Next Article in Journal
Predicting the Health Status of an Unmanned Aerial Vehicles Data-Link System Based on a Bayesian Network
Next Article in Special Issue
EmoTour: Estimating Emotion and Satisfaction of Users Based on Behavioral Cues and Audiovisual Data
Previous Article in Journal
Generative Adversarial Networks-Based Semi-Supervised Automatic Modulation Recognition for Cognitive Radio Networks
Previous Article in Special Issue
Combined Channel Estimation with Interference Suppression in CPSS
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays

1
School of Electrical Engineering and Automation, Wuhan University, Wuhan 430072, China
2
School of Automation and Mechanical Engineering, Kunming University, Kunming 650118, China
3
School of Information Engineering, Space Engineering University, Beijing 101400, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(11), 3914; https://doi.org/10.3390/s18113914
Submission received: 29 September 2018 / Revised: 29 October 2018 / Accepted: 2 November 2018 / Published: 13 November 2018
(This article belongs to the Special Issue Exploiting the IoT within Cyber Physical Social System)

Abstract

:
In this article, we first investigate secure communications for a two-hop interference channel relay system with imperfect channel estimation in the wireless Internet of Things (IoT), where K source-destination pairs communicate simultaneously when an eavesdropper exists. We jointly conceive source, relay and destination matrices upon minimizing total mean-squared error (MSE) of all legitimate destinations while keeping the MSE at eavesdropper above a given threshold. We illuminate that the design of the source, relay and destination matrices is subject to both transmit power constraints and secrecy requirements. More specifically, we propose an efficient robust iterative distributed algorithm to simplify the process of the joint design for optimal source, relay and destination matrices. Furthermore, the convergence of the iterative distributed algorithm is described. Additionally, the performances of our proposed algorithm, such as its secrecy rate and MSE, are characterized in the form of simulation results. The simulation results reveal that the proposed algorithm is superior to the traditional approach. As a benefit, secure communications can be ensured by using the proposed algorithm for the multiple input multiple output (MIMO) interference relay IoT network in the presence of an eavesdropper.

1. Introduction

Future Internet of Things networks integrate the existing and evolving network with developments in communication and sensing fields, such as multi-hop, self-configuration and enhance the security of the communications with proper management to create an intelligent network that can be sensed [1,2,3,4,5,6]. Recently, with the rapid technological advancements of relay networks, wireless multi-hop relay networks (such as wireless sensor network) have become a popular technology for the future IoT networks [7,8,9,10,11]. Along with the enormous development in the field of wireless communication and hardware technology, wireless multi-hop relay networks are considered as major applications in IoT [12].
As the application scenarios in wireless IoT, the multi-hop relay networks consist of spatially distributed sensors or nodes, which enable IoT devices to collect and exchange data in relay manner. Since the broadcasting nature of wireless communications, this wireless IoT is more prone to eavesdropping [13]. Therefore, security is required, which can be accomplished by security approaches. Most of the security approaches for the wireless multi-hop IoT are deployed in the upper layers of the networks. However, nearly all upper-layer security approaches for IoT believe that the opponent or eavesdropper can obtain entirely control over a sensor or node by way of decoding cryptographic scheme [14]. Physical layer security technology, which comes from information theory to achieve perfect security [15,16,17], is found to be more robust than upper-layer security approaches for the IoT with multi-hop relay connectivity [13].
The physical layer security of the traditional close-range wireless systems mainly considers that the eavesdropper wiretaps the messages between sources and legitimate destinations. However, the security of long-range relays system considers that the eavesdropper wiretaps not only the messages between sources and relays but also the messages between relays and legitimate destinations. Therefore, the security of long-range relays system become more complexity than that of traditional wireless systems for close-range communication [18,19].
Physical layer security has been focused for multi-hop relay networks to combat eavesdropping for IoT [20,21,22,23,24,25]. In Reference [13], both channel aware encryption and precoding strategies are discussed in multi-hop IoT to achieve secrecy communication subject to resource constraints. In References [20,21], the authors select the optimal relay to improve security by joint relay and jammer selection algorithm, which may not fully take advantage of all relay nodes. In Reference [22], the problem of secure resource allocation for a two-way single relay wireless network is investigated, which is designed under schemes of applying and not applying cooperative jamming in the case of an eavesdropper. Security enhancement algorithm for IoT communication exposed to eavesdroppers has been forced on transmission design [23]. The authors in Reference [24] study the problem of improving security for the important data collection in IoT, where eavesdroppers can decode the signal extremely by combining their observations. The precoding matrices are optimized to satisfy that the MSEs at legitimate receivers are small and the MSE at eavesdropper is large in a relay aided cellular interference IoT system [25]. There are also some other schemes of achieving security, which are worth investigating. For instance, artificial noise has played an important role in enhancing the wireless communication physical layer secrecy in a two-hop relay network [26]. Furthermore, transmit beamforming is employed in an Amplify-and-Forward MIMO relay system, in order to obtain the maximum secrecy rate [27].
Although physical layer security for multi-hop relay IoT networks has been studied well, the resultant problem for secure communications still remains a significant challenge when the relay networks are faced with interferences and imperfect channel estimation. Some literature considers physical layer security problem just in interference channels. In Reference [28], a joint power control and beamforming algorithm is proposed for minimizing the total transmitted power, while keeping the signal-to-interference-plus-noise ratio (SINR) at each receiver over an expected threshold. An iterative distributed algorithm is used to design transmit precoding matrices and receive filter matrices for secure communications over the MIMO interference channels with an eavesdropper [29]. Other literatures just consider imperfect channel estimation. In Reference [30], an efficient beamforming approach has been proposed to combat eavesdropper with imperfect channel estimation. Secrecy outage analysis over a multiplicative composite channel model has been investigated with imperfect channel estimation [31].
To the best of our knowledge, the works on interference relay networks analysis and design for physical layer security in IoT system under imperfect channel estimation are still absent. Motivated by this challenge, we aim to provide secure communications for a two-hop relay system in future IoT with power supply strategy in this paper, where multiple source-destination pairs communicate simultaneously over the relay-interference channel in the presence of an active eavesdropper. In our article, we use MSE as the main performance metric. The system-wide minimum MSE (MMSE) has been considered in many works. In Reference [32], MMSE performance metric has been considered in a multiuser MIMO system where a distributed iterative algorithm and interference alignment are presented. In Reference [33], a weighted-MMSE method is proposed to apply in the optimization problems of sum-rate maximization, sum-MSE minimization and sum SINR maximization, respectively. However, the security problem of relays system is not considered in References [32,33].
To guarantee security in the relays system for IoT, we design an optimization scheme in order to minimize the total MSE estimated at legitimate destinations and keep the MSE at eavesdropper above an expected threshold, which is subject to the transmission power constrains at relay nodes and source nodes. To implement this optimization scheme, the source, relay and destination matrices must be jointly designed. Nevertheless, there exists a huge problem to design these matrices mentioned above, because the optimization scheme is too complicated to achieve the closed form solution or numerical solution of these matrices.
To conquer the above problem, we proposed an iterative distributed algorithm to simplify the optimization scheme. Specifically, for the sake of achieving the source, relay and destination matrices, we circularly calculate one of them by using the other two matrix variables obtained from previous iterations. Furthermore, Kronecker product is employed to facilitate the process of solving these matrix variables. Consequently, the acquisition of the numerical solution of the source, relay and destination matrices are much easier. Additionally, our simulation results demonstrate that the proposed iterative distributed algorithm will converge to a constant after several iterations. We also reveal that our proposed algorithm is superior to the traditional approach.
The remainder of the article is organized as follows. In Section 2, we describe the system model and propose the optimization problem. In Section 3, we propose an iterative distributed algorithm for dividing the non-convex optimization problem into three sub-problems. In Section 4, we demonstrate the convergence of the proposed algorithm. In Section 5, the simulation results are presented. In Section 6, the conclusions are summarized.
Notation: In this article, we use (.)H to represent Hermitian transpose, Tr(.) to represent the trace of a matrix, E{.} to represent the expectation, I to represent the identity matrix, 0 to represent a matrix or vector whose all element are zeros, Y ~ C N ( μ ,   σ 2 ) to represent Y following the complex normal distribution with mean μ and variance σ 2 . b d ( . ) to represent a block-diagonal matrix, v e c ( . ) to represent stack columns of a matrix on top of each other into a single vector, . to represent 2-norm of a vector, to represent Kronecker product and to represent the complex field.

