21
arXiv:2012.03169v1 [cs.IT] 6 Dec 2020 1 Low-complexity and High-performance Receive Beamforming for Secure Directional Modulation Networks against an Eavesdropping-enabled Full-duplex Attacker Yin Teng, Jiayu Li, Lin Liu, Guiyang Xia, Xiaobo Zhou, Feng Shu, Jiangzhou Wang, Fellow, IEEE, and Xiaohu You, Fellow, IEEE Abstract In this paper, we present a novel scenario for directional modulation (DM) networks with a full- duplex (FD) malicious attacker (Mallory), where Mallory can eavesdrop the confidential message from Alice to Bob and simultaneously interfere Bob by sending a jamming signal. Considering that the jamming plus noise at Bob is colored, an enhanced receive beamforming (RBF), whitening-filter-based maximum ratio combining (MRC) (WFMRC), is proposed. Subsequently, two RBFs of maximizing the secrecy rate (Max-SR) and minimum mean square error (MMSE) are presented to show the same performance as WFMRC. To reduce the computational complexity of conventional MMSE, a low- complexity MMSE is also proposed. Eventually, to completely remove the jamming signal from Mallory and transform the residual interference plus noise to a white one, a new RBF, null-space projection (NSP) based maximizing WF receive power, called NSP-based Max-WFRP, is also proposed. From simulation Yin Teng, Jiayu Li, Lin Liu, Guiyang Xia, and Feng Shu are with the School of Electronic and Optical Engineering, Nanjing University of Science and Technology, 210094, CHINA. (e-mail: [email protected]). Xiaobo Zhou is with the School of Physics and Electronic Engineering, Fuyang Normal University, Fuyang 236037, China. (e-mail:[email protected]). Feng Shu is also with the School of Information and Communication Engineering, Hainan University, Haikou, 570228, China. Jiangzhou Wang is with the School of Engineering and Digital Arts, University of Kent, Canterbury CT2 7NT, U.K. (e-mail: [email protected]). Xiaohu You is with the School of Information Science and Engineering, Southeast University, 210094, CHINA. (e-mail: [email protected]).

1 Low-complexity and High-performance Receive Beamforming

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 Low-complexity and High-performance Receive Beamforming

arX

iv:2

012.

0316

9v1

[cs

.IT

] 6

Dec

202

01

Low-complexity and High-performance

Receive Beamforming for Secure Directional

Modulation Networks against an

Eavesdropping-enabled Full-duplex Attacker

Yin Teng, Jiayu Li, Lin Liu, Guiyang Xia, Xiaobo Zhou, Feng Shu,

Jiangzhou Wang, Fellow, IEEE, and Xiaohu You, Fellow, IEEE

Abstract

In this paper, we present a novel scenario for directional modulation (DM) networks with a full-

duplex (FD) malicious attacker (Mallory), where Mallory can eavesdrop the confidential message from

Alice to Bob and simultaneously interfere Bob by sending a jamming signal. Considering that the

jamming plus noise at Bob is colored, an enhanced receive beamforming (RBF), whitening-filter-based

maximum ratio combining (MRC) (WFMRC), is proposed. Subsequently, two RBFs of maximizing

the secrecy rate (Max-SR) and minimum mean square error (MMSE) are presented to show the same

performance as WFMRC. To reduce the computational complexity of conventional MMSE, a low-

complexity MMSE is also proposed. Eventually, to completely remove the jamming signal from Mallory

and transform the residual interference plus noise to a white one, a new RBF, null-space projection (NSP)

based maximizing WF receive power, called NSP-based Max-WFRP, is also proposed. From simulation

Yin Teng, Jiayu Li, Lin Liu, Guiyang Xia, and Feng Shu are with the School of Electronic and Optical Engineering, Nanjing

University of Science and Technology, 210094, CHINA. (e-mail: [email protected]).

Xiaobo Zhou is with the School of Physics and Electronic Engineering, Fuyang Normal University, Fuyang 236037, China.

(e-mail:[email protected]).

Feng Shu is also with the School of Information and Communication Engineering, Hainan University, Haikou, 570228, China.

Jiangzhou Wang is with the School of Engineering and Digital Arts, University of Kent, Canterbury CT2 7NT, U.K. (e-mail:

[email protected]).

Xiaohu You is with the School of Information Science and Engineering, Southeast University, 210094, CHINA. (e-mail:

[email protected]).

Page 2: 1 Low-complexity and High-performance Receive Beamforming

2

results, we find that the proposed Max-SR, WFMRC, and low-complexity MMSE have the same SR

performance as conventional MMSE, and achieve the best performance while the proposed NSP-based

Max-WFRP performs better than MRC in the medium and high signal-to-noise ratio regions. Due to its

low-complexity,the proposed low-complexity MMSE is very attractive. More important, the proposed

methods are robust to the change in malicious jamming power compared to conventional MRC.

Index Terms

Malicious attacker, secure, directional modulation, secrecy rate, receive beamforming, null-space

projection (NSP).

I. INTRODUCTION

In the past decade, physical layer security (PLS) has attracted wide attention from academia

[1]–[8]. Directional modulation (DM), as an advanced PLS transmission technique, is suitable

for line-of-sight (LoS) propagation channel. Beamforming technology with artificial noise (AN)

has a capability of creating a secure transmission in the LoS propagation channel [4], [9]–[11].

