressed aswhere is a constant chosen to satisfy the per-BS power constraint , which can be expressed by

For the CBf, the base stations cooperate with each other and design their transmit beamformers in a coordinated manner. We are interested in RCI precoding, and the beamforming vector is given by [25]where is the regularized parameter. Define as the normalized regularization parameter, whose function is to achieve a tradeoff between the signal power at the legitimate user and the interference from the other users in the same cell. So, (5) can be rewritten as

Similarly, the beamforming vector in the cell is given by

3. Achievable Secrecy Sum Rate with Coordination Beamforming

In this section, we derive the achievable secrecy sum rate by using the RCI precoder with CBf scheme in the downlink multicell MIMO systems.

3.1. SINR at a Legitimate User

We consider a legitimate user in the reference Cell 1. Due to RCI precoding, the user k receives intracell interference caused by the other messages transmitted by the BS in Cell 1 and intercell interference caused by the messages transmitted by the BS in other Cell . The SINR of the user in Cell 1 can be expressed as

For brevity in the following presentation, we denote

By plugging the beamforming vectors and in (6) and (7) into (8), we can write the numerator of the excluding as

In denominator, the terms and can be expanded as follows:

By applying the matrix inversion lemma [22], we know thatwhere is with the row removed.

Thus, we can rewrite and as follows:

Thus, the can be rewritten as

3.2. SINR at the Eavesdropper

We assume that for each legitimate user, its confidential message can be eavesdropped by other users in the same cell and the users in the other cells, i.e., the remaining users act maliciously as eavesdroppers. From a worst-case perspective, we take into account collusion amongst the malicious users, i.e., the cooperative eavesdroppers are able to cancel the interference, leaving only the signal for the intended user. The consideration of the worst-case scenario is motivated by the fact that the malicious behaviors of the potential eavesdropper in the network are not fully controllable or predictable at the BSs. The consideration of the worst-case scenario is widely adopted in broadcasting networks (e.g., [17, 19, 20, 23]). Furthermore, we clarify that intentionally sharing the received messages by potential eavesdroppers does not disobey the rule of confidential broadcasting. This is due to the fact that the BSs are required to securely transmit messages to each user but do not control the user behaviors after receiving messages. Thus, the SINR for the colluding eavesdropper can be expressed as

3.3. Ergodic Secrecy Rate

The ergodic secrecy rate for the typical user in the Cell 1 can be obtained aswhere denotes the mean operator.

In order to obtain the ergodic secrecy sum rate, we need to know the distributions of and , which are complicated and hard to derive [17]. We instead consider deriving the nonrandom equivalents for and in the large system limit. The number of antennas at the BS and the number of users in each cell K both grow large together, while their ratio (also known as cell load) remains a constant. So we can obtain the closed-form expression of the secrecy sum rate in a large-system limit.

4. Large-System Analysis

In this section, we first derive the expressions for the for the legitimate user and the colluding malicious users with the CBf in the large-system limit. The large-system results do not depend on the channel realizations and thus can eliminate the computational complexity incurred by Monte Carlo simulations. Many studies, e.g., [13, 14, 17], have exploited the approach and shown that the large-system result can provide useful insights into the secrecy performance for the finite-size system.

We obtain the following propositions.

Proposition 1. Let and be the solution of . In the large-system limit, the with CBf given in (18) converges in probability to a deterministic quantity given by

Proof. See the appendix.
By substituting (21) and (22) into (20), it is easy to obtain the following proposition.

Proposition 2. Based on RCI precoding, the secrecy sum rate with CBf can be obtained in the large-system regime asThe value of has a significant impact on the secrecy sum rate in the large-system regime. To obtain the optimal regularization parameter that maximizes the secrecy sum-rate, we can take the derivative of the asymptotic in (23) with respect to to zero, i.e.,The closed-form expression for the value of is mathematically intractable, but it can be easily found numerically using the closed-form expression in (A.11).
In order to gain some insight for system design and analysis, similar to [20], we adopt a simplified path loss model, i.e.,where denotes the intercell interference factor.
For the simplified model, the secrecy sum rate with CBf can be further written as

Remark 1. Proposition 2 provides the novel closed-form expression of the secrecy sum rate in the large-system limit with CBf cooperation scheme. The expression can reduce the complexity of system design and analysis incurred by Monte Carlo simulation. We can evaluate and optimize the secrecy performance with respect to the key parameters effectively.

Remark 2. The secrecy sum rate contains the parameter, which characterize the impact of the path loss (or equivalently, the cross-cell interference level) on the secrecy performance.

5. Numerical Results

In this section, we evaluate the secrecy performance of the considered multicell MIMO system with CBf. In order to gain some insight for system analysis, we only consider the small-scale fading channel. The simulation results for the ergodic secrecy rate of the user in Cell 1 in (22) are averaged over 3,000 random channel realizations.