2. System Model and Methods

In this article, we investigate secrecy communication over the MIMO interference channels in two-hop relay system for the wireless IoT [34,35]. As shown in Figure 1, K source nodes transmit data to corresponding destination nodes by employing M IoT relay nodes. Meanwhile, an eavesdropper tries to wiretap the data from source. Assuming that the sophisticated eavesdropper can calculate its optimal receive matrix relying on minimizing its own total MSE [36]. Considering the path loss and transmission power constrains, the direct links between sources and destinations are negligible. According to previous related study [18,19], we assume that the eavesdropper is near by the relay and far away from the source. Therefore, the eavesdropper wiretapping the messages from both the sources and the relays simultaneously is difficult. Hence, we only consider the links from relay to eavesdropper and ignore the links from source to eavesdropper. The interference channels exist in the system when one of the source nodes transmits signal to corresponding destination while the others source nodes transmit signals synchronously.
In the system model, the sets of source nodes, relay nodes, corresponding destination nodes and the source-destination pairs are denoted as { S k } , { R m } , { D k } and { ( S k , D k ) } , where k = 1 , , K ,   m = 1 , , M . More generally, the eavesdropper is denoted as E. Furthermore, S k , R m , D k and eavesdropper are equipped with T k , Q m , N k and N e antennas. We consider that the channels undergo slow varying flat Rayleigh fading. We also assume that the noise at all receiving nodes is additive white Gaussian noise (AWGN) with zero mean and variance σ 2 [37]. We denote H k m , G m k and G m e as the actual channel matrices of S k R m , R m D k and R m E links.
The relays work in half-duplex model with amplify and forward (AF) strategy. So there needs two time slots to complete the data exchange between source and destination. In the first time slot, S k transmits data s k to R m , then the R m receives the incoming signal with its receiving antennas and transmits y r m to D k and eavesdropper in the second time slot. The received signals at R m , D k and eavesdropper can be denoted as follows
y r m = k = 1 K H k m s k + n r m , m = 1 , , M ,
y d k = m = 1 M G m k y r m + n d k , k = 1 , , K ,
y e = m = 1 M G m e y r m + n e ,
where y r m Q m × 1 is the received signal vector at relay R m ; y d k N k × 1 is the received signal vector at destination D k ; y e N e × 1 is the received signal vector at the eavesdropper E; H k m Q m × T k is denoted as channel gain between source S k and relay R m ; G m k N k × Q m is denoted as channel gain between relay R m and destination D k ; G m e N e × Q m is denoted as channel gain between relay R m and eavesdropper E; s k T k × 1 is the transmitted data vector at source S k ; n r m Q m × 1 , n d k N k × 1 and n e N e × 1 are AWGN vectors at R m , D k and eavesdropper with zero mean and covariance matrix σ r m 2 I Q m , σ d k 2 I N k and σ e 2 I N e .
To minimize total MSE at destinations and achieve secure communication, we jointly design transmit precoding matrices at source and relay and linear receive matrices at destinations and eavesdropper, which are subject to transmission power constrains at source and relay. For the sake of seeking optimum solution about above matrices, we scheme an iterative distributed algorithm.
Before transmitting the data s k , we utilize transmit precoding matrix U k to encode the data s k at source S k . Similarly, we utilize transmit precoding matrix V m to encode the data y r m at relay R m . The received signals at R m , D k and eavesdropper are as follows
y r m = k = 1 K H k m U k s k + n r m , m = 1 , , M ,
y d k = m = 1 M G m k V m y r m + n d k , k = 1 , , K ,
y e = m = 1 M G m e V m y r m + n e ,
In most scenarios, perfect channel estimation is considered. However, channel estimation is far from being perfect in realistic practical system. Hence, we assume imperfect channel estimation in our article. Here, P s k and P r m denote the maximum transmission power at S k and R m . N p denotes the number of channel estimation pilot symbols. Considering H ^ k m , G ^ m k and G ^ m e as the estimated channel matrices and E h , k m , E r , m k , and E e , m e as the MMSE estimation error matrices, respectively, we obtain the relationship of the estimated and actual channel matrices as H k m = H ^ k m + E h , k m , G m k = G ^ m k + E r , m k , G m e = G ^ m e +   E e , m e , where E h , k m Q m × T k ~ C N ( 0 ,   ( 1 + ρ h SNR h ) 1 ) with ρ h = N p / T k and SNR h = P s k / σ r m 2 , E r , m k N k × Q m ~ C N ( 0 ,   ( 1 + ρ r SNR r ) 1 ) with ρ r = N p / Q m and SNR r = P r m / σ d k 2 , and E e , m e N e × Q m ~ C N ( 0 ,   ( 1 + ρ e SNR e ) 1 ) with ρ e = N p / Q m and SNR e = P r m / σ e 2 .
