Communications and Network, 2013, 5, 194-199
http://dx.doi.org/10.4236/cn.2013.53B2037 Published Online September 2013 (http://www.scirp.org/journal/cn)
Copyright © 2013 SciRes. CN
Artificial Noise Based Security Algorithm for
Multi-User MIMO System
Jian-hua Peng, Kai-zhi Huang, Jiang Ji
National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China
Email: hongyinghunan@126.com
Received June, 2013
ABSTRACT
The existing physical layer security algorithm, which is based on artificial noise, could affect legitimate receivers nega-
tively when the number of users is no less than sending antennas in multi-user MIMO system. In order to improve secu-
rity of multi-user MIMO system under this scenario, we propose a new multi-user MIMO system physical layer security
algorithm based on joint channel state matrix. Firstly, multiple users are processed together, thus a multi-user joint
channel state matrix is established. After achieving Singular Value Decomposition (SVD) of the joint channel state ma-
trix, the minimum singular value is obtained, which can be utilized for precoding to eliminate the interference of artifi-
cial noise to legitimate receivers. Further, we also present an approach to optimize the power allocation. Simulation
results show that the proposed alg orithm can increase secrecy capacity by 0.1 bit/s/HZ averagely.
Keywords: Multi-user MIMO System; Joint Channel State Matrix; Secrecy Capacity; Artificial Noise; Physical Layer
Security
1. Introduction
The multiple-input-multiple-output (MIMO) technology
has become one of the key technologies for the next gen-
eration wireless communication systems. Besides, it has
been introduced in the standards like IEEE 802.11/16 and
3GPP LTE. Due to the broadcast characteristics of the
electromagnetic signal propagation and the openness of
wireless channels, however, transmission of communica-
tion contents in the wireless communication system can
be easily intercepted. Thusly, it has become important
increasingly for protecting the multi-user MIMO system
communication security.
Considering the scenario without null space in the
multi-user MIMO system (number of legitimate users is
more than or equal to the number of antennas at the
transmitter), artificial noise for the physical layer security
will introduce additional noise to the legitimate users.
For this reason, available research about using artificial
noise to achieve multi-user MIMO system physical layer
security is conducted under the scenario of null space
existing in the system. [1,2] proposed a method improv-
ing security of the legitimate users by sending artificial
noise to third-party users: the potential eavesdropper’s
receiving could be inhibited by setting main lobe direct-
ing at the desired users at the multi-antenna transmitting
terminal and transmitting artificial noise in the other
beam. Communication security can be improved via
combining the beam forming and the artificial noise
when the locations of eavesdroppers are unknown [3].
Another way to protect the security of the legitimate us-
ers is achieved by introducing redundancy and transmit-
ting artificial noise in the view of space and frequency
domains combined [4]. An encipherment scheme under
multi-user downlinks situation is proposed using artifi-
cial noise jamming the eavesdroppers [5, 6]. Especially,
[5] discusses the security effectiveness of linear beam
forming with artificial noise integrated respectiv ely in the
MIMO broadcast channel and the MIMO transmission
multicast; besides, the noise power allocation scheme is
also considered with the SINR of desired users un-
changed. [7-9] provide a derivation and prove the secrecy
capacity range when there are multiple legitimate users
and eavesdroppers in Gaussian MIMO and MISO wire-
tap channel. The noise power allocation is specific re-
searched to maximize the secrecy capacity in literature
[10]. In order to ensure the existence of system null space
when the number of antennas in transmitting terminal is
limited, literature [11] studies how to select users from
the downlink multi-users to keep the security of the sys-
tem. However, the application scenarios discussed above
are limited, which restrict the system users’ capacity.
In the paper, a multi-user MIMO system security algo-
rithm based on artificial noise is proposed, aiming at no
null space in multi-user MIMO system scenario, and
translating the problem of eliminating the interference of
artificial noise to design of precoding. Firstly, multiple
J.-H PENG ET AL.
Copyright © 2013 SciRes. CN
195
legitimate users are processed together at transmitting
terminal, thus a multi-user joint channel state matrix and
its complement matrix are established. Then, after Sin-
gular Value Decomposition of the joint channel state
matrix and the complement matrix respectively, the
minimum singular va lue can b e utilized for precoding , so
as to eliminate the interference of artificial noise to le-
gitimate receivers and multi-user. At last, the paper pre-
sented an approach to optimize the power allocation. The
paper established a joint channel state matrix and suffi-
ciently considered the problems might exist in the
multi-user system, by precoding both the artificial noise
affect to the legitimate users is suppressed and the inter-
ference between the multi-user is eliminated; the artifi-
cial noise is forced to be transmitted via the small-
est-affect sub-channel, while the majority artificial noise
falls on the eavesdropping side. Simulation results show
that the proposed algorithm can increase the secrecy ca-
pacity by 0.1 bit/s/HZ averagely.
2. Security Model of the Multi-user MIMO
System
The encipherment model of the multi-user MIMO system
is shown as Figure 1. Supposing there are T
N transmit-
ting antennas at transmitting terminal, the number of re-
ceiving antennas of each K legitimate users is present
as
R
N. There is also a eavesdropper whose number of
receiving antennas is
E
N.
Respectively, the signals received by the -t hk le-
gitimate user and the eavesdropper can be shown as:
K
kkkkkjjkk
jk
yHtbH tbHpzn
 