In [12], the authors presented a DM technique that uses the phased arrays to generate mod-

ulation and provides security by deliberately distorting signals in other directions and making

the signal independent of direction. An orthogonal vector approach was proposed in [9] for the

synthesis of multi-beam DM transmitters. In [10], [13], the authors developed robust synthesis

schemes, in which DM is able to enhance the security performance of desired directions and

distort the constellation points of undesired directions. These systems have the capability of

concurrently projecting independent data streams along different specified spatial directions while

simultaneously distorting signal constellations in all other directions. A directional modulation

technique using frequency diverse array (FDA) for secure communications was proposed in

[14]–[20]. In [14], [15], the authors developed a novel DM scheme based on random frequency

diverse arrays with artificial noise (RFDA-DM-AN) to enhance physical layer security of wireless

communications. In order to address the limitations of the previous works and further enhance

physical layer (PHY) security, an AN-aided index modulation (IM) scheme with cooperative

LUs based on FDA beamforming was proposed in [16]. Multi-beam directional modulation

schemes based on FDA were investigated in [16]–[18]. Different from the traditional directional

modulation that only implements angle dependent directional modulation, the authors proposed

Page 3: 1 Low-complexity and High-performance Receive Beamforming

3

some precise secure transmission schemes of achieving two-dimensional dependence on angle

and range dimensions in [14], [19], [20]. In the multi-carrier based DM antenna array system

design, to solve the problems of high peak-to-average-power ratio (PAPR) and phase pattern

formation simultaneously, a method, called wideband beam and phase pattern formation by

Newton’s (WBPFN), was proposed in [21]. In [22], the authors developed a multi-carrier based

DM framework using antenna arrays, which can realize data transmission on multiple frequencies

simultaneously, so as to obtain a higher data rate. A practical wireless transmission scheme was

proposed in [11] to transmit the confidential message (CM) to the desired user securely and

precisely by jointly exploiting multiple techniques, including artificial noise (AN) projection,

phase alignment/beamforming, and random subcarrier selection (RSCS) based on orthogonal

frequency division multiplexing (OFDM) [23], [24], and DM. Particularly, if a DM transmitter

intends to transmit CM to Bob and to interfere eavesdropper (Eve) with AN, she needs to know

the directions of Bob and Eve in advance. In [25], two phase alignment (PA) methods, hybrid

analog and digital PA and hybrid digital and analog PA, were proposed to estimate direction

of arrival (DOA) based on the parametric method. In [26], the authors proposed an improved

hybrid analog-digital (HAD) estimation of signal parameters via rotational invariance techniques

(ESPRIT) at HAD transceiver to measure the DOA of a desired user.

However, the aforementioned existing works focused on the scenarios with only a passive

eavesdropper Eve having no active malicious attacking capacity. In such a situation, it is hard

for Alice to obtain the channel state information (CSI) from Alice to Eve. This is an embarrassing

issue usually raised by secure expert. How to address this challenging issue? If Eve behaves

like Mallory, with an active malicious attacking ability, this problem naturally disappears. By

channel estimating, Alice may obtain the CSI from Alice to Mallory and Bob can obtain the

CSI from Mallory to Bob. In [27], the authors proposed a jamming detection method for non-

coherent single input multiple output (SIMO) systems without CSI. A hybrid wiretapping wireless

system with a half-duplex adversary was proposed in [28], where the adversary can decide to

either jam or eavesdrop the transmitter-to-receiver channel. In the presence of a full-duplex

eavesdropper having both eavesdropping and jamming capabilities, the authors in [29] proposed

a novel secure transmission strategy against eavesdropping by the sophisticated adversary. The

authors in [30] studied the secrecy outage probability and mean SR of the system to evaluate the

Page 4: 1 Low-complexity and High-performance Receive Beamforming

4

security performance of the system. In this paper, our focus is on how to suppress the malicious

jamming and improve the secure performance by designing receive beamforming (RBF) at Bob

in the presence of the malicious jamming.

In this paper, we present a novel DM scenario with a full-duplex (FD) malicious attacker

Mallory. Moreover, Mallory also eavesdrops the CM conveyed from Alice to Bob. To reduce

the impact of jamming from Mallory on Bob and improve the secure performance, four RBF

methods are proposed. Our main contributions are summarized as follows:

1) To alleviate the jamming from Mallory on Bob and improve the secure performance,

the conventional MRC RBF at Bob is presented to strengthen the confidential signal.

To enhance its performance, a WFMRC RBF is proposed by converting the colored

interference plus noise at Bob into a white one with its covariance matrix being a multiple

of identity matrix. Then, two RBFs Max-SR and conventional MMSE are derived. From

simulation results, the proposed two RBFs WFMRC and Max-SR obviously outperform the

conventional MRC in the medium and high SNR regions and achieve the same performance

as conventional MMSE in terms of SR and BER.

2) To completely remove the jamming from Mallory, a new RBF of maximizing the WF-

based receive power at Bob is proposed to force the malicious jamming onto the null-space

(NSP) of the channel spanning from Alice to Bob. By exploiting the rank-one property

of channel steering vector, a low-complexity MMSE is proposed to reduce the complexity

of conventional MMSE without performance loss. According to simulation, we find that

the proposed NSP-based Max-WFRP is slightly worse than Max-SR, WFMRC and low-

complexity MMSE in terms of the SR performance. Its main advantage is that its SR

performance is independent of the change in malicious jamming power. Moreover, the

proposed low-complexity MMSE has achieved the same performance as three proposed

high-performance RBFs WFMRC, conventional MMSE, and Max-SR with an extremely

low-complexity.

The remainder of this paper is organized as follows. Section II presents the DM system

model. In Section III, four schemes of design RBF vector vBR is proposed and its closed-

form expression is given. Simulation and numerical results are shown in Section IV. Finally, we

draw our conclusions in Section V.

Page 5: 1 Low-complexity and High-performance Receive Beamforming

5

Notations: Throughout the paper, matrices, vectors, and scalars are denoted by letters of bold

upper case, bold lower case, and lower case, respectively. Signs (·)T , (·)−1, (·)†, (·)H , ‖ · ‖and tr(·) represent transpose, inverse, Moore-Penrose, conjugate transpose, norm and trace,

respectively. IN denotes the N×N identity matrix. The notation E{·} represents the expectation

operation.

II. SYSTEM MODEL

Alice.

Mallory

Bob

1

NA

1

1

NB

H(θAB)

Self-interference

H(θAM)

H(θMB)

HM

.

.

.

.

.

θr,AM

θt,AB

θt,AM

θt,MB

θr,MB

θr,AB

. . .NM

Fig. 1. Block diagram of the DM network with FD malicious attacker.