Finally, both destination D k and the eavesdropper employ linear receive matrix W k and W e , k respectively to receive the transmitted signals. Assuming imperfect channel estimation above mention, the estimate of the data s k at D k and the eavesdropper can be denoted as follows
s ^ k = W k H y d k = W k H ( m = 1 M l = 1 K ( G m k E r , m k ) V m ( H l m E h , l m ) U l s l + m = 1 M ( G m k E r , m k ) V m n r m + n d k ) ,
s ^ e k = W e , k H y e = W e , k H ( m = 1 M l = 1 K ( G m e E e , m e ) V m ( H l m E h , l m ) U l s l + m = 1 M ( G m e E e , m e ) V m n r m + n e ) ,
where W k and W e , k are the T k × N k and T k × N e , k receive weight matrices. We assume that E { s k s k H } = I T k is the covariance matrix of the data s k at S k . From Equation (7), the MSE of estimating s k at D k can be calculated as
MSE k = t r ( E { ( s ^ k s k ) ( s ^ k s k ) H } ) = t r ( ( m = 1 M W k H ( G m k E r , m k ) V m ( H k m E h , k m ) U k I T k ) ( m = 1 M W k H ( G m k E r , m k ) V m ( H k m E h , k m ) U k I T k ) H + m = 1 M σ r m 2 W k H ( G m k E r , m k ) V m V m H ( G m k E r , m k ) H W k + m = 1 M l = 1 , l k K W k H ( G m k E r , m k ) V m ( H l m E h , l m ) U l U l H ( H l m E h , l m ) H V m H ( G m k E r , m k ) H W k + σ d k 2 W k H W k ) .
Similarly, we can get the MSE of estimating s k at eavesdropper as follows
MSE e , k = t r ( E { ( s ^ e k s k ) ( s ^ e k s k ) H } ) = t r   ( ( m = 1 M W e , k H ( G m e E e , m e ) V m ( H k m E h , k m ) U k I T k ) ( m = 1 M W e , k H ( G m e E e , m e ) V m ( H k m E h , k m ) U k I T k ) H + m = 1 M σ r m 2 W e , k H ( G m e E e , m e ) V m V m H ( G m e E e , m e ) H W e , k + m = 1 M l = 1 , l k K W e , k H ( G m e E e , m e ) V m ( H l m E h , l m ) U l U l H ( H l m E h , l m ) H V m H ( G m e E e , m e ) H W e , k + σ e 2 W e , k H W e , k ) .
The transmission power constraints at source S k and relay R m are as follows
t r ( U k E { s k s k H } U k H ) P s k , k = 1 , , K ,
t r ( V m E { y r m y r m H } V m H ) P r m , m = 1 , , M ,
where P s k and P r m denote the maximum transmission power at S k and R m .
Without eavesdropper, the K legitimate communication pairs can achieve their maximum communication rates and the transmission is secure and reliable. However, when there exists an eavesdropper, the signals from source may be leaked out to the eavesdropper.
In order to elaborate more specifically and clearly, we assume a worst-case situation, namely in the presence of a sophisticated eavesdropper which can obtain the channel state information and our proposed algorithm, the eavesdropper calculates its linear receive matrix W e , k to minimize its own MSE e , k . To prevent this, we exploit the assumption to conceive the precoding/receive matrices for legitimate system at source or relay.
The solution of the source matrices { U k } , relay matrices { V m } and destination matrices { W k } is vital. The solution of the problem is to utilize the source, relay and destination matrices to minimize the total MSE of all legitimate destination nodes and keep the MSE e , k above an expected threshold ε k   ( k = 1 , , K ) , while subjecting to the transmission power constrains at source and relay. The solution is denoted as follows
m i n { U k } , { V m } , { W k }   :   k = 1 K MSE k s . t .     :   MSE e , k ε k , t r ( U k E { s k s k H } U k H ) P s k , t r ( V m E { y r m y r m H } V m H ) P r m ,
where { U k } ,   { V m } and { W k } are the solution obtained.

3. The Iterative Distributed Algorithm of Solving Source, Relay, Destination and Eavesdropper Matrices

Due to the non-convex problem (13) with matrix variables, so we are facing an uphill battle to obtain the optimum solution of the joint design matrices. To deal with the solution, we design an iterative distributed algorithm to jointly design the optimal solution of the source matrices { U k } , relay matrices { V m } and destination matrices { W k } . The whole solving process of the three matrix variables is divided into three steps. We circularly calculate one of them by using the other two matrix variables obtained from previous iterations, the non-convex problem (13) is transformed into three sub-problems in each step.
The objective function of (13) can be denoted by total MSE (TMSE) as follows
TMSE = k = 1 K MSE k .

