Next Article in Journal
The Brevity Law as a Scaling Law, and a Possible Origin of Zipf’s Law for Word Frequencies
Previous Article in Journal
Computing Classical-Quantum Channel Capacity Using Blahut–Arimoto Type Algorithm: A Theoretical and Numerical Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security

1
School of Information Science and Technology, Zhejiang Sci-Tech University, Hangzhou 310018, China
2
College of Mechanical and Electrical Engineering, Jiaxing University, Jiaxing 314001, China
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(2), 223; https://doi.org/10.3390/e22020223
Submission received: 12 December 2019 / Revised: 4 February 2020 / Accepted: 13 February 2020 / Published: 17 February 2020

Abstract

:
Since the cloud radio access network (C-RAN) transmits information signals by jointly transmission, the multiple copies of information signals might be eavesdropped on. Therefore, this paper studies the resource allocation algorithm for secure energy optimization in a downlink C-RAN, via jointly designing base station (BS) mode, beamforming and artificial noise (AN) given imperfect channel state information (CSI) of information receivers (IRs) and eavesdrop receivers (ERs). The considered resource allocation design problem is formulated as a nonlinear programming problem of power minimization under the quality of service (QoS) for each IR, the power constraint for each BS, and the physical layer security (PLS) constraints for each ER. To solve this non-trivial problem, we first adopt smooth 0 -norm approximation and propose a general iterative difference of convex (IDC) algorithm with provable convergence for a difference of convex programming problem. Then, a three-stage algorithm is proposed to solve the original problem, which firstly apply the iterative difference of convex programming with semi-definite relaxation (SDR) technique to provide a roughly (approximately) sparse solution, and then improve the sparsity of the solutions using a deflation based post processing method. The effectiveness of the proposed algorithm is validated with extensive simulations for power minimization in secure downlink C-RANs.

1. Introduction

The cloud radio access network (C-RAN) [1,2] has been recognized as a promising paradigm for the fifth generation (5G) wireless network [3] in reducing both capital and operating expenditures. In C-RAN, the signal processing for filtering, modulate/demodulate, and detection are moved to the baseband unit (BBU) pool or central unit (CU), and all the low-powered base stations (BSs) are connected to the BBU pool through high capacity fibre fronthaul links or microwave wireless links [2]. Although joint transmission scheme can be adopted to boost the spectral efficiency, one particular technical challenge is the energy consumption due to the fluctuation of data traffic during day and night. Therefore, it is of great importance and interest to reduce the network power consumed by the BSs and the corresponding fronthaul links [4,5,6,7].
To achieve power efficient C-RAN, BS mode selection has been proved to be an promising paradigm to save energy [4,5,6,7,8]. In particular, the BSs with corresponding fronthaul links are switched into sleep mode under low traffic conditions. However, to provide guaranteed quality-of-service (QoS) requirements for each information receiver (IR), the transmit power consumption should be increased. Hence, the BSs mode selection and beamforming are jointly designed to reduce the power consumption [4,6,7,8,9]. Due to the broadcast properties of wireless channels, information signals may be eavesdropped by the eavesdrop receivers (ERs). Although traditional cryptographic technique may guarantee communication security in the application layer, it is not suitable in the current wireless network due to the computation improvement of ERs. The beamforming technique is propitious to align the information signals to the intended IRs; however, security transmission cannot be guaranteed when ERs are close to IRs or the channel gains of ERs are large enough. As an alternative, the concept of physical layer security (PLS) can perfectly guarantee wireless information transmission against eavesdropping in an information-theoretic perspective [10,11,12,13]. When artificial noise (AN) [13] is introduced to resist eavesdropping, the performance gain can be obtained. In summary, the joint design of beamforming and AN have been widely investigated to achieve secure information transmission over the past few years [14,15,16]. In particular, the BS mode, beamforming, and AN are jointly designed in a secure downlink C-RAN for network power minimization.
Since dense low-powered BSs are deployed in C-RAN, the distances between BSs and IRs/ERs are decreased. As a result, the received signal-to-interference-plus-noise ratio (SINR) at each ER is strengthened. Moreover, the information signals can also be improved at each ER since the joint transmission provides many signal copies. Therefore, it is necessary to investigate the power consumption in C-RAN by taking into consideration the PLS and BS mode selection. To achieve power efficient secure C-RAN, three problems must be addressed: (i) which BSs should be active? (ii) how much power should be transmitted by active BSs for data transmission of IRs? and (iii) how much AN should be generated by active BSs for interfering the ERs?
Practically, it is difficult to obtain the perfect CSI of IRs and ERs due to estimation and quantization errors, as well as Doppler frequency [17,18,19]. More importantly, the imperfection in CSI can significantly deteriorate the system performance [18,19,20]. A robust design approach needs to deal with the CSI uncertainty. Therefore, it is of great importance to jointly optimize the BS mode, beamforming, and AN to minimize the network power consumption while providing guaranteed QoS for each IR with PLS in a robust design manner.
In this paper, the joint design problem of BS mode selection, beamforming, and AN is formulated as an integer nonlinear non-convex programming problem subject to the constraints of the SINR at each IR, the maximum power constraint at each BS, and the maximum received SINR constraint at each ER with CSI uncertainty. The challenges of our work originate from both a combinatorial composite objective and the infinite number of non-convex quadratic constraints. The essential idea of addressing the infinite number of non-convex quadratic constraints is to apply the S-lemma [21], while the combinatorial composites for BS mode can be achieved by controlling the sparsity structure of the corresponding solutions. In particular, the authors in [4,6] propose group sparse beamforming (GSBF) approaches to minimize the network power consumption in a downlink C-RAN by jointly designing the active remote radio heads (RRHs) and beamforming. Reference [22] proposes group sparsity and relaxed integer programming algorithms to optimize power consumption in C-RAN considering both the uplink and downlink transmission. Moreover, a two-stage rank selection framework is proposed in [7] for the BS mode selection and user association optimization problem by successively determining the BS mode. Unfortunately, since our constraints take PLS into consideration, the algorithms in [4,6,7,22] are not applied to solve our problem. By reformulating the integer-related term in objective function using the 0 -norm, the 1 / 2 -norm algorithm in [7] can be modified to solve our problem only when the semi-definite relaxation (SDR) technique with S-lemma is used to tackle the non-convex quadratic PLS constraints. This 1 / 2 -norm algorithm switching as many BSs as possible into sleep mode provides sufficiently sparse BS mode; however, the transmit power consumption is increased in order to satisfy the QoS requirements. More importantly, using the SDR technique by dropping the rank one constraints, the tightness of the rank one relaxation should be investigated. In addition, the second order cone programming (SOCP) transformation [7] cannot be applied since the PLS constraints in our problem cannot be reformulated as second order cone (SOC) ones. On the other hand, some existing works focus on joint beamforming and AN design to maximize sum rate [13] or minimize transmit power [14]. However, AN based power allocation algorithms [13] for secrecy capacity maximization cannot be applicable to the power minimization problem in C-RAN. In conclusion, all the aforementioned algorithms cannot be applied to solve the considered problem directly. Consequently, the major contributions of this paper can be summarized as follows:
Firstly, we formulate the joint BS mode, beamforming and AN problem as an integer nonlinear non-convex programming problem, subject to IRs’ SINR requirements, transmit power constraints, and PLS constraints with CSI uncertainties. We reformulate the original problem using a sparse beamforming formulation. By approximating the non-convex 0 -norm using a smooth function, we propose a general iterative difference of convex (IDC) based algorithm to find a local optimal solution for the difference of convex (DC) programming problem.
Secondly, using the S-lemma in conjunction with SDR technique, we propose a three-stage algorithm to find the sparse structure of the active BSs. Specifically, the rough sparse solutions are obtained by using the IDC-based SDP algorithm in stage 1. In stage 2, we further improve the sparsity of the solution using a deflation based post processing method, and we solve a transmit power optimization problem in stage 3.
Finally, we validate the effectiveness of proposed algorithm through extensive simulations. The results suggest that our proposed algorithm can provide robust solutions, and the algorithm can converge to a local optimal solution rapidly. The proposed algorithm achieves comparable performance compares with the exhaustive search algorithm, and our algorithm significantly outperforms the algorithm without considering the BS mode selection.
The remainder of this paper is organized as follows. The system model and the problem formulation are presented in Section 2. In Section 3, we transform the problem into a difference of convex programming, and propose a general iterative difference of convex algorithm. In Section 4, by applying the SDR technique, we propose a three-stage algorithm. Simulation results of the proposed algorithm are presented in Section 5. Finally, the concluding remarks are given in Section 6. Table 1 summarizes the major symbols used for the rest of this paper.