The proposed DM system is illustrated in Fig. 1. It consists of an NA-antennas base station

(Alice), a legitimate NB-antennas user (Bob) and an illegal NM -antennas malicious attacker

(Mallory). Here, the Alice sends CM to the Bob. In addition, there is an illegal malicious

attacker Mallory trying to intercept the CM. Mallory operates on the FD model. That is, he/she

can eavesdrop on CM, and simultaneously initiate an active attack on Bob. The baseband transmit

signal can be expressed as

sA =√

β1PAvAdA +√

(1− β1)PATA,ANzA,AN , (1)

where PA is the total transmit power, β1 stands for the power allocation (PA) factor, vA ∈ CNA×1

denotes the transmit beamforming vector of the CM, and TA,AN ∈ CNA×NA is the projection

matrix for controlling AN to the undesired direction, where vHAvA = 1 and tr[TA,ANT

HA,AN] = 1.

In addition, vA is defined as the transmit beamforming vector for the CM. In (1), dA is the CM

with average power E[‖dA‖2] = 1 and zA,AN ∈ CNA×1 denotes the AN vector with complex

Page 6: 1 Low-complexity and High-performance Receive Beamforming

6

Gaussian distribution, i.e., zA,AN ∼ CN (0, INA). The malicious attacking signal at Mallory can

be expressed as

sM =√PMTM,ANzM,AN , (2)

where TM,AN ∈ CNM×NJ is the projection matrix for forcing the jamming to Bob, NJ ∈{1, 2, ...., NM − 1}. Herein, PM is the transmit power at Mallory, zM,AN ∈ CNJ×1 denotes the

AN vector with complex Gaussian distribution, i.e., zM,AN ∼ CN (0, INJ).

The corresponding received signal at Bob can be written as

rB = vHBR(

√gABH

H(θAB)sA +√gMBH

H(θMB)sM + nB)

= vHBR(

√gABβ1PAH

H(θAB)vAdA +√

gAB(1− β1)PAHH(θAB)TA,ANzA,AN︸ ︷︷ ︸

nA

+√gMBH

H(θMB)sM︸ ︷︷ ︸nM

+nB)

= vHBR(

√gABβ1PAH

H(θAB)vAdA + nA + nM + nB︸ ︷︷ ︸nB

), (3)

where HH(θAB) = h(θr,AB)hH(θt,AB) and HH(θMB) = h(θr,MB)h

H(θt,MB). HH(θAB) ∈C

NB×NA denotes the channel matrix from Alice to Bob. HH(θMB) ∈ CNB×NM denotes the

channel matrix from Mallory to Bob. The normalized steering vector h(θ) as

h(θ) =1√N[ej2πΨθ(1), ..., ej2πΨθ(n), ..., ej2πΨθ(N)]T , (4)

where the phase function Ψθ(n) is defined by [31]

Ψθ(n) , −(n− N + 1

2

)d cos θ

λ, n = 1, · · · , N, (5)

where θ is the direction of arrival or departure, n is the index of antenna, d represents the

element spacing in the transmit antenna array, and λ is the wavelength. In (3), nB ∈ CNB×1 is

the complex additive white Gaussian noise (AWGN) vector, distributed as nB ∼ CN (0, σ2BINB

).

Notably, gAB = αdcAB

represents the path loss from Alice to Bob. Here, dAB is the distance

between Alice and Bob, c denotes the path loss exponent and α means the path loss at reference

distance d0. Moreover, vBR ∈ CNB×1 represents the receive beamforming vector of Bob. Using

the concept of the null-space projection, we can design

TA,AN = INA−H(θAB)[H

H(θAB)H(θAB)]−1HH(θAB). (6)

Page 7: 1 Low-complexity and High-performance Receive Beamforming

7

Similarly, the receive signal at Mallory is given by

rM = vHMR(

√gAMHH(θAM )sA +

√ρHH

MsM + nM )

= vHMR(

√gAMβ1PAH

H(θAM )vAdA +√gAM(1− β1)PAH

H(θAM )TA,ANzA,AN

+√ρPMHH

MTM,ANzM,AN + nM ), (7)

where HH(θAM) = h(θr,AM)hH(θt,AM). HH(θAM) ∈ CNM×NA denotes the channel matrix from

Alice to Mallory. gAM = αdcAM

represents the corresponding path loss, and dAM is the distance

between Alice and Mallory. Additionally, vMR represents the receive beamforming vector at

Mallory. The complex AWGN at Mallory is denoted by nM ∼ CN (0, σ2MINM

).√ρHH

M ∈CNM×NM is the residual self-interference (RSI) channel matrix of Mallory, ρ ∈ [0, 1] denotes the

residual self-interference parameter of the Mallory after self-interference cancelation [29].

As per (3) and (7), we can derive the achievable rate along Bob and Mallory as

RAB(vBR) = log2

(1 +

vHBRAvBR

vHBRBvBR + vH

BRDvBR + σ2B

), (8)

and

RAM = log2

(1 +

vHMREvMR

vHMRFvMR + vH

MRRMvMR + σ2M

), (9)

respectively, where RM is the covariance matrix of RSI channel,

RM = ρPMHHMTM,ANT

HM,ANHM , (10)

A = gABβ1PAHH(θAB)vAv

HAH(θAB), (11)

B = gAB(1− β1)PAHH(θAB)TA,ANT

HA,ANH(θAB), (12)

D = gMBPMHH(θMB)TM,ANTHM,ANH(θMB), (13)

E = gAMβ1PAHH(θAM)vAv

HAH(θAM), (14)

F = gAM(1− β1)PAHH(θAM )TA,ANT

HA,ANH(θAM). (15)

Then we arrive the achievable SR, Rs, as follows:

Rs(vBR) = max {0, RAB(vBR)− RAM} . (16)

III. PROPOSED FOUR RBF METHODS

In this section, to improve the security rate performance and reduce the effect of jamming

from Mallory on Bob, four RBF schemes are proposed. Additionally, the conventional MRC is

also presented as a performance benchmark for the future comparison.