3.1. Solution of Destination Matrices { W k }

In the first iteration of our proposed algorithm, we set the initial value of { U k } and { V m } , then calculate the optimal solution of { W k } . Thus, at the following iteration of the algorithm, we calculate the optimal { W k } by utilizing previously obtained { U k } and { V m } .
It is obvious from (13) that { W k } are independent with transmission power constrains of source and relay. Therefore, we can obtain the optimal linear receive matrices { W k } to minimize the total MSE at destination by the well-known linear MMSE receiver [38], which can be formulated as
W k = ( m = 1 M l = 1 K ( G m k E r , m k ) V m ( H l m E h , l m ) U l U l H ( H l m E h , l m ) H V m H ( G m k E r , m k ) H + m = 1 M σ r m 2 ( G m k E r , m k ) V m V m H ( G m k E r , m k ) H + σ d k 2 I N k ) 1 ( m = 1 M ( G m k E r , m k ) V m ( H k m E h , k m ) U k ) .
Assuming that the eavesdropper employs the above well-known linear MMSE method to calculate its linear receive matrix W e , k ., which can be formulated as
W e , k = ( m = 1 M l = 1 K ( G m e E e , m e ) V m ( H l m E h , l m ) U l U l H ( H l m E h , l m ) H V m H ( G m e E e , m e ) H + m = 1 M σ r m 2 ( G m e E e , m e ) V m V m H ( G m e E e , m e ) H + σ e 2 I N e ) 1 ( m = 1 M ( G m e E e , m e ) V m ( H k m E h , k m ) U k ) .

3.2. Solution of Source Matrices { U k }

After obtaining the optimal matrices { W k } , we can calculate the transmit precoding matrices { U k } with { W k } obtained from current iteration and { V m } obtained from the previous iteration.
For further analysis, the TMSE of (14) can be specifically written as
TMSE = k = 1 K t r ( m = 1 M l = 1 K W k H ( G m k E r , m k ) V m ( H l m E h , l m ) U l U l H ( H l m E h , l m ) H V m H ( G m k E r , m k ) H W k ) k = 1 K t r ( m = 1 M W k H ( G m k E r , m k ) V m ( H k m E h , k m ) U k ) + k = 1 K t r ( m = 1 M U k H ( H l m E h , l m ) H V m H ( G m k E r , m k ) H W k ) + k = 1 K t r ( m = 1 M σ r m 2 W k H ( G m k E r , m k ) V m V m H ( G m k E r , m k ) H W k + σ d k 2 W k H W k + I T k )
Define P k , m , l = W k H ( G m k E r , m k ) V m ( H l m E h , l m ) , so (17) can be written as
TMSE = k = 1 K t r ( m = 1 M l = 1 K P k , m , l U l U l H P k , m , l H ) k = 1 K t r ( m = 1 M P k , m , k U k ) k = 1 K t r ( m = 1 M U k H P k , m , k H ) + k = 1 K t r ( m = 1 M σ r m 2 W k H ( G m k E r , m k ) V m V m H ( G m k E r , m k ) H W k + σ d k 2 W k H W k + I T k )
Define P k , m = [ P k , m , 1 ,   P k , m , 2 ,   ,   P k , m , K ] , P ^ k , k = m = 1 M P k , m , k , U = b d ( U 1 ,   U 2 ,   ,   U K ) .
TMSE = k = 1 K t r ( m = 1 M P k , m U U H P k , m H ) k = 1 K t r ( P ^ k , k U k ) k = 1 K t r ( U k H P ^ k , k H ) + γ ,
where γ = k = 1 K t r ( m = 1 M σ r m 2 W k H ( G m k E r , m k ) V m V m H ( G m k E r , m k ) H W k + σ d k 2 W k H W k + I T k ) . γ is independent with { U k } , so it can be ignored in the solving process. Let P ^ = b d [ P ^ 1 , 1 ,   P ^ 2 , 2 , ,   P ^ K , K ] , from (19) we can get
TMSE = k = 1 K t r ( m = 1 M P k , m U U H P k , m H ) t r ( P ^ U ) t r ( U H P ^ H ) + γ .
To solve the above problems simplistically, we introduce some important formulas of Reference [39]
tr ( A H B ) = ( v e c ( A ) ) H v e c ( B ) ,   tr ( A H B A C ) = ( v e c ( A ) ) H ( C H B ) v e c ( A ) , v e c ( A B C ) = ( C H A ) v e c ( B ) .
And define u v e c ( U ) and U k = t k U t k H , where t k = [ 0 T k × l = 1 k 1 T l   I T k × T k   0 T k × l = k + 1 K T l ] . We can further simplify Formula (20) as follows
TMSE =   u H ω u ψ u u H ψ H + γ ,
where τ = b d ( I T 1 ,   I T 2 ,   ,   I T K ) , ω = k = 1 K m = 1 M τ P k , m H P k , m , ψ = ( v e c ( P ^ H ) ) H .
In the same way, we can obtain the simplified formula of MSE e , k as follows
MSE e , k = u H ω e , k u ψ e , k u u H ψ e , k H + γ e ,
where P e , k , m , l = W e , k H ( G m e E e , m e ) V m ( H l m E h , l m ) , P e , k , m = [ P e , k , m , 1 ,   P e , k , m , 2 ,   ,   P e , k , m , K ] , P ^ e , k , k = m = 1 M P e , k , m , k , ω e , k = m = 1 M τ P e , k , m H P e , k , m , γ e = t r ( m = 1 M σ r m 2 W e , k H ( G m e E e , m e ) V m V m H ( G m e E e , m e ) H W e , k + σ e , k 2 W e , k H W e , k + I T k ) and ψ e , k = ( v e c ( P ^ e , k , k H ) ) H ( t k t k ) .
Because of E { s k s k H } = I T k , the transmission power constrains (11) can be rewritten as
t r ( t k U t k H ( t k U t k H ) H ) P s k , k = 1 , , K ,
Then we obtain (24)
u H ρ u P s k , k = 1 , , K ,
where ρ = ( t k H t k ) ( t k H t k ) .
From (21), (22) and (24), the source matrices optimization problem is denoted as
  m i n { U k }   :   TMSE   s . t .   :     MSE e , k ε k   u H ρ u P s k
The source matrices optimization problem (25) is a quadratic constrained quadratic programming (QCQP) problem [40]. Compared with the non-convex problem (13), the (25) will be solved by the CVX of MATLAB toolbox [41].