2. System Model and Problem Formulation

2.1. System Model

2.1.1. Signal Model

We consider a secure downlink C-RAN consisting of L BSs (each equipped with N antennas), where the BSs jointly serve the K single-antenna IRs, which is illustrated in Figure 1. Denote L , A and A ( A = | A | ) the BSs set, active BS set, and the number of active BSs, respectively, and A L . Note that there are M single-antenna ERs in the network.
The received signals at IR k ( k { 1 , , K } ) and ER m ( m { 1 , , M } ) are respectively given by
y k I R = h k H x + n k I R and y m E R = g m H x + n m E R ,
where x C N A × 1 denotes the joint transmit data vector of the A active BSs to the K IRs. The channels from the A active BSs to IR k and ER m are denoted by h k C N A × 1 and g m C N A × 1 , respectively. n k I R and n m E R are respectively the noise at IR k and ER m, which are modeled as additive white Gaussian noise with zero mean and variances σ I R k 2 and σ E R m 2 , respectively.
The transmitted signal a k with E [ | a k | 2 ] = 1 for IR k is beamformed by w k before transmission. The beamformed signal for IR k is x k = w k a k . The transmit signal vector x at the A active BSs is given by x = k = 1 K x k + v , where v = [ v 1 T , , v A T ] T is the AN vector generated for the A active BSs ( v l is the AN vector from BS l to IR k), which is modeled as a complex Gaussian random vector, i.e., v CN ( 0 , V ) , where V H N A , V 0 is the covariance matrix of v .

2.1.2. Channel Model

The channel from the A BSs to the k-th IR is h k = [ h k 1 T , , h k A T ] T . The downlink CSI of the BSs-to-IR channels can be obtained through measuring the uplink pilots in the handshaking or beacon signals via channel reciprocity. The BSs are able to refine the estimate of h k frequently via the pilot sequences embedded in each acknowledgement packet. Therefore, we assume that the channels from BSs to IR k are imperfectly known in the BBU pool, and the imperfect channel is modeled as the sum of two parts. According to [18,19], a deterministic model for characterizing the resulting uncertain channel is adopted
h k = h ˜ k + Δ h k , k ,
where h ˜ k is the estimated channel of IR k, and Δ h k = [ Δ h k 1 T , , Δ h k A T ] T C N A × 1 is the channel uncertainty, which is assumed to satisfy an elliptic model, i.e., Δ h k H Θ k Δ h k 1 where Θ k H N A × N A is the shape of the ellipsoid with Θ k 0 . Define the set H k { Δ h k : Δ h k H Θ k Δ h k 1 } which contains all possible channel uncertainty region of IR k.
The ERs do not interact with the BSs during information transmission, and the central unit does not know the location of ERs. However, to facilitate the resource allocation algorithm design, we follow the existing research [15] and the CSI between the BSs and the ERs are assumed to be known at central unit. As a result, we design the resource allocation algorithm assuming an unfavorable scenario (Without the instantaneous CSI of ERs at the central unit being known, stochastic geometry modeling may be an optimistic approach [23,24]. In this case, the system model is different from this paper, and we leave it for future work). In this paper, the same CSI model of ER is adopted as in [15,25]. Since the CSI of the ERs may be outdated during transmission, we use a deterministic model [17,18,19] for characterizing the resulting CSI uncertainty. The CSI model from BSs to ERs are
g m = g ˜ m + Δ g m , m ,
where g m = [ g m 1 T , , g m A T ] T C N A × 1 , and Δ g m = [ Δ g m 1 T , , Δ g m A T ] T C N A × 1 is the channel uncertainty which is assumed to satisfy the following elliptic model (To model the imperfection CSI of ERs, a deterministic CSI error model [15,18,19] or probabilistic CSI error model [20] are usually adopted. The probabilistic CSI error model for ERs investigates the statistics of CSI. However, since the probabilistic CSI error model results in a highly intractable form, this paper only focuses on the deterministic CSI model), i.e., Δ g m H Θ ˜ m Δ g m 1 , where Θ ˜ m H N A × N A is the shape of the ellipsoid with Θ ˜ m 0 . Define the set Ω m { Δ g m : Δ g m H Θ ˜ m Δ g m 1 } which contains all possible channel uncertainty region of ER m. It is noted that the spherical error model is considered when Θ k = 1 ε I R k 2 I or Θ ˜ m = 1 ε E R m 2 I , where ε I R k 0 and ε E R m 0 are the radii of the uncertainty parts. In this case, the uncertainty vectors of IR and ER satisfy Δ h k 2 ε I R k and Δ g m 2 ε E R m , respectively. It is easy to see that the CSI of both IR and ER become perfect when ε I R k and ε E R m approach zeros. Unlike considering the second-order statistics of channels [26], in this paper, we consider the instantaneous channel in every coherence interval. The beamforming vectors and AN, as well as BS mode are recomputed every coherence interval, and it can be viewed as an ideal or special case of the second-order statistics model.
The SINR at IR k and ER m are respectively
SINR k = | h k H w k | 2 i k | h k H w i | 2 + | h k H v | 2 + σ I R k 2 , k
SINR m k = | g m H w k | 2 i k | g m H w i | 2 + | v g m H | 2 + σ E R m 2 ( a ) | g m H w k | 2 | v g m H | 2 + σ E R m 2 SINR ¯ m k , k , m ,
where ( a ) in Equation (5) constitutes an upper bound (The upper bound in Equation (5) is reasonable when all the other beamformed IRs’ signals (except for IR k) and the corresponding channels of the m-th ER are orthogonal) on the received SINR at ER m for decoding the information of IR k [15].

2.1.3. Power Model

According to [1,27], the network power consumption of C-RAN consists of the power consumption by the BSs and fronthaul links. By moving the baseband processing into CU, a BS transceiver mainly comprises power amplifier, radio frequency module, direct-current (DC)–DC power supply, active cooling system and alternating current (AC)–DC main supply [27]. According to [27], P l bs can be modeled as typical linear function
P l bs = P l a , bs + 1 η l P l tx , 0 < P l tx P l max , l P l s , bs , P l tx = 0 , l ,
where P l tx = k = 1 K w k l 2 2 + v l 2 2 is the transmit power, P l a , bs is the hardware power consumption of BS l in the active mode, and the constant P l s , bs (typically nonzero) is the power consumption of BS l in the sleep mode. Typically, since P l s , bs < P l a , bs , it is beneficial to switch BSs into the sleep mode to save energy. The static power for BS l is defined as P l c , bs = P l a , bs P l s , bs , which indicates the saved power of switching the BS from active into sleep mode, and we assume all the power amplifier has the same efficiency for simplicity, i.e., η = η l , l .
According to [28], optical fiber is usually adopted by C-RAN as a fronthaul network to connect BSs and CU using a passive optical network (PON). The fronthaul network is comprised by an optical line terminal (OLT) that connects one optical fibre with a set of optical network unit (ONU). One efficient way to save energy for PON is to switch ONU into sleep mode. However, OLT cannot be switched into sleep mode and it consumes constant power. Therefore, the overall power consumed by fronthaul network is
P fhn = P olt + l = 1 L P l tl
where P olt is the constant power consumption of OLT, P l tl = P l a , tl is the power consumption of ONU l in the active mode, and P l tl = P l s , tl is the power consumption of ONU l in the sleep mode, and P olt = 20 Watt, P l a , tl = 3.85 Watt and P l s , tl = 0.75 Watt. Therefore, switching off ONUs into sleep mode is an efficient way to save energy on the fronthaul network.
It is noted that, when both BS l and its corresponding fronthaul link l are in active mode, the power consumed by BS l and ONU l is P l a = P l a , tl + P l a , bs . We define P l s = P l s , tl + P l s , bs the power consumption of BS l and ONU l in the sleep mode. Then, the network power consumption of C-RAN is
P total = 1 η l A P l tx + l A P l a + l Z P l s + P olt = 1 η l A P l tx + l A ( P l a P l s ) + l L P l s + P olt = 1 η l A k = 1 K w k l 2 2 + v l 2 2 + l A P l c + l L P l s + P olt ,
where P l c = P l a P l s is the saved power by switching the BS l and ONU l into the sleep mode, and the second equality in (8) is based on the fact l Z P l s = l L P l s l A P l s . Since this paper explores the power efficiency in secure downlink C-RAN, the constant term l L P l s + P olt is omitted. Therefore, the network power (NP) consumption is given by
P NP = l A 1 η l k = 1 K w k l 2 2 + v l 2 2 + l A P l c .
It is noted that, switching off more BSs into sleep mode, more transmit power (summation of data transmission power (DTP) and AN) will be consumed in order to satisfy the QoS requirements. Therefore, the BS mode and transmit power should be jointly designed under certain QoS constraints.

