
The rapid growth of IoT driven by recent advancements in consumer
electronics, 5G communication technologies, and cloudcomputing enabled
bigdata analytics, has recently attracted tremendous attention from both the
industry and academia. One of the major open challenges for IoT is the limited
network lifetime due to massive IoT devices being powered by batteries with
finite capacities. The lowpower and lowcomplexity backscatter communications
(BackCom), which simply relies on passive reflection and modulation of an
incident radiofrequency (RF) wave, has emerged to be a promising technology
for tackling this challenge. However, the contemporary BackCom has several
major limitations, such as short transmission range, low data rate, and
unidirectional information transmission. The article aims at introducing the
recent advances in the active area of BackCom. Specifically, we provide a
systematic introduction of the next generation BackCom covering basic
principles, systems, techniques besides IoT applications. Lastly, we describe
the IoT application scenarios with the next generation BackCom.

Information theory is a mathematical theory of learning with deep connections
with topics as diverse as artificial intelligence, statistical physics, and
biological evolution. Many primers on information theory paint a broad picture
with relatively little mathematical sophistication, while many others develop
specific application areas in detail. In contrast, these informal notes aim to
outline some elements of the informationtheoretic "way of thinking," by
cutting a rapid and interesting path through some of the theory's foundational
concepts and results. They are aimed at practicing systems scientists who are
interested in exploring potential connections between information theory and
their own fields. The main mathematical prerequisite for the notes is comfort
with elementary probability, including sample spaces, conditioning, and
expectations. We take the KullbackLeibler divergence as our most basic
concept, and then proceed to develop the entropy and mutual information. We
discuss some of the main results, including the Chernoff bounds as a
characterization of the divergence; Gibbs' Theorem; and the Data Processing
Inequality. A recurring theme is that the definitions of information theory
support natural theorems that sound ``obvious'' when translated into English.
More pithily, ``information theory makes common sense precise.'' Since the
focus of the notes is not primarily on technical details, proofs are provided
only where the relevant techniques are illustrative of broader themes.
Otherwise, proofs and intriguing tangents are referenced in liberallysprinkled
footnotes. The notes close with a highly nonexhaustive list of references to
resources and other perspectives on the field.

The coding problem for wiretap channels with causal channel state information
available at the encoder and/or the decoder is studied under the strong secrecy
criterion. This problem consists of two aspects: one is due to naive wiretap
channel coding and the other is due to onetime pad cipher based on the secret
key agreement between Alice and Bob using the channel state information. These
two aspects are closely related to each other and investigated in details from
the viewpoint of achievable rates with strong secrecy. The general wiretap
channel with various directions of channel state informations among Alice, Bob
and Eve (called the multiway channel state information) is also studied, which
includes the above systems as special cases. We provide a unified view about
wiretap channel coding with causal multiway channel state information.

We show that there is a binary subspace code of constant dimension 3 in
ambient dimension 7, having minimum distance 4 and cardinality 333, i.e., $333
\le A_2(7,4;3)$, which improves the previous best known lower bound of 329.
Moreover, if a code with these parameters has at least 333 elements, its
automorphism group is in one of $31$ conjugacy classes. This is achieved by a
more general technique for an exhaustive search in a finite group that does not
depend on the enumeration of all subgroups.

We consider Additive White Gaussian Noise channels and Discrete Memoryless
channels when the transmitter harvests energy from the environment. These can
model wireless sensor networks as well as Internet of Things. By providing a
unifying framework that works for any energy harvesting channel, we study these
channels assuming an infinite energy buffer and provide the corresponding
achievability and converse bounds on the channel capacity in the finite
blocklength regime. We additionally provide moderate deviation asymptotic
bounds as well.

This article investigates emergence and complexity in complex systems that
can share information on a network. To this end, we use a theoretical approach
from information theory, computability theory, and complex networks. One key
studied question is how much emergent complexity (or information) arises when a
population of computable systems is networked compared with when this
population is isolated. First, we define a general model for networked
theoretical machines, which we call algorithmic networks. Then, we narrow our
scope to investigate algorithmic networks that optimize the average fitnesses
of nodes in a scenario in which each node imitates the fittest neighbor and the
randomly generated population is networked by a timevarying graph. We show
that there are graphtopological conditions that cause these algorithmic
networks to have the property of expected emergent openendedness for large
enough populations. In other words, the expected emergent algorithmic
complexity of a node tends to infinity as the population size tends to
infinity. Given a dynamic network, we show that these conditions imply the
existence of a central time to trigger expected emergent openendedness.
Moreover, we show that networks with small diameter compared to the network
size meet these conditions. We also discuss future research based on how our
results are related to some problems in network science, information theory,
computability theory, distributed computing, game theory, evolutionary biology,
and synergy in complex systems.

This paper studies the effectiveness of relaying for interference mitigation
in an interferencelimited communication scenario. We are motivated by the
observation that in a cellular network, a relay node placed at the cell edge
observes a combination of intended signal and intercell interference that is
correlated with the received signal at a nearby destination, so a relaying link
can effectively allow the antennas at the relay and at the destination to be
pooled together for both signal enhancement and interference mitigation. We
model this scenario by a MIMO Gaussian relay channel with a digital
relaytodestination link of finite capacity, and with correlated noise across
the relay and destination antennas. Assuming a compressandforward strategy
with Gaussian input distribution and quantization noise, we propose a
coordinate ascent algorithm for obtaining a stationary point of the nonconvex
joint optimization of the transmit and quantization covariance matrices. For
fixed input distribution, the globally optimum quantization noise covariance
matrix can be found in closedform using a transformation of the relay's
observation that simultaneously diagonalizes two conditional covariance
matrices by congruence. For fixed quantization, the globally optimum transmit
covariance matrix can be found via convex optimization. This paper further
shows that such an optimized achievable rate is within a constant additive gap
of the MIMO relay channel capacity. The optimal structure of the quantization
noise covariance enables a characterization of the slope of the achievable rate
as a function of the relaytodestination link capacity. Moreover, this paper
shows that the improvement in spatial degrees of freedom by MIMO relaying in
the presence of noise correlation is related to the aforementioned slope via a
connection to the deterministic relay channel.

We introduce a new information theoretic measure of quantum correlations for
multiparticle systems. We use a form of multivariate mutual information  the
interaction information and generalize it to multiparticle quantum systems.
There are a number of different possible generalizations. We consider two of
them. One of them is related to the notion of quantum discord and the other to
the concept of quantum dissension. This new measure, called dissension vector,
is a set of numbers  quantumness vector. This can be thought of as a
finegrained measure, as opposed to measures that quantify some average quantum
properties of a system. These quantities quantify/characterize the correlations
present in multiparticle states. We consider some multiqubit states and find
that these quantities are responsive to different aspects of quantumness, and
correlations present in a state. We find that different dissension vectors can
track the correlations (both classical and quantum), or quantumness only. As
physical applications, we find that these vectors might be useful in several
information processing tasks. We consider the role of dissension vectors  (a)
in deciding the security of BB84 protocol against an eavesdropper and (b) in
determining the possible role of correlations in the performance of Grover
search algorithm. Especially, in the Grover search algorithm, we find that
dissension vectors can detect the correlations and show the maximum
correlations when one expects.

We study highdimensional distribution learning in an agnostic setting where
an adversary is allowed to arbitrarily corrupt an $\varepsilon$fraction of the
samples. Such questions have a rich history spanning statistics, machine
learning and theoretical computer science. Even in the most basic settings, the
only known approaches are either computationally inefficient or lose
dimensiondependent factors in their error guarantees. This raises the
following question:Is highdimensional agnostic distribution learning even
possible, algorithmically?
In this work, we obtain the first computationally efficient algorithms with
dimensionindependent error guarantees for agnostically learning several
fundamental classes of highdimensional distributions: (1) a single Gaussian,
(2) a product distribution on the hypercube, (3) mixtures of two product
distributions (under a natural balancedness condition), and (4) mixtures of
spherical Gaussians. Our algorithms achieve error that is independent of the
dimension, and in many cases scales nearlylinearly with the fraction of
adversarially corrupted samples. Moreover, we develop a general recipe for
detecting and correcting corruptions in highdimensions, that may be applicable
to many other problems.

Hybrid beamforming for frequencyselective channels is a challenging problem
as the phase shifters provide the same phase shift to all of the subcarriers.
The existing approaches solely rely on the channel's frequency response and the
hybrid beamformers maximize the average spectral efficiency over the whole
frequency band. Compared to stateoftheart, we show that substantial sumrate
gains can be achieved, both for rich and sparse scattering channels, by jointly
exploiting the frequency and time domain characteristics of the massive
multipleinput multipleoutput (MIMO) channels. In our proposed approach, the
radio frequency (RF) beamformer coherently combines the received symbols in the
time domain and, thus, it concentrates signal's power on a specific time
sample. As a result, the RF beamformer flattens the frequency response of the
"effective" transmission channel and reduces its root mean square delay spread.
Then, a baseband combiner mitigates the residual interference in the frequency
domain. We present the closedform expressions of the proposed beamformer and
its performance by leveraging the favorable propagation condition of massive
MIMO channels and we prove that our proposed scheme can achieve the performance
of fullydigital zeroforcing when number of employed phase shifter networks is
twice the resolvable multipath components in the time domain.

We study the problem of variable selection for linear models under the
highdimensional asymptotic setting, where the number of observations $n$ grows
at the same rate as the number of predictors $p$. We consider twostage
variable selection techniques (TVS) in which the first stage uses bridge
estimators to obtain an estimate of the regression coefficients, and the second
stage simply thresholds this estimate to select the "important" predictors. The
asymptotic false discovery proportion (AFDP) and true positive proportion
(ATPP) of these TVS are evaluated. We prove that for a fixed ATPP, in order to
obtain a smaller AFDP, one should pick a bridge estimator with smaller
asymptotic mean square error in the first stage of TVS. Based on such
principled discovery, we present a sharp comparison of different TVS, via an
indepth investigation of the estimation properties of bridge estimators.
Rather than "orderwise" error bounds with loose constants, our analysis
focuses on precise error characterization. Various interesting signaltonoise
ratio and sparsity settings are studied. Our results offer new and thorough
insights into highdimensional variable selection. For instance, we prove that
a TVS with Ridge in its first stage outperforms TVS with other bridge
estimators in large noise settings; twostage LASSO becomes inferior when the
signal is rare and weak. As a byproduct, we show that twostage methods
outperform some standard variable selection techniques, such as LASSO and Sure
Independence Screening, under certain conditions.

This summary of the doctoral thesis is created to emphasize the close
connection of the proposed spectral analysis method with the Discrete Fourier
Transform (DFT), the most extensively studied and frequently used approach in
the history of signal processing. It is shown that in a typical application
case, where uniform data readings are transformed to the same number of
uniformly spaced frequencies, the results of the classical DFT and proposed
approach coincide. The difference in performance appears when the length of the
DFT is selected to be greater than the length of the data. The DFT solves the
unknown data problem by padding readings with zeros up to the length of the
DFT, while the proposed Extended DFT (EDFT) deals with this situation in a
different way, it uses the Fourier integral transform as a target and optimizes
the transform basis in the extended frequency range without putting such
restrictions on the time domain. Consequently, the Inverse DFT (IDFT) applied
to the result of EDFT returns not only known readings, but also the
extrapolated data, where classical DFT is able to give back just zeros, and
higher resolution are achieved at frequencies where the data has been
successfully extended. It has been demonstrated that EDFT able to process data
with missing readings or gaps inside or even nonuniformly distributed data.
Thus, EDFT significantly extends the usability of the DFTbased methods, where
previously these approaches have been considered as not applicable. The EDFT
founds the solution in an iterative way and requires repeated calculations to
get the adaptive basis, and this makes it numerical complexity much higher
compared to DFT. This disadvantage was a serious problem in the 1990s, when the
method has been proposed. Fortunately, since then the power of computers has
increased so much that nowadays EDFT application could be considered as a real
alternative.

Motivated by applications of distributed storage systems to keyvalue stores,
the multiversion coding problem was formulated to efficiently store frequently
updated data in asynchronous decentralized storage systems. Inspired by
consistency requirements in distributed systems, the main goal in the
multiversion coding problem is to ensure that the latest possible version of
the data is decodable, even if the data updates have not reached some servers
in the system. In this paper, we study the storage cost of ensuring consistency
for the case where the data versions are correlated, in contrast to previous
work where data versions were treated as being independent. We provide
multiversion code constructions that show that the storage cost can be
significantly smaller than the previous constructions depending on the degree
of correlation, despite the asynchrony and the decentralized nature. Our
achievability results are based on ReedSolomon codes and random binning.
Through an informationtheoretic converse, we show that our multiversion codes
are nearlyoptimal, within a factor of $2$, in certain interesting regimes.

The majority of works in distributed storage networks assume a simple network
model with a collection of identical storage nodes with the same communication
cost between the nodes. In this paper, we consider a realistic multirack
distributed data storage network and present a code design framework for this
model. Considering the cheaper data transmission within the racks, our code
construction method is able to locally repair the nodes failure within the same
rack by using only the survived nodes in the same rack. However, in the case of
severe failure patterns when the information content of the survived nodes is
not sufficient to repair the failures, other racks will participate in the
repair process. By employing the criteria of our multirack storage code, we
establish a linear programming bound on the size of the code in order to
maximize the code rate.

We show that any $\ell$controllable complete group system $\mathsf{C}$ can
be reduced to a generator group $({\mathcal{U}}_g,\circ)$. The set
${\mathcal{U}}_g$ is defined on a double Cartesian product space, with indices
$k$, for $0\le k\le\ell$, and time $t$, for $t\in\mathbf{Z}$. Each index $k$
and time $t$ is associated with a set $G_k^t$ of \glabs\ $g_k^t$. Each $g_k^t$
is the label of a generator in $\mathsf{C}$ defined for the time interval
$[t,t+k]$. The operation $\circ$ is a global operation defined on the sets
$G_k^t$ in ${\mathcal{U}}_g$, for $0\le k\le\ell$ and $t\in\mathbf{Z}$. We show
the generator group contains an infinite collection of elementary groups, one
for each $k$ and $t$, defined on small subsets of ${\mathcal{U}}_g$, in the
shape of triangles, which form a tile like structure over ${\mathcal{U}}_g$.
There is a homomorphism from each elementary group to any elementary group
wholely contained in the former group.
The generator group without its global operation $\circ$ forms an elementary
system $\mathcal{E}$. An elementary system is an elementary set, such as
${\mathcal{U}}_g$, an infinite collection of nested elementary groups defined
on triangular subsets of the elementary set, and a homomorphism condition.
There is a homomorphism from each elementary group to the two largest
elementary groups nested in the former group. Then any generator group and any
$\ell$controllable complete group system $\mathsf{C}$ can be reduced to an
elementary system $\mathcal{E}$. This process can be reversed. We can construct
any $\ell$controllable complete group system $\mathsf{C}$ starting with an
elementary system $\mathcal{E}$. This process is straightforward since
$\mathcal{E}$ is nested in index $k$.
We extend these results to block codes and obtain new results on the group
structure of block codes.

Due to the big size of data and limited data storage volume of a single
computer or a single server, data are often stored in a distributed manner.
Thus, performing largescale machine learning operations with the distributed
datasets through communication networks is often required. In this paper, we
investigate the impact of network communication constraints on the convergence
speed of the communicationefficient distributed machine learning algorithm.
Firstly, we study the convergence rate of the distributed dual coordinate
ascent algorithm in a general treestructured network. Since a tree network
model can be understood as the generalization of a star network model, our
algorithm can be thought of as the generalization of the distributed dual
coordinate ascent in a star network model. Secondly, by considering network
communication delays, we optimize the networkconstrained distributed dual
coordinate ascent algorithm to maximize its convergence speed. In numerical
experiments, we consider machine learning scenarios over communication
networks, where local workers cannot directly reach to a central node due to
constraints in communication, and demonstrate that the usability of our
distributed dual coordinate ascent algorithm in tree networks.

This work considers a superresolution framework for overcomplete tensor
decomposition. Specifically, we view tensor decomposition as a superresolution
problem of recovering a sum of Dirac measures on the sphere and solve it by
minimizing a continuous analog of the $\ell_1$ norm on the space of measures.
The optimal value of this optimization defines the tensor nuclear norm. Similar
to the separation condition in the superresolution problem, by explicitly
constructing a dual certificate, we develop incoherence conditions of the
tensor factors so that they form the unique optimal solution of the continuous
analog of $\ell_1$ norm minimization. Remarkably, the derived incoherence
conditions are satisfied with high probability by random tensor factors
uniformly distributed on the sphere, implying global identifiability of random
tensor factors.

We consider the problem of distributed estimation of a Gaussian vector with
linear observation model. Each sensor makes a scalar noisy observation of the
unknown vector, quantizes its observation, maps it to a digitally modulated
symbol, and transmits the symbol over orthogonal powerconstrained fading
channels to a fusion center (FC). The FC is tasked with fusing the received
signals from sensors and estimating the unknown vector. We derive the Bayesian
Fisher Information Matrix (FIM) for three types of receivers: (i) coherent
receiver (ii) noncoherent receiver with known channel envelopes (iii)
noncoherent receiver with known channel statistics only. We also derive the
WeissWeinstein bound (WWB). We formulate two constrained optimization
problems, namely maximizing trace and logdeterminant of Bayesian FIM under
network transmit power constraint, with sensors transmit powers being the
optimization variables. We show that for coherent receiver, these problems are
concave. However, for noncoherent receivers, they are not necessarily concave.
The solution to the trace of Bayesian FIM maximization problem can be
implemented in a distributed fashion. We numerically investigate how the
FIMmax power allocation across sensors depends on the sensors observation
qualities and physical layer parameters as well as the network transmit power
constraint. Moreover, we evaluate the system performance in terms of MSE using
the solutions of FIMmax schemes, and compare it with the solution obtained
from minimizing the MSE of the LMMSE estimator (MSEmin scheme), and that of
uniform power allocation. These comparisons illustrate that, although the WWB
is tighter than the inverse of Bayesian FIM, it is still suitable to use
FIMmax schemes, since the performance loss in terms of the MSE of the LMMSE
estimator is not significant.

Coded source compression, also known as source compression with helpers, has
been a major variant of distributed source compression, but has hitherto
received little attention in the quantum regime. This work treats and solves
the corresponding quantum coded source compression through an observation that
connects coded source compression with channel simulation. First, we consider
classical source coding with quantum side information where the quantum side
information is observed by a helper and sent to the decoder via a classical
channel. We derive a singleletter characterization of the achievable rate
region for this problem. The direct coding theorem of our result is proved via
the measurement compression theory of Winter, a quantumtoclassical channel
simulation. Our result reveals that a helper's scheme which separately conducts
a measurement and a compression is suboptimal, and measurement compression
seems necessary to achieve the optimal rate region. We then study coded source
compression in the fully quantum regime, where two different scenarios are
considered depending on the types of communication channels between the
legitimate source and the receiver. We further allow entanglement assistance
from the quantum helper in both scenarios. We characterize the involved quantum
resources, and derive singleletter expressions of the achievable rate region.
The direct coding proofs are based on wellknown quantum protocols, the quantum
state merging protocol and the fully quantum SlepianWolf protocol, together
with the quantum reverse Shannon theorem.

We introduce the Fixed Cluster Repair System (FCRS) as a novel architecture
for Distributed Storage Systems (DSS), achieving a small repair bandwidth while
guaranteeing a high availability. Specifically we partition the set of servers
in a DSS into $s$ clusters and allow a failed server to choose any cluster
other than its own as its repair group. Thereby, we guarantee an availability
of $s1$. We characterize the repair bandwidth vs. storage tradeoff for the
FCRS under functional repair and show that the minimum repair bandwidth can be
improved by an asymptotic multiplicative factor of $2/3$ compared to the state
of the art coding techniques that guarantee the same availability. We further
introduce Cubic Codes designed to minimize the repair bandwidth of the FCRS
under the exact repair model. We prove an asymptotic multiplicative improvement
of $0.79$ in the minimum repair bandwidth compared to the existing exact repair
coding techniques that achieve the same availability. We show that Cubic Codes
are informationtheoretically optimal for the FCRS with $2$ and $3$ complete
clusters. Furthermore, under the repairbytransfer model, Cubic Codes are
optimal irrespective of the number of clusters.

We consider nonbinary polarization transform problem of polar codes. The
focus of this work is on finding equidistant (or almost equidistant) polarizing
transforms to maximize the minimum distance and to approach the equidistant
distant spectrum bound as a function of signal set. This bound is an ultimate
limit and tight for additive white Gaussian channels. In this way, polarization
of error probability for the good channel is improved while the bad channel is
almost the same for a given signal set. Our main result is that the
polarization speed is increased by using polarizing transform with an improved
distance profile. A nonbinary polarization transform for q = 5 is found that
can provide the equidistant distant spectrum bound. Almost equidistant
polarization transforms for q = 4, 6, 7 and 8 are introduced for PSK signal
sets. As a private solution, we provided new geometries for the signal set
design to define the equidistant transform for q = 3 and q = 4 for one and two
dimensional signalings. We proposed a procedure to design transforms that have
better distance profiles for qary signal sets. Finally, we show improvements
in frame error rates.

Modern authentication systems store hashed values of passwords of users using
cryptographic hash functions. Therefore, to crack a password an attacker needs
to guess a hash function input that is mapped to the hashed value, as opposed
to the password itself. We call a hash function that maps the same number of
inputs to each bin, as \textbf{unbiased}. However, cryptographic hash functions
in use have not been proven to be unbiased (i.e., they may have an unequal
number of inputs mapped to different bins). A cryptographic hash function has
the property that it is computationally difficult to find an input mapped to a
bin. In this work we introduce a structured notion of biased hash functions for
which we analyze the average guesswork under certain types of brute force
attacks. This work shows that the level of security depends on the set of
hashed values of valid users as well as the statistical profile of a hash
function, resulting from bias. We examine the average guesswork conditioned on
the set of hashed values, and model the statistical profile through the
empirical distribution of the number of inputs that are mapped to a bin. In
particular, we focus on a class of statistical profiles (capturing the bias) ,
which we call typeclass statistical profiles, that has an empirical
distribution related to the probability of the type classes defined in the
method of types. For such profiles, we show that the average guesswork is
related to basic measures in information theory such as entropy and divergence.
We use this to show that the effect of bias on the conditional average
guesswork is limited compared to other system parameters such as the number of
valid users who store their hashed passwords in the system.

To attain the targeted data rates of next generation cellular networks
requires dense deployment of small cells in addition to macro cells which
provide wide coverage. Dynamic radio resource management is crucial to the
success of such heterogeneous networks due to much more pronounced traffic and
interference variations in small cells. This work proposes a framework for
spectrum management organized according to two timescales, which include 1)
centralized optimization on a moderate timescale corresponding to typical
duration of user sessions (several seconds to minutes in today's networks), and
2) distributed spectrum allocation on a fast timescale corresponding to typical
latency requirements (a few milliseconds). An optimization problem is
formulated to allocate resources on the slower timescale with consideration of
(distributed) opportunistic scheduling on the faster timescale. Both fixed and
fully flexible user association schemes are considered. Iterative algorithms
are developed to solve these optimization problems efficiently for a cluster of
cells with guaranteed convergence. Simulation results demonstrate advantages of
the proposed framework and algorithms.

This paper studies the need for individualizing vehicular communications in
order to improve collision warning systems for an Nlane highway scenario. By
relating the trafficbased and communications studies, we aim at reducing
highway traffic accidents. To the best of our knowledge, this is the first
paper that shows how to customize vehicular communications to driver's
characteristics and traffic information. We propose to develop VANET protocols
that selectively identify crash relevant information and customize the
communications of that information based on each driver's assigned safety
score. In this paper, first, we derive the packet success probability by
accounting for multiuser interference, path loss, and fading. Then, by Monte
carlo simulations, we demonstrate how appropriate channel access probabilities
that satisfy the delay requirements of the safety application result in
noticeable performance enhancement.

The secrecy rate region of wiretap interference channels with a multiantenna
passive eavesdropper is studied under receiver energy harvesting constraints.
To stay operational in the network, the legitimate receivers demand energy
alongside information, which is fulfilled by power transmission and exploiting
a power splitting (PS) receiver. By simultaneous wireless information and power
transfer (SWIPT), the amount of leakage to the eavesdropper increases, which in
turn reduces the secrecy rates. For this setup, lowerbounds for secure
communication rate are derived without imposing any limitation at the
eavesdropper processing. These lowerbounds are then compared with the rates
achieved by assuming the worstcase linear eavesdropper processing. We show
that in certain special cases the worstcase eavesdropper does not enlarge the
achievable secure rate region in comparison to the unconstrained eavesdropper
case. It turns out that in order to achieve the Pareto boundary of the secrecy
rate region, smart tuning of the transmit power and receiver PS coefficient is
required. Hence, we propose an efficient algorithm to optimize these parameters
jointly in polynomialtime. The secrecy rate region characterization is
formulated as a weighted maxmin optimization problem. This problem turns out
to be a nonconvex problem due to the nonconvex constrained set. This set is
replaced by a convex subset that in consequence leads to an achievable
suboptimal solution which is improved iteratively. By solving the problem
efficiently, we obtain the amount of rate loss for providing secrecy, meanwhile
satisfying the energy demands.