3.3. Solution of Relay Matrices { V m }

Since { W k } , { W e , k } and { U k } are already obtained, the TMSE can be rewritten as
TMSE = k = 1 K t r ( m = 1 M l = 1 K G ¯ m k V m H ¯ l m H ¯ l m H V m H G ¯ m k H ) k = 1 K t r ( m = 1 M G ¯ m k V m H ¯ k m )   k = 1 K t r ( m = 1 M H ¯ k m H V m H G ¯ m k H ) + k = 1 K t r ( m = 1 M σ r m 2 G ¯ m k V m V m H G ¯ m k H + σ d k 2 W k H W k + I T k )
where G ¯ m k = W k H ( G m k E r , m k ) , H ¯ k m = ( H k m E h , k m ) U k . Define V = b d ( V 1 ,   V 2 ,   ,   V M ) , G ¯ k = b d [ G ¯ 1 k , G ¯ 2 k , , G ¯ M k ] , η = b d [ σ r 1 2 I Q 1 , σ r 2 2 I Q 2 , , σ r M 2 I Q M ] , H ¯ k = b d [ H ¯ k 1 , H ¯ k 2 , , H ¯ k M ] , β = k = 1 K ( σ d k 2 W k H W k + I T k ) . Then the TMSE can be simplified as
TMSE = k = 1 K t r ( G ¯ k V ( l = 1 K H ¯ l H ¯ l H ) V H G ¯ k H ) k = 1 K t r ( G ¯ k V H ¯ k ) k = 1 K t r ( H ¯ k H V H G ¯ k H ) + k = 1 K t r ( G ¯ k V η V H G ¯ k H ) + β .
Let us introduce v = v e c ( V ) , then we obtain the TMSE as
TMSE = v H Ω v O v v H O H + v H μ v + β ,
where Ω = k = 1 K ( ( l = 1 K H ¯ l H ¯ l H ) ( G ¯ k H G ¯ k ) ) , O = k = 1 K ( v e c ( G ¯ k H H ¯ k H ) ) H , μ = k = 1 K ( η ( G ¯ k H G ¯ k ) ) .
In the same way, we can obtain the simplified formula of MSE e , k as follows
MSE e , k = v H Ω e , k v O e , k v v H O e , k H + v H μ e , k v + β e , k ,
where G ¯ e , k , m = W e , k H ( G m e E e , m e ) , Ω e , k = ( l = 1 K H ¯ l H ¯ l H ) ( G ¯ e , k H G ¯ e , k ) , O e , k = ( v e c ( G ¯ e , k H H ¯ k H ) ) H , μ e , k = η ( G ¯ e , k H G ¯ e , k ) , β e , k = σ e 2 W e , k H W e , k + I T k , G ¯ e , k = b d [ G ¯ e , k , 1 , G ¯ e , k , 2 , , G ¯ e , k , M ] .
Because of E { y r m y r m H } = k = 1 K ( H k m E h , k m ) U k U k m H ( H k m E h , k m ) H + σ r m 2 I Q m and V m = d m V d m H , d m = [ 0 Q m × l = 1 m 1 Q l   I Q m × Q m   0 Q m × l = m + 1 M Q l ] . The transmission power constrains at relay can be denoted as
v H λ v P r m , m = 1 , , M ,
where λ = ( d m H ( k = 1 K ( H k m E h , k m ) U k U k m H ( H k m E h , k m ) H + σ r m 2 I Q m ) d m ) H ( d m H d m ) .
From (28), (29) and (30), the relay matrices optimization problem is denoted as
m i n { V m }   : TMSE   s . t . :     MSE e , k ε k   v H λ v P r m , m = 1 , , M ,
The relay matrices optimization problem (31) is a QCQP problem [40]. Compared with the non-convex problem (13), the (31) will be solved by utilizing the CVX of MATLAB toolbox [41].
The solving process of optimization matrices { W k } , { U k } and { V m } by employing iterative distributed algorithm is summarized in Table 1 and variable n denotes the nth iteration.
At last, we introduce the communication rate and secrecy rate in this system model. The communication rate at destinations and eavesdropper are as follows [42],
com D k = log 2 ( 1 + m = 1 M W k H G m k V m 2 W k H W k ) , k = 1 , , K ,
com E = log 2 ( 1 + m = 1 M W e , m H G m e V m 2 W e , m H W e , m ) ,
The secrecy rate at each destination can be obtained [43].
Rate D k = m a x ( 0 , com D k ) m a x ( 0 , com E ) , k = 1 , , K .

4. The Convergence of the Proposed Algorithm

In this part, the convergence of our proposed algorithm is proved [44]. Since the { U k } and { V m } are updated at each iteration by minimizing the TMSE, the TMSE is reduced gradually after each iteration. Furthermore, it is obvious that the TMSE has a lower limit which is at least greater than 0. This implies that the proposed algorithm is convergence. The convergence of the proposed algorithm can be proved exactly as follows. According to Section 3, we can obtain the objective function is
m i n { U k } , { V m } , { W k }   :   k = 1 K MSE k
The solution of { W k } can be ignored in the proof of convergence, because it is calculated by obtained { U k } and { V m } rather than utilize optimal scheme. For the obtained { V m } , the optimal solution can be denoted as follows.
m i n { U k }   :   k = 1 K MSE k
Therefore, we can get k = 1 K MSE k ( U k ( n + 1 ) , V m ( n ) ) k = 1 K MSE k ( U k ( n ) , V m ( n ) ) .
Similarly, for the obtained { U k } , the optimal solution can be denoted as follows.
m i n { V m }   :   k = 1 K MSE k
Hence, we can deduce k = 1 K MSE k ( U k ( n + 1 ) , V m ( n + 1 ) ) k = 1 K MSE k ( U k ( n + 1 ) , V m ( n ) ) . Furthermore, we get k = 1 K MSE k ( U k ( n + 1 ) , V m ( n + 1 ) ) k = 1 K MSE k ( U k ( n ) , V m ( n ) ) .
According to the mentioned above, we conclude that the TMSE is decreasing gradually with the updated { U k } and { V m } after each iteration. The TMSE converges to a constant after several iterations, which is also demonstrated by the Figure 2 of the Numerical Results part.