(1)
1
K
eejje e
j
yH tzHpzn

(2)
k
y
e
H
k
H
k
t
k
b
k
w
e
w
e
y
p
z
2
b
1
b
2
t
1
t
2
y
2
H
2
w
1
y
1
H
1
w
Figure 1. The Security model of multi-user MIMO system.
Among them: k
b is the transmitting signal of the
-t hk legitimate user, k
H
is the channel state matrix of
the -thk legitimate user, e
H
is the channel state ma-
trix of the eavesdropper, k
t and p, the dimension all
being 1
T
N
, are respectively stand for th e precoding of
eliminating affection to legitimate users caused by
multi-user interference and artificial noise, z is the artifi-
cial noise, k
n and e
n separately stand for the additive
white Gaussian noise of the legitimate users and the
eavesdropper.
Then, the signal estimation from the -t h
k legitimate
user and the eavesdropper are separately:
''
''
K
kkkkkkk jj
jk
kk kk
y
wHtb wHtb
wHpzwn


(3)
'''
1
K
eeejjee ee
j
ywHtbwHpzwn

(4)
Among them: k
w and e
w are both 1
T
N
dimen-
sion and stands for beam forming weight for the -thk
legitimate user and the eavesdropper respectively, 'k
w
and 'e
w are the conjugate transposed matrixes of k
w
and e
w .
3. A Multi-user MIMO System Security
Algorithm Based on Artificial Noise
When there is more than one legitimate user, security
using artificial noise should meet two requirements: 1) to
prevent mutual interference between multi-user; 2) to
minimize the artificial noise affection to legitimate users.
Based on the two requirements, the main idea of the se-
curity algorithm is the precoding design of p and k
t ,
so that the numerous artificial noise and mutual interfer-
ence between multi-user could be filtered as signal is
transmitted though the legitimate users’ channel and the
eavesdropper could not demodulate correctly due to the
artificial noise affection. From (3) and (4), the legitimate
users are affected by a small part of the artificial noise
interference 'kk
wHpz, and the natural additive noise
from the channel 'kk
wn. Meanwhile, the eavesdropper is
effected by the mutual interference between multi-user
'K
ee jj
jk
wH tb
, the most part of the artificial noise inter-
ference 'ee
wHpz and the natural additive noise from
the channel 'ee
wn. As can be seen from the analysis
above, precoding design of k
t and p are directly re-
lated to whether the artificial noise affection and the
multi-user interference to legitimate users could be
eliminated; besides, the precoding design of k
t and p
are gotten though constructing complement matrix, joint
channel state matrix and the Singular Value Decomposi-
tion of these two matrixes. Thus, the algorithm could be
J.-H PENG ET AL.
Copyright © 2013 SciRes. CN
196
divided into two modules: precoding based on the Sin-
gular Value Decomposition of complement matrix and
precoding based on the Singular Value Decomposition of
joint channel state matrix.
3.1. Precoding Based on the Singular Value
Decomposition of Complement Matrix
Taking the modified Zero-Forcing beam forming method,
in the receiving terminal [5], firstly, having process of
beam forming and getting the weight vector l
w, then
defining the complement matrix
111
[ ........]T
lllK
hhhh


