License: arXiv.org perpetual non-exclusive license
arXiv:2402.14581v1 [cs.IT] 22 Feb 2024

Semantic Communication-assisted Physical Layer Security over Fading Wiretap Channels

Xidong Mu1 and Yuanwei Liu1 1School of Electronic Engineering and Computer Science, Queen Mary University of London, U.K.
E-mail:{xidong.mu, yuanwei.liu}@qmul.ac.uk
Abstract

A novel semantic communication (SC)-assisted secrecy transmission framework is proposed. In particular, the legitimate transmitter (Tx) sends the superimposed semantic and bit stream to the legitimate receiver (Rx), where the information may be eavesdropped by the malicious node (EVE). As the EVE merely has the conventional bit-oriented communication structure, the semantic signal acts as the type of beneficial information-bearing artificial noise (AN), which not only keeps strictly confidential to the EVE but also interferes with the EVE. The ergodic (equivalent) secrecy rate over fading wiretap channels is maximized by jointly optimizing the transmit power, semantic-bit power splitting ratio, and the successive interference cancellation decoding order at the Tx, subject to both the instantaneous peak and long-term average power constraints. To address this non-convex problem, both the optimal and suboptimal algorithms are developed by employing the Lagrangian dual method and the successive convex approximation method, respectively. Numerical results show that the proposed SC-assisted secrecy transmission scheme can significantly enhance the physical layer security compared to the baselines using the conventional bit-oriented communication and no-information-bearing AN. It also shows that the proposed suboptimal algorithm can achieve a near-optimal performance.

I Introduction

Recently, semantic communication (SC) has been proposed as a new paradigm for information transmission in 6G [1, 2]. Compared to conventional information transmission under the Shannon paradigm (termed as bit-oriented communication), where the total source is converted into bit sequences for transmission, SC only focuses on the key part of the source which is relevant to the specific meaning/actions/goals [2]. By doing so, on the one hand, the original source can be significantly compressed before transmission and the required wireless resources can be greatly reduced. On the other hand, compared to bit-oriented communication, SC makes the receiver ’understand’ the information for realizing specific tasks. This is promising to be employed in the “human-to-machine” and “machine-to-machine” communication scenarios.
Motivated by the above advantages, extensive research efforts have been devoted to developing SC approaches with the aid of machine learning tools.
On the one hand, efficient SC approaches have been conceived for conventional text/speech/image/video transmission. For example, the authors of [3] employed the deep learning-based semantic text transmission tool, namely DeepSC. It showed that the performance of DeepSC can significantly outperform conventional bit communication within the low and moderate signal-to-noise ratio (SNR) ranges. Based on the DeepSC-enabled text transmission, the authors of [4] proposed the semantic rate performance metric for quantifying the performance of SC. Moreover, the authors of [5] developed a joint source-channel coding approach for image transmission. The authors of [6] further proposed a full-duplex device-to-device SC approach to reduce the computation tasks in the mixed reality application. On the other hand, researchers also developed SC approaches for new emerging tasks. For example, the authors of [7] proposed the SC-based image transmission for enabling unmanned aerial vehicles to classify images. Furthermore, the authors of [8] studied the timeliness of information in task-oriented communications.
It can be observed that SC provides a new transmission strategy for future wireless networks.
To this end, some initial works began to investigate the interplay between SC and other physical layer techniques to further improve communication performance. For example, the authors of [9] proposed an opportunistic semantic and bit-oriented communication scheme for controlling the co-channel interference in uplink non-orthogonal multiple access (NOMA) systems. The authors of [10] developed an inverse semantic-aware wireless sensing framework with the aid of reconfigurable intelligent surface (RIS) technologies.
Against the above background, we explore the potential of SC in physical layer security (PLS).
In particular, we propose a novel SC-assisted secrecy transmission framework over fading wiretap channels, where one legitimate transmitter (Tx) sends information to one legitimate receiver (Rx) under the eavesdropping of one malicious node (EVE). Both semantic and bit-oriented encoder/decoder are equipped at the legitimate Tx and Rx, while only the conventional bit-oriented encoder/decoder is equipped at the EVE. The main idea of the proposed SC-assisted secrecy transmission framework is that the Tx sends the superimposed semantic and bit streams to the Rx to deliver the intended information, where the semantic stream not only keeps strictly confidential to the EVE but also can interfere with the EVE when eavesdropping the bit stream, i.e., acting as one type of beneficial artificial noise (AN). Based on the proposed framework, we maximize the ergodic (equivalent) secrecy rate by jointly optimizing the transmit power, power splitting ratio among the two streams, and the successive interference cancellation (SIC) decoding order of the Tx, subject to the peak and average power constraints. To solve this non-convex optimization problem, both optimal and suboptimal algorithms are proposed by employing the Lagrangian dual method and the successive convex approximation (SCA) method, respectively. Our numerical results show that the proposed SC-assisted secrecy transmission scheme can significantly improve the secrecy rate compared to the baselines using conventional bit-oriented communication and no-information-bearing AN. Moreover, the proposed suboptimal algorithm can achieve near-optimal performance.

II System Model and Problem Formulation

As shown in Fig. 1, we investigate a fundamental three-node single-input-single-output (SISO) secrecy transmission over fading wiretap channels, which consists of one legitimate Tx, one legitimate Rx, and one malicious EVE. All nodes are assumed to have a single antenna. In particular, the legitimate Tx and Rx are assumed to be equipped with both the new semantic-channel encoder/decoder and the conventional bit-oriented source-channel encoder/decoder, while the malicious EVE is assumed to only have the conventional bit encoder/decoder. The quasi-static block fading channel model is assumed for both the legitimate Tx-Rx link and the wiretapping Tx-EVE link. The instantaneous Tx-Rx and Tx-EVE channel coefficients at the fading state v are denoted by hL(v) and hE(v), respectively. The channel coefficients are assumed to be unchanged during each fading state v and independently vary between different fading states. To characterize the maximum performance gain and explore useful insights, in this work, we assume that all channel coefficients are perfectly known at the Tx.

II-A SC-assisted Secrecy Transmission

As illustrated, we propose a novel SC-assisted secrecy transmission framework. Recalling the fact that the legitimate Tx/Rx has both semantic and bit-oriented communication structures, as illustrated in Fig. 1, the original source at the Tx is firstly split into two parts, where one part is processed by the semantic-channel encoder (termed as a semantic stream) and the other part is processed by the conventional bit-oriented source-channel encoder (termed as a bit stream). Let xs and xb denote the normalized semantic symbol from the semantic-channel encoder and the normalized information symbol from the conventional bit-oriented source-channel encoder, respectively. Therefore, the superimposed semantic and bit signal transmitted by the Tx at fading state v can be expressed as

x(v)=β(v)p(v)xs+(1β(v))p(v)xb, (1)

where p(v) denotes the employed instantaneous transmit power of the Tx at fading state v, and 0β(v)1 denotes the corresponding power portion allocated to the semantic stream. Here, we consider both the peak power constraint (PPC) and the average power constraint (APC) at the Tx. For PPC, we have {p(v)P^,v}, where P^ represents the maximum instantaneous transmit power that can be used at the Tx for each fading state v. For APC, we have 𝔼v[p(v)]P¯, where 𝔼v[] is the expectation operation over v and P¯ represents the maximum long-term average transmit power that can be used at the Tx over the entire fading states. Without loss of generality, we have P¯P^.

Refer to caption
Figure 1: The proposed SC-assisted secrecy transmission framework.

Accordingly, the received signal at the legitimate Rx and the malicious EVE are respectively given by

yL(v)=hL(v)(β(v)p(v)xs+(1β(v))p(v)xb)+zL, (2c)
yE(v)=hE(v)(β(v)p(v)xs+(1β(v))p(v)xb)+zE, (2f)

where zL𝒞𝒩(0,σL2) and zE𝒞𝒩(0,σE2) denote the additive white Gaussian noise (AWGN) at the legitimate Rx and the malicious EVE, respectively.

For the legitimate Rx, both the received semantic and bit signals, {xs,xb}, are desired and can be decoded. However, for the malicious EVE only having the conventional bit-oriented source-channel decoder, only the bit signal, {xb} can be decoded for wiretapping. In the following, we introduce the communication performance of the legitimate Rx and the malicious EVE.

II-A1 Achievable Communication Rate at the Rx

The legitimate Rx successively decodes the received superimposed signal with the aid of SIC, i.e., the Rx first decodes one type of signal and then subtracts it from the received signal, before decoding the other type of signal. Then, the SNR or signal-to-interference-plus-noise (SINR) when decoding the bit signal, xb, and semantic signal, xs, are respectively given by

γL,b(v)=(1β(v))p(v)gL(v)μ(v)β(v)p(v)gL(v)+1, (3a)
γL,s(v)=β(v)p(v)gL(v)(1μ(v))(1β(v))p(v)gL(v)+1, (3b)

where gL(v)=Δ|hL(v)|2σL2. The binary variable μ(v){0,1} denotes the SIC decoding order employed at the Rx for fading state v. If the bit siganl is decoded first, we have μ(v)=1; Otherwise, μ(v)=0. An example of μ(v)=0, i.e., the decoding order from semantic signal to bit signal, is illustrated in Fig. 1.

Accordingly, the achievable bit rate (bit/s/Hz) for decoding xb is given by

Rb(v)=log2(1+γL,b(v)). (4)

To quantify the communication performance of SC, we employ the performance metric, namely semantic rate, proposed in [4] for DeepSC-enabled semantic text transmission [3]. Assuming that, on average, each sentence at the Tx contains L words, representing I semantic information (measured in semantic units (suts)). Additionally, each word generates an average of KZ+ semantic symbols through DeepSC. According to [4], the achievable semantic rate (suts/s/Hz) for decoding xs is given by:

Ss(v)=IKLεK(γL,s(v)), (5)

where 0εK(γL,s(v))1 denotes the semantic similarity function which quantifies the semantic loss between the original text source and the recovered text source in SC. Its value depends on the employed DeepSC scheme, K, and the received SNR/SINR, γL,s(v). In [4], ε can only be experimentally obtained by using the DeepSC tool. To provide a closed-form expression of ε for facilitating theoretical study, in our previous work [11], we approximate ε for any given K with high accuracy using a generalized logistic function as follows:

εK(γL,s(v))AK,1+AK,2AK,11+e(CK,110lg(γL,s(v))+CK,2). (6)

Here, for different K, the lower (left) asymptote and the upper (right) asymptote of the generalized logistic function are denoted by AK,1>0 and AK,2>0, respectively. The corresponding logistic growth rate and mid-point are represented by CK,1>0 and CK,2, respectively.

As illustrated in Fig. 1, after decoding the two types of signal, Rx will combine the decoded results. Then, the achievable communication rate at Rx for fading state v should be Rb(v)+Ss(v). However, the units of the two rates are different, so we transform the semantic rate into the equivalent bit rate (bit/s/Hz) as follows [4]:

Rs(v)=ρLISs(v)=ρKεK(γL,s(v)), (7)

where ρ=40 (bits/word) represents the average number of bits required for transmitting one word if ASCII code is used for bit-oriented source-channel encoder/decoder and the semantic similarity achieved by bit transmission is assumed to be 1 [4]. Based on the above equivalent transformation, the achievable communication rate at the Rx for fading state v after combing the two streams can be expressed as

RL(v)=Rb(v)+Rs(v). (8)

II-A2 Achievable Communication Rate at the EVE

As the EVE can only decode the bit signal, xb, by treating the semantic signal, xs, as interference, the corresponding received SINR at fading state v can be expressed as

γE(v)=(1β(v))p(v)gE(v)β(v)p(v)gE(v)+1, (9)

where gE(v)=Δ|hE(v)|2σE2. Then, the achievable communication rate of EVE at fading state v is RE(v)=log2(1+γE(v)).

II-A3 Secrecy Communication Rate

Based on the above discussion, the achievable secrecy communication rate at fading state v is given by

(p(v),β(v),μ(v))=[RL(v)RE(v)]+, (10)

where []+=Δmax(,0). Therefore, the ergodic secrecy rate is =𝔼v[(p(v),β(v),μ(v))].

Remark 1.

Since the EVE only has the capability of decoding the conventional bit stream, the semantic stream in the proposed scheme can act as a beneficial information-bearing AN. On the one hand, the semantic signal conveys useful information to the Rx, see (3b). On the other hand, the semantic signal is strictly confidential to the EVE and can interfere with the EVE during the decoding of bit signal, see (9).

II-B Problem Formulation

In this paper, we aim to maximize the ergodic secrecy rate, , by jointly optimizing the transmit power, {p(v),v}, the power allocation factor, {β(v),v}, and the SIC decoding order, {μ(v),v}, of each fading state, subject to the PPC and APC. We can formulate the studied optimization problem as follows:

max{p(v),β(v),μ(v)} 𝔼v[(p(v),β(v),μ(v))] (11a)
s.t. 𝔼v[p(v)]P¯, (11b)
0p(v)P^,v, (11c)
0α(v)1,v, (11d)
μ(v){0,1},v. (11e)

As the objective function is non-concave and the integer SIC decoding order constraint (11e) is non-convex, problem (II-B) is a non-convex optimization problem. In the following, we will propose both optimal and suboptimal solutions to problem (II-B).

III Proposed Solutions

III-A Optimal Solution to Problem (II-B)

To optimally solve problem (II-B), we first show that it satisfies the “time-sharing” condition [12] with the following lemma.

Lemma 1.

For problem (II-B) given the APCs P¯a and P¯b, the corresponding optimal solutions are denoted by {pa(v),βa(v),μa(v)} and {pb(v),βb(v),μb(v)}, respectively. Then, for any 0θ1, there always exists a feasible solution {pc(v),βc(v),μc(v)} such that

cθa+(1θ)b,
𝔼v[pc(v)]θP¯a+(1θ)P¯b,

where i=𝔼v[(pi(v),βi(v),μi(v))] is calculated by substituting the given solutions into (10), i{a,b,c}.

Proof.

Considering that each fading state v has a certain amount of time, we can construct a feasible solution {pc(v),βc(v),μc(v)} by allocating a θ percentage of the time and the remaining 1θ percentage of the time to solutions {pa(v),βa(v),μa(v)} and {pb(v),βb(v),μb(v)}, respectively. By combining all fading states with the above constructed solution, we have 𝔼v[(pc(v),βc(v),μc(v))]=c=θa+(1θ)b=θ𝔼v[(pa(v),βa(v),μa(v))]+(1θ)𝔼v[(pb(v),βb(v),μb(v))] and 𝔼v[pc(v)]=θ𝔼v[pa(v)]+(1θ)𝔼v[pc(v)]θP¯a+(1θ)P¯c. Therefore, the proof of Lemma 1 is completed.

Lemma 1 implies that the “time-sharing” condition [12] holds for problem (II-B). It means that there is zero duality gap between the primal problem (II-B) and the Lagrange dual problem, i.e., strong duality holds [13]. As a result, we can employ the Lagrange duality method to optimally solve problem (II-B). The Lagrangian of problem (II-B) can be expressed as

(p(v),β(v),μ(v),λ)=𝔼v[c(v)]+λ{P¯𝔼v[p(v)]}, (12)

where the non-negative Lagrange multiplier λ is associated with the APC (11b). As a result, the partial Lagrange dual function of problem (II-B) is given by

g(λ)=max0p(v)P^,0β(v)1,μ(v){0,1},v(p(v),β(v),μ(v),λ). (13)

Note that we can decompose problem (13) into several parallel subproblems sharing the same structure. Each subproblem corresponds to one distinct fading state. In the following discussion, we drop the fading state index v for brevity. Under any given λ, the associated subproblem for a particular fading state can be rewritten as follows:

max0pP^,0β1,μ{0,1}¯(p,β,μ), (14)

where ¯(p,α,μ)=(p,β,μ)λp. To solve problem (14), we need to compare the respective maximum value associated with the cases of μ=1 and μ=0, which yields the two subproblems (15) and (16) as shown at the top of the next page. Before solving the two problems, we first have the following lemma.

1(p1*,β1*)=max0pP^,0β1[ρKεK(βpgL)+log2(1+(1β)pgLβpgL+1)log2(1+(1β)pgEβpgE+1)]+λp, (15)
0(p0*,β0*)=max0pP^,0β1[ρKεK(βpgL(1β)pgL+1)+log2(1+(1β)pgL)log2(1+(1β)pgEβpgE+1)]+λp, (16)
Lemma 2.

When 1gL1gE, the optimal decoding order to problem (14) is μ*=0.

Proof.

When σL2gLσE2gE, the value of log2(1+(1β)pgLβpgL+1)log2(1+(1β)pgEβpgE+1) is always negative under any given 0<pP^ and 0β<1. In this case, the optimal power splitting ratio to problem (15) when μ=1 is β1*=1, i.e., not allocating power to the bit stream. It can be verified that 1(p1*,β1*=1)=0(p0*,β0*=1)0(p0*,β0*). Therefore, the proof of Lemma 2 is completed.

Therefore, the optimal solutions to problem (14) are given By

{μ*=1,p=p1*,β=β1*,if1gL<1gEand1>0,μ*=0,p=p0*,β=β0*,otherwise, (17)

where (p1*,β1*) and (p0*,β0*) are obtained from (15) and (16) via exhaustive search.

Based on the above discussion, for any given λ, problem (13) can be solved by solving problem (14) for different fading states. Recalling the fact of the strong duality holds for problem (II-B), problem (II-B) can be optimally solved by iteratively solving problem (13) with fixed λ and update λ with the bisection method until the PPC (11b) is satisfied with equality.

III-B Suboptimal Solution to Problem (II-B)

Note that the exhaustive search has to be employed for each fading state to find the optimal solution to problem (13), which leads to potential high computational complexity. To this end, we propose a successive convex approximation (SCA)-based suboptimal algorithm to solve problem (13) with a lower computational complexity.

Lemma 2 implies that there is a higher probability that the optimal SIC decoding order is μ=0. Inspired by this, to handle the integer constraint caused by the SIC decoding order in problem (13), we fix {μ(v)=0,v} for all fading states. Let us define ps(v)=Δβ(v)p(v), pb(v)=Δ(1β(v))p(v),v, and introduce the below auxiliary variables {χ(v),v} such that

χ(v)=AK,1+AK,2AK,11+e(CK,110lg(ps(v)gL(v)pb(v)gL(v)+1)+CK,2). (18)

With the above definition, problem (13) can be re-expressed as follows:

max{ps(v),pb(v),χ(v)}𝔼v[RL(χ(v),pb(v))RE(pb(v),ps(v))] (19a)
s.t.χ(v)AK,1+AK,2AK,11+e(CK,110lg(ps(v)gL(v)pb(v)gL(v)+1)+CK,2), (19b)
𝔼v[ps(v)+pb(v)]P¯, (19c)
        0pi(v)P^,i{s,b},v, (19d)

where RL(χ(v),pb(v))=ΔρKχ(v)+log2(1+pb(v)gL(v)) and RE(pb(v),ps(v))=Δlog2(1+pb(v)gE(v)ps(v)gE(v)+1). Problem (III-B) is a non-convex optimization problem due to the non-convex function RE(pb(v),ps(v)) and the non-convex constraint (19b). Note that RE(pb(v),ps(v)) can be rewritten as the difference of two concave functions, and the convex upper bound by employing the first-order Taylor expansion at given local points {ps(r)(v),pb(r)(v)} in the rth iteration is given by (20), as shown at the top of the next page.

RE(pb(v),ps(v))=log2(1+ps(v)gE(v)+pb(v)gE(v))log2(1+ps(v)gE(v))R¯E(r)(pb(v),ps(v))=Δlog2(1+ps(r)(v)gE(v)+pb(r)(v)gE(v))+gE(v)(ps(v)ps(r)(v)+pb(v)pb(r)(v))(1+ps(r)(v)gE(v)+pb(r)(v)gE(v))ln2log2(1+ps(v)gE(v)). (20)
ln(χ(v)AK,1)+CK,110lg(pb(v)gL(v)+1)CK,110lg(ps(v)gL(v))+CK,2+ln(AK,2χ(v)). (21)

For the non-convex constraint (19b), we first rewrite it into (21), as shown at the top of the next page. The left-hand-side of (21) is non-convex but concave with respect to χ(v) and pb(v). By employing the first-order Taylor expansion at given local points {χ(r)(v),pb(r)(v)} in the rth iteration, an upper bound is given by

η(r)(χ(v),pb(v))=Δln(χ(r)(v)AK,1)+χ(v)χ(r)(v)χ(r)(v)AK,1+CK,110lg(1+pb(r)(v)gL(v))+10CK,1gL(v)(pb(v)pb(r)(v))(1+pb(r)(v)gL(v))ln10. (22)

Employing (20)-(22), problem (III-B) can be rewritten as follows:

max{ps(v),pb(v),χ(v)}𝔼v[RL(χ(v),pb(v))R¯E(r)(pb(v),ps(v))] (23a)
s.t.η(r)(χ(v),pb(v))CK,110lg(ps(v)gL(v))+CK,2+ln(AK,2χ(v)), (23d)
(19c),(19d). (23e)

It can be found that problem (III-B) is convex, which can be efficiently solved with convex optimization software, such as CVX [14]. Therefore, the original non-convex problem (III-B) can be solved by iteratively solving the convex problem (III-B) with the local points {ps(r)(v),pb(r)(v),χ(r)(v)} until convergence, thus obtaining a locally optimal solution. In particular, the solutions obtained in rth iteration are used as the input local points for the (r+1)th iteration. Note that only a convex optimization problem (III-B) needs to be solved in each iteration, the proposed suboptimal algorithm has a polynomial computational complexity in the worst case.

IV Numerical Results

In this section, we present numerical results to validate the effectiveness of the proposed SC-assisted secrecy transmission scheme as well as the performance of the developed optimal and suboptimal algorithms. Let dL and dE denote the Tx-Rx distance and the Tx-EVE distance, respectively. The large-scale distance-dependent path loss is modelled as PL=PL0(1/di)α, where PL0=30 dB denotes the reference path loss at 1 meter, α=4 denotes the path loss exponent, and di,i{L,E} denotes the corresponding link distance in meters. For the small-scale fading, we assume that the Tx-Rx and Tx-EVE channels at each fading state follow independent and identically distributed Rayleigh fading. In the simulations, dL=dE=30 meter. The PPC is set to P^=10 W and the noise power is set to σL2=σE2=80 dBm.

For performance comparison, we consider the following two benchmark schemes based on the conventional bit-oriented transmission. (1) Bit-only transmission: In this scheme, the Tx only employs the conventional bit-oriented transmission and all the information can be eavesdropped by the EVE. The corresponding secrecy communication rate at fading state v can be expressed as bit_only(v)=[log2(1+p(v)gL(v)σL2)log2(1+p(v)gE(v)σE2)]+. The resulting ergodic secrecy rate maximization problem can be solved by using the proposed algorithm by setting {β(v)=0,v}. (2) Bit transmission with no-information-bearing AN [15]: In this scheme, the Tx sends both the bit and no-information-bearing AN signals. In particular, we assume that the AN signal can be cancelled by the Rx but cannot be cancelled by the EVE. The corresponding secrecy communication rate at fading state v can be expressed as bit_AN(v)=[log2(1+(1β(v))p(v)gL(v)σL2)log2(1+(1β(v))p(v)gE(v)β(v)p(v)gE(v)+σE2)]+. The resulting ergodic secrecy rate maximization problem can be solved by using the proposed algorithm by setting {μ(v)=0,Rs(v)=0,v}.
In Fig. 2, we compare the ergodic secrecy rate achieved by different transmission schemes.
For the employed SC, we set K=5 and the corresponding parameters for the generalized logistic function are AK,1=0.37, AK,2=0.98, CK,1=0.2525, and CK,2=0.7895. It can be observed that the ergodic secrecy rate increases with the APC, P¯, except for the bit-only transmission scheme. This underscores the importance of employing jamming schemes to guarantee the PLS. Moreover, compared to the conventional bit transmission with AN scheme, the proposed SC-assisted secrecy transmission scheme can achieve a significant performance gain. This is because the semantic signal in the proposed scheme can be regarded as a type of beneficial AN signal, which not only interferes with the EVE but also delivers useful information to the Rx. The above performance comparison confirms the effectiveness of the proposed SC-assisted secrecy transmission scheme. Furthermore, it can be seen from Fig. 2 that the performance gap between the optimal and suboptimal solutions is negligible, i.e., the proposed suboptimal algorithm can achieve near-optimal performance.
In Fig. 3, we investigate the impact of the semantic encoding scheme, K, on the achieved ergodic secrecy rate of the proposed SC-assisted secrecy transmission scheme.
All the results in Fig. 3 are obtained by the proposed suboptimal algorithm. It can be observed that the achieved ergodic secrecy rate decreases with K. This is because equation (7) implies that a higher K employed in the SC leads to a lower equivalent bit rate, i.e., a lower performance gain of SC over conventional bit-oriented communication. The above results underscore the importance of developing an efficient semantic encoder/decoder, which can use less number of semantic symbols to deliver the desired information.

Refer to caption
Figure 2: Ergodic secrecy rate of different transmission schemes versus the APC.
Refer to caption
Figure 3: Ergodic secrecy rate of different semantic encoder schemes versus the APC.

V Conclusions

An SC-assisted secrecy transmission framework was proposed for enhancing the physical layer security in future wireless networks. The legitimate Tx communicates with the legitimate Rx using the superimposed semantic and bit steams under the presence of the EVE. Due to the bit-information-only decoding capability of the EVE, the semantic stream was a beneficial AN to deliver the confidential information to the Rx and interfere with the EVE. The transmit power, power splitting ratio between the two streams, and the SIC decoding order at the Tx were joint optimized to maximize the ergodic (equivalent) secrecy rate over the wiretap fading channels, subject to the PPC and APC. To solve this problem, Lagrangian dual method-based and SCA-based algorithms were developed to obtain the optimal and suboptimal solutions. Our numerical results showed that the developed suboptimal achieves near-optimal performance and the proposed SC-assisted secrecy transmission can achieve significant secrecy communication gain.

References

  • [1] D. Gündüz, Z. Qin, I. E. Aguerri, H. S. Dhillon, Z. Yang, A. Yener, K. K. Wong, and C.-B. Chae, “Beyond transmitting bits: Context, semantics, and task-oriented communications,” vol. 41, no. 1, pp. 5–41, 2023.
  • [2] Z. Qin, X. Tao, J. Lu, and G. Y. Li, “Semantic communications: Principles and challenges,” [Online]. Available:https://arxiv.org/abs/2201.01389.
  • [3] H. Xie, Z. Qin, G. Y. Li, and B.-H. Juang, “Deep learning enabled semantic communication systems,” IEEE Trans. Signal Process., vol. 69, pp. 2663–2675, 2021.
  • [4] L. Yan, Z. Qin, R. Zhang, Y. Li, and G. Y. Li, “Resource allocation for text semantic communications,” IEEE Wireless Commun. Lett., vol. 11, no. 7, pp. 1394–1398, 2022.
  • [5] E. Bourtsoulatze, D. Burth Kurka, and D. Gunduz, “Deep joint source-channel coding for wireless image transmission,” IEEE Trans. Cogn. Commun. Netw., vol. 5, no. 3, pp. 567–579, 2019.
  • [6] H. Du, J. Wang, D. Niyato, J. Kang, Z. Xiong, and D. I. Kim, “Ai-generated incentive mechanism and full-duplex semantic communications for information sharing,” vol. 41, no. 9, pp. 2981–2997, 2023.
  • [7] X. Kang, B. Song, J. Guo, Z. Qin, and F. R. Yu, “Task-oriented image transmission for scene classification in unmanned aerial systems,” IEEE Trans. Wireless Commun., vol. 70, no. 8, pp. 5181–5192, 2022.
  • [8] X. Qin, Y. Li, X. Song, N. Ma, C. Huang, and P. Zhang, “Timeliness of information for computation-intensive status updates in task-oriented communications,” IEEE J. Sel. Areas Commun., vol. 41, no. 3, pp. 623–638, 2023.
  • [9] X. Mu and Y. Liu, “Exploiting semantic communication for non-orthogonal multiple access,” vol. 41, no. 8, pp. 2563–2576, 2023.
  • [10] H. Du, J. Wang, D. Niyato, J. Kang, Z. Xiong, J. Zhang, and X. Shen, “Semantic communications for wireless sensing: RIS-aided encoding and self-supervised decoding,” vol. 41, no. 8, pp. 2547–2562, 2023.
  • [11] X. Mu, Y. Liu, L. Guo, and N. Al-Dhahir, “Heterogeneous semantic and bit communications: A semi-NOMA scheme,” vol. 41, no. 1, pp. 155–169, 2023.
  • [12] W. Yu and R. Lui, “Dual methods for nonconvex spectrum optimization of multicarrier systems,” IEEE Trans. Commun., vol. 54, no. 7, pp. 1310–1322, 2006.
  • [13] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004.
  • [14] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1,” [Online]. Available:http://cvxr.com/cvx, Mar 2014.
  • [15] X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, 2010.