Figures 2 and 3 illustrate the per-antenna secrecy sum rate for different values of the regularization parameter and SNR and examine the impact of on the large-system secrecy sum rate. and are considered, respectively. It is obvious there exists an optimal value of the regularization parameter that maximizes the secrecy sum rate. can be numerically obtained from the plots. We find that decreases with . In particular, converges to a constant value at a high transmit SNR when , i.e., the cell load , as shown in Figure 3.

Figure 4 shows the per-antenna secrecy sum rate versus the transmit SNR for the CBf with . Different number of users , i.e., the cell load , are considered. For SCP without cooperation, the intercell interference and information leakage cannot be suppressed effectively by the BS, which results in nonpositive secrecy sum rate. By exploiting the CBf, a significant performance gain in the secrecy sum rate can be obtained with a beamformer-level coordination. It shows that the secrecy sum rate monotonically increases with if but becomes zero at high if . The results are reasonable. When , i.e., , there is not sufficient spacial degrees of freedom to cancel the intercell interference with CBf. This implies that more antennas are required for the BS if M is large. Our large-system analytical results are proved to be accurate at lower values of SNR by simulation. The loss of accuracy at high SNR mainly comes from the limitations of the large-system assumption in the finite-size systems.

Figure 5 further compares the secrecy sum rate for different values of and . It shows that the large-system results are pretty accurate even at lower values of N and K. This means that the large-system result is sufficiently accurate for finite size systems, which can reduce the complexity of system design and analysis. In addition, the secrecy performance of RCI precoding is better than that of ZF precoding, especially at lower SNR, but the secrecy performance of ZF approached that of RCI at an asymptotically high SNR.

Figure 6 shows the secrecy sum rate with the CBf for different number of users per cell. Different number of cells , and the number of antennas at BS are considered. The secrecy sum rate first monotonically increases with value of and then monotonically decreases to zero as increases. Similar to Figure 4, for , the secrecy rate monotonically increases with value of . However, for the case of , the intercell interference cannot be sufficiently well suppressed by CBf and the smaller secrecy rate will be achieved for large . There exists an optimal value of to achieve the maximal secrecy sum rate, and the optimal value of for is smaller than that for . Furthermore, the secrecy sum rate decreases fast for higher and the power allocation becomes an important factor affecting the secrecy sum rate for higher SNR.

6. Conclusion

In this paper, we considered a multicell MIMO system with CBf for secure downlink transmission. For CBf, the BSs can jointly design their beamforming matrix to control intercell interference and information leakage. Based on RCI precoding, we derived the ergodic secrecy sum rate and obtained its closed-form expression in the large-system regime. Based on the results, we optimized the regularization parameter that maximized the secrecy sum rate. The analytical expression allowed us to gain significant insight into the impact of the system parameters on performance. The analysis in this paper focused on the perfect CSI. Generalizing the results to the case of imperfect CSI is part of our going research effort.

Appendix

Proof of Proposition 1

Proof. For the clarity in presentation, we first list two important results in a random matrix to derive Proposition 1.

Lemma A.1. (see [26]). Let be a deterministic complex matrix with uniformly bounded spectral radius for all N. Let , where the are i. i. d. with zero mean and unit variance. Let be a similar vector independent of . Then, we have

Theorem A.1. (see [26]). Let be a random matrix with independent entries which are zero mean and variance , such that are uniformly bounded from above. For each , letbe the variance profile function given bySuppose that converges uniformly to a limiting bounded function . Then, for each , and ,where satisfies

Moreover, almost surely, the empirical eigenvalue distribution of converges weakly to a limiting distribution whose Stieltjes transform is given by .

Following Lemma A.1, in (12) converges (almost surely) to

By applying rank-1 perturbation lemma [27], we have

Let ; then, ; we havewhere is the empirical eigenvalue distribution of . By applying Theorem A.1, the distribution converges almost surely to a limiting distribution F whose Stieltjes transform is as follows:where

Let be the positive solution of , and we have [17]

Similarly, by applying rank-1 perturbation lemma twice, we can obtain

Since , as a result, we have .

We observe that converges almost surely to

By following the same steps, we observe that converges almost surely to

Meanwhile, we have . Thus, we obtain

Thus, power constraints converge surely to

By making the derivative with respect to at both sides of (A.11), we can obtain

To sum up, we can express the limiting SINR for legitimate user as

The limiting SINR for the colluding eavesdroppers is given by

Data Availability

The simulation code data used to support the findings of this study are available from the corresponding author (Juan Bai, e-mail: b_juan@163.com) upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant 61601503 and 61601499.