,
in which the ()
H
T
lll
hwH
is 1
T
N in dimension ,
so the dimension of l
H
can be known as (1)T
K
N
,
at last, the
H
llll
H
UDV

would be got by the Singular
Value Decomposition of l
H
. At the time of T
K
N
,
the row number of l
H
is less than the column number,
there would be a null space existing in the Singular
Value Decomposition, then the right singular vector
could be sequentially decomposed to () (0)
[]
s
H
lll
VVV
 ,
while the ()
s
l
V
is the corresponding right singular vector
of the nonzero singular values and the (0)
l
V
stands for
the null space of the complement matrix. Therefore, the
precoding (0)
kl
tV based on the Singular Value De-
composition of l
H
is available.
3.2. Precoding Based on the Singular Value
Decomposition of Joint Channel State
Matrix
To minimize the affection of the artificial noise at the
same time on the K legitimate users, the joint channel
state matrix can be defined as 1
[ ........]T
kK
Hh h
, in
which the ()
H
T
lll
hwH
is a 1
T
N dimension vector
and the k
H
is T
K
N dimension, so
H
kkkk
H
UDV
would be got by the Singular Value Decomposition.
At the time of T
K
N, the row number of k
H
is
less than the column number, there would be a null space
existing in the Singular Value Decomposition, then the
right singular vector could be sequentially decomposed
to () (0)
[]
s
H
kkk
VVV
 , while the (0)
k
V
stands for the null
space of the complement matrix. Therefore, the precod-
ing (0)
k
pV based on the Singular Value Decomposi-
tion of k
H
is available, then, the artificial noise inter-
ference to the legitimate users is zero by the precoding at
the moment. At the time of T
K
N, the right singular
vector could be sequentially decomposed to
() (0)
[]
s
H
kkk
VVV
 ,
and there would be no null space existing in the decom-
position of k
H
, that is, there is no null space existing
in the multi-user MIMO system. To make artificial noise
being transmitted via the smallest-affect to the legitimate
users sub-channel and in order to reduce the affection to
the legitimate users, the vector with smallest corre-
sponding singular value in ()
s
k
V
can be chosen as the
precoding p. The specific calculation steps are as fol-
lows:
1) By the Singular Value Decomposition of k
h, select
the left singular vectors to be the k
w corresponding to
the largest singular value.
2) Constructing the complement matrix
111
[ ........]T
lllK
hhhh


,
the precoding k
t is available via the Singular Value
Decomposition, which can eliminate the multi-user in-
terference.
3) Constructing the joint channel state matrix
1
[ ........]T
kK
Hh h
, the precoding p is available via the
Singular Value Decomposition, to eliminate the artificial
noise affection on the legitimate users.
4. Performance Analysis
4.1. Security Performance Analysis
On the basis of definition of secrecy capacity in literature
[4], the secrecy capacity of the -th
k user in the
multi-user MIMO system in the case of no null space
existing could be derived as:
2
'2
sec 2
'22
2
'2
22
'2'22
log(1)
log(1)
kkku
kkz n
eeku
K
eej ueeze
jk
wHt
CwH p
wHt
wHtwH p





(5)
Wherein, 2222
uzne

,,, separately stand for the
signal power, artificial noise power, noise power in the
legitimate user channel and the noise power in the
eavesdropper channel of the -thk user.
2
'2
sec 2
'22
2
'2
22
'2'22
log(1 )
log(1)
kkk u
kkz n
eek u
K
eej ueeze
jk
wHt
CwH p
wHt
wHtwH p





(6)
As can be seen from the formula above, under the total
power constrained conditions, a part of the power is used
to transmit artificial noise, besides, the problem of allo-
cation between signal power and noise power is directly
affect the secrecy capacity. Assuming the power alloca-
tion among the users is uniform and the useful power
allocation coefficient is
, then the power of the -thk
J.-H PENG ET AL.
Copyright © 2013 SciRes. CN
197
user is kP
p
K
,the allocated noise power of the -thk
user is

1
n
P
p
K
and the channel capacity of the
-t hk user is:

2
'
2
'2
log(1)
1
kkk
Ak
kk n
wHt P
CwHpPK


(7)
The channel capacity of the eavesdropper is:

2
'
22
'' 2
log(1)
1
eek
Ae K
eej eee
jk
wHt P
C
wHtPwH pPK



(8)
Assuming:
22 2
'' 2'
22
'' 2
,,,,
,,
kkkkkn eek
K
eej eee
jk
A
WHtBWHp C KD WHt
EWHtFWHpGK


Then:
log(1)
(1 )
Ak AP
CBPC


(9)
log(1 )
(1 )
Ae DP
CEPFPG

 
(10)
After derivation to the secrecy formula
sec Ak Ae
CCC,
make it equal to zero then get a unary quadratic equation
about
:
 
2
1112 221111112 22222
22
112 20
zabzabzah zbh zahzbh
zh zh

  (11)
where in
1212
121221
,,,,
, ,,
aEFDaABbEFb B
hFGhBCzAhzdh


By the discussion and judgment of the formulas above,
the value of
which could maximize the -thk user
secrecy capacity can be available.
4.2. System Performance Analysis
From (7), the -thk user’s channel capacity without arti-
ficial noise, i.e. 1
, can be acquired.
2
'
2
log(1)
kkk
Ak
n
wHt P
CK
 (12)
Then, the system sum capacity without artificial noise is:
2
'
2
1
log(1)
Kkkk
kn
wHt P
CK

(13)
Similarly, system sum capacity with artificial noise
added is:

2
'
z2
'2
1log(1 )
1
Kkkk
kkk n
wHt P
CwHpPK


(14)
So, with artificial noise security loss of system sum
capacity is:

2
'
z2
1
2
'
2
'2
1
=- =log(1)
log(1)
1
Kkkk
kn
Kkkk
kkk n
wHt P
CCC K
wHtP
wH pPK



(15)
Obviously, from (15), the loss of system sum capacity
is closely related with the receiving terminal beam form-
ing vector k
w, the precoding eliminating the multi-user
interference k
t, the precoding eliminating the artificial
noise affection p and the useful power allocation coef-
ficient
. Taking advantages of precoding design prin-
ciples in the previous section, which means the useful
signal is transmitted through the primary channel and the
artificial takes the secondary channel i.e. maximizing the
2
'
kkk
wHt and minimizing the 2
'
kk
wH p , the artificial
noise affection to the legitimate users and the loss of
system sum capacity can be minimized.
5. Simulation and Analysis
5.1. Secrecy Capacity
First of all, according to the method given in [6], a simu-
lation about secrecy capacity and sum capacity is taken
as the null space being existent and security being taken
in the system. Assuming that the numbers of antennas in
the transmitting and receiving terminal are both 4, the
number of legitimate users is 3, while the channel state of
legitimate users is given and normalized and total power
is 500 mW constantly. The simulation results of the
-t h
k user’s secrecy capacity and sum capacity are
shown in Figures 3 and 4.
The abscissa in Figure 2 presents the ratio between
noise power in user channel and in the eavesdropper
channel, the ordinate stands for the secrecy capacity.
Before artificial noise being added, part of the secrecy
capacity is greater than zero due to the affection on the
third-party from the multi-user interference; after artifi-
cial noise added the secrecy capacity is entirely improved
which causes the secrecy capacity is always above zero
in the part of 22
40 100
ne

 and realizes the secure
communication. Figure 3 indicates that with transmitting
power limited there will be some loss of the sum capacity
after encryption; meanwhile, the more noise power dis-
tributed, greater the loss will be.
J.-H PENG ET AL.
Copyright © 2013 SciRes. CN
198
Secondly, raise the number of legitimate users to 4 and
maintain the other simulation conditions. Now the null
space will be inexistent, and the simulation results of the
-t h
k user’s secrecy capacity and sum capacity are
shown in Figures 4 and 5 following the proposed algo-
rithm.
From Figure 4, when the system null space is inexist-
ent, the system secrecy capacity can be also improved via
the artificial noise, nonetheless, as the null space is in-
existent, the secrecy capacity is decreased comparing
with the null space existent condition. In addition, the
system secure communication cannot be achieved when
the useful power allocation coefficient is 0.8 and the ratio
range is 22
70 100
ne

. With the legitimate user’s
channel conditions deteriorated, the secrecy capacity
when useful power distribution coefficient is 0.6 or 0.4
gets gradatim higher than the condition as useful power
distribution coefficient being 0.8. This indicates that un-
der certain conditions, by more artificial noise transmit-
ted, the secrecy capacity can be improved and secure
Figure 2. Secrecy capacity.
Figure 3. Sum capacity.
communication will be realized.
From Figure 5, when the system null space is inexist-
ent, the artificial noise has partial impact on the legiti-
mate users, so the loss of sum capacity is intensified be-
cause of the artificial noise security; the loss of sum ca-
pacity with useful power allocation coefficients being 0.8
and 0.4 is separately as much as 1/4 and 1/2 of the sum
capacity without encryption. In spite of big loss of sum
capacity, as the users number increasing the sum capacity
after encryption is still higher than sum capacity of the
null space existing system. In summary, the substance of
the proposed algorithm is via a certain loss of sum capac-
ity to improve the secrecy capacity.
5.2. Power Allocation
Assuming the total power to be 500 mW constantly, the
simulation result of the -th
k user secrecy capacity in
the system changing with the useful signal power alloca-
tion coefficient is shown as Figure 6. When 22
20
ne

,
known conditions from the simulation are:
Figure 4. Secrecy capacity.
Figure 5. Sum capacity.
J.-H PENG ET AL.
Copyright © 2013 SciRes. CN
199
Figure 6. The Relationship between secrecy capacity and
useful power allocation coefficient.
4
0.0775, 0.0067, 80,9.78610,
1.0048, 0.0012,4
ABCD
EFG


Substituting results above into (10), the power alloca-
tion coefficient
which maximize the secrecy capacity
(i.e. maximum transmitting speed under security trans-
mission) could be present, similarly when the 22
ne
changes, on ly C need to be changed.
It is shown in Figure 6 that in the multi-user MIMO
system with null space inexistent, the secrecy capacity
will decline rapidly, when the transmission power of the
artificial noise is too small, especially less than the 10
percent of total power, and the secure transmission can-
not be achieved if th e condition g etting even worse. With
legitimate users’ channel conditions deteriorate, the op-
timum allocation coefficien t gradu ally shifts left, n amely,
the allocated artificial noise power will be more and
more if the channel condition of the eavesdropper is bet-
ter than the legitimate us er.
6. Conclusions
In this paper, a multi-user MIMO system security algo-
rithm based on artificial noise is proposed, which em-
phasizes the no null space in multi-user MIMO system
scenario. In the algorithm, the affection of artificial noise
to legitimate user is eliminated by precoding. For this
purpose, the joint channel state matrix is established;
then, after Singular Value Decomposition of the joint
channel state matrix, the precoding is completed based
on the minimum singular value; at last, an optimized
power allocation scheme is proposed. As shown from
simulation result, in the multi-user MIMO system with
null space inexistent, with artificial noise introduced for
physical layer security, the secrecy capacity will be im-
proved efficiently by a certain sacrifice of sum capacity;
especially, with the channel condition of the legitimate
user getting worse, the allocated artificial noise power
will be more and more to maximize the secrecy capacity.
REFERENCES
[1] R. Negi and S. Goel, Secure Communications Using Arti-
ficial Noise, IEEE Vehicle Technology Conference
(VTC), Dallas, TX, September 2005, pp. 1906-1910.
[2] S. Goel and R. Negi, “Guaranteeing secrecy using artifi-
cial noise,” IEEE Transactions on Wireless Communica-
tion, Vol. 7, No. 6, 2008, pp. 2180-2189.
[3] M. Ghogho and A. Swami, “Physical Layer Secrecy of
MIMO Communications in the Presence of a Poisson
Random Field of Eavesdroppers,” IEEE ICC Workshop
on Physical Layer Security, Kyoto, Japan, June 2011, pp.
1-5.
[4] M. Ghogho and Ananthram, “Physical Layer Security of
MIMO frequency selective channels by beamforming and
noise generation,” European Signal Processing Confer-
ence, Barcelona, Spain, Augest 2011, pp. 829-833.
[5] A. Mukherjee and A. L. Swindlehurst, “Utility of Beam-
forming Strategies for Secrecy in Multi-user MIMO
Wiretap Channels, in Proc. of Forty-Seventh Allerton
Conf., Oct 2009: 1268-1276.
[6] W. Liao, T. Chang, W. Ma and C. Chi, “Joint transmit
beamforming and artificial noise design for QoS dis-
crimination in wireless downlink,” in Proc. IEEE ICASSP,
Dallas, Mar 2010, pp. 256-2565.
[7] E. Ekrem and S. Ulukus, “The Secrecy Capacity Region
of the Gaussian MIMO Multi-Receiver Wiretap Chan-
nel,” IEEE Transactions on Information Theory, Vol. 57,
No. 4, 2011, pp. 2083-2113.
doi:10.1109/TIT.2011.2111750
[8] A. Khisti and G. W. Wornell, “Secure Transmission with
Multiple Antennas Part II: The MIMOME Wiretap Chan-
nel,” IEEE Transactions on Information Theory, Vol. 56,
No. 11, 2010, pp. 5515-5532.
doi:10.1109/TIT.2010.2068852
[9] A. Khisti and G. W. Wornell, “Secure Transmission with
Multiple Antennas I: The MISOME Wiretap Channel,”
IEEE Transactions on Information Theory, 2010, Vol. 56,
No. 11, pp. 3088-3104.doi:10.1109/TIT.2010.2048445
[10] X. Zhou and M. R. Mckay, Secure Transmission with
Artificial Noise over Fading Channels: Achievable Rate
and Optimal Power Allocation, International Conference
Signal Processing and Communication Systems, Omaha,
NE, Oct. 2010, pp. 3831-3842.
[11] A. Mukherjee and A. L. Swindlehurst, “User Election in
Multi-user MIMO Systems with Secrecy Considerations,”
ASILOMAR Conf. on Signals, Systems, and Computers,
Pacific Grove, CA, 2009, pp. 1479-1482.