Page 8: 1 Low-complexity and High-performance Receive Beamforming

8

A. Conventional MRC and Proposed WFMRC

From the definition of conventional MRC, we have

vHBR =

(HH(θAB)vA

)H

‖(HH(θAB)vA)H‖2, (17)

under the approximation that nB is viewed as a white Gaussian noise vector with zero mean and

covariance matrix being identity matrix multiplied by a scalar. However, nB is a sum of three

terms including malicious interference from Mallory, and is colored. Its covariance matrix is

CnB= E

{nBn

HB

}= B+D+ σ2

BINB(18)

which is a positive definite Hermitian matrix, i.e., a normal matrix, and has the eigenvalue-

decomposition (EVD) form [32]

CnB= QΛQH , (19)

where Q is a unitary matrix, Λ is a diagonal matrix diag (d1, ..., dNB) with di being the i-th

eigenvalue of matrix CnB. We can construct the following WF matrix

WWF = (QΛ1

2 )−1 = Λ− 1

2QH . (20)

Left multiplication of rB by WWF leads to

rB = WWFrB

=√

gABβ1PAWWFHH(θAB)vAdA +WWFnB, (21)

where

rB =√

gABβ1PAHH(θAB)vAdA + nB. (22)

Obviously, the new noise vector WWFnB becomes a white Gaussian vector with convariance

matrix being an identity. Now, similar to (17), the WFMRC is directly given as

vHBR =

(WWFHH(θAB)vA)

H

‖(WWFHH(θAB)vA)H‖2. (23)

Page 9: 1 Low-complexity and High-performance Receive Beamforming

9

B. Proposed Max-SR Method

Now, we turn to the method of maximizing the SR in (16). Observing the SR in (16), it is

evident that the available rate at Mallory is independent of vBR. Thus, the optimization problem

of the Max-SR

maxvBR

Rs(vBR)

s.t. vHBRvBR = 1, (24)

reduces to

maxvBR

RAB(vBR)

s.t. vHBRvBR = 1, (25)

which can be rewritten as

maxvBR

vHBRAvBR

vHBRCnB

vBR

s.t. vHBRvBR = 1, (26)

which is the Max-SJNR. Let us define

v′HBR = vH

BR(C1

2

nB)H , (27)

then SJNR can be expressed as follows

SJNR =v′HBR

R︷ ︸︸ ︷(C

− 1

2

nB)HA(C

− 1

2

nB)v′

BR

v′HBRv

′BR

, (28)

Max-SJNR is rewritten as

maxv′

BR

v′HBRRv′

BR

s.t. v′HBRv

′BR = 1. (29)

Let us differentiate the SJNR expression with respect to v′HBR and set it to zero

∂v′BR

(v′HBRRv′

BR

v′HBRv

′BR

) =Rv′

BR · v′HBRv

′BR − v′H

BRRv′BR · v′

BR

(v′HBRv

′BR)

2= 0, (30)

which means that the numerator equals zero and

Rv′BR =

v′HBRRv′

BR

v′HBRv

′BR︸ ︷︷ ︸

λ

· v′BR︸︷︷︸v

. (31)

Page 10: 1 Low-complexity and High-performance Receive Beamforming

10

Observing the above equation, λ is the eigenvalue and v is the eigenvector associated with λ. In

other words, the maximum SJNR is achieved as v′BR is taken to be the eigenvector corresponding

to the largest eigenvalue λmax of R. In particular, the semi-definite positive matrix R is rank

one, written as

R = aaH (32)

with

a =√gABβ1PA(C

− 1

2

nB)HHH(θAB)vA. (33)

Let us define

v =a

‖a‖2, (34)

and multiplying the equality R = aaH from right by v yields

Ra

‖a‖2︸ ︷︷ ︸v

=(aHa

)︸ ︷︷ ︸λmax

a

‖a‖2︸ ︷︷ ︸v

, (35)

which means

v =a

‖a‖2(36)

is the eigenvector corresponding to the largest eigenvalue of matrix R. Clearly, we have

v′∗BR = vmax = v =

a

‖a‖2, (37)

which is in agreement with the expression in (23). Substituting the above back into (27), we

have

v∗BR = C

− 1

2

nBv′∗BR = C

− 1

2

nB

a

‖a‖2. (38)

C. Proposed low-complexity MMSE Method

In the following, we propose a low-complexity MMSE algorithm based on the minimum mean

square error criterion to design receive beamforming. We can derive the vBR by the following

optimization formula

Page 11: 1 Low-complexity and High-performance Receive Beamforming

11

minvBR

f(vBR) = E {(rB − dA)(rB − dA)∗}

= tr[vHBR(gABβ1PAH

H(θAB)vAvHAH(θAB) +RnA

+RnM+RnB

)vBR

−√gABβ1PAv

HBRH

H(θAB)vA −√

gABβ1PAvHAH(θAB)vBR + 1], (39)

where RnA= E

{nAn

HA

}= B, RnM

= E{nMnH

M

}= D and RnB

= E{nBn

HB

}= σ2

BINB.

To obtain the optimal receive beamforming, we need to compute the derivative of m(vBR)

with respect to vBR,

∂f(vBR)

∂vBR

= 2(gABβ1PAHH(θAB)vAv

HAH(θAB) +RnA

+RnM+RnB

)vBR

− 2√

gABβ1PAHH(θAB)vA. (40)

It is easy to see from Eq.(40) that matrix gABβ1PAHH(θAB)vAv

HAH(θAB)+RnA

+RnM+RnB

is positive definite. Let∂f(vBR)∂vBR

= 0, we have the conventional MMSE

vBR =√gABβ1PA(gABβ1PAH

H(θAB)vAvHAH(θAB) +RnA

+RnM+RnB︸ ︷︷ ︸

O

)−1HH(θAB)vA.