5. Numerical Results

In this part, we provide numerical results to examine the effectiveness of the optimization iterative distributed algorithm for secure transmission in interference channels MIMO relay system with eavesdropping. Assuming that all nodes have the same antennas, T k = Q m = N k = N e = 3 and all channel matrices are independently distributed Gaussian channel matrices with zero mean and unit variance. The noises at all receiving nodes are assumed as AWGN with σ d k 2 = σ r m 2 = σ e 2 = 1 . The transmission power constrains at sources and relays are assumed as P s k = P r m = 20   dB . Assuming that the eavesdropper knows the channel state information of the links between relay and itself. In addition, the threshold of eavesdropper’s MSE are ε k = 2.2 ,   k = 1 , , K . All figures are averaged over 1000 independent test.
Figure 2 depicts the convergence of proposed iterative distributed algorithm, where we have K = 2 or 6, M = 3 , N p = 100 , as well as P s k = P r m = 20   dB . As can be seen in Figure 2, TMSE decreases gradually until convergence when the number of iterations increases. It can be observed in both Figure 2a,b, as the system scale increases (i.e., increasing K ), the convergence speed decreases and TMSE increases. This is because more legitimate source-destination pairs increase both the system complexity and the interferences between each legitimate source-destination pair and they lead to more iterations to approximate convergence and the increasement of TMSE.
Figure 3 shows the changes of TMSE and MSEs at different destinations versus signal to noise ratio (SNR) with different N p , where we have K = 3 ,   M = 3 , TMSE-e denotes the k = 1 K MSE e , k . As shown in Figure 3a, both TMSE of all destinations and MSE at different destinations decrease gradually as the SNR increases. It can also be observed in Figure 3a that MSEs at different destinations are very similar, statistically there is the nearly the same of the three legitimate links. Obviously, the TMSE of all legitimate destinations is much lower than the TMSE-e. It means that the system can be achieved a better transmission performance by employing our proposed algorithm against the eavesdropper. Additionally, Figure 3b shows that the TMSE of all destinations decreases when N p increases. The reason is that the reduction of N p causes the increasement of channel estimation errors, which in turn leads to the increasement of the TMSE.
Figure 4 depicts the values of secrecy rate and communication rate versus transmission power constrains with different N p , when K = 3 ,   M = 3 , which is in the same background with Figure 3. As shown in Figure 4a, compared to the traditional approach, the proposed algorithm can support a positive secrecy rate and secrecy rate gradually improves with the SNR increasing. In other word, our proposed algorithm guarantees secure communications for the system. According to Reference [45], when the communication rate of legitimate transmitter-receiver link is lower than that of the transmitter-eavesdropper link, we define the secrecy rate as “0”; when the communication rate of legitimate transmitter-receiver link is larger than that of the transmitter-eavesdropper link, we define secrecy rate as the difference between the communication rate of legitimate transmitter-receiver link and that of the transmitter-eavesdropper link (as shown in (32)). The traditional approach does not consider the eavesdropper and the eavesdropper is so “sophisticated” (it knows our security algorithm) that the communication rate of legitimate transmitter-receiver link is lower than that of the transmitter-eavesdropper link. Consequently, no matter how large the SNR is, the secrecy rate is always zero. That communication rates of three links are similar, the situation of the secrecy rates is the same. Moreover, the achievable secrecy rates are lower than communication rates, because the proposed algorithm sacrifices a part of communication rate to realize a positive secrecy rate. Additionally, it can be observed in Figure 4b that the secrecy rate improves with the increasing of N p . This is because the increasement of N p causes the reduction of channel estimation errors, which in turn leads to the increasement of secrecy rates.
Furthermore, in Figure 5 we depict the variation of the TMSE as a function of the number of iterations and the transmission power constrains, where we have K = 3 , M = 3 and N p = 100 As shown in Figure 5, the TMSE of all destinations decreases when the SNR or the number of iterations increases. In addition, it also be depicted in Figure 5 that the TMSE decreases quickly at the beginning of the iteration process. And that means the proposed algorithm converges quickly.

6. Conclusions

In this article, we first investigate secure communication in MIMO interference relay IoT network in the presence of an active eavesdropper. A robust iterative distributed algorithm which jointly optimizes the source, relay and destination matrices has been proposed under the imperfect channel estimation. It aims to minimize the TMSE of all legitimate destinations subject to transmission power constrains while keeping MSE at eavesdropper above a certain threshold. The convergence of the proposed algorithm has also been proved. In addition, the performances of our proposed algorithm, such as its secrecy rate and MSE, are characterized in the form of simulation results. The simulation results reveal that our proposed algorithm is superior to the traditional approach. In other word, security can be ensured by using the proposed algorithm in the interference channel MIMO relay IoT network when there exists an eavesdropper.

Author Contributions

Conceptualization, Z.K. and D.W.; Methodology, Z.K.; Software, D.W.; Validation, Z.K., D.W. and Y.L.; Formal Analysis, C.W.; Investigation, C.W.; Resources, Z.K.; Data Curation, D.W.; Writing-Original Draft Preparation, Z.K. and D.W.; Writing-Review & Editing, Y.L.