2.2. Problem Formulation

To release the impact of limited-capacity fronthaul links on performance, fronthaul compression strategy is introduced in C-RAN. By introducing compression noise (or called quantized noise), the fronthaul capacity requirement is largely reduced. On the other hand, AN is introduced to interfere ERs to provide PLS. According to [29], compression noise on fronthaul links can be viewed as AN to provide PLS for C-RAN since they have the same mathematical form. Therefore, adding the fronthaul capacity constraints does not affect the convex form of the considered problem, and the solutions proposed in this paper can be directly extended to solve the problem with fronthaul compression under limited fronthaul capacity constraints.
We formulate the joint optimization problem of BS mode, AN and beamforming, subject to IR’s SINR requirements, transmit power constraints, and PLS constraints with CSI uncertainty, as a nonlinear non-convex programming problem, given by
P 0 : min w , v , A 1 η l A k = 1 K w k l 2 2 + v l 2 2 + l A P l c
s . t . min Δ h k H k SINR k γ k , k ,
max Δ g m Ω m SINR ¯ m k Γ m k , k , m ,
k = 1 K w k l 2 2 + v l 2 2 P l max , l A ,
where w = [ w 1 , , w K ] . γ k is the SINR threshold of IR k, and constraints (10b) indicate that each IR has its minimum SINR requirement for a given channel uncertainty set H k . Γ m k is the SINR threshold of ER m for IR k, and constraints (10c) indicate that each ER has its maximum SINR requirement for a given channel uncertainty set Ω m . Constraint (10d) the power constraint for each BS with maximum transmit power P l max . It is interesting to investigate the secrecy data rate maximization subject to the same constaints of problem P 0 , and we leave it for future work.
The challenges of solving problem P 0 arise from: (i) the combinatorial objective function for BS selection; (ii) non-convex quadratic constraints (10b); and (iii) the infinite number of non-convex PLS constraints (10c). Even with convex constraints, the optimal solutions of problem P 0 are only achieved by exhaustive search procedure. Moreover, the computational complexity will exponentially increase with the network size. Therefore, this paper proposes a low-complexity algorithm based on DC procedure to find a local optimal solution to problem P 0 .

3. DC-Based Sparse Beamforming Design

In this section, we first reformulate the above problem into a sparse beamforming one and convert the transformed problem to DC programs by using the smooth 0 -norm approximation. Then, we propose a DC-based algorithm to find a local optimal solution.

3.1. Problem Reformulation

In this subsection, we rewrite the combinatorial composite problem P 0 as a sparse beamforming form and approximate the 0 -norm using a smooth function.

3.1.1. Sparse Beamforming Problem

It is observed that the mode of BSs can be specified with the beamforming w and v . In particular, when k = 1 K w k l 2 2 = 0 and v l 2 2 = 0 , BS l is switched into sleep mode, otherwise the BS should be active. By introducing a non-negative auxiliary variable s l = k = 1 K w k l 2 2 + v l 2 2 , we have
f ( s l ) = 0 , s l = 0 , l , 1 , otherwise ,
where s l can be viewed as the soft transmit power of BS l.
Since the 0 -norm indicates the number of nonzero elements of a vector, the indicator function f ( s l ) can be replaced by the 0 -norm of s l without loss of optimality. Therefore, the original optimization problem P 0 is equivalently rewritten as
P 1 : min w , v , A , s 1 η l L s l + s 1 P l c , , s L P L c 0
s . t . k = 1 K w k l 2 2 + v l 2 2 s l , l ,
s l P l max , l A , ( 10 b ) , ( 10 c ) ,
where s = [ s 1 , , s L ] T and the sparsity of the BS mode is controlled by s . It is noted that, if the parameters of γ k , Γ m k and P l max are poorly chosen, problem P 1 may become infeasible. Then, user admission control or SINR relaxation should be applied, which is beyond the scope of this paper.
Although we have transformed problem P 0 to a sparse beamforming problem P 1 , it is still challenging due to the non-convex 0 -norm in the objective, the non-convex quadratic QoS constraints and the infinite number of non-convex PLS constraints.

3.1.2. Smooth 0 -Norm Approximation

To address the non-convex discontinuous 0 -norm in the objective, in this paper, we employ a general smooth function, denoted by f ( x ) . The smooth function f ( x ) should satisfy the following three properties: (i) f ( x ) is concave and non-decreasing with respective to x 0 ; (ii) lim x 0 + f ( x ) = 0 ; and (iii) f ( x ) is continuous differentiable. Specifically, the logarithmic function, exponential function, and arctangent function are frequently adopted to approximate the non-convex 0 -norm [30,31], given by
f τ ( x ) = log ( 1 + x τ 1 ) log ( 1 + τ 1 ) , 1 exp ( x τ 1 ) , arctan ( x τ 1 ) ,
where τ > 0 is used to control the smoothness of approximation. It is easily observed that a smoother function is obtained with a larger τ , but the approximation performance is worse, and vice versa.
Then, by replacing the non-convex 0 -norm in the objective with the smoothed function, the problem P 1 can be approximated as:
P 2 : min W , V , s 1 η l = 1 L s l + l = 1 L f τ ( s l ) P l c s . t . ( 10 b ) , ( 10 c ) , ( 12 b ) , ( 12 c ) .
Since the first term in the objective is convex in s l and the smooth function f τ ( s l ) is concave in s l , the objective function is in a form of “a convex function + a concave function”. Therefore, the objective of problem P 2 is the difference between two convex functions. If the constraints in problem P 2 can be rewritten as the difference between two convex functions or be transformed to convex ones, problem P 2 is a general form of a DC programming problem. Then, the DC programming algorithm can be developed to deal with the DC programming problem. Therefore, an IDC procedure can be adopted to find a local optimal solution of problem P 2 .

3.2. Generalized IDC Procedure

In this subsection, the IDC algorithm is proposed to solve problem P 2 .