(41)

However, the complexity of the conventional MMSE method mentioned above is the cubic

function of NB , which will become high as NB tends to large-scale. Interestingly, since the rank

of matrix HH(θAB)vAvHAH(θAB), RnA

, and RnMin matrix O are one, the Sherman-Morrison

formula can be applied to provide a low-complexity way of computing the inverse of matrix

O. By exploiting the rank-one property of channel steering vector, a low-complexity MMSE is

proposed in what follows.

By repeatedly making use of the Sherman-Morrison formula

(Z+ uvT )−1 = Z−1 − Z−1uvTZ−1

1 + vTZ−1u(42)

where Z ∈ Rn×n, u,v ∈ Rn×1, Z and Z + uvT are invertible, and 1 + vTZ−1u 6= 0, we have

the low-complexity MMSE method as follows

vBR =√gABβ1PAO

−1HH(θAB)vA, (43)

where

O−1 = K−1 − gMBPMK−1HH(θMB)TM,ANTHM,ANH(θMB)K

−1

gMBPMTHM,ANH(θMB)K−1HH(θMB)TM,AN + 1

, (44)

Page 12: 1 Low-complexity and High-performance Receive Beamforming

12

where

K−1 = L−1 − gAB(1− β1)PAL−1HH(θAB)h(θt,AB)h

H(θr,AB)L−1

1 + gAB(1− β1)PAhH(θr,AB)L−1HH(θAB)h(θt,AB), (45)

where

L−1 = M−1 +2gAB(1− β1)PAM

−1HH(θAB)h(θt,AB)hH(θr,AB)M

−1

1− 2gAB(1− β1)PAhH(θr,AB)M−1HH(θAB)h(θt,AB), (46)

where

M−1 = N−1 − gAB(1− β1)PAN−1HH(θAB)h(θt,AB)h

H(θr,AB)N−1

1 + gAB(1− β1)PAhH(θr,AB)N−1HH(θAB)h(θt,AB), (47)

where

N−1 = σ−2B INB

− σ−4B gABβ1PAH

H(θAB)vAvHAH(θAB)

1 + gABβ1PAvHAH(θAB)HH(θAB)vA

. (48)

Proof : See Appendix for detailed deriving process.

After we complete the above derivation, the complexity of the proposed low-complexity MMSE

is reduced to the quadratic function of NB .

D. Proposed NSP-based Max-WFRP Method

We now trun our attention on solving the Max-RP problem, which can be cast as

maxvBR

vHBRH

H(θAB)vAvHAH(θAB)vBR

s.t. (C1) vHBRH

H(θMB) = 01×NM

(C2) vHBRvBR = 1, (49)

where constraint (C1) ensures the malicious jamming lying in the null-space of Bob. To simplify

the above optimization problem, constraint (C1) implies vBR = GvBR, and

G = INB−HH(θMB)[H(θMB)H

H(θMB)]−1H(θMB), (50)

where vBR is defined as a new optimization variable. Since (C1) has projected Malicious jamming

into the null-space of Bob’s channel, we obtain the new model,

rB =√

gABβ1PAGHHH(θAB)vAdA +GH(nA + nM + nB)

=√

gABβ1PAGHHH(θAB)vAdA +GH(nA + nB). (51)

Page 13: 1 Low-complexity and High-performance Receive Beamforming

13

Similar to (21), the left multiplication of (51) by WWF yields

rB =√

β1PAgABWWFGHHH(θAB)vAdA + WWF GH(nA + nB)︸ ︷︷ ︸

nB

, (52)

where WWF is defined as

WWF = (QΛ1

2 )−1 = Λ− 1

2 QH , (53)

and

QΛQH = CnB= E

{nBn

HB

}= GH

(B+ σ2

BINB

)G. (54)

As such, the optimization problem of NSP-based Max-WFRP can be written as

maxvBR

vHBRJvBR

s.t. vHBRvBR = 1, (55)

where

J = WWFGHHH(θAB)vAv

HAH(θAB)GWH

WF . (56)

Considering that the rank of the semi-definite positive matrix J is unit, J can be written as

J = bbH , with b = WWFGHHH(θAB)vA. Similar to (29), the optimal solution of vBR is

directly given by

v∗BR =

b

‖b‖2=

WWFGHHH(θAB)vA

‖WWFGHHH(θAB)vA‖2. (57)

E. Computational Complexity Analysis

In this subsection, we turn to analyze the computational complexities of the above-mentioned

schemes. The computational complexities of MRC, WFMRC, Max-SR, NSP-based Max-WFRP,

Page 14: 1 Low-complexity and High-performance Receive Beamforming

14

low-complexity MMSE and conventional MMSE are respectively given by

CMRC = O(3NANB + 2NB), (58)

CWFMRC = O(N3B + 4N2

A + 7N2B + 5NANB + 3NBNM − 2NA −NB − 1), (59)

CMax−SR = O(N3B + 4N2

A + 8N2B + 5NANB + 3NBNM − 2NA −NB − 1), (60)

CMax−WFRP = O(4N3B +N3

M + 4N2A + 7N2

B + 4NANB + 3NBNM + 3N2M

− 2NA −NM − 2), (61)

CLow−complexity MMSE = O(36N2B + 12NANB + 6NBNM + 3NA +NM − 14NB − 6), (62)

CConventional MMSE = O(N3B + 2N2

ANB + 2N2BNA + 7N2

B +NANB + 2NBNM −NB − 1).

(63)

float-point operations (FLOPs). Obviously, their complexities have a decreasing order: NSP-

based Max-WFRP>Conventional MMSE>Max-SR>WFMRC>Low-complexity MMSE>MRC.

Observing equations from (56) to (62), we find the fact: as NB tends to large-scale, the complex-

ities of MRC, low-complexity MMSE , and remaining methods have the orders O(NB),O(N2B),

and O(N3B). Clearly, the conventional MRC has the lowest complexity among six methods

because its complexity is a linear function of NB . The proposed MMSE, Max-SR, and WFMRC

have the highest same order complexity O(N3B) FLOPs. The proposed low-complexity MMSE

is in between them because its complexity is a quadratic function of NB.

IV. SIMULATION RESULTS AND DISCUSSIONS

In this section, simulations are done to evaluate the performance of the proposed RBF schemes.

System parameters are set as follows: quadrature phase shift keying (QPSK) modulation, PA =

10W , NA = 4, NB = 4, NM = 4, ρ = 10−11, β1 = 0.9, θt,AB = 90◦, θt,AM = 125◦, θt,MB = 45◦,

dAB = 1km, dAM = 4km, dMB = 3km, σ2B = σ2

M .

Fig. 2 plots the curves of SR versus SNR of the four proposed methods with PM = 10W,

where conventional MRC and MMSE are used as a performance benchmark. It can be seen

from this figure that the proposed Max-SR, WFMRC, and low-complexity MMSE have the

same SR performance as conventional MMSE, and achieve the best SR performance among

all six methods. In the low SNR region, the SR performance of conventional MRC is close to

those of the proposed Max-SR, WFMRC, and low-complexity MMSE and better than that of

Page 15: 1 Low-complexity and High-performance Receive Beamforming

15

-10 -5 0 5 10 15 20 25SNR (dB)

0

1

2

3

4

5

6

Sec

recy

Rat

e (b

its/

s/H

z)

Proposed Max-SRConventional MRCProposed WFMRCProposed NSP-based Max-WFRPConventional MMSEProposed Low-complexity MMSE

Fig. 2. Curves of SR versus SNR with PM = 10W .

0 20 40 60 80 100Jamming power P

M(W)

0

1

2

3

4

5

Sec

recy

Rat

e (b

its/

s/H

z)

Proposed Max-SRConventional MRCProposed WFMRCProposed NSP-based Max-WFRPConventional MMSEProposed Low-complexity MMSE

Fig. 3. Curves of SR versus PM with SNR = 15dB and fixed PA=10W.

NSP-based Max-WFRP. The proposed NSP-based Max-WFRP performs much better than MRC

and worse than the proposed WFMRC, Max-SR, and low-complexity MMSE in the medium

and high SNR regions.

Fig. 3 demonstrates the curves of SR versus PM for the proposed five different methods

with SNR = 15dB and fixed PA=10W, where conventional MRC and MMSE are still used

as a performance benchmark. From Fig. 3, it is seen that regardless of the value of PM , the

proposed WFMRC, Max-SR, and low-complexity MMSE still perform much better than the

proposed NSP-based Max-WFRP and conventional MRC in terms of SR. As PM increases,

the SR performance of the proposed WFMRC, Max-SR , and low-complexity MMSE degrade

gradually and finally converge to a SR floor. However, this SR floor is still larger than that of

Page 16: 1 Low-complexity and High-performance Receive Beamforming

16

NSP-based Max-WFRP with NSP. Interestingly, the SR of NSP-based Max-WFRP with NSP

keeps constant and is independent of the change in value of PM due to the use of NSP operation.

Additionally, the conventional MRC shows a dramatic reduction on SR as PM increases. This

means that the proposed NSP-based Max-WFRP with NSP is the most robust one among six

methods. The conventional MRC becomes non-robust as the jamming power PM increases. The

proposed remaining methods are in between NSP-based Max-WFRP and MRC in accordance

with robustiness.

-10 -5 0 5 10 15 20SNR (dB)

10-6

10-5

10-4

10-3

10-2

10-1

100

BE

R

Proposed Max-SRConventional MRCProposed WFMRCProposed NSP-based Max-WFRPConventional MMSEProposed Low-complexity MMSE

Fig. 4. Curves of BER versus SNR with PM=10W.

Fig. 4 demonstrates the curves of BER versus SNR of the proposed five methods with PM =

10W, where conventional MRC is still used as a BER performance benchmark. From Fig. 4,

we can obtain the same performance tendency as Fig. 2. The proposed Max-SR, WFMRC, and

low-complexity MMSE still have the best performance in our BER simulation. In the low SNR

region, the NSP-based Max-WFRP has the worst BER performance, however when the SNR

increases up to a certain level, for example SNR=20dB, its performance will be better than that

of conventional MRC. Six RBF methods have an increasing order on BER performance: MRC,

NSP-based Max-WFRP, Max-SR ≈ WFMRC ≈ conventional MMSE≈ low-complexity MMSE.

V. CONCLUSION

In this paper, we have investigated RBF schemes in a DM network with a FD attacker

Mallory. Four high-performance RBF schemes, WFMRC, Max-SR, NSP-based Max-WFRP, and

low-complexity MMSE were proposed to mitigate the impact of the jamming signal on Bob.

Page 17: 1 Low-complexity and High-performance Receive Beamforming

17

First, the conventional MRC was presented to strengthen CM. Due to the colored the jamming

plus noise at Bob, the WFMRC was proposed to convert the colored noise to a white one.

Then, the Max-SR and low-complexity MMSE were proposed and shown to be equivalent to

WFMRC. Eventually, to completely remove the jamming from Mallory, a NSP-based Max-

WFRP was proposed. Moreover, their closed-form expressions were derived with extremely

low-complexities. Simulation results show that the proposed four methods perform much better

than the conventional MRC in the medium and high SNR regions, and their SR performances are

in an increasing order: MRC, NSP-based Max-WFRP, and Max-SR=WFMRC=low-complexity

MMSE. Compared with conventional MRC, the proposed five methods are more robust against

the change of jamming power at Mallory. In particular, the proposed NSP-based Max-WFRP

is independent of the change in jamming power at Mallory, and the most robust one among

six methods. More importantly, the proposed low-complexity MMSE achieve the same optimal

performance as WFMRC, Max-SR, and conventional MMSE while its complexity is one order

of magnitude lower than those of the latter methods. This is very attractive.

APPENDIX

APPENDIX: DERIVATION OF LOW-COMPLEXITY MMSE

In order to reduce the complexity of the conventional MMSE in (41), let us first define a new

matrix

O = gABβ1PAHH(θAB)vAv

HAH(θAB) +RnA

+RnM+RnB

= gABβ1PAHH(θAB)vAv

HAH(θAB) + gAB(1− β1)PAH

H(θAB)TA,ANTHA,ANH(θAB)

+ gMBPMHH(θMB)TM,ANTHM,ANH(θMB) + σ2

BINB, (64)

where the rank of matrix HH(θAB)vAvHAH(θAB), RnA

, and RnMin matrix O are one. The

receive beamforming at Bob can be rewritten as

vBR =√gABβ1PAO

−1HH(θAB)vA. (65)

Page 18: 1 Low-complexity and High-performance Receive Beamforming

18

In order to compute the inverse of matrix O, we rearrange its inverse in the following form

O−1 = [σ2BINB

+A+ gAB(1− β1)PAHH(θAB)TA,ANT

HA,ANH(θAB)︸ ︷︷ ︸

K

+ gMBPMHH(θMB)TM,AN︸ ︷︷ ︸uO

THM,ANH(θMB)︸ ︷︷ ︸

vT

O

]−1

= (K+ uOvTO)−1

(66)

Observing the above expression, it is clear that uO and vO are the rank-one column vectors,

using the Sherman-Morrison formula, we directly have

O−1 = K−1 − K−1uOvTOK−1

1 + vTOK−1uO

= K−1 − gMBPMK−1HH(θMB)TM,ANTHM,ANH(θMB)K

−1

1 + gMBPMTHM,ANH(θMB)K−1HH(θMB)TM,AN

, (67)

Similarly, in the following, by repeatedly making use of the Sherman-Morrison formula four

times, we get the inverse matrix

K−1 = [σ2BINB

+A+ gAB(1− β1)PAHH(θAB)H(θAB)− 2gAB(1− β1)PAH

H(θAB)H(θAB)︸ ︷︷ ︸L

+ gAB(1− β1)PAHH(θAB)h(θt,AB)︸ ︷︷ ︸

uK

hH(θr,AB)︸ ︷︷ ︸vT

K

]−1

= (L + uKvTK)−1

= L−1 − L−1uKvTKL−1

1 + vTKL−1uK

= L−1 − gAB(1− β1)PAL−1HH(θAB)h(θt,AB)h

H(θr,AB)L−1

1 + gAB(1− β1)PAhH(θr,AB)L−1HH(θAB)h(θt,AB), (68)

where uK and vK are the rank-one column vectors, which yields

L−1 = [σ2BINB

+A+ gAB(1− β1)PAHH(θAB)H(θAB)︸ ︷︷ ︸

M

−2gAB(1− β1)PAHH(θAB)h(θt,AB)︸ ︷︷ ︸

uL

• hH(θr,AB)︸ ︷︷ ︸vT

L

]−1

= (M+ uLvTL)−1

= M−1 − M−1uLvTLM−1

1 + vTLM−1uL

= M−1 +2gAB(1− β1)PAM

−1HH(θAB)h(θt,AB)hH(θr,AB)M

−1

1− 2gAB(1− β1)PAhH(θr,AB)M−1HH(θAB)h(θt,AB), (69)

Page 19: 1 Low-complexity and High-performance Receive Beamforming

19

where uL and vL are the rank-one column vectors, which yields

M−1 = [σ2BINB

+A︸ ︷︷ ︸N

+ gAB(1− β1)PAHH(θAB)h(θt,AB)︸ ︷︷ ︸

uM

hH(θr,AB)︸ ︷︷ ︸vT

M

]−1

= (N+ uMvTM)−1

= N−1 − N−1uMvTMN−1

1 + vTMN−1uM

= N−1 − gAB(1− β1)PAN−1HH(θAB)h(θt,AB)h

H(θr,AB)N−1

1 + gAB(1− β1)PAhH(θr,AB)N−1HH(θAB)h(θt,AB), (70)

where uM and vM are the rank-one column vectors, which yields

N−1 = [σ2BINB

+ gABβ1PAHH(θAB)vA︸ ︷︷ ︸

uN

vHAH(θAB)︸ ︷︷ ︸

vT

N

]−1

= (σ2BINB

+ uNvTN)−1

= σ−2B INB

− σ−4B uNv

TN

1 + σ−2B vT

NuN

= σ−2B INB

− σ−4B gABβ1PAH

H(θAB)vAvHAH(θAB)

1 + gABβ1PAvHAH(θAB)HH(θAB)vA

, (71)

where uN and vN are still the rank-one column vectors.

REFERENCES

[1] H. M. Wang, Q. Yin, and X.-G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks,”

IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532–3545, Jul. 2012.

[2] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. Chen, “A survey on multiple-antenna techniques for physical layer

security,” IEEE Communications Surveys Tutorials, vol. 19, no. 2, pp. 1027–1053, 2017.

[3] N. Zhao, F. R. Yu, M. Li, and V. C. M. Leung, “Anti-eavesdropping schemes for interference alignment (ia)-based wireless

networks,” IEEE Trans. Wirel. Commun., vol. 15, no. 8, pp. 5719–5732, 2016.

[4] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure massive mimo transmission with an active eavesdropper,”

IEEE Trans. Inf. Theory, vol. 62, no. 7, pp. 3880–3900, Jul. 2016.

[5] Y. Zou, J. Zhu, X. Li, and L. Hanzo, “Relay selection for wireless communications against eavesdropping: A security-

reliability trade-off perspective,” IEEE Netw., vol. 30, no. 5, pp. 74–79, Oct. 2016.

[6] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wirel. Commun., vol. 7, no. 6, pp. 2180–

2189, Jun. 2008.

[7] L. Wang, Z. Zhang, M. Dong, L. Wang, Z. Cao, and Y. Yang, “Securing named data networking: Attribute-based encryption

and beyond,” IEEE Commun Mag, vol. 56, no. 11, pp. 76–81, Nov. 2018.

[8] F. Shu, T. Shen, L. Xu, Y. Qin, S. Wan, S. Jin, X. You, and J. Wang, “Directional modulation: A physical-layer security

solution to b5g and future wireless networks,” IEEE Network, vol. 34, no. 2, pp. 210–216, 2020.

[9] Y. Ding and V. Fusco, “Orthogonal vector approach for synthesis of multi-beam directional modulation transmitters,” IEEE

Antennas Wirel. Propag. Lett., vol. 14, pp. 1330–1333, Feb. 2015.

Page 20: 1 Low-complexity and High-performance Receive Beamforming

20

[10] F. Shu, X. Wu, J. Li, R. Chen, and B. Vucetic, “Robust synthesis scheme for secure multi-beam directional modulation in

broadcasting systems,” IEEE Access, vol. 4, pp. 6614–6623, Oct. 2016.

[11] F. Shu, X. Wu, J. Hu, J. Li, R. Chen, and J. Wang, “Secure and precise wireless transmission for random-subcarrier-

selection-based directional modulation transmit antenna array,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 890–904,

Apr. 2018.

[12] M. P. Daly and J. T. Bernhard, “Directional modulation technique for phased arrays,” IEEE Trans. Antennas Propag.,

vol. 57, no. 9, pp. 2633–2640, Sep. 2009.

[13] J. Hu, F. Shu, and J. Li, “Robust synthesis method for secure directional modulation with imperfect direction angle,” IEEE

Communications Letters, vol. 20, no. 6, pp. 1084–1087, 2016.

[14] J. Hu, S. Yan, F. Shu, J. Wang, J. Li, and Y. Zhang, “Artificial-noise-aided secure transmission with directional modulation

based on random frequency diverse arrays,” IEEE Access, vol. 5, pp. 1658–1667, Jan. 2017.

[15] B. Qiu, J. Xie, L. Wang, and Y. Wang, “Artificial-noise-aided secure transmission for proximal legitimate user and

eavesdropper based on frequency diverse arrays,” IEEE Access, vol. 6, pp. 52 531–52 543, 2018.

[16] B. Qiu, L. Wang, J. Xie, Z. Zhang, Y. Wang, and M. Tao, “Multi-beam index modulation with cooperative legitimate users

schemes based on frequency diverse array,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11 028–11 041,

2020.

[17] Q. Cheng, V. Fusco, J. Zhu, S. Wang, and C. Gu, “Svd-aided multi-beam directional modulation scheme based on frequency

diverse array,” IEEE Wireless Communications Letters, vol. 9, no. 3, pp. 420–423, 2020.

[18] Q. Cheng, V. Fusco, J. Zhu, S. Wang, and F. Wang, “Wfrft-aided power-efficient multi-beam directional modulation schemes

based on frequency diverse array,” IEEE Transactions on Wireless Communications, vol. 18, no. 11, pp. 5211–5226, 2019.

[19] J. Xiong, S. Y. Nusenu, and W.-Q. Wang, “Directional modulation using frequency diverse array for secure communica-

tions,” Wireless Personal Communications, vol. 95, pp. 2679–2689, 2017.

[20] W. Wang, “Dm using fda antenna for secure transmission,” IET Microwaves, Antennas Propagation, vol. 11, no. 3, pp.

336–345, 2017.

[21] B. Zhang, W. Liu, and Q. Li, “Multi-carrier waveform design for directional modulation under peak to average power ratio

constraint,” IEEE Access, vol. 7, pp. 37 528–37 535, 2019.

[22] B. Zhang and W. Liu, “Multi-carrier based phased antenna array design for directional modulation,” IET Microwaves,

Antennas Propagation, vol. 12, no. 5, pp. 765–772, 2018.

[23] H. Zhu and J. Wang, “Chunk-based resource allocation in ofdma systems - part i: chunk allocation,” IEEE Transactions

on Communications, vol. 57, no. 9, pp. 2734–2744, 2009.

[24] ——, “Chunk-based resource allocation in ofdma systems—part ii: Joint chunk, power and bit allocation,” IEEE

Transactions on Communications, vol. 60, no. 2, pp. 499–509, 2012.

[25] F. Shu, Y. Qin, T. Liu, L. Gui, Y. Zhang, J. Li, and Z. Han, “Low-complexity and high-resolution doa estimation for hybrid

analog and digital massive mimo receive array,” IEEE Trans Commun, vol. 66, no. 6, pp. 2487–2501, Jun. 2018.

[26] Z. Zhuang, L. Xu, J. Li, J. Hu, L. Sun, F. Shu, and J. Wang, “Machine-learning-based high-resolution doa measurement and

robust directional modulation for hybrid analog-digital massive mimo transceiver,” Science China Information Sciences,

vol. 63, 08 2020.

[27] S. Xu, W. Xu, C. Pan, and M. Elkashlan, “Detection of jamming attack in non-coherent massive simo systems,” IEEE

Trans. Inf. Forensics Secur., vol. 14, no. 9, pp. 2387–2399, Sep. 2019.

Page 21: 1 Low-complexity and High-performance Receive Beamforming

21

[28] Y. O. Basciftci, O. Gungor, C. E. Koksal, and F. Ozguner, “On the secrecy capacity of block fading channels with a hybrid

adversary,” IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1325–1343, Mar. 2015.

[29] A. Mukherjee and A. L. Swindlehurst, “A full-duplex active eavesdropper in mimo wiretap channels: Construction and

countermeasures,” in Proc. Asilomar Conf. Sign. Syst. Comput., Nov. 2011, pp. 265–269.

[30] H. Chen, X. Tao, N. Li, Y. Hou, J. Xu, and Z. Han, “Secrecy performance analysis for hybrid wiretapping systems using

random matrix theory,” IEEE Trans. Wirel. Commun., vol. 18, no. 2, pp. 1101–1114, Feb. 2019.

[31] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005.

[32] R. A. Horn and C. R. Johnson, Matrix Analysis, 2nd ed. Cambridge University Press, 2012.