Secure Communications Over Wireless Broadcast Networks - INLAB

3 downloads 0 Views 2MB Size Report
Engineering and Applied Science, and the Michael. Henry Strater University Professor of Electrical. Engineering. His research interests are in ... heim Fellowship in 2002 and the IEEE Education Medal in 2005. Recent recog- nition of his work ...
682

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization Yingbin Liang, Member, IEEE, H. Vincent Poor, Fellow, IEEE, and Lei Ying, Member, IEEE

Abstract—A wireless broadcast network model with secrecy constraints is investigated, in which a source node broadcasts confidential message flows to user nodes, with each message intended to be decoded accurately by one user and to be kept secret from all other users (who are thus considered to be eavesdroppers with regard to all other messages but their own). The source maintains a queue for each message flow if it is not served immediately. The channel from the source to the users is modeled as a fading broadcast channel, and the channel state information is assumed to be known to the source and the corresponding receivers. Two eavesdropping models are considered. For a collaborative eavesdropping model, in which the eavesdroppers exchange their outputs, the secrecy capacity region is obtained, within which each rate vector is achieved by using a time-division scheme and a source power control policy over channel states. A throughput optimal queue-length-based rate scheduling algorithm is further derived that stabilizes all arrival rate vectors contained in the secrecy capacity region. Moreover, the network utility function is maximized via joint design of rate control, rate scheduling, power control, and secure coding. More precisely, a source controls the message arrival rate according to its message queue, the rate scheduling selects a transmission rate based the queue length vector, and the rate vector is achieved by power control and secure coding. These components work jointly to solve the network utility maximization problem. For a noncollaborative eavesdropping model, in which eavesdroppers do not exchange their outputs, an achievable secrecy rate region is derived based on a time-division scheme, and the queue-length-based rate scheduling algorithm and the corresponding power control policy are obtained that stabilize all arrival rate vectors in this region. The network utility maximizing rate control vector is also obtained. Index Terms—Broadcast channel, power control, queue-lengthbased algorithm, rate control, rate scheduling, secrecy capacity region, stability, utility maximization.

Manuscript received September 27, 2010; revised May 18, 2011; accepted May 19, 2011. Date of publication May 31, 2011; date of current version August 17, 2011. The work of Y. Liang was supported by the National Science Foundation under Grant CCF-10-26566. The work of H. V. Poor was supported by the Air Force Office of Scientific Research under Grant FA9550-08-1-0480 and by the National Science Foundation under Grant CNS-09-05398. The work of L. Ying was supported by the National Science Foundation under Grant CNS- 08-31756 and Grant CNS-09-53165, and by the DTRA under Grant HDTRA1-08-1-0016 and Grant HDTRA1-09-1-0055. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Wade Trappe. Y. Liang is with the Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY 13244 USA (e-mail: yliang06@syr. edu). H. V. Poor is with the Department of Electrical Engineering, Princeton University, Princeton, NJ 08544 USA (e-mail: [email protected]). L. Ying is with the Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 USA (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TIFS.2011.2158311

I. INTRODUCTION

W

IRELESS broadcast networks constitute one class of basic and important wireless networks, in which a source node simultaneously transmits a number of information flows (messages) to different destinations. However, broadcast communications make use of the open nature of the wireless medium, which presents a great challenge to achieve secure communication for individual users. This is because information for all users is contained in one transmitted signal, and hence information destined for one user may be obtained by nonintended users unless special coding is used. Physical layer security, which uses randomness of a physical communication channel to provide security for messages transmitted through the channel, opens a promising new direction toward solving wireless networking security problems. This approach was pioneered by Wyner in [1] and by Csiszár and Körner in [2], and more recently has been extensively explored in the literature (see [3] for a review of recent advances in physical layer security). Physical layer security adopts a precise quantitative measure of security level, i.e., the equivocation rate defined by Shannon [4], which equals the entropy rate of the source message conditioned on the channel output at the eavesdropper. This measure of the secrecy level allows security to be considered under the general Shannon framework of information theory [5], and hence provides an analytical basis with which to characterize the fundamental limits on communication rates given the security level constraints. This measure of security level also makes a unified security design across networking layers possible. The goal of such a design is to maximize network utility (i.e., to maximize overall users’ satisfaction of the service rate in a certain fair manner among users) under security, reliability, and stability constraints. This motivates a joint design of rate control at the transport layer, rate scheduling at the medium access control layer, and power control and secure coding at the physical layer. Without security constraints, the above issues have been separately studied for wireless broadcast networks in previous work. The physical layer issue of reliability requires that each information flow is received correctly at intended corresponding destinations, and optimal coding schemes to achieve reliability and the corresponding capacity region that includes all achievable rate vectors (rate allocation among users) have been studied in, e.g., [6]–[8]. Based on a queue-length-based scheduling algorithm that achieves the network throughput region [9], stability and utility maximization in wireless networks have been studied in, e.g., [10]–[15]. With security constraints, following the seminal work of [1], [2], physical layer secure coding schemes and the fundamental limits on the secrecy

1556-6013/$26.00 © 2011 IEEE

LIANG et al.: SECURE COMMUNICATIONS OVER WIRELESS BROADCAST NETWORKS

683

Fig. 2. Two time scales. Fig. 1. Fading broadcast network.

communication rates have been studied for broadcast networks in [16]–[33], where reliability and secrecy are jointly studied. Although jointly considering secrecy, reliability, and stability for network utility maximization has the potential for significant impact in improving network performance and resource efficiency, this perspective has not been examined before. One reason is because the physical layer approach to achieve security, which quantifies the measure of secrecy and greatly facilitates this joint design, has attracted considerable attention only recently. This joint design is the goal of this paper. In this paper, we study a broadcast network (see Fig. 1), in which a source node transmits confidential message flows to user nodes, and each message flow is intended to be decoded accurately by one node while being kept secret from all other nodes. Nodes are thus considered to be eavesdroppers with regard to all other messages but their own. We consider two eavesdropping models. The first one is referred to as a collaborative eavesdropping model, in which the eavesdroppers can exchange their outputs to interpret the message. The second one is referred to as a noncollaborative eavesdropping model, in which eavesdroppers do not exchange their outputs. We assume that the source node maintains a queue for each message flow if it is not served immediately. Each queue needs to remain stochastically stable so that no queue length builds up to infinity. As the measure of users’ satisfaction about network transmission services, a utility function is associated with each user. As the measure of the overall performance, the sum of all users’ utility functions needs to be maximized given that transmission of all information flows over the network is secret, reliable, and stable. In this paper, stability means queue stability, i.e., the queues do not build up to infinity. We assume that the channel from the source to the users is a fading broadcast channel, in which the channel outputs at each user are corrupted by a multiplicative fading gain process in addition to an additive white Gaussian noise process. We assume that the channel state information (channel gain realization) is known to the source node and to the corresponding receiver. This assumption is justified in the broadcast scenario considered here, because all users receive information from the source node and hence it is reasonable for them to feed their channel states back to the source node to obtain better service rates from this node. There are two time scales (see Fig. 2): one is the symbol time level, at which the channel state varies across symbol times, and the other is the packet time level, which spans a large number of symbol times during which the channel state behaves ergodically. To achieve reliable and secure communication for users, we adopt the physical layer security approach [1], [2] to employ a stochastic encoder at the source node. The source node allocates

its power not only among message flows (i.e., among users) but also dynamically according to the channel state information to improve secrecy communication rates. Hence the source power control operates over the symbol time scale, and determines the service rate allocation among users at the packet time level. At the packet time level, to maintain the stability of all queues, the source node implements a rate schedule scheme that adapts its service rate allocation dynamically among users based on the queue lengths. Furthermore, rate control is performed also at the packet time level to maximize the network utility function. Our goal is to study how to jointly design rate control and rate scheduling at the packet time scale and power control and secure coding at the symbol time scale to achieve network utility maximization under reliability, security and stability constraints. For the collaborative eavesdropping model, we first obtain the secrecy capacity region, within which each rate vector can be achieved by a time-division scheme, i.e., at each channel state, the source transmits only to the user whose channel gain is better than the sum of the channel gains of all other users. It is clear that this user must have the best channel gain at this state. The power control among the channel states thus determines the rate allocation among users, i.e., rate allocation among components of a rate vector. We further show that all arrival rate vectors contained in this region can be stabilized by a throughput optimal queue-length-based scheduling scheme at the packet time level, where queue length determines the service rate allocation among users, and hence determines the corresponding power control to achieve this service rate vector at the symbol time level. Finally, we obtain a distributed rate control policy that maximizes the overall network utility maximization given that reliability, secrecy, and stability are achieved. This maximization is achieved by joint design of rate control, rate scheduling, power control, and secure coding. For the noncollaborative eavesdropping model, we study a time-division scheme, in which the source transmits to one user in each channel state. The secrecy rate region based on this scheme is derived. Although the time-division scheme is suboptimal, it is simple and important from a practical point of view. We also provide and discuss improved secure coding schemes based on non-time-division schemes. Based on a simple achievable secrecy rate region, a queue-length-based rate scheduling algorithm is derived that stabilizes the arrival rate vectors contained in this rate region. We also obtain the distributed rate control policy that achieves the overall network utility maximization. The rest of the paper is organized as follows. In Section II, we introduce the channel model of interest. In Sections III and IV, we present our results for the collaborative and noncollaborative eavesdropping models, respectively. In Section V, we conclude the paper with a few remarks.

684

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

II. CHANNEL MODEL We consider the -user fading broadcast network (see Fig. 1), in which a source node transmits confidential messages to user nodes. Each message is intended for one user and needs to be kept secret from all other nodes. Hence, with regard to one message, all users other than its intended receiver are considered to be eavesdroppers. We assume that the channel from the source node to the users is a fading broadcast channel, in which the channel outputs at each user are corrupted by a multiplicative fading gain process in addition to an additive white Gaussian noise process. The channel input–output relationship is given by

In this paper, we focus on the case of perfect secrecy, in which the eavesdroppers do not obtain any information about the messages. This happens if (3) . for The second model is referred to as the noncollaborative model, which assumes that the eavesdroppers do not exchange their outputs. For this model, the secrecy level of the confidential message at user is measured by the following equivocation rate: (4)

(1) where denotes the th user, and denotes the th symbol time instant. At the symbol time instant , is the channel input from the source, is the channel output at user , is the source-to-user channel gain coefficient, and is the noise term at user . We define , and assume is a stationary and ergodic vector proper complex random process. We assume that the channel state information (i.e., the realization of ) is known at both the source node and the corresponding receivers. Here, the fading coefficients across users are not necessarily independent, and nor are they necessarily identically distributed. It will be clear in Sections III and IV that as long as the channel state information is known, only the marginal channel distributions to individual users affect the performance of the network. The noise processes for are independent identically distributed (i.i.d.) proper complex Gaussian processes with zero means and unit variances. The input sequence is subject to the average power constraint , i.e.,

A 1)

code consists of the following: message sets: for with each message uniformly distributed over the set , respectively; 2) one (stochastic) encoder at the source node that maps each message vector to a codeword ; and 3) decoders: each at one user node that maps a received sequence to a message for . In this paper, we study two eavesdropping models. The first model is referred to as the collaborative eavesdropping model, which assumes that all eavesdroppers collaborate and exchange their outputs to interpret a receiver’s message. As in [1], the secrecy level of the confidential message is measured by the following equivocation rate:

(2)

In the case of perfect secrecy, we have (5) , and . We note that for the definitions of collaborative and noncollaborative eavesdropping models have appeared in [34] and [35] for multiple access wiretap channels. A rate vector is achievable if there exists a sequence of codes such that as goes to infinity, the average probability of error goes to zero and asymptotic perfect secrecy is achieved for each message. The secrecy capacity region is defined to be the set that includes all achievable rate vectors such that perfect secrecy can be achieved. Since the source node has access to the channel state information, the source can dynamically change its transmission power as the channel state varies at the symbol time level. Each rate vector in the secrecy capacity region is a service rate allocation among users and is achieved by a corresponding power control policy at the source node. We assume that the source node maintains one queue for each message flow if it is not served immediately. We first consider the case in which the arrivals of the message flows are on the packet time scale, and are assumed to be random and independent of each other. We use to denote an arrival rate vector at packet time slot , with each component representing the arrival rate of one queue at packet time slot . The system is stochastically stable if no queue builds to infinity (see the formal definition in [9, Def. 3.1]). We use the vector to denote the queue length vector at packet time slot , with each component denoting the queue length for the th queue. We note that each packet time slot contains a large number of symbol time slots, during which the channel state changes in a stationary and ergodic manner. For each packet time slot, the rate scheduling at the source node is accomplished by choosing a secrecy rate vector as a service rate vector, which is achieved by a corresponding power control policy at the symbol time level. The stability region is defined to include all arrival rate vectors that can be stabilized by a rate scheduling algorithm. In the second case, we assume that associated with each user, a standard -fair utility function [36] is given by

LIANG et al.: SECURE COMMUNICATIONS OVER WIRELESS BROADCAST NETWORKS

where denotes the rate at which the source node generates the messages for user . The objective is to control arrival rate vectors for users properly so that the following network utility function is maximized, i.e.,

685

Theorem 1: For the collaborative eavesdropping model, the secrecy capacity region of the fading broadcast network is given by

(6) given that information flow to each user is securely and reliably received, and each queue is stabilized. This involves jointly designing rate control and a scheduling algorithm at the packet time scale and a power control policy and a secure coding scheme at the symbol time scale to achieve reliable and perfectly secure communication for all users, and at the same time to maintain the queues of all message flows stochastically stable.

III. COLLABORATIVE EAVESDROPPING MODEL A. Secrecy Capacity Region In this section, we consider the collaborative eavesdropping model, in which for a given message, all users (eavesdroppers) other than the intended destination can exchange their outputs to try to decode a given message. Since the eavesdroppers can exchange their outputs, they can be viewed as a super-eavesdropper that has receive antennas with each antenna receiving the outputs of one eavesdropper. Hence, the channel is equivalent to the wiretap channel [1] with the eavesdropper having multiple antennas, whose secrecy capacity (see Appendix A) can be obtained from that for the multiple-input multiple-output (MIMO) wiretap channel given in [37]–[40]. It is then clear that for each channel state, only a user whose channel gain is larger than the sum of the channel gains of all other users (eavesdroppers) can receive its message with perfect secrecy. Note that such a user may not exist. It is clear that this user must have the best channel state among all users. This suggests a time-division scheme with the source transmitting to at most one user in each channel state (or at the corresponding symbol time slot). For a given channel state , let denote the source power allocation for state . We use to denote the set that includes all power allocation functions (i.e., power control policies) that satisfy the power constraints, i.e., (7) Now let be the set of all channel states for which the channel gain of user is larger than the sum of the channel gains of all other users, i.e., (8) The following theorem states that a time-division scheme is optimal to achieve the secrecy capacity region.

(9) where the random vector has the same distribution as the marginal distribution of the random process at one symbol time instant. Proof: See Appendix A. We note that each rate in (9) decreases as the number of users increases, because the sum of channel gains of all other users in the second term in the bound for rate increases. This is intuitive because more eavesdroppers reduce the secrecy rate for each user. Remark 1: It is clear from (9) that no power is allocated to channel states that are not contained in any of the sets for , because no user can obtain perfect secrecy over these states. Remark 2: In Theorem 1, only ergodicity and stationarity are assumed for the fading process , which can be correlated across time and across components, and is not necessarily Gaussian. Remark 3: Each rate vector contained in the secrecy capacity region given in (9) is achieved by a certain power control policy over the symbol time slots. It also represents average service rates for users over a large number of fading states and hence at the packet time level. B. Stability and Utility Maximization The secrecy capacity region given in Theorem 1 includes all achievable secrecy rate vectors with each component representing the service rate for one user. It still remains to determine a rate scheduling algorithm to choose a service rate vector at each packet time slot to stabilize all queues and correspondingly to determine a power control policy over the symbol time slots to achieve this service rate vector. The rate scheduling algorithm and the power allocation policy are given in the following two theorems, respectively. Theorem 2: For the collaborative eavesdropping model, the information flows (i.e., the queues) are stable only if the arrival rate vector is in the secrecy capacity region given in (9), i.e., . Furthermore, given any arrival rate vector that satisfies (where denotes a -dimensional vector with all components equal to ), the system is stochastically stable under the following queue-length-based algorithm: for any given queue length vector , the secrecy rate vector

686

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

is chosen to be a solution to the following optimization problem: (10) Proof: See Appendix B. Remark 4: Since the queue-length-based algorithm given in Theorem 2 stabilizes any arrival rate vector inside the secrecy capacity region, it is referred to the secrecy throughput optimal scheduling scheme. Theorem 3: For the collaborative eavesdropping model, the power control policy that achieves the secrecy rate vector for the queue-length-based algorithm given in Theorem 2 is given as follows. For a given queue length vector

if otherwise (11) where is chosen to satisfy the power constraint given in (7). Proof: See Appendix C. Remark 5: It can be seen from (11) that more power may be allocated to user to increase its service rate and stabilize its queue when its queue length increases. We now consider the following network utility maximization problem: (12) A solution to the above problem provides an optimal rate control vector for the source node to generate messages for users so that the overall network utility is maximized given that all information flows are securely and reliably received, and each queue is stabilized. Theorem 4: Consider the following joint rate control, rate scheduling, and power allocation algorithm: For any given queue length vector , the source node generates messages for user with a rate (13)

Remark 6: In the above theorem, is a tuning parameter that controls the trade-off between optimality of utility maximization and the queue length. As increases, the rate control vector determined by (13) approaches the optimal solution to the utility maximization problem. Remark 7: The rate depends only on the utility function of user and the queue length of user . If information flows are generated at separate source centers, the rate control algorithm given in (13) provides a distributed way to control packet generation at these source centers. IV. NONCOLLABORATIVE EAVESDROPPING MODEL A. Secrecy Rate Region In this section, we consider the noncollaborative eavesdropping model, in which users do not share their outputs. For a given message, the channel can be viewed as the wiretap channel with multiple eavesdroppers [41] or with one eavesdropper whose channel to the source node is a compound channel [42]. For this model, we first consider a time-division scheme, i.e., the source node transmits to only one user at one symbol time or equivalently in one channel state realization . We use to denote the index of the user to which the source node transmits in the state . Hence, , as a function, describes a particular time-division (i.e., state allocation) scheme. We also use to denote the set that includes all possible state-division schemes. For a given channel allocation scheme , we consider the set of states for transmitting to user , i.e.,

The channel states in this set may not necessarily satisfy the condition that user has the best channel state among all users. The channel corresponding to these states can be viewed as parallel channels to every user with each subchannel corresponding to one state realization . Since during these states, the source node transmits information only to user , this channel is a parallel compound wiretap channel [43] with user being the legitimate receiver and other users being eavesdroppers, and both the legitimate user and eavesdroppers having parallel Gaussian channels. For the compound parallel wiretap channel, an optimal secure coding scheme was proposed in [44] to code across all parallel channels. Applying this scheme, an achievable rate for user can be obtained and is given by

is chosen to be a solution to the and the secrecy rate vector following optimization problem:

For the collaborative eavesdropping model, we have

where is the optimal solution of the network utility maximization problem. Proof: See Appendix D.

where equals its argument if it is positive and equals zero otherwise. It is clear that the total power allocated for transmitting to user is given by

Similar to the above steps, we can obtain the achievable secrecy rates for other users, and hence these rates constitute a rate

LIANG et al.: SECURE COMMUNICATIONS OVER WIRELESS BROADCAST NETWORKS

vector achieved for a given power control scheme and a channel allocation scheme . An achievable secrecy rate region for the broadcast channel includes achievable secrecy rates obtained for any power control scheme and any possible state allocation scheme, which is given below. Theorem 5: For the noncollaborative eavesdropping model, an achievable secrecy rate region for the fading broadcast channel is given by

(14)

where the random vector has the same distribution as the marginal distribution of the random process at one symbol time instant. We further consider a simple state allocation function, in which the source node transmits to user if user ’s channel is the best among users. We define the set to include all such channel states, i.e., (15) Then we have the state allocation function if for . Based on this state allocation function, we have the following corollary. Corollary 1: For the noncollaborative eavesdropping model, an achievable secrecy rate region for the fading broadcast channel is given by

(16)

has the same distriwhere the random vector bution as the marginal distribution of the random process at one symbol time instant. Proof: For each channel state, the source transmits only to the user with the best channel state, and hence the channel is the wiretap channel with multiple eavesdroppers. The achievable secrecy rate follows directly from the proof in [42]. We note that similar to the collaborative eavesdropping model, each rate in (16) decreases as the number of users increases, because the number of rate terms that the “min” is taken over increases. We also note that the gap between the regions given in (16) and (9) suggests the impact of eavesdropper collaboration on the

687

secrecy rate region. Two major differences determine the gap between the two regions. First of all, for the collaborative eavesdropping model, collaboration among eavesdroppers is reflected by the fact that a rate determined by the sum of the channel gains of the eavesdroppers is subtracted from the rate to the legitimate user in (9). For the noncollaborative eavesdropping model, a rate determined by the channel gain of each individual user is subtracted from the rate to the legitimate user. Second, for the collaborative model, a positive secrecy rate is achievable for a channel state only if one user has its channel gain larger than the sum of the channel gains of all of the other users. This condition may not be satisfied by all channel states. Hence, there may be some channel states at which no user can receive a positive secrecy rate. However, for the noncollaborative model, the condition for a user to achieve a positive secrecy rate is that this user’s channel gain is larger than that of all other users. This condition is less stringent, and each channel state can satisfy this condition for a certain user and hence contributes to this user’s secrecy rate. Due to both of the above reasons, the secrecy rate region for the noncollaborative eavesdropping model is larger than that of the collaborative eavesdropping model. This justification suggests the following remark. Remark 8: The regions given in (14) and (16) are larger than the region given in (9). This is because the eavesdroppers are less powerful in the noncollaborative eavesdropping model than in the collaborative eavesdropping model. Further improved secrecy rate regions can be derived if the source node is not restricted to time-division schemes and transmits multiple information flows at a time. In this case, the state allocation function represents a set of user indices to which the source node transmits at the channel state , and becomes more involved. The source node can apply stochastic superposition coding [45] to transmit multiple information flows simultaneously at one channel state. For each user, secure coding is performed across multiple states. In general, the above achievable schemes may not be optimal. Hence, we also derive an outer bound on the secrecy capacity region, which is given in the following theorem. Theorem 6: For the noncollaborative eavesdropping model, an outer bound on the secrecy capacity region of the fading broadcast channel is given by

(17)

where (18) Proof: The bound in (17) for and follow steps similar to those in Appendix A by replacing

688

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

with , respectively. The rest (for other indices) follows the steps similar to those for the above case. It can be seen that the gap between the inner bound (i.e., the achievable secrecy rate region) given in (16) and the outer bound given in (17) lies in the different sets over which the expectation of the secrecy rate is taken. For the inner bound, the expectations of the secrecy rate for users are taken over disjoint sets due to the time-division scheme. However, for the outer bound, the set over which the expectation is taken varies with and is the set that maximizes the expected value. It is also clear that the expectations in (17) for different users are taken over overlapping sets. This does not appear in the achievable region (16), because the achievable scheme uses time division and hence rates for different users cannot be contributed from overlapping state sets. For the case when , the two bounds are equal and provide the secrecy capacity region. This is also the case when the collaborative and noncollaborative eavesdropping models are the same. In general, the inner and outer bounds may not be very close, which also suggests there is potential to improve the secrecy rate region in (16) and (14). Although the non-time-division schemes discussed above provide a better secrecy rate region, their optimality remains an open issue. B. Stability and Utility Maximization As expected, if the secrecy rate region is too complicated, it may not be useful for joint design with other networking layers in practice. Hence, in this section, we study queue-length-based algorithms based on the achievable secrecy rate region given in (16). Theorem 7: For the noncollaborative eavesdropping model, if the arrival rate vector satisfies given in (16), then the system is stochastically stable under the following queue-based algorithm: for any given queue length vector , the secrecy rate vector is chosen to be a solution to the following optimization problem: (19) The corresponding power control policy that achieves the secrecy rate vector in the preceding algorithm is the solution to the following optimization problem:

(20) We note that the optimal power control policy can be derived by applying techniques developed in [46] for solving max–min optimization problems. We next consider the network utility maximization problem defined in (12) to obtain the optimal rates for the source node to generate messages for users. Theorem 8: Consider the following joint rate control, rate scheduling, and power allocation algorithm: For any given

queue length vector for user with a rate

, the source node generates messages

(21) and the secrecy rate vector is chosen to be a solution to the following optimization problem:

(22) For the noncollaborative eavesdropping model, we have

where is the optimal solution of the following network utility maximization problem: (23) Proof: The proof is similar to the proof of Theorem 4 given in Appendix D, and is hence omitted. Remark 9: Based on an improved secrecy rate region given in (14), the joint design for stability in Theorem 7 and utility maximization in Theorem 8 also needs to incorporate state allocation at the physical layer, which determines the achievable rate vectors jointly with power control. V. CONCLUSIONS In this paper, we have studied wireless broadcast networks, for which we have obtained the secrecy capacity region for the collaborative eavesdropping model and inner and outer bounds on the secrecy capacity region for the noncollaborative eavesdropping model. We have also obtained a secrecy throughput optimal scheduling scheme and a corresponding jointly optimal power control policy for the collaborative eavesdropping model. For the noncollaborative eavesdropping model, we have obtained results similar to the above based on an achievable secrecy rate region. For both models, we have further obtained the rate control vector for the source node to generate messages for users that achieve overall network utility maximization. To the authors’ knowledge, this is the first work that addresses reliability, security (via a physical layer approach), and stability jointly and studies utility network maximization under these constraints for wireless broadcast networks. The approach in this paper can be applied to analyze other wireless networks including multiple-access, interference, and relay networks. This approach also allows the incorporation of public and common message flows for users in the system as well. APPENDIX A PROOF OF THEOREM 1 , Proof of Achievability: For a given fading state the th message is transmitted to user . Since the eavesdroppers can exchange their outputs, they can be viewed as a super-

LIANG et al.: SECURE COMMUNICATIONS OVER WIRELESS BROADCAST NETWORKS

eavesdropper that has receive antennas with each antenna receiving the outputs of one eavesdropper. Now the channel is equivalent to the wiretap channel [1] with the eavesdropper having multiple antennas. Hence, based on the secrecy capacity region for the MIMO wiretap channel given in [37]–[40], the following secrecy rate is achievable in channel state :

689

where denotes the vector sequence . In the preceding equation, (a) follows from the perfect secrecy condition, (b) follows from the definition of the equivocation rate given in (2), (c) follows from Fano’s inequality such that (26) if , and follows because given , is independent of . and For each , since varying the correlation between does not affect the secrecy capacity, we obtain

where (24) Thus, the rate achievable for user is an average of the rate over all channel states , which provides the rate given in (9). Proof of the Converse: We note that although the converse proof is based on the ideas for obtaining the secrecy capacity of the parallel wiretap channel [47], [48] and the MIMO wiretap channel in [37]–[40], the proof is not given by directly combining the two. We first consider the parallel broadcast channel with subchannels indexed by . Each subchannel is a broadcast channel with one input and outputs for . In fact, the parallel broadcast channel is equivalent to a fading broadcast channel with the channel state taking finite equi-probable states indexed by . Each subchannel of the parallel broadcast channel corresponds to one channel state of the fading broadcast channel. Extending our proof to the case when has a continuous state space is standard. For the parallel broadcast channel, we consider a code with average error probability , where approaches zero as approaches infinity. We follow steps similar to those in [47] and [48], and bound the rate as follows:

(27) in the above equation denotes the minimization over where all possible correlation between and . We now apply the converse proof in [37]–[40] to obtain

(28) if subchannel corresponds to the fading state , and the power is allocated to this subchannel. It is clear that only those whose corresponding contribute to the secrecy rate in (25), and hence the average needs to be taken only over in (27). Following the same steps as above, we can obtain the bounds on the rates . It is also clear that the sum of the power allocated for obtaining is less than the power constraint , because the channel states contributing to these rates constitute disjoint sets. This concludes the proof. APPENDIX B PROOF OF THEOREM 2 given in (9) is the secrecy caWe first note that since pacity region, it is clear that the network cannot be stabilized if . We next use the idea proposed in [9] to establish stability. We define the following Lyapunov function:

We also define

We further define and derive the drift of

(25)

as follows:

690

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

APPENDIX C PROOF OF THEOREM 3 From (10), we obtain

(33) (29) where packets in Let slot, slot, and

for are given in (9). The Lagrangian to where solve the preceding convex optimization problem is given by

denotes the unused service rate due to the lack of queue . denote the maximum number of arrivals in one time denote the maximum rate achievable in one time . Note that if , and hence (34)

and

where is a Lagrange multiplier. For , the optimal satisfies the following necessary and sufficient condition: (30)

Now given that that

, there exists

such

(31) Thus, we have

with equality when . The power control policy (11) can then be obtained by simple algebra.

(35) in

APPENDIX D PROOF OF THEOREM 4 We define the following Lyapunov function:

Following the analysis in the proof of Theorem 2, we obtain that there exists such that

(32) where (a) follows from (31), and (b) follows from the definition of the queue-length-based algorithm that for is a solution to the optimization problem given in (10). Therefore, we conclude that if . Since is Markovian, the system is stochastically stable according to the Foster–Lyapunov criterion [49].

(36) is the optimal solution to the network utility where maximization problem (12).

LIANG et al.: SECURE COMMUNICATIONS OVER WIRELESS BROADCAST NETWORKS

Since is a solution to the optimization problem given in (10), we have , and

(37) Since obtain

is a solution to the optimization problem (13), we (38)

and (39) Summing up both sides for

to

, we obtain

(40) which implies that

Letting both

and

go to infinity, we have

Furthermore,

holds at any time , so we conclude that

691

REFERENCES [1] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975. [2] I. Csiszár and J. Körner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339–348, May 1978. [3] Y. Liang, H. V. Poor, and S. Shamai (Shitz), “Information theoretic security,” in Foundations and Trends in Communications and Information Theory. Hanover, MA: Now Publishers, 2008, vol. 5, nos. 4–5, pp. 355–580. [4] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, 1949. [5] C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J., vol. 27, pp. 379–423 and 623–656, 1948. [6] D. N. Tse, “Optimal power allocation over parallel Gaussian broadcast channels,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Ulm, Germany, Jun. 1997, pp. 27–27. [7] L. Li and A. J. Goldsmith, “Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity,” IEEE Trans. Inform. Theory, vol. 47, no. 3, pp. 1083–1102, Mar. 2001. [8] L. Li and A. J. Goldsmith, “Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity,” IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1103–1127, Mar. 2001. [9] L. Tassiulas and A. Ephremides, “Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks,” IEEE Trans. Automat. Contr., vol. 37, no. 12, pp. 1936–1948, Dec. 1992. [10] E. M. Yeh and A. S. Cohen, “Throughput optimal power and rate control for multiaccess and broadcast communications,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Chicago, IL, Jun./Jul. 2004, pp. 112–112. [11] A. Eryilmaz, R. Srikant, and J. Perkins, “Stable scheduling policies for fading wireless channels,” IEEE/ACM Trans. Netw., vol. 13, no. 2, pp. 411–424, Apr. 2005. [12] A. Eryilmaz and R. Srikant, “Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control,” in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005. [13] M. Neely, E. Modiano, and C. Li, “Fairness and optimal stochastic control for heterogeneous networks,” in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005, vol. 3, pp. 1723–1734. [14] A. Stolyar, “Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm,” Queueing Syst., vol. 50, no. 4, pp. 401–457, Aug. 2005. [15] A. Eryilmaz and R. Srikant, “Joint congestion control, routing and MAC for stability and fairness in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 8, pp. 1514–1524, Aug. 2006. [16] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008. [17] E. Ekrem and S. Ulukus, “Degraded compound multi-receiver wiretap channels,” IEEE Trans. Inf. Theory, 2009, submitted for publication. [18] E. Ekrem and S. Ulukus, “The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083–2114, Apr. 2011. [19] E. Ekrem and S. Ulukus, “Secrecy capacity of a class of broadcast channels with an eavesdropper,” Special Issue on Wireless Physical Layer Security, EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 29–29, 2009, Article ID 824235. [20] E. Ekrem and S. Ulukus, “Ergodic secrecy capacity region of the fading broadcast channel,” in Proc. IEEE Int. Conf. Commun. (ICC), Dresden, Germany, 2009. [21] E. Ekrem and S. Ulukus, “Capacity region of Gaussian MIMO broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, 2010, submitted for publication. [22] P. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008. [23] A. Khisti, A. Tchamkerten, and G. Wornell, “Secure broadcasting,” Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453–2469, Jun. 2008. [24] Z. Li, W. Trappe, and R. D. Yates, “Secret communication via multi-antenna transmission,” in Proc. Conf. Information Sciences and Systems (CISS), Baltimore, MD, Mar. 2007. [25] H. D. Ly, T. Liu, and Y. Liang, “Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages,” IEEE Trans. Inf.. Theory, vol. 56, no. 11, pp. 5477–5487, Nov. 2010. [26] Y. Liang, H. V. Poor, and S. Shamai (Shitz), “Physical layer security in broadcast networks,” Security Commun. Netw., vol. 2, no. 3, pp. 227–238, May/Jun. 2009.

692

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

[27] Y. Liang, H. V. Poor, and S. Shamai (Shitz), “Secure communication over fading channels,” Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470–2492, Jun. 2008. [28] M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, “On the compound MIMO broadcast channels with confidential messages,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, Jun./ Jul. 2009. [29] R. Liu, I. Maric, P. Spasojevic, and R. Yates, “Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions,” Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493–2507, Jun. 2008. [30] R. Liu and H. V. Poor, “Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages,” IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235–1249, Mar. 2009. [31] R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), “MIMO Gaussian broadcast channels with confidential and common messages,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Austin, TX, Jun. 2010. [32] R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), “Multiple-input multiple-output Gaussian broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215–4227, Sep. 2010. [33] J. Xu, Y. Cao, and B. Chen, “Capacity bounds for broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4529–4542, Oct. 2009. [34] E. Tekin and A. Yener, “The Gaussian multiple access wire-tap channel,” IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747–5755, Dec. 2008. [35] E. Tekin and A. Yener, “The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming,” Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, Jun. 2008. [36] J. Mo and J. Walrand, “Fair end-to-end window-based congestion control,” in Proc. SPIE Int. Symp., Boston, MA, 1998. [37] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas-I: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010. [38] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas-II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, Nov. 2010. [39] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wire-tap channel,” in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007. [40] T. Liu and S. Shamai (Shitz), “A note on the secrecy capacity of the multi-antenna wire-tap channel,” IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547–2553, Jun. 2009. [41] P. Wang, G. Yu, and Z. Zhang, “On the secrecy capacity of fading wireless channel with multiple eavesdroppers,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Nice, France, Jun. 2007. [42] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), “Compound wire-tap channels,” in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007. [43] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), “Compound wire-tap channels,” Special Issue on Wireless Physical Layer Security, EURASIP J. Wireless Commun. Netw., vol. 2009, p. 12, 2009, Article ID 142374. [44] T. Liu, V. Prabhakaran, and S. Vishwanath, “The secrecy capacity of a class of parallel Gaussian compound wiretap channels,” in Proc. IEEE Int. Symp. Information Theory (ISIT), Toronto, ON, Canada, Jul. 2008. [45] P. P. Bergmans, “Random coding theorem for broadcast channels with degraded components,” IEEE Trans. Inf. Theory, vol. IT-19, no. 2, pp. 197–207, Mar. 1973. [46] Y. Liang, V. V. Veeravalli, and H. V. Poor, “Resource allocation for wireless fading relay channels: Max-min solution,” Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3432–3453, Oct. 2007. [47] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallel channels,” in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006. [48] Y. Liang and H. V. Poor, “Secure communication over fading channels,” in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006. [49] S. Asmussen, Applied Probability and Queues. New York: SpringerVerlag, 2003.

Yingbin Liang (S’00–M’05) received the Ph.D. degree in electrical engineering from the University of Illinois at Urbana-Champaign in 2005. From 2005 to 2007, she was working as a postdoctoral research associate at Princeton University. From 2008 to 2009, she was an assistant professor at the Department of Electrical Engineering, University of Hawaii. Since December 2009, she has been an assistant professor at the Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY. Her research interests include communications, wireless networks, information theory, and machine learning. Dr. Liang was a Vodafone Fellow at the University of Illinois at UrbanaChampaign during 2003–2005, and received the Vodafone-U.S. Foundation Fellows Initiative Research Merit Award in 2005. She also received the M.E. Van Valkenburg Graduate Research Award from the ECE department, University of Illinois at Urbana-Champaign, in 2005. In 2009, she received the National Science Foundation CAREER Award, and the State of Hawaii Governor Innovation Award.

H. Vincent Poor (S’72–M’77–SM’82–F’87) received the Ph.D. degree in electrical engineering and computer science from Princeton University in 1977. From 1977 to 1990, he was on the faculty of the University of Illinois at Urbana-Champaign. Since 1990, he has been on the faculty at Princeton University, Princeton, NJ, where he is the Dean of Engineering and Applied Science, and the Michael Henry Strater University Professor of Electrical Engineering. His research interests are in the areas of stochastic analysis, statistical signal processing and information theory, and their applications in wireless networks and related fields. Among his publications in these areas are Quickest Detection (Cambridge Univ. Press, 2009), coauthored with Olympia Hadjiliadis, and Information Theoretic Security (Now Publishers, 2009), coauthored with Yingbin Liang and Shlomo Shamai. Dr. Poor is a member of the National Academy of Engineering and the National Academy of Sciences, a Fellow of the American Academy of Arts and Sciences, and an International Fellow of the Royal Academy of Engineering (U. K.). He is also a Fellow of the Institute of Mathematical Statistics, the Optical Society of America, and other organizations. In 1990, he served as President of the IEEE Information Theory Society, and in 2004–2007 as the Editor-in-Chief of the IEEE TRANSACTIONS ON INFORMATION THEORY. He received a Guggenheim Fellowship in 2002 and the IEEE Education Medal in 2005. Recent recognition of his work includes the 2009 Edwin Howard Armstrong Achievement Award of the IEEE Communications Society, the 2010 IET Ambrose Fleming Medal for Achievement in Communications, the 2011 IEEE Eric E. Sumner Award, and an honorary doctorate from the University of Edinburgh, awarded in June 2011.

Lei Ying (M’08) received the B.E. degree from Tsinghua University, Beijing, in 2001, and the M.S. and Ph.D. degrees in electrical engineering from the University of Illinois at Urbana-Champaign in 2003 and 2007, respectively. During Fall 2007, he worked as a Postdoctoral fellow in the University of Texas at Austin. He is currently an Assistant Professor at the Department of Electrical and Computer Engineering at Iowa State University, Ames, IA. His research interest is broadly in the area of information networks, including wireless networks, mobile ad hoc networks, P2P networks, and social networks. Dr. Ying received a Young Investigator Award from the Defense Threat Reduction Agency (DTRA) in 2009, NSF CAREER Award in 2010, and is named Litton Assistant Professor at the Department of Electrical and Computer Engineering at Iowa State University for 2010–2012.