3.2.1. IDC Procedure

The main idea for the IDC algorithm is to convexify the concave parts by their first order Taylor expansions, and then solve a sequence of convex problems successively. In particular, the objective function f τ ( s l ) is linearized, which is given by
f τ ( s l ( t ) ) = f τ ( s l ( t ) ) + f τ ( s l ( t 1 ) ) s l ( t ) s l ( t 1 ) ,
where t 1 is the iteration number, and f τ ( s l ( t ) ) is the value of f τ ( s l ) at the t-th iteration, and f τ ( s l ( t 1 ) ) is the gradient of f τ ( s l ) at the previous iteration point s l ( t 1 ) .
Therefore, with the knowledge obtained from iteration ( t 1 ) , the following problem is solved at the t-th iteration
P 3 : min W , V , s l = 1 L ν l s l s . t . ( 10 b ) , ( 10 c ) , ( 12 b ) , ( 12 c ) ,
where the superscript (t) is dropped here, and ν l = 1 η + f τ ( s l ( t 1 ) ) P l c is a constant.
Then, starting with an initial feasible point s ( 0 ) = [ s 1 ( 0 ) , , s L ( 0 ) ] T , problem P 2 is iteratively solved through solving a sequence of problem P 3 . Note that the smooth function f τ ( s l ) is strictly monotonic decreasing. Therefore, the IDC algorithm is guaranteed to converge to a local optimal solution of problem P 2 , and the convergence proof can be found in [32,33]. Now, the main challenge of the IDC algorithm is to solve problem P 3 . In the next subsection, the SDR technique with S-lemma is applied to solve problem P 3 efficiently.

3.2.2. Updating Rule of τ

As mentioned in the above subsection, the approximation performance of f τ ( x ) depends on the smoothed factor τ . Clearly, when x is small, τ should be small so that f τ ( x ) approximate 0 -norm well, and τ should be large when x is large. As shown in [31], when τ is chosen to maximize the gradient of the approximation function, the three smooth functions in (13) have almost the same performance. Similar to the updating rule of τ in [31], we set a large value of τ for initialization, and decrease τ by a given factor ς , i.e., τ ς τ . The τ is iteratively updated until it is sufficiently small.
It is noted that this general IDC algorithm can be applied to solve the unconstrained or linearly constrained problems [34]. Indeed, this algorithm is suitable for solving the general DC programming problems [35,36], for instance, a DC objective function with convex constraints or a convex objective function with DC constraints. However, the difficulties for the considered problem mainly come from the CSI uncertainty and PLS. Even with S-lemma and semi-definite relaxation technique, the rank one solutions still need to be investigated. In the next section, we will propose a three-stage algorithm by applying the IDC framework in conjunction with constraints transformations to solve the considered problem.

4. Proposed Optimization Algorithm

In this section, we develop a three-stage low-complexity algorithm with the SOCP transformation. Specifically, in stage 1, a rough sparse solution for the BS mode is obtained by applying the IDC-based SDP algorithm. In stage 2, a post processing procedure with a newly defined incentive metric is proposed to further improve the sparse structure of the solutions, and followed by optimizing the transmit power in stage 3.

4.1. Stage 1: IDC-Based SDP Algorithm

The challenge of the IDC procedure for solving problem P 2 is the non-convexity of problem P 3 . While the non-convexity comes from the non-convex quadratic SINR constraints in constraints (10b) and the infinite number of PLS constraints (10c), which makes problem P 3 formidable to solve. Therefore, our focuses are to transform constraints (10b) and (10c) into tractable ones, and then recast problem P 3 into an SDP one.
To deal with the non-convex constraints (10b), we first transform it into an equivalent form, given by
h k H w k 2 2 γ k i k h k H w i 2 2 h k H v 2 2 γ k σ I R k 2 .
Letting W k = w k w k H and X k = W k γ k i k W i V , we further rewrite constraint (17) as
h ˜ k + Δ h k H X k h ˜ k + Δ h k γ k σ I R k 2 , Δ h k H k .
It is found that constraint (18) refers to an infinite number of constraints because of the uncertainty in h k . Towards this end, we transform (18) into linear matrix inequality (LMI) using the S-lemma [21]. Specifically, there exists Δ h k satisfying the SINR constraints (18) for any Δ h k H Θ k Δ h k 1 0 , if and only if there exists x k 0 , k , such that the following LMI constraints hold:
X k X k h ˜ k h ˜ k H X k h ˜ k H X k h ˜ k γ k σ I R k 2 + x k Θ k 0 0 1 0 , k ,
where x = [ x 1 , , x K ] is the introduced variables for IRs.
Therefore, constraint (19) is a semi-definite. For constraints (10c), we first transform it into the following form
max Δ g m Ω m Tr ( G m W k ) / Γ Tr ( G m V ) σ E R m 2 , k , m .
Following the similar transformation using the S-lemma, Δ g m H Δ g m σ E R m 2 implies
Δ g m H ( W k Γ V ) Δ g m + 2 R e g m H W k Γ V Δ g m + g m H ( W k Γ V ) g m σ E R m 2 0 , m , k ,
holds if and only if there exist α m k 0 , such that the following LMI constraints hold.
S ( W k , V , α m k ) = U g m H W k U g m / Γ + U g m H V U g m + α m k T m k + T ˜ m 0 , m , k ,
where T m k = Θ ˜ m 0 N L × 1 0 1 and T ˜ m = 0 N L 0 N L × 1 0 σ E R m 2 , and U g m = [ I N L g ˜ m ] .
Hence, by directly dropping the rank one constraints, rank ( W k ) = 1 , k and rank ( V ) = 1 , problem P 3 can be transformed as
P 4 : min W , V , s , x , α l = 1 L ν l s l
s . t . k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) s l , l L
s l P l max , l L
V 0 , W k 0 , α m k 0 , k , m ( 19 )   and   ( 22 ) ,
where Φ l diag ( 0 , , 0 ( l 1 ) N , 1 , , 1 N , 0 , , 0 ( L l ) N ) for all l L , W = { W k } and α = { α m k } .
Since problem P 4 is an SDP problem, we can solve it using the standard convex optimization software, such as CVX [37]. It is noted from the following proposition that the solution s l of problem P 4 cannot equal to zero, which means that the sparse structure of active BSs cannot be obtained.
Proposition 1.
The solution of problem P 4 can be expressed as s l = k = 1 K T r ( Φ l W k ) + T r ( Φ l V ) , where W k and V are respectively the optimal solutions of W k and V , and W k cannot be zero matrices. The proof can be found in Appendix A.
To illustrate the results in Proposition 1, we will give an experimental example in Section 4. Thus, the sparse solution of problem P 4 is generated by iteratively penalizing the BS with smaller transmit power consumption.
Proposition 2.
The worst-case SINR constraints of IRs and the SINR constraints of ERs in problem P 4 should be active at the optimal solution.
Proof. 
Since constraints (19) and (22) are respectively the equivalent transformation of (10b) and (10c), we prove (10b) and (10c) are active at the optimal solution. Firstly, we prove that constraints (10b) are active at the optimal solution. If the left-hand side of (10b) is greater than γ , one can decrease DTP to save power. Since constraints (10c) must be satisfied, decreasing DTP does not affect the inequality. Thus, constraints (10b) must be active at the optimal solution. The first part proof of this proposition is completed.
Now, we prove the second part of this proposition. If Γ is greater than the left-hand side of (10c), one can decrease DTP or increase AN to save power. However, with the decrease of DTP or increase of AN, the left-hand side of (10b) is decreased. Then, the equality of (10b) is not satisfied, which conflicts with the equality constraints in (10b). The second part of the proof is completed. □
Since the rank one constraints are dropped in problem P 4 , it is important to investigate tightness of such a relaxation. If the solutions of problem P 4 ( W k ) are rank one, i.e., rank( W k ) = 1, the optimal beamforming w k of problem P 4 can be extracted by eigenvalue decomposition from W k . Otherwise, the Gaussian randomization method [38] can be employed to obtain the approximate solutions.
Finally, the algorithm is summarized in Algorithm 1.
Algorithm 1 IDC-based SDP algorithm.
 Initialization: Set the initial values for s ( 0 ) by letting { W k ( 0 ) , V ( 0 ) } be a feasible point to problem P 4 ;
 Repeat:
Step 1: Fix { ν l } , solve problem P 4 and return instantaneous optimal solution { W k , V , s } ;
Step 2: Update { W k W k , V V , s s , τ ς τ } , update { ν l } using s ( 0 ) = [ s 1 , , s L ] T .
 Until convergence or maximum iteration is reached.
Although the active BSs are obtained from Algorithm 1 by checking the nonzero elements of s , the minimum network power consumption may not be attained since Algorithm 1 converges to a local optimal solution. Since the IDC-based SDP algorithm tries to switch maximum number of BSs into sleep mode, the minimum network power consumption cannot be attained. Moreover, as mentioned in [4], by investigating the system parameters after obtaining the beamforming and AN, the performance can be enhanced. Therefore, we develop a post processing procedure to further reduce the network power consumption in the next subsection.

4.2. Stage 2: Post Processing Procedure

The IDC-based SDP algorithm tries to enforce s to zero, and the BSs with zero soft transmit power are switched into sleep mode. For instance, when s l = 0 , BS l is switched into sleep mode. Since Algorithm 1 converges to a local optimal solution, using only s l to find the active BSs will cause a performance loss. However, the amount of soft transmit power indicates the BS activation priority, and a smaller s l indicates that BS l has a lower priority to be switched off. According to [4,7], a better network power performance can be obtained by exploiting the key system parameters. Hence, in this subsection, we define a new incentive metric Λ l to indicate the priority of activating BS l as
Λ l = s l k = 1 K h k l 2 2 P l c ,
where k = 1 K h k l 2 2 indicates the channel gain of BS l. A larger Λ l means that BS l has a higher priority to be activated.
It should be noted that the BSs with no transmit power (i.e., s l = 0 ) should be switched off since the corresponding Λ l equals to zero when s l = 0 . Thus, Z [ 0 ] = { s l = 0 } denotes the roughly inactive BS set. Denote A ^ = L { s l = 0 } the rough active BS set obtained from Algorithm 1, and A ^ = A ^ the rough number of active BSs. Then, all the incentive metric are sorted in ascending order: θ π 1 θ π A ^ , where π i is the active BSs order. By fixing the active BS set A [ i ] at the i-th step, problem P 4 becomes
P 5 : min W , V , x , α 1 η l A [ i ] k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) + l A [ i ] P l c s . t . k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) P l max , l A [ i ] ( 19 ) , ( 22 ) , ( 23 d ) ,
The post processing procedure switches the BSs with the lowest incentive metric into sleep mode one by one until problem P 5 becomes infeasible or the network power consumption of problem P 5 at the i-th step is larger than the power consumption obtained from the previous [ i 1 ] -th step, where A [ i ] is the instantaneous active BS set at the i-th step, and A [ i ] = L Z [ i ] with Z [ i ] = { π 1 , , π i } .
Since the BSs are switched into sleep mode one by one, problem P 5 needs to solve by no more than A ^ times. Moreover, since problem P 5 has a similar form as problem P 4 , the rank one conditions are also attainable, which can be easily proved.

4.3. Stage 3: Transmit Power Optimization

Once the active BS set A is obtained using Algorithm 2, the joint beamforming and AN design problem needs to be solved. In other words, by replacing A [ i ] with A , we solve the following problem:
P 6 : min W , V , α 1 η l A k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) + A ^ P l c s . t . k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) P l max , l A ( 19 ) , ( 22 ) , ( 23 d ) ,
where A ^ = | A | is the active number of active BSs, and problem P 6 is a SDP problem which can be solved using the interior-point method [21]. It is obvious that problem P 6 has rank one solutions.
Finally, the post processing is summarized as Algorithm 2.
Algorithm 2 Post processing procedure for finding the final active BSs.
 Initialization: let A [ 0 ] = { 1 , , A ^ } , the network power consumption P total A [ 0 ] and the iteration index
  i = 0 .
 Step 1: Update the iteration number i = i + 1 .
 Step 2: Let A [ i ] = A [ i 1 ] { π i } , and solve problem P 5 .
 Step 3: If problem P 5 is infeasible, go to Step 5; Otherwise, go to Step 4.
 Step 4: If P total A [ i ] P total A [ i 1 ] , go to Step 1; Otherwise, go to Step 5.
 Step 5: Obtain the final active BS set A = A [ i 1 ] .
 Step 6: Solve problem P 6 and obtain the final network power consumption P total A , beamforming and
 AN (i.e., { W k , V } ).

4.4. Initialization and Complexity Analysis

In this subsection, we first discuss the initial points for Algorithm 1, and then analyze the computational complexity of the proposed algorithm.

4.4.1. Initialization

Since Algorithm 1 needs to solve problem P 4 iteratively, it is important to set the starting point to be feasible. In this paper, we get a feasible point through solving the following initialization problem with all BSs active (i.e., let A = L ).
P INI : min W , V , x , α 1 η l L k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) s . t . k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) P l max , l L ( 19 ) , ( 22 ) , ( 23 d ) ,
The optimal solution { W k ( 0 ) , V ( 0 ) } of problem P INI is employed as a feasible initialization point in Algorithm 1 in Section 4.1. Then, the initialization point s ( 0 ) is calculated using s l ( 0 ) = k = 1 K Tr ( Φ l W k ( 0 ) ) + Tr ( Φ l V ( 0 ) ) , l . Since Algorithm 1 iteratively generates a decreasing sequence, it converges to a local optimal solution [32,33] with a initialization point s ( 0 ) .

4.4.2. Complexity Analysis

According to [39], the computational complexity of Algorithm 1 using the interior point method is on the order of O ( I max M K N L ( M K 3 ( N L ) 2 + M K 2 ( N L ) 3 ) ) , where I max is the maximum iteration number. Since Algorithm 2 solves problem P 5 for at most A ^ times and problem P 6 for one time, its computational complexity is O ( A ^ M K N A ^ ( M K 3 ( N A ^ ) 2 + M K 2 ( N A ^ ) 3 ) ) . Finally, the total computational complexity of the proposed algorithm (summation of Algorithms 1 and 2) is O ( A ^ M K N A ^ ( M K 3 ( N A ^ ) 2 + M K 2 ( N A ^ ) 3 ) ) .

5. Simulation Results and Discussion

We consider a secure downlink C-RAN with L = 7 two-antenna BSs, K = 4 single-antenna IRs and M = 1 single-antenna ER. One BS locates at the circle centre, and the other six BSs are located on the circle rim with a radius of 0.2 km. The IRs and ER are randomly distributed in the circle with uniform distribution. The layout of the considered scenario in a secure downlink C-RAN is depicted in Figure 2.
We assume that all the BSs have the same fronthaul link power ( P c = P l c , l ) and maximum transmit power ( P max = P l max , l ). We set P l c = 5 Watt and P l max = 1 Watt for all BSs [4]. The channel model considered in this paper consists of path-loss, shadowing and small-scale fading. In particular, the channel from BS l to IR k is
h ˜ k l = 10 L ( d k l ) / 20 φ k l δ k l b k l ,
where L ( d k l ) = 148.1 + 37.6 log 10 d k l is the path-loss fading from BS l to IR k at d k l km [4,40], φ k l = 9 dBi is the transmit antenna gain at each BS, δ k l is the log-normal shadowing and zero mean and standard deviation of 8 dB of δ k l are adopted in this paper [4], and b k l CN ( 0 , I ) is the small-scale fading coefficient. Similarly, the channels ( g ˜ m , m M ) from BSs to ERs are generated. The channel uncertainties of IRs and ERs are assumed to satisfy Θ k = 1 ε I R 2 I N L , k [19] and Θ ˜ m = 1 ε E R 2 I N L , m [15], respectively, and without specified ε I R 2 = ε E R 2 = 0.05 . We default Γ = 10 dB [15] and γ = γ k = 15 dB. The noise power (with 10 MHz bandwidth) is σ I R k 2 = σ E R m 2 = 104 dBm. We utilize the general smooth function as f ( s l ) = ln ( 1 + s l τ 1 ) ln ( 1 + τ 1 ) [31]. Without specified, all the data are averaged over 40 independently IR and ER locations, and the CSI on each location is averaged over 40 channel realizations. Three algorithms are taken into consideration for comparison.
1 / 2 -norm algorithm [7]: this algorithm is also called re-weighted 1 -norm algorithm, which approximates 0 -norm in the objective function of problem P 0 by the re-weighted 1 / 2 -norm, and updates the weights iteratively until the convergence condition is met. The BSs with zero transmit power consumption will be switched into sleep mode. Since the 1 / 2 -norm algorithm needs to solve a series of SDP problems and its computational complexity is in the order of O ( I max M K N L ( M K 3 ( N L ) 2 + M K 2 ( N L ) 3 ) ) , where I max is the maximum iteration number.
ExSearch algorithm: this algorithm is the optimal one since it computes network power consumption for all possible combinations of the active BSs, and chooses the one with lowest power consumption. The corresponding BSs are active, and this algorithm achieves global optimal solution since the problem is globally solved for any fixed active BS mode. Since the Exsearch algorithm searches for all possible combinations of the active BSs, the computational complexity is on the order of O ( 2 L M K N L ( M K 3 ( N L ) 2 + M K 2 ( N L ) 3 ) ) .
Baseline algorithm: this algorithm assumes that all the BSs are active. This algorithm is taken for comparison in order to investigate the performance gain of BS mode selection. ExSearch algorithm can be regarded as a special case of Baseline algorithm if the obtained active BS set A of ExSearch algorithm is L . The Baseline algorithm solves the SDP problem for only one time and its computational complexity is in the order of O ( M K N L ( M K 3 ( N L ) 2 + M K 2 ( N L ) 3 ) ) .