Funding

This research was funded by National Natural Science Foundation of China (61801518) and Hubei Provincial Natural Science Foundation of China (2017CFB661).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhu, C.; Wang, H.; Liu, X.; Shu, L.; Yang, L.T.; Leung, V.C.M. A novel sensory data processing framework to integrate sensor networks with mobile cloud. IEEE Syst. J. 2016, 10, 1125–1136. [Google Scholar] [CrossRef]
  2. Liu, H.; Ning, H.; Zhang, Y.; Xiong, Q.; Yang, L.T. Role-dependent privacy preservation for secure V2G networks in the smart grid. IEEE Trans. Inf. Forensics Secur. 2014, 9, 208–220. [Google Scholar] [CrossRef]
  3. Jiang, P.; Winkley, J.; Zhao, C.; Munnoch, R.; Min, G.; Yang, L.T. An intelligent information forwarder for healthcare big data systems with distributed wearable sensors. IEEE Syst. J. 2016, 10, 1147–1159. [Google Scholar] [CrossRef]
  4. Liu, H.; Ning, H.; Zhang, Y.; Yang, L.T. Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid. IEEE Trans. Smart Grid 2012, 3, 1722–1733. [Google Scholar] [CrossRef]
  5. Xiong, W.; Hu, H.; Xiong, N.; Yang, L.T.; Peng, W.-C.; Wang, X.; Qu, Y. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Inf. Sci. 2014, 258, 403–415. [Google Scholar] [CrossRef]
  6. Naik, V.K.; Liu, C.; Yang, L.T.; Wagner, J. Online resource matching for heterogeneous grid environments. In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid, Cardiff, UK, 9–12 May 2005; pp. 607–614. [Google Scholar] [CrossRef]
  7. Deng, X.J.; Tang, Z.J.; Yang, L.T.; Lin, M.; Wang, B. Confident Information Coverage Hole Healing in Hybrid Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2018, 14, 2220–2229. [Google Scholar] [CrossRef]
  8. Deng, X.J.; Tang, Z.J.; Yi, L.Z.; Yang, L.T. Healing Multimodal Confident Information Coverage Holes in NB-IoT-Enabled Networks. IEEE Internet Things J. 2018, 5, 1463–1473. [Google Scholar] [CrossRef]
  9. Deng, X.J.; Yang, L.T.; Yi, L.Z.; Wang, M.; Zhu, Z. Detecting Confident Information Coverage Hole in Industrial Internet of Things: An Energy-Efficient Perspective. IEEE Commun. Mag. 2018, 56, 68–73. [Google Scholar] [CrossRef]
  10. Yi, L.Z.; Deng, X.J.; Wang, M.H.; Ding, D.; Wang, Y. Localized Confident Information Coverage Hole Detection in Internet of Things for Radioactive Pollution Monitoring. IEEE Access 2017, 5, 18665–18674. [Google Scholar] [CrossRef]
  11. Zou, Z.H.; Deng, X.J.; Yi, L.Z.; Tang, Z.; Wang, M.; Gong, X. A Novel Confident Information Coverage Hole Detection Algorithm in Sensor Networks. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data, Chengdu, China, 15–18 December 2016; pp. 199–204. [Google Scholar]
  12. Li, J.L.; Chang, S.; Fu, X.M.; Zhang, L.; Su, Y.; Jin, Z. A Coalitional Formation Game for Physical Layer Security of Cooperative Compressive Sensing Multi-Relay Networks. Sensors 2018, 18, 2942. [Google Scholar] [CrossRef] [PubMed]
  13. Mukherjee, A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality under Resource Constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
  14. Albashier, M.A.M.; Abdaziz, A.; Ghani, H.A. Performance analysis of physical layer security over different error correcting codes in wireless sensor networks. In Proceedings of the 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC), Bali, Indonesia, 17–20 December 2017; pp. 191–195. [Google Scholar] [CrossRef]
  15. Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011; ISBN 9780521516501. [Google Scholar]
  16. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  17. Bloch, M.; Barros, J.; Rodrigues, M.R.D. Wireless Information-Theoretic Security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  18. Zou, Y.L.; Wang, X.B.; Shen, W.M. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef]
  19. Park, K.H.; Wang, T.; Alouini, M.S. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming. IEEE J. Sel. Areas Commun. 2013, 31, 1741–1750. [Google Scholar] [CrossRef]
  20. Krikidis, I.; Thompson, J.; Mclaughlin, S. Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8, 5003–5011. [Google Scholar] [CrossRef]
  21. Chen, J.; Zhang, R.; Song, L. Joint relay and jammer selection for secure two-way relay networks. Proc. IEEE Trans. Inf. Forensics Secur. 2012, 7, 310–320. [Google Scholar] [CrossRef]
  22. Zhang, H.J.; Xing, H.; Cheng, J.L. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks without and with Cooperative Jamming. IEEE Trans. Ind. Inform. 2016, 12, 1714–1725. [Google Scholar] [CrossRef]
  23. Xu, Q.; Ren, P.Y.; Song, H.B. Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations. IEEE Access 2016, 4, 2840–2853. [Google Scholar] [CrossRef]
  24. Zhang, Y.Y.; Shen, Y.L.; Wang, H. On Secure Wireless Communications for IoT under Eavesdropper Collusion. IEEE Trans. Autom. Sci. Eng. 2016, 13, 1281–1293. [Google Scholar] [CrossRef]
  25. Islam, S.N.; Mahmud, M.A. Secured Communication among IoT Devices in the Presence of Cellular Interference. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017; pp. 1–6. [Google Scholar] [CrossRef]
  26. Ying, L.; Liang, L.; Alexandropoulos, G.C. Securing Relay Networks with Artificial Noise: An Error Performance Based Approach. Entropy 2017, 19, 384. [Google Scholar]
  27. Jeong, C.; Kim, I.; Kim, D.I. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System. IEEE Trans. Signal Process. 2012, 60, 310–325. [Google Scholar] [CrossRef]
  28. Khandaker, M.R.A.; Rong, Y. Interference MIMO Relay Channel: Joint Power Control and Transceiver-Relay Beamforming. IEEE Trans. Signal Process. 2012, 60, 6509–6518. [Google Scholar] [CrossRef] [Green Version]
  29. Kong, Z.M.; Yang, S.S.; Wu, F.L. Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels. IEEE Trans. Inf. Forensics Secur. 2016, 11, 594–608. [Google Scholar] [CrossRef]
  30. Badra, N.; Yang, J.X.; Psaromiligkos, I.; Champagne, B. Robust and secure beamformer design for MIMO relaying with imperfect eavesdropper CSI. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 17–19 October 2016; pp. 442–449. [Google Scholar] [CrossRef]
  31. Alexandropoulos, G.C.; Peppas, K.P. Secrecy Outage Analysis Over Correlated Composite Nakagami-m/Gamma Fading Channels. IEEE Commun. Lett. 2018, 22, 77–80. [Google Scholar] [CrossRef]
  32. Alexandropoulos, G.C.; Papadias, C.B. A reconfigurable distributed algorithm for K-user MIMO interference networks. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 3063–3067. [Google Scholar] [CrossRef]
  33. Shi, Q.; Razaviyayn, M.; Luo, Z. An Iteratively Weighted MMSE Approach to Distributed Sum-Utility Maximization for a MIMO Interfering Broadcast Channel. IEEE Trans. Signal Process. 2011, 59, 4331–4340. [Google Scholar] [CrossRef]
  34. Alexandropoulos, G.C.; Ferrand, P.; Papadias, C.B. On the Robustness of Coordinated Beamforming to Uncoordinated Interference and CSI Uncertainty. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar] [CrossRef]
  35. Alexandropoulos, G.C.; Barousis, V.I.; Papadias, C.B. Precoding for multiuser MIMO systems with single-fed parasitic antenna arrays. In Proceedings of the 2014 IEEE Global Communications Conference (GLOBECOM), Austin, TX, USA, 8–12 December 2014; pp. 3897–3902. [Google Scholar] [CrossRef]
  36. Xu, D.; Ren, P.; Ritcey, J.A. Optimal Grassmann Manifold Eavesdropping: A Huge Security Disaster for M-1-2 Wiretap Channels. In Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  37. Xu, Z.Y.; Zhong, J.; Chen, G.J. Novel joint secure resource allocation optimization for full-duplex relay networks with cooperative jamming. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; pp. 1–6. [Google Scholar] [CrossRef]
  38. Yang, S.S.; Hanzo, L. Fifty Years of MIMO Detection: The Road to Large-Scale MIMOs. IEEE Commun. Surv. Tutor. 2015, 17, 1941–1988. [Google Scholar] [CrossRef]
  39. Horn, R.A.; Johnson, C.R. Topics in Matrix Analysis, 1st ed.; Cambridge University Press: Cambridge, UK, 1994. [Google Scholar]
  40. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  41. Grant, M.; Boyd, S. Cvx: MATLAB Software for Disciplined Convex Programming (Webpage and Software). Available online: http://cvxr.com/cvx (accessed on 1 April 2010).
  42. Fang, H.; Xu, L. Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme. IEEE Trans. Inf. Forensics Secur. 2018, 13, 197–209. [Google Scholar] [CrossRef]
  43. Al-jamali, M.; Al-nahari, A.; AlKhawlani, M.M. Relay selection scheme for improving the physical layer security in cognitive radio networks. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May 2015; pp. 495–498. [Google Scholar] [CrossRef]
  44. Shen, H.; Li, B.; Tao, M. MSE-Based Transceiver Designs for the MIMO Interference Channel. IEEE Trans. Wirel. Commun. 2010, 9, 3480–3489. [Google Scholar] [CrossRef]
  45. Zheng, C.; Kanapathippillai, C.; Ding, Z.G. Robust outage secrecy rate optimizations for a MIMO secrecy channel. IEEE Wirel. Commun. Lett. 2015, 4, 86–89. [Google Scholar] [CrossRef]
Figure 1. Two-hop multiple input multiple output (MIMO) interference relay system model in the wireless Internet of Things (IoT).
Figure 1. Two-hop multiple input multiple output (MIMO) interference relay system model in the wireless Internet of Things (IoT).
Sensors 18 03914 g001
Figure 2. Total mean square error (TMSE) versus the number of iterations.
Figure 2. Total mean square error (TMSE) versus the number of iterations.
Sensors 18 03914 g002
Figure 3. The TMSE and MSE versus signal to noise ratio (SNR).
Figure 3. The TMSE and MSE versus signal to noise ratio (SNR).
Sensors 18 03914 g003
Figure 4. The communication rate and secrecy rate versus SNR.
Figure 4. The communication rate and secrecy rate versus SNR.
Sensors 18 03914 g004
Figure 5. The TMSE versus the number of iterations and SNR.
Figure 5. The TMSE versus the number of iterations and SNR.
Sensors 18 03914 g005
Table 1. The proposed iterative distributed algorithm for problem (13).
Table 1. The proposed iterative distributed algorithm for problem (13).
StepsSpecific Progress
Step 1Set n = 0 , TMSE ( n ) = 0 and initialize the { U k ( 0 ) } and { V k ( 0 ) } satisfying power constrains (11) and (12).
Step 2Calculate { W k ( n + 1 ) } and { W e , k ( n + 1 ) } with { U k ( n ) } and { V m ( n ) } obtained from previous iteration.
Step 3Update { U k ( n + 1 ) } by solving the problem (25) with { W k ( n + 1 ) } , { W e , k ( n + 1 ) } and { V m ( n ) } .
Step 4Update { V m ( n + 1 ) } by solving the problem (31) with { W k ( n + 1 ) } , { W e , k ( n + 1 ) } and { U k ( n + 1 ) } , then calculate TMSE ( n + 1 ) .
Step 5If TMSE ( n + 1 ) TMSE ( n ) ξ , then end; otherwise set n = n + 1 , then go to step 2.

Share and Cite

MDPI and ACS Style

Kong, Z.; Wang, D.; Li, Y.; Wang, C. Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays. Sensors 2018, 18, 3914. https://doi.org/10.3390/s18113914

AMA Style

Kong Z, Wang D, Li Y, Wang C. Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays. Sensors. 2018; 18(11):3914. https://doi.org/10.3390/s18113914

Chicago/Turabian Style

Kong, Zhengmin, Die Wang, Yunjuan Li, and Chao Wang. 2018. "Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays" Sensors 18, no. 11: 3914. https://doi.org/10.3390/s18113914

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop