
Physical layer security (PLS) has been shown to hold promise as a new
paradigm for securing wireless links. In contrast with the conventional
cryptographic techniques, PLS methods exploit the random fading in wireless
channels to provide link security. As the channel dynamics prevent a constant
rate of secure communications between the legitimate terminals, the outage
probability of the achievable secrecy rate is used as a measure of the secrecy
performance. This work investigates the secrecy outage probability of a
simultaneous wireless information and power transfer (SWIPT) system, which
operates in the presence of multiple eavesdroppers that also have the energy
harvesting capability. The loss in secrecy performance due to eavesdropper
collusion, i.e., information sharing between the eavesdroppers to decode the
secret message, is also analyzed. We derive closedform expressions for the
secrecy outage probability for Nakagami$m$ fading on the links and imperfect
channel estimation at the receivers. Our analysis considers different
combinations of the separated and the integrated SWIPT receiver architectures
at the receivers. Numerical results are provided to validate our analysis.

Cellfree massive multipleinput multipleoutput (MIMO) is a potential key
technology for fifth generation wireless communication networks. A mixed
qualityofservice (QoS) problem is investigated in the uplink of a cellfree
massive MIMO system where the minimum rate of nonreal time users is maximized
with per user power constraints whilst the rate of the realtime users (RTUs)
meet their target rates. First an approximated uplink user rate is derived
based on available channel statistics. Next, the original mixed QoS problem is
formulated in terms of receiver filter coefficients and user power allocations
which can iteratively be solved through two subproblems, namely, receiver
filter coefficient design and power allocation, which are dealt with using a
generalized eigenvalue problem and geometric programming, respectively.
Numerical results show that with the proposed scheme, while the rates of RTUs
meet the QoS constraints, the $90\%$likely throughput improves significantly,
compared to a simple benchmark scheme.

The problem of user scheduling with reduced overhead of channel estimation in
the uplink of Massive multipleinput multipleoutput (MIMO) systems has been
considered. A geometrybased stochastic channel model (GSCM), called the COST
2100 channel model has been used for realistic analysis of channels. In this
paper, we propose a new user selection algorithm based on knowledge of the
geometry of the service area and location of clusters, without having full
channel state information (CSI) at the base station (BS). The multiuser link
correlation in the GSCMs arises from the common clusters in the area. The
throughput depends on the position of clusters in the GSCMs and users in the
system. Simulation results show that although the BS does not require the
channel information of all users, by the proposed geometrybased user
scheduling algorithm the sumrate of the system is only slightly less than the
wellknown greedy weight clique scheme. Finally, the robustness of the proposed
algorithm to the inaccuracy of cluster localization is verified by the
simulation results.

In this paper, we consider the maxmin signaltointerference plus noise
ratio (SINR) problem for the uplink transmission of a cellfree Massive
multipleinput multipleoutput (MIMO) system. Assuming that the central
processing unit (CPU) and the users exploit only the knowledge of the channel
statistics, we first derive a closedform expression for uplink rate. In
particular, we enhance (or maximize) user fairness by solving the maxmin
optimization problem for user rate, by power allocation and choice of receiver
coefficients, where the minimum uplink rate of the users is maximized with
available transmit power at the particular user. Based on the derived
closedform expression for the uplink rate, we formulate the original user
maxmin problem to design the optimal receiver coefficients and user power
allocations. However, this maxmin SINR problem is not jointly convex in terms
of design variables and therefore we decompose this original problem into two
subproblems, namely, receiver coefficient design and user power allocation. By
iteratively solving these subproblems, we develop an iterative algorithm to
obtain the optimal receiver coefficient and user power allocations. In
particular, the receiver coefficients design for a fixed user power allocation
is formulated as generalized eigenvalue problem whereas a geometric programming
(GP) approach is utilized to solve the power allocation problem for a given set
of receiver coefficients. Numerical results confirm a threefold increase in
system rate over existing schemes in the literature.

We consider a cellfree Massive multipleinput multipleoutput (MIMO) system
and investigate the system performance for the case when the quantized version
of the estimated channel and the quantized received signal are available at the
central processing unit (CPU), and the case when only the quantized version of
the combined signal with maximum ratio combining (MRC) detector is available at
the CPU. Next, we study the maxmin optimization problem, where the minimum
user uplink rate is maximized with backhaul capacity constraints. To deal with
the maxmin nonconvex problem, we propose to decompose the original problem
into two subproblems. Based on these subproblems, we develop an iterative
scheme which solves the original maxmin user uplink rate. Moreover, we present
a user assignment algorithm to further improve the performance of cellfree
Massive MIMO with limited backhaul links.

This paper investigates a secure energy efficiency (SEE) optimization problem
in a multipleinput singleoutput (MISO) underlay cognitive radio (CR) network.
In particular, a multiantenna secondary transmitter (SUTx) simultaneously
sends secured information and energy to a secondary receiver (SURx) and an
energy receiver (ER), respectively, in the presence of a primary receiver
(PURx). It is assumed that the SURx, ER and PURx are each equipped with a
single antenna. In addition, the SUTx should satisfy constraints on maximum
interference leakage to the PURx and minimum harvested energy at the ER. In
this CR network, we consider the transmit covariance matrix design with the
assumption of perfect channel state information (CSI) at the SUTx. In
addition, it is assumed that the ER is a potential passive eavesdropper due to
broadcast nature of wireless transmission. On the other hand, we consider the
worstcase scenario that ER's energy harvesting requirement is only satisfied
when it performs only energy harvesting without intercepting or eavesdropping
information intended for the SURx. We formulate this transmit covariance
matrix design as a SEE maximization problem which is a nonconvex problem due
the nonlinear fractional objective function. To realize the solution for this
nonconvex problem, we utilize the nonlinear fractional programming and
difference of concave (DC) functions approaches to reformulate into a tractable
form. Based on these techniques and the Dinkelbach's method, we propose
iterative algorithms to determine the solution for the original SEE
maximization problem. Numerical simulation results are provided to demonstrate
the performance of the proposed transmit covariance matrix design and
convergence of the proposed algorithms.

In this paper, we propose a device to device (D2D) communication scenario
underlaying a cellular network where both D2D and cellular users (CUs) are
discrete powerrate systems with limited feedback from the receivers. It is
assumed that there exists an adversary which wants to eavesdrop on the
information transmission from the base station (BS) to CUs. Since D2D
communication shares the same spectrum with cellular network, cross
interference must be considered. However, when secrecy capacity is considered,
the interference caused by D2D communication can help to improve the secrecy
communications by confusing the eavesdroppers. Since both systems share the
same spectrum, cross interference must be considered. We formulate the proposed
resource allocation into an optimization problem whose objective is to maximize
the average transmission rate of D2D pair in the presence of the cellular
communications under average transmission power constraint. For the cellular
network, we require a minimum average achievable secrecy rate in the absence of
D2D communication as well as a maximum secrecy outage probability in the
presence of D2D communication which should be satisfied. Due to high complexity
convex optimization methods, to solve the proposed optimization problem, we
apply Particle Swarm Optimization (PSO) which is an evolutionary approach.
Moreover, we model and study the error in the feedback channel and the
imperfectness of channel distribution information (CDI) using parametric and
nonparametric methods. Finally, the impact of different system parameters on
the performance of the proposed scheme is investigated through simulations. The
performance of the proposed scheme is evaluated using numerical results for
different scenarios.

In this letter, we propose a robust beamforming design for nonorthogonal
multiple access (NOMA) based multipleinput singleoutput (MISO) downlink
systems. In particular, the robust power minimization problem is studied with
imperfect channel state information (CSI), where the beamformers are designed
by incorporating normbounded channel uncertainties to provide the required
quality of service at each user. This robust scheme is developed based on the
worstcase performance optimization framework. In terms of beamforming vectors,
the original robust design is not convex and therefore, the robust beamformers
cannot be obtained directly. To circumvent this nonconvex issue, the original
intractable problem is reformulated into a convex problem, where the nonconvex
constraint is converted into a linear matrix inequality (LMI) by exploiting
SProcedure. Finally, simulation results are provided to demonstrate the
effectiveness of the proposed robust design.

This paper investigates the optimal power allocation scheme for sum
throughput maximization of nonorthogonal multiple access (NOMA) system with
$\alpha$fairness. In contrast to the existing fairness NOMA models,
$\alpha$fairness can only utilize a single scalar to achieve different user
fairness levels. Two different channel state information at the transmitter
(CSIT) assumptions are considered, namely, statistical and perfect CSIT. For
statistical CSIT, fixed target data rates are predefined, and the power
allocation problem is solved for sum throughput maximization with
$\alpha$fairness, through characterizing several properties of the optimal
power allocation solution. For perfect CSIT, the optimal power allocation is
determined to maximize the instantaneous sum rate with $\alpha$fairness, where
user rates are adapted according to the instantaneous channel state information
(CSI). In particular, a simple alternate optimization (AO) algorithm is
proposed, which is demonstrated to yield the optimal solution. Numerical
results reveal that, at the same fairness level, NOMA significantly outperforms
the conventional orthogonal multiple access (MA) for both the scenarios with
statistical and perfect CSIT.

Physical layer security has been recently recognized as a promising new
design paradigm to provide security in wireless networks. In addition to the
existing conventional cryptographic methods, physical layer security exploits
the dynamics of fading channels to enhance secured wireless links. In this
approach, jamming plays a key role by generating noise signals to confuse the
potential eavesdroppers, and significantly improves quality and reliability of
secure communications between legitimate terminals. This article presents
theoretical limits and practical designs of jamming approaches for physical
layer security. In particular, the theoretical limits explore the achievable
secrecy rates of user cooperation based jamming whilst the centralized, and
game theoretic based precoding techniques are reviewed for practical
implementations. In addition, the emerging wireless energy harvesting
techniques are exploited to harvest the required energy to transmit jamming
signals. Future directions of these approaches, and the associated research
challenges are also briefly outlined.

This paper studies the secrecy rate maximization problem of a secure wireless
communication system, in the presence of multiple eavesdroppers. The security
of the communication link is enhanced through cooperative jamming, with the
help of multiple jammers. First, a feasibility condition is derived to achieve
a positive secrecy rate at the destination. Then, we solve the original secrecy
rate maximization problem, which is not convex in terms of power allocation at
the jammers. To circumvent this nonconvexity, the achievable secrecy rate is
approximated for a given power allocation at the jammers and the approximated
problem is formulated into a geometric programming one. Based on this
approximation, an iterative algorithm has been developed to obtain the optimal
power allocation at the jammers. Next, we provide a bisection approach, based
on onedimensional search, to validate the optimality of the proposed
algorithm. In addition, by assuming Rayleigh fading, the secrecy outage
probability (SOP) of the proposed cooperative jamming scheme is analyzed. More
specifically, a singleintegral form expression for SOP is derived for the most
general case as well as a closedform expression for the special case of two
cooperative jammers and one eavesdropper. Simulation results have been provided
to validate the convergence and the optimality of the proposed algorithm as
well as the theoretical derivations of the presented SOP analysis.

This paper investigates secrecy rate optimization for a multicasting network,
in which a transmitter broadcasts the same information to multiple legitimate
users in the presence of multiple eavesdroppers. In order to improve the
achievable secrecy rates, private jammers are employed to generate interference
to confuse the eavesdroppers. These private jammers charge the legitimate
transmitter for their jamming services based on the amount of interference
received at the eavesdroppers. Therefore, this secrecy rate maximization
problem is formulated as a Stackelberg game, in which the private jammers and
the transmitter are the leaders and the follower of the game, respectively. A
fixed interference price scenario is considered first, in which a closedform
solution is derived for the optimal amount of interference generated by the
jammers to maximize the revenue of the legitimate transmitter. Based on this
solution, the Stackelberg equilibrium of the proposed game, at which both
legitimate transmitter and the private jammers achieve their maximum revenues,
is then derived. Simulation results are also provided to validate these
theoretical derivations.

This paper considers transmit covariance matrix design for secrecy rate
maximization problem in a multipleinput singleoutput (MISO) multicasting
simultaneous wireless information and power transfer (SWIPT) system. In order
to enhance the performance of the system, artificial noise (AN) is added to the
transmit signal in the design for the following purposes: to reduce the
received signaltonoise ratio (SNR) at the eavesdroppers and increase the
harvested energy. We assume that all the channelstateinformation (CSI) is
perfectly known at the transmitter and all legitimate users are capable of
simultaneously receiving information and harvesting energy. In addition, all
the eavesdroppers are passive and they can harvest energy only when they are
not intercepting or eavesdropping the messages intended for the legitimate
users. The original secrecy rate maximization problem is not convex in terms of
transmit and artificial covariance matrices as well as the power splitting (PS)
ratio. In order to circumvent this nonconvexity issue, we exploit the
\emph{CharnesCooper} Transformation and semidefinite relaxation (SDR) to
convert this original problem into a convex one. However, this convex problem
does not always yield the rankone transmit and AN covariance matrices to
obtain the solution of the original problem. Therefore, we analyze the optimal
conditions and utilize a Gaussian randomization (GR) method to construct the
rankone solutions from the nonrank one results. Simulation results have been
provided to demonstrate the performance of the proposed transmit covariance
matrices design for MISO multicasting SWIPT system.