5.1. Power Distribution of the BSs

In this subsection, we investigate the power distribution of the BSs with all BSs active to show the efficiency of proposition 1. Letting A = L (all BSs are active), we solve problem P 5 using mathematical tool, i.e., CVX. It is noted that problem P 5 is a power minimization problem without considering BS mode selection, and the BS power distribution will give some insights into which BSs are active when BS mode selection is taken into consideration. Since the fronthaul link power consumption is fixed, we only analyze the transmit power consumption of each BS for eight typical randomly channel realizations, and the results are listed in Table 2. Note that we use “Ch” as the abbreviation of “Channel”.
As shown in Table 2 that the transmit power of each BS is not equal to zero for all the eight random channel realizations. In fact, we have tested the transmit power distribution of the BS mode for more than 1000 randomly channel realizations, and found that the transmit power of the BSs is not equal to zero exactly. In other words, the value of dual variable β l is no less than 1 / η in general. However, it is interesting to find that the transmit powers of some BSs are close to zero compared to other ones. For instance, BS 2, 3 and 4 are lower transmit power than that of the other four BSs for Channel 1, and BS 2, 4, and 7 also consume lower transmit than that of the other four BSs. It is also observed from Table 1 that BS 4 seems to be switched into sleep mode for Channel 7 since it consumes much lower transmit power than other BSs. The value of the transmit power provides some insights in selecting which BSs should be switched into sleep mode in the following subsections.

5.2. Convergence Analysis

To demonstrate the convergence rate of the proposed SDR-based DC algorithm, we plot the objective value of problem P 3 over two randomly channel realizations. It is shown in Figure 3a that the proposed algorithm converges to a local optimal solution in less than 15 iterations. In Figure 3b, we show the corresponding DTP and AN distribution of Algorithm 1. It indicates that both DTP and AN increase with the iteration progress, and Algorithm 1 converges when DTP and AN converge to a local optimal solution. This is mainly due to the fact that Algorithm 1 tries to switch the BSs into sleep mode with the updated weights, and the transmit power must be increased in order to satisfy the same QoS requirements and PLS constraints. According to the expressions of the SINR of IRs and ERs, by increasing DTP, the SINRs of IRs increase while the SINRs of ERs decrease. On the other hand, the directions of transmitted signals try to align the intended IRs, and a small amount of AN is needed to interfere the ERs. As a result, the power consumption for data transmitting is larger than AN (AN accounts for only 19.5 % and 13.85 % of overall transmit power for Ch 1 and Ch 2, respectively).
To investigate further, we take the active BSs of Ch 2 (the same channel as in Figure 3) under different algorithms as an example, which is given in Figure 4. It is observed from Figure 4 that 1 / 2 -norm algorithm needs four active BSs in order to support the required SINR of IRs and PLS constraints. However, the proposed three-stage algorithm consumes only three active BSs, which has the same active number as the ExSearch algorithm. This is mainly because the power consumption increased by the transmit power is lower than the power saved by switching one more BS into sleep mode while satisfying the same constraints. These observations reveal that the BSs with lower transmit power are inclined to be switched into sleep mode. The active BS number, network power, and transmit power consumption of the proposed three-stage algorithm are given in Table 3. Since all BSs are assumed to be active for the baseline algorithm, there are seven active BSs in Table 3. It can be seen from Table 3 that the proposed algorithm and ExSearch algorithm consume a smaller amount of network power than that of 1 / 2 -norm algorithm and the baseline algorithm.

5.3. Impact of SINR Threshold of IR on Performance

In Figure 5, we evaluate the impact of the minimum required SINR (SINR threshold) of IRs on the overall network power consumption. It can be observed that the network powers of all the algorithms are a monotonically nondecreasing function of γ . This is mainly because more active BSs and transmit power are consumed in order to support higher required SINR of IRs. The network power consumption of the proposed algorithm is close to the ExSearch one, and is lower than the baseline and 1 / 2 -norm algorithms by respectively 35% and 8% in the low required SINR region, and by about 12% and 5%, respectively, in the high required SINR region.

5.4. Impact of SINR Threshold of ER on Performance

Figure 6 studies the impact of the ERs’ SINR threshold Γ on the network power consumption. It is observed from Figure 6 that a smaller Γ results in a higher overall power consumption. This is because more AN has to be generated to satisfy a smaller Γ , bringing in a larger interference. As a result, more DTPs are consumed to satisfy the minimum required SINR of IRs, resulting in a higher overall network power consumption. Moreover, the performance of the proposed algorithm is approximately the optimal one, and it consumes around 5% less network power than the 1 / 2 -norm algorithm.

5.5. Performance of the Proposed Algorithm

In this subsection, we investigate the relationship between network power consumption and ER number under different channel errors of IRs and ERs. All the IRs and ERs are randomly distributed in the circle region. For each IR and ER location, a single channel realization at each location is considered. Since the proposed algorithm has comparable network performance as the ExSearch one, and both achieve much better performance than 1 / 2 -norm algorithm and Baseline algorithm, we only plot the proposed algorithm in this subsection. In the simulations, we assume that all the IRs and ERs have the same CSI error radiuses, i.e., ε 2 = ε I R 2 = ε E R 2 .

5.5.1. Impact of BS Antennas on Performance

Firstly, we compare the performance of different algorithms under different BS antennas, and the results are given in Table 4. Intuitively, the network power consumption decreases with the increased BS antennas. More BS antennas provide a larger diversity gain, and less active BSs as well as transmit power are needed to guarantee QoS requirements and PLS. As can also be seen from Table 4, the total power consumption decrease with the increased number of BS antennas. With more BS antennas, degree of freedom provided by BSs is increased and the desired signals are concentrated to align IRs. As a result, less amount of AN is needed to provide PLS.

5.5.2. Impact of CSI Error Radius of ERs on Performance

To investigate further, we study different CSI error radius of IRs and ERs on the performance of the proposed algorithm. The results are given in Table 5. As can be seen from Table 5 that both the transmit power and network power are increased with the increasing CSI error radius of ERs. This is due to the fact that a larger CSI error radius of ERs decrease the information signal quality, and it also increases the interference for ERs.

5.5.3. Network Power Consumption versus ER Number

We also investigate the impact of ER number on network power consumption under different CSI error radius. The results are shown in Figure 7.
It can be seen from Figure 7 that the more overall network power that is consumed in order to interfere, the larger the number of ERs. This is mainly because more power is needed to guarantee all the SINR of ERs be no larger than their SINR thresholds. On the other hand, by increasing the channel error radius, more network power is consumed. This is because, with a higher CSI error ε 2 , a larger amount of DTP and AN alongside the active BS number are required to maintain the SINR thresholds of ERs and IRs. In particular, when ε 2 = 0 , the channels of IRs and ERs are perfectly known at the BBU pool. In this case, to support guaranteed QoS, the network power consumption is lower than the ones when the channels are imperfect.

6. Conclusions

This paper has investigated the power efficiency of a secure downlink C-RAN system with CSI uncertainty. The BS mode, beamforming, and AN are jointly optimized to minimize the overall network power consumption with imperfect CSI at both IRs and ERs. With problem transformation and approximation, a general IDC algorithm is proposed to provide a local optimal solution for the DC programming problem. A three-stage algorithm is proposed, which combines the IDC-based SDP algorithm and post processing method. Specifically, a rough sparse solution is obtained by the proposed IDC-based SDP algorithm, and the sparsity of the solution is further improved by a post processing procedure. Numerical results showed that the developed algorithm can significantly reduce the overall network power consumption. Moreover, by increasing the channel error or the number of ERs, more overall network power was consumed. The algorithm is developed under the assumption of imperfect CSI of ERs in this paper, and a more practical scenario without knowing the CSI of ERs is interesting, and we leave it for future work.

Author Contributions

Formal analysis, R.L.; Writing—original draft, Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Proposition 1

Proof. 
Accordingly, constraint (23b) must hold with equality at the optimal point, i.e., s l = k = 1 K Tr ( Φ l W k ) + Tr ( Φ l V ) , where W k and V are respectively the optimal value of W k and V . Since each IR has its own QoS requirement, W k cannot be a zero matrix. Thus, s l 0 and the proof is completed. □

References

  1. Chen, K.; Duan, R. C-RAN the road towards green RAN. China Mobile Research Institute, White Paper. 2011. Available online: https://pdfs.semanticscholar.org/eaa3/ca62c9d5653e4f2318aed9ddb8992a505d3c.pdf (accessed on 13 February 2020).
  2. Peng, M.; Li, Y.; Jiang, J.; Li, J.; Wang, C. Heterogeneous cloud radio access networks: A new perspective for enhancing spectral and energy efficiencies. IEEE Wirel. Commun. 2014, 21, 126–135. [Google Scholar] [CrossRef] [Green Version]
  3. Andrews, J.; Buzzi, S.; Choi, W.; Hanly, S.; Lozano, A.; Soong, A.; Zhang, J. What Will 5G Be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
  4. Shi, Y.; Zhang, J.; Letaief, K.B. Group sparse beamforming for green cloud-ran. IEEE Trans. Wirel. Commun. 2014, 13, 2809–2823. [Google Scholar]
  5. Wu, J.; Zhang, Y.; Zukerman, M.; Yung, K.N. Energy-efficient base-stations sleep-mode techniques in green cellular networks: A survey. IEEE Commun. Surv. Tutor. 2015, 17, 803–826. [Google Scholar] [CrossRef]
  6. Tang, J.; Tay, W.; Quek, T. Cross-layer resource allocation with elastic service scaling in cloud radio access network. IEEE Trans. Wirel. Commun. 2015, 14, 5068–5081. [Google Scholar] [CrossRef]
  7. Wang, Y.; Ma, L.; Xu, Y.; Wei, X. Computationally efficient energy optimization for cloud radio access networks with csi uncertainty. IEEE Trans. Commun. 2017, 65, 5499–5513. [Google Scholar] [CrossRef]
  8. Dai, B.; Yu, W. Energy efficiency of downlink transmission strategies for cloud radio access networks. IEEE J. Sel. Areas Commun. 2016, 34, 1037–1050. [Google Scholar] [CrossRef] [Green Version]
  9. Li, J.; Wu, J.; Peng, M.; Zhang, P. Queue-aware energy-efficient joint remote radio head activation and beamforming in cloud radio access networks. IEEE Trans. Wirel. Commun. 2016, 15, 3880–3894. [Google Scholar] [CrossRef]
  10. Wyner, A. The Wire-Tap Channel; Technical Report; Wiley-VCH: Hoboken, NJ, USA, 1975. [Google Scholar]
  11. Khisti, A.; Wornell, G. Secure transmission with multiple antennas-part I the misome wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef] [Green Version]
  12. Khisti, A.; Wornell, G. Secure transmission with multiple antennas-part II the mimome wiretap channel. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar] [CrossRef] [Green Version]
  13. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  14. Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.; Leung, K. Secrecy rate optimizations for a mimo secrecy channel with a multiple-antenna eavesdropper. IEEE Trans. Veh. Technol. 2014, 63, 1678–1690. [Google Scholar] [CrossRef]
  15. Ng, D.; Lo, E.; Schober, R. Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wirel. Comm. 2014, 13, 4599–4615. [Google Scholar] [CrossRef] [Green Version]
  16. Wang, H.; Wang, C.; Ng, D.; Lee, M.; Xiao, J. Artificial noise assisted secure transmission for distributed antenna systems. IEEE Trans. Signal Process. 2016, 64, 4050–4064. [Google Scholar] [CrossRef]
  17. Love, D.; Heath, R., Jr.; Lau, V.; Gesbert, D.; Rao, B.; Andrews, M. An overview of limited feedback in wireless communication systems. IEEE J. Sel. Areas Commun. 2008, 26, 1341–1365. [Google Scholar] [CrossRef]
  18. Wang, J.; Bengtsson, M.; Ottersten, B.; Palomar, D. Robust MIMO precoding for several classes of channel uncertainty. IEEE Trans. Signal Process. 2013, 61, 3056–3070. [Google Scholar] [CrossRef]
  19. Shen, C.; Chang, T.; Wang, K.; Qiu, Z.; Chi, C. Distributed robust multicell coordinated beamforming with imperfect CSI: An admm approach. IEEE Trans. Signal Process. 2012, 60, 2988–3003. [Google Scholar] [CrossRef] [Green Version]
  20. Zhou, F.; Li, Z.; Cheng, J.; Li, Q.; Si, J. Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT. IEEE Trans. Wirel. Commun. 2017, 16, 2450–2464. [Google Scholar] [CrossRef] [Green Version]
  21. Stephen, B.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004; p. 655. [Google Scholar]
  22. Luo, S.; Zhang, R.; Lim, T. Downlink and uplink energy minimization through user association and beamforming in cloud ran. IEEE Trans. Wirel. Commun. 2015, 14, 494–508. [Google Scholar] [CrossRef]
  23. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  24. Deng, Y.; Wang, L.; Elkashlan, M.; Nallanathan, A.; Mallik, R.K. Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach. IEEE Trans. Inf. Forensic Secur. 2016, 11, 1128–1138. [Google Scholar] [CrossRef] [Green Version]
  25. Ng, D.; Schober, R. Secure and green SWIPT in distributed antenna networks with limited backhaul capacity. IEEE Trans. Wirel. Commun. 2015, 14, 5082–5097. [Google Scholar] [CrossRef] [Green Version]
  26. Shojaeifard, A.; Wong, K.K.; Yu, W.; Zheng, G.; Tang, J. Full-Duplex Cloud Radio Access Network: Stochastic Design and Analysis. IEEE Trans. Wirel. Commun. 2018, 17, 7190–7207. [Google Scholar] [CrossRef]
  27. Auer, G.; Giannini, V.; Desset, C.; Godor, I.; Skillermark, P.; Olsson, M.; Imran, M.A.; Sabella, D.; Gonzalez, M.J.; Blume, O.; et al. How much energy is needed to run a wireless network? IEEE Wirel. Commun. 2011, 18, 40–49. [Google Scholar] [CrossRef]
  28. Dhaini, A.; Ho, P.; Shen, G.; Shihada, B. Energy efficiency in tdma-based next-generation passive optical access networks. IEEE/ACM Trans. Netw. 2014, 22, 850–863. [Google Scholar] [CrossRef] [Green Version]
  29. Park, S.-H.; Simeone, O.; Shamai, S. Fronthaul quantization as artificial noise for enhanced secret communication in C-RAN. In Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017. [Google Scholar]
  30. Rinaldi, F.; Schoen, F.; Sciandrone, M. Concave programming for minimizing the zero-norm over polyhedral sets. Comput. Optim. Appl. 2010, 46, 467–486. [Google Scholar] [CrossRef]
  31. Tao, M.; Chen, E.; Zhou, H.; Yu, W. Content-centric sparse multicast beamforming for cache-enabled cloud RAN. IEEE Trans. Wirel. Commun. 2016, 15, 6118–6131. [Google Scholar] [CrossRef] [Green Version]
  32. Marks, B.; Wright, G. A general inner approximation algorithm for nonconvex mathematical programs. Oper. Res. 1978, 26, 681–683. [Google Scholar] [CrossRef]
  33. Bomze, I.; Lemaréchal, C. Necessary conditions for local optimality in difference-of-convex programming. J. Convex Anal. 2010, 17, 673–680. [Google Scholar]
  34. Yuille, A.; Rangarajan, A. The concave-convex procedure. Neural Comput. 2003, 15, 915–936. [Google Scholar] [CrossRef]
  35. Smola, A.; Vishwanathan, S.; Hofmann, T. Kernel methods for missing variables. In Proceedings of the International Workshop Artificial Intelligence and Statistics, Bridgetown, Barbados, 6–8 January 2005; pp. 325–332. [Google Scholar]
  36. Lipp, T.; Boyd, S. Variations and extension of the convex-concave procedure. Optim. Eng. 2016, 17, 263–287. [Google Scholar] [CrossRef]
  37. Grant, M.; Boyd, S.; Ye, Y. CVX: Matlab Software for Disciplined Convex Programming, Version 2.0 Beta. 2012. Available online: http://cvxr.com/cvx (accessed on 13 February 2020).
  38. Luo, Z.; Ma, E.; Thus, M.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  39. Pólik, I.; Terlaky, T. Interior point methods for nonlinear optimization. In Nonlinear Optimization; Springer: Berlin/Heidelberger, Germany, 2010; Volume 4, pp. 45–47. [Google Scholar]
  40. LTE. Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Frequency (RF) Requirements for LTE Pico Node B (Release 9), 3rd Generation Partnership Project (3GPP), TS 36.931, Version 9.0.0; Technical Report; 3GPP: Valbonne, France, 2011. [Google Scholar]
Figure 1. Illustration of the considered secure downlink C-RAN with L = 4 , K = 2 , M = 1 , A = { BS 1 , BS 2 , BS 4 } .
Figure 1. Illustration of the considered secure downlink C-RAN with L = 4 , K = 2 , M = 1 , A = { BS 1 , BS 2 , BS 4 } .
Entropy 22 00223 g001
Figure 2. Layout of the secure downlink C-RAN.
Figure 2. Layout of the secure downlink C-RAN.
Entropy 22 00223 g002
Figure 3. Convergence behavior of the SDR-based SDP algorithm for two random channels.
Figure 3. Convergence behavior of the SDR-based SDP algorithm for two random channels.
Entropy 22 00223 g003
Figure 4. The set of active BSs generated by (a) proposed algorithm, (b) 1 / 2 -norm algorithm, (c) ExSearch algorithm, and (d) Baseline algorithm.
Figure 4. The set of active BSs generated by (a) proposed algorithm, (b) 1 / 2 -norm algorithm, (c) ExSearch algorithm, and (d) Baseline algorithm.
Entropy 22 00223 g004
Figure 5. Network power consumption vs. minimum required SINR of IRs.
Figure 5. Network power consumption vs. minimum required SINR of IRs.
Entropy 22 00223 g005
Figure 6. Network power consumption vs. maximum tolerate received SINR of ERs.
Figure 6. Network power consumption vs. maximum tolerate received SINR of ERs.
Entropy 22 00223 g006
Figure 7. Network power consumption vs. number of ERs’ with γ = 15 dB.
Figure 7. Network power consumption vs. number of ERs’ with γ = 15 dB.
Entropy 22 00223 g007
Table 1. List of major symbols used in this paper.
Table 1. List of major symbols used in this paper.
SymDescriptionSymDescription
Tr [ · ] trace of a matrix E [ · ] expectation operator
Θ k uncertainty channel shape of the ellipsoid of IR k C set of complex numbers
Θ ˜ m uncertainty channel shape of the ellipsoid of ER m ( · ) T transpose
H k set of uncertainty channel region of IR k ( · ) H conjugate transpose
Ω m set of uncertainty channel region of ER m I N N × N identity matrix
CN complex gaussian distribution 0 N N × N zero matrix
P l a , bs hardware power consumption of BS l in the active mode H N N × N Hermite matrix
P l s , bs power consumption of BS l in the sleep mode L BS set
P l c , bs saved power by switching BS l in the sleep mode A active BS set
P olt constant power consumption of OLT Z inactive BS set
P l a , tl power consumption of ONU l in the active mode L Z set of L exclude Z
P l s , tl power consumption of ONU l in the sleep mode x 0 0 -norm
P l c both BS l and its corresponding fronthaul link in active mode x 1 1 -norm
P l a both BS l and its corresponding fronthaul link in sleep mode x 2 2 -norm
P l c P l a P l s | · | mode operator
Table 2. The transmit power distribution in milliwatt over eight random channels.
Table 2. The transmit power distribution in milliwatt over eight random channels.
ChBS 1BS 2BS 3BS 4BS 5BS 6BS 7
Ch 10.190.090.070.070.131.590.23
Ch 28.582.223.191.022.7612.322.18
Ch 34.092.552.764.8512.567.711.16
Ch 42.080.701.683.442.631.582.64
Ch 54.3912.682.190.371.672.1814.49
Ch 67.991.526.887.931.011.130.52
Ch 74.145.791.990.092.573.640.86
Ch 81.5010.273.680.222.990.442.70
Table 3. The active BS number, network power and transmit power consumed by different algorithms over Ch 2.
Table 3. The active BS number, network power and transmit power consumed by different algorithms over Ch 2.
AlgorithmsA P total (Watt) P tp (Watt)
Proposed algorithm315.560.14
1 / 2 -norm algorithm420.280.07
ExSearch algorithm315.560.14
Baseline algorithm735.130.03
Table 4. The impact of BS antennas on network power consumption (Watt).
Table 4. The impact of BS antennas on network power consumption (Watt).
Algorithms N = 1 N = 2 N = 4 N = 8
AN (Watt)0.1600.0530.0040.001
DTP (Watt)0.3170.1340.0130.008
NP (Watt)27.4318.1815.3212.79
AN/DTP(%)50.5039.5530.7712.50
Table 5. The impact of ε E R on power consumption (Watt) with ε I R 2 = 0.05 .
Table 5. The impact of ε E R on power consumption (Watt) with ε I R 2 = 0.05 .
ε ER 2 00.0010.010.050.10.12
AN + DTP0.1490.4090.5451.0281.4431.767
NP15.59917.55318.19118.99819.97120.929

Share and Cite

MDPI and ACS Style

Zhang, Y.; Liu, R. Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security. Entropy 2020, 22, 223. https://doi.org/10.3390/e22020223

AMA Style

Zhang Y, Liu R. Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security. Entropy. 2020; 22(2):223. https://doi.org/10.3390/e22020223

Chicago/Turabian Style

Zhang, Yijia, and Ruiying Liu. 2020. "Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security" Entropy 22, no. 2: 223. https://doi.org/10.3390/e22020223

APA Style

Zhang, Y., & Liu, R. (2020). Robust Power Optimization for Downlink Cloud Radio Access Networks with Physical Layer Security. Entropy, 22(2), 223. https://doi.org/10.3390/e22020223

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop