 Research
 Open Access
 Published:
Joint optimization of BSVS association and power control in secure HSR communication systems
EURASIP Journal on Advances in Signal Processing volume 2021, Article number: 64 (2021)
Abstract
In this paper, the secure transmission for highspeed railway (HSR) communication system is studied. The considered HSR wireless communication system consists of a macro base station, B roadside base stations, and K vehicle stations (VSs) on the top of the train, and the eavesdropping user is a mobile unmanned aerial vehicle (UAV). We consider maximizing the sum of the minimum security rate of each time slot as the objective function, and the constraint conditions contain the quality of service (QoS), switch requirements and the total power constraint. The original optimization problem is mixedinteger and nonconvex, it is intractable to solve directly. The block coordinate descent (BCD) method is applied, and the original problem can be decoupled into two subproblems. The one is the joint BSVS association problem, and the other is the power control problem. The first subproblem of optimizing BSVS association can be solved by the successive convex approximation (SCA) algorithm, and the second one of optimizing transmit power can be solved by the lagrangian dual method. Simulation results show that the proposed algorithms have good convergence.
1 Introduction
As a kind of comfortable, fast, and safe traffic tool, the application of highspeed railway (HSR) has attracted the extensive attention in many countries. Especially in China, the HSR has developed rapidly and has become the main tool of medium and longdistance passenger transport. The widespread popularity of HSR poses a severe challenge to the HSR communication service of train operation and passenger communication service [1, 2]. In order to ensure the safety of train operation, the train multimedia dispatching, railway emergency communication and HSR line condition monitoring based the broadband railway communication system are becoming more and more important [3]. In addition, it is necessary to provide highquality voice services, video services, and Internet access for passengers on the train [4]. In order to satisfy the requirements of the data transmission rate in HSR communication, the broadband mobile communication system for HSR has attracted wide attention in industry and academia [5]. So as to better improve the QoS, LTE for railway (LTER) is proposed by the International Union of Railways to substitute for the global system for mobile communications for railway (GSMR) [6]. The fifth generation (5G) communication system will cover a variety of high mobility scenarios, such as HSR, highway, and subway. Due to the large bandwidth, 5G communication system for railway (5GR) can provide highspeed data service for the train operation and passengers at the same time. It is predicted that the peak data rate of HSR communication in the future will reach 0.5–5 Gbps [7].
The most promising solution is to adopt the two hop architecture in the future HSR communication system [8–10]. The first hop from the base station (BS) to the mobile relay station (MRS) on the top of the train works in a lower frequency band, which can avoid the penetration loss of the train and reduce the probability of handover failure [11, 12]. The other hop is from MRS to the mobile station (MS) in the train, which can use the millimeter wave to obtain the high bandwidth [13]. A HSR wireless communications between a fixed BS and a high speed train (HST) was considered, and a beamforming method with Doppler suppression for the BS was proposed, which could maximize the signaltointerferenceplusnoise ratio [14]. The weight was computed from the direction of departure of two direct paths, a position aided distributed beamforming algorithm was proposed in [15]. The joint optimization of access control and resource allocation for multimedia services in HSR wireless networks was studied in [16]. By introducing the virtual queue, the system utility maximization problem was equivalently decomposed into three subproblems. A distributed resource allocation scheme was proposed for the mixed integer resource allocation problem. The delayaware dynamic resource management for multiservice in HSR communication system was investigated, which mainly concerned on power control along the time and the resource allocation of the services [17]. The uplink system capacity of HSR communications with massive multiple input multiple output (MIMO) was derived in [18], where the colocated antennas at the center of the train and the distributed antennas uniformly placed among the train were considered, respectively.
Furthermore, the security performance of HSR wireless communication system is very important. In order to ensure the safe transmission of the train control information, the cryptographic safely code by secret key was applied to the safety protocol[19, 20]. However, if the codebook can be intercepted and there is the enough processing ability, the key based encryption technology is easy to be cracked [21]. The improvement of the security for the HSR wireless communication system has been extensively concerned. Physical layer security (PLS) has been considered as an effective method to improve the security of wireless communication system, which can be applied to HSR communication system. From the perspective of information theory, the essence of PLS is to maximize the system security rate [22]. The security rate of the legitimate users is defined as the rate of the legitimate users minus the maximum rate of the eavesdropping users. If the rate of the eavesdropping user is greater than that of the legitimate user, the rate of the legitimate user is zero. Artificial noise and MIMO are often used to improve the secrecy performance [23]. The transmission strategy of joint beamforming and artificial noise was discussed to improve the security of HSR wireless communication in [24]. The legitimate user was on the top of the train, and the eavesdropping user was stationary beside the railway. Multiple remote antenna units were connected to the central processing unit, and a cooperative distributed secure spatial modulation was established, which could improve the security performance of HSR communication system. A joint optimal secrecy capacity algorithm was proposed to maximize the system security capacity, and the eavesdropping users were also stationary [25].
In this paper, the secure transmission for HSR communication system is investigated. The contributions are mainly summarized as follows:
(1) The considered HSR wireless communication system includes a macro base station (MBS), B roadside base stations (RBS) and K vehicle stations (VSs) on the top of the train, and the eavesdropping user is a mobile UAV. The objective function is to maximize the sum of the minimum security rate in each time slot. The constraint conditions are the QoS, switch requirements, and total power constraint.
(2) The original optimization problem is mixedinteger and nonconvex. The block coordinate descent (BCD) method is applied and the original problem can be decoupled into two subproblems. The one is the joint BSVS association problem, and the other is the power control one.
(3) The first subproblem of optimizing BSVS association can be solved by the successive convex approximation (SCA) algorithm, and the second subproblem of optimizing transmit power can be solved by the Lagrangian dual method [26]. Simulation results verify the effectiveness of the proposed algorithm.
The rest of this paper is organized as follows. In Section 2, the secure HSR communication system model is introduced and the joint BSVS association and power control problem is formulated. Then, we proposed an efficient iterative algorithm to maximize the minimum secrecy rate by using some convex optimization techniques in Section 3. Finally, numerical results show the effectiveness of the proposed solution in Section 4, and Section 5 concludes this paper.
2 Methods
2.1 System model
The architecture of a HSR wireless communication network is illustrated in Fig. 1. A heterogeneous cellular network consisting of a MBS and B RBS is considered to communicate with K single antenna VSs installed on the train roof, where all RBSs are deployed at regular intervals in the coverage area of MBS and all BSs are configured with single antenna. The set of BSs is defined as \(\mathcal {B}=\{0,1,\dots,B\}\) where 0 represents the MBS and \(\{1,2,\dots,B\}\) are RBSs, and the set of VSs is defined as \(\mathcal {K}=\{1,2,\dots,K\}\). Moreover, there is a malicious eavesdropping UAV equipped with single antenna in the cell, and its trajectory can be known [27].
It is assumed that the running time of the highspeed train in the cell of MBS is T, which is equally split into N time slots for the sake of convenience in analyzing the system model. The set of time slots is defined as \(\mathcal {N}=\{1,2,\dots,N\}\). In each time slot, the BSs send the requested data to the VSs and each VS is assumed to only associate with a RBS or the MBS. Let x_{ik}[n]∈{0,1} be a binary variable for VS \(k\in \mathcal {K}\) at time slot \(n\in \mathcal {N}\) to indicate VStoBS \(i\in \mathcal {B}\) association, i.e., x_{ik}[n]=1 if VS k is associated with BS i and x_{ik}[n]=0 otherwise. Since each VS is only associated with one BS at each time slot, we have
In order to avoid the high frequent switch and reduce associated overhead in the process of running, the VS is inclined to associate with the same BS in a period of consecutive time slots. Therefore, we give the following constraint
where c and d are the constants to determine a tradeoff between lowswitch and highperformance. d is the maximum number of connections and c is the number of time slots. The larger the number of connections in the fewer slots, the higher the performance of the system.
If VS k is associated with BS i at time slot n, the achievable data rate of the downlink transmission for VS k is given by
where p_{ik}[n] is the transmit power from BS i to VS k at time slot n, h_{ik}[n] is the downlink channel gain from BS i to VS k at time slot n, \(\sum \limits _{j\in \mathcal {B}}\sum \limits _{l\in \mathcal {K},l\neq k}x_{jl}[n]p_{jl}[n]h_{jl}[n]\) is the interference from BSs to all other VSs except k, and \(\sigma _{k}^{2}\) is the noise power.
It is supposed that the eavesdropping UAV is located at the horizontal coordinate w_{u}[n] with the fixed altitude H at time slot n, which are imperfectly known at the BSs. The location of BS \(i\in \mathcal {B}\) is denoted as l_{i}. We assume that UAV is also the network user and so it can be considered as the internal eavesdropping user. Since the propagation conditions between BSs and the eavesdropping UAV can be approximated as free space, we adopt the freespace path loss model to characterize the channel. Thus, the channel power gain between BS k and the UAV is dominated by the lineofsight link and is written as
where \(\varpi =\xi _{i}\xi _{u}(\frac {\zeta }{4\pi d_{0}})^{2}\) denotes the channel power gain of BStoUAV link at the reference distance d_{0}=1 m, with ζ being the wavelength of the transmit signals, ξ_{i} and ξ_{u} being the transmitting gain of the antenna of BS i and receiving gain of the antenna of UAV, respectively. Therefore, the data rate for the eavesdropping UAV to eavesdrop the signal from the VS k can be given as
Since the VS \(k\in \mathcal {K}\) does not know that the received signal is eavesdropped or not by the eavesdropping UAV, the secure communication between the associated BS and VS k need to be guaranteed at any time slot. The secrecy rate for VS k at time slot n is given by
where [a]^{+}= max{a,0}.
2.2 Problem formulation
The aim of this paper is to maximize the sum of N secrecy rates any of which is the minimum secrecy rate among all VSs at one time slot. We seek to optimize the BSVS association \(\boldsymbol {x}\triangleq \left \{x_{ik}[n],\forall i\in \mathcal {B},\forall k\in \mathcal {K},\forall n\in \mathcal {N}\right \}\) and power control \(\boldsymbol {p}\triangleq \left \{p_{ik}[n],\forall i\in \mathcal {B},\forall k\in \mathcal {K},\forall n\in \mathcal {N}\right \}\) under of guaranteeing QoS, less switch requirements and total power. The optimization problem can be formulated as
where \(\gamma _{k}^{\min }\) is the minimum QoS requirement for VS \(k\in \mathcal {K}\) and \(p_{i}^{\max }\) is the peak transmit power of BS \(i\in \mathcal {B}\).
The joint BSVS association and power control problem in P1 have some challenges to solve, since two key variables are coupled in P1 and P1 is in a mixedinteger and nonconvex form. To solve P1, we apply the BCD method and decouple P1 into two subproblems. We solve the first subproblem of optimizing BSVS association by applying the SCA technique, and then leverage the lagrangian dual method to solve the second subproblem of optimizing transmit power.
3 Proposed security rate maximization algorithm for HSR communication systems
3.1 BSVS association subproblem
When the power control vector p is fixed, the optimization problem P1 can be rewritten as
To begin with, P2 is reformulated as P2.1 by introducing the auxiliary variables \(\chi [n],n\in \mathcal {N}\) and slacking the constraint (7d).
In order to ensure the associated solutions are binary, we introduce the auxiliary variables \(\mathbf {y}\triangleq \{y_{ik}[n],\forall i\in \mathcal {B},\forall k\in \mathcal {K},\forall n\in \mathcal {N}\}\) and give the following constraints.
The constraint (10) is transformed into a penalty item to be added to the objective function [28]. Then, we get the following problem.
where ω_{n} is penalty factor for \(\forall n\in \mathcal {N}\).
To solve problem P2.2, we propose the doublelayer iterative algorithm where y with the fixed x and χ[n] is optimized in outer layer and the problem P2.2 with y is solved in inner layer. In outer layer, the optimal solution y^{∗} is obtained by solving the unconstrained optimization problem, as follows:
By deriving the firstorder derivative of problem P2.3 with respect to y_{ik}[n], the following equation can be obtained as
Then, the optimal solution of y is obtained as
for \(\forall i\in \mathcal {B},\forall k\in \mathcal {K},\forall n\in \mathcal {N}\).
In inner layer, problem P2.1 with the fixed y is nonconvex due to constraint (9b). R_{k}[n]−R_{ku}[n] is rewritten as
where \(\Delta _{1}(\mathbf {x})=\sum \limits _{j\in \mathcal {B}}\sum \limits _{l\in \mathcal {K}}x_{jl}[n]p_{jl}[n]h_{jl}[n], \Delta _{2}(\mathbf {x})=\sum \limits _{j\in \mathcal {B}}\sum \limits _{l\in \mathcal {K},l\neq k}x_{jl}[n]p_{jl}[n]h_{jl}[n], \Delta _{3}(\mathbf {x})=\sum \limits _{j\in \mathcal {B}}\sum \limits _{l\in \mathcal {K}}x_{jl}[n]p_{jl}[n]h_{ju}[n]\), and \(\Delta _{4}(\mathbf {x})=\sum \limits _{j\in \mathcal {B}}\sum \limits _{l\in \mathcal {K},l\neq k}x_{jl}[n]p_{jl}[n]h_{ju}[n]\).
Since f_{1} and g_{1} are concave functions, f_{1}(x)−g_{1}(x) is a subtraction form of two concave functions. We adopt the SCA technique to reexpress R_{k}[n]−R_{ku}[n] in the t+1th iteration as
Constraint (9b) is transformed as
Constraint (7b) is rewritten as
Since the left item of constraint (7e) is convex, we introduce the function \(f_{2}((x_{i})_{i\in \mathcal {B}})\)
with inequality \(\max \{(x_{i})_{i\in \mathcal {B}}\}\leq f_{2}((x_{i})_{i\in \mathcal {B}})\leq \max \left \{(x_{i})_{i\in \mathcal {B}}\right \}+\ln B\), and (7e) can be approximate to
We adopt the SCA technique to reexpress the above inequality by using the first order Taylor expansion of f_{2} around a feasible point {x_{ik}[n]} at the (t+1)th iteration. Constraint (7e) is reexpressed as (21).
Problem P2.2 is reformulated as
which is a convex optimization problem.
3.2 BS transmit power subproblem
When the BSVS association vector x is given, P1 can be split to N subproblems, which is equivalently formulated as
where the symbol [n] indicating time slot n is omitted for the stake of convenience.
To convexify the objective function, we introduce two kinds of auxiliary variables ρ and \(\tau _{k},k\in \mathcal {K}\) and P3 is reformulated as
Since (24b) is nonconvex, we introduce the inequality
with
where the inequality holds if \(\eta =\bar {\eta }\), and get that
Thus, constraint (24b) is rewritten as
The second item in above inequality is coupled with respect to the optimization variables. Its first order Taylor expansion around a feasible point \((\rho ^{t},\tau _{k}^{t},p_{b_{k}k}^{t})\) at the (t+1)th iteration is given as
According to (29), inequality (24b) can be derived as a further tight constraint (30) at the (t+1)th iteration.
Constraint (24c) is nonconvex and expressed as
To convexify (24c), the first order Taylor expansion of \(\phantom {\dot {i}\!}2^{\tau _{k}}1\) around a feasible point τ_{k} at the (t+1)th iteration is given as
Thus, (24c) is converted into
Letting \(\Gamma _{k}=2^{\tau _{k}^{t}}\left (1\ln 2\tau _{k}^{t}\right)1\) and \(\Xi _{k}=2^{\tau _{k}^{t}}\ln 2\), we have
The right item of inequality (34) is coupled with respect to the optimization variables τ_{k} and \(p_{b_{l}l}\). We derive its first order Taylor expansion around a feasible point \(\phantom {\dot {i}\!}(\tau _{k}, p_{b_{k}k})\) at the (t+1)th iteration, which is similar to the process of (29). The lower bound of the right item of inequality (34) is given as (35).
According to (35), inequality (24c) can be derived as a further tight constraint (36) at the (t+1)th iteration.
The constraint (23b) \(R_{k}\geq \gamma _{k}^{\min }\) can be rewritten as
Therefore, problem P3.1 is reformulated as
In the following, we use the Lagrange dual technique to solve P3.2. The Lagrangian function of (38) is given as (39).
where \(\boldsymbol {\lambda }\triangleq \{\lambda _{k},k\in \mathcal {K}\}, \boldsymbol {\mu }\triangleq \{\mu _{k},k\in \mathcal {K}\}, \boldsymbol {\kappa }\triangleq \{\kappa _{k},k\in \mathcal {K}\}, \boldsymbol {\nu }\triangleq \{\nu _{i},i\in \mathcal {B}\}\) are the Lagrangian multipliers.
Then, the corresponding dual function is represented as
Thus, the dual problem of P3.2 is given by
The strong duality always exists since P3.2 is a convex optimization problem. For any given (λ,μ,κ,ν), the optimal solution (p^{∗},ρ^{∗},τ^{∗}) can be obtained by the following theorems.
Theorem 1
For any given (λ,μ,κ,ν), the optimal solution of power control for all VSs is given by (43).
Proof
When (λ,μ,κ,ν) is given, the Eq. 42 is obtained by deriving the firstorder derivative of \(\mathcal {L}\) with respect to \(p_{b_{k}k}\) for \(\forall k\in \mathcal {K}\). Thus, the optimal solution of power allocation for all VSs can be get by (43). □
Theorem 2
For any given (λ,μ,κ,ν), the optimal auxiliary variables ρ^{∗} and \(\tau _{k}^{\ast }\) for any VS \(k\in \mathcal {K}\) can be obtained by
Proof: It is assumed that (λ,μ,κ,ν) have been given. By deriving the firstorder derivative of \(\mathcal {L}\) with respect to ρ and τ_{k} respectively, we can obtain the following equations
and
Thus, the optimal solution ρ^{∗} and \(\tau _{k}^{\ast }, k\in \mathcal {K}\) can be obtained by (44).
3.3 Proposed iterative algorithm
According to the aforementioned analysis, the proposed iterative algorithms are described in Algorithm 1 where the BSVS association x with given p is optimized and in Algorithm 2 where the power control p with given x is solved. The joint optimization procedure is presented in Algorithm 3. In order to verify the convergence of Algorithm 3, we define ϕ_{1}(x,p),ϕ_{2}(x,p),ϕ_{2.1}(x,p),ϕ_{2.2}(x,p),ϕ_{3}(x,p),ϕ_{3.1}(x,p), and ϕ_{3.2}(x,p) as the objective values of P1,P2,P2.1,P2.2,P3,P3.1, and P3.2. In step 4 of Algorithm 1, we can obtain the solution \(\tilde {\mathbf {x}}^{t+1}\) to P2.4 with a feasible point \(\tilde {\mathbf {x}}^{t}\). As the iterative number increasing in step 3 and step 5, the feasible point is updated and the feasible region is enlarged with the SCA method. When \(\tilde {\mathbf {x}}^{t+1}=\tilde {\mathbf {x}}^{t}\), we have \(\phi _{2.2}(\tilde {\mathbf {x}}^{t},\tilde {\mathbf {x}}^{t+1},\mathbf {p}^{t})\leq \phi _{2.2}(\tilde {\mathbf {x}}^{t+1},\tilde {\mathbf {x}}^{t+1},\mathbf {p}^{t})=\phi _{2.1}(\mathbf {x}^{t+1},\mathbf {p}^{t})\), where x^{t+1} is the globally optimal solution for P2.1 with fixed p^{t}. Since P2.1 is equivalent to P2, the inequality ϕ_{2}(x^{t},p^{t})≤ϕ_{2}(x^{t+1},p^{t}) holds. From step 6 to step 9 in Algorithm 2, the solution \(\tilde {\mathbf {p}}^{t+1}\) to P3.2 with a feasible point \((\tilde {\mathbf {p}}^{t}, \tilde {\rho }^{t}, \tilde {\boldsymbol {\tau }}^{t})\) is obtained. Constraints (30) and (36) are relaxed by updating \((\tilde {\mathbf {p}}^{t}, \tilde {\rho }^{t}, \tilde {\boldsymbol {\tau }}^{t})\) and \((\tilde {\theta }^{t}, \tilde {\vartheta }^{t})\). When \(\tilde {\mathbf {p}}^{t+1}=\tilde {\mathbf {p}}^{t}\), we have \(\phi _{3.2}(\mathbf {x}^{t+1},\tilde {\mathbf {p}}^{t+1},\tilde {\mathbf {p}}^{t})\leq \phi _{3.2}(\mathbf {x}^{t+1},\tilde {\mathbf {p}}^{t+1},\tilde {\mathbf {p}}^{t+1})=\phi _{3.1}(\mathbf {x}^{t+1},\mathbf {p}^{t+1})\), where p^{t+1} is the globally optimal solution for P3.1 with fixed x^{t+1}. Since P3.1 is equivalent to P3, the inequality ϕ_{3}(x^{t+1},p^{t})≤ϕ_{3}(x^{t+1},p^{t+1}) holds. In Algorithm 3, the obtained solutions in step 2 and step 3 have the following relationship: ϕ_{1}(x^{t},p^{t})=ϕ_{2}(x^{t},p^{t})≤ϕ_{2}(x^{t+1},p^{t})=ϕ_{3}(x^{t+1},p^{t})≤ϕ_{3}(x^{t+1},p^{t+1})=ϕ_{1}(x^{t+1},p^{t+1}). That is ϕ_{1}(x^{t},p^{t})≤ϕ_{1}(x^{t+1},p^{t+1}). It is obviously obtained that ϕ_{1} is monotonically nondecreasing with respect to the iteration number and is upper bounded by a finite value. Therefore, Algorithm 3 is guaranteed to converge.
4 Results and discussion
4.1 Parameters setting
In this subsection, we present numerical results to validate our analysis and demonstrate the effectiveness of the proposed algorithms. We consider a railway segment of length 1 km where one MBS and B=4 RBSs are deployed. A HSR with K=5 VSs is running from point (100,0) to point (260,0) with the speed of 80 m/s during T=2 s. The length of each time slot is set as 0.2 s. The eavesdropping UAV have a fixed trajectory which is that the UAV with fixed H=100 travels back and forth between the starting point (100,0,100) and ending point (900,0,100) along the straight line at a uniform speed of 40 m/s. The airtoair channel power gain is set as ϖ=10^{−4} and the noise power is \(\sigma _{k}^{2}=\sigma _{u}^{2}=110\) dBm. We consider the Rayleigh fading model between BS and VS. The path loss between MBS/RBS and VS is modeled as PL^{MBS}=128.1+37.6 log10(d_{ik}[km]) and PL^{RBS}=141.1+36.4 log10(d_{ik}[km]), where d_{ik} is the distance (in km) between MBS/RBS i and VS k. The peak power budget of MBS/RBS is set to \(p_{0}^{\max }=46\) dBm and \(p_{i}^{\max }=30\) dBm, \(i\in \mathcal {B}/\{0\}\). Figure 2 gives the corresponding coordinate positions of all BSs and VSs.
4.2 Discussion
Figure 3 shows the influence of the different flight speeds of UAV on the BSVS association performance with the given power in Algorithm 1. It can be seen from Fig. 3 that for the given flight speed of UAV, when the number of iterations increases from 1 to 3, the system performance gradually increases. When the number of iterations is greater than 3, the system performance tends to be stable, which shows that Algorithm 1 has the good convergence and stability. It can also be seen from Fig. 3 that the flight speeds of UAV has an important impact on the system performance. The lower the flight speed of UAV, the higher the system performance. This is because the high flight speed of UAV increases the chance of eavesdropping VS.
Figure 4 gives the convergence performance of Algorithm 2 when the maximum transmission power of BS is different. As can be seen from Fig. 4, at first, the system performance gradually increases with the increase of iterations. When the number of iterations is between 3 and 10, the system performance jumps. For example, when Pmax = 35dbm, the system performance after the fourth iteration is higher than that of the following iterations. When the number of iterations is more than 10, the performance of Algorithm 2 tends to be stable. It can also be seen from Fig. 4 that the higher the power, the better the system performance.
Figure 5 shows the convergence performance of Algorithm 3 for the different maximum transmission power of BS. It can be seen from Fig. 5 that, with the increase of the number of the iterations, the system performance is monotonically increasing and then tends to be stable. When the maximum transmission power of BS is 35dbm, the system performance tends to be stable after two iterations. When the maximum transmission power of BS is 38dbm, 40dbm, and 42dbm, the system performance tends to be stable after four iterations. Similar to Fig. 4, the higher the maximum transmission power of BS, the better the system performance. When the maximum transmission power of BS is 42dbm, the maximum system performance of Algorithm 2 in Fig. 4 is about 79.8 bit/s/Hz, while the maximum system performance of Algorithm 3 with the joint optimization in Fig. 5 is 114 bit/s/Hz. This is because Algorithm 3 in Fig. 5 jointly considers the power optimization and the BSVS association, while Algorithm 2 in Fig. 4 only considers the power optimization for the given BSVS association.
Figure 6 shows the connection state of VSs and the system performance with different c and d. As can be seen from Fig. 6, when c = 6 and d = 4, there is only one VSBS association in the first seven time slots and it remains unchanged. In the 8th time slot, there are three VSBS association. In the 9th and 10th time slots, there is only one VSBS association. In the 11th time slot, there are three VSBS association. It can be seen that when c = 6, d = 4, the switch frequency is lower, while when c = 4, d = 2, the switch frequency is relatively high. It can be seen from the relationship between the system performance and the number of iterations in Fig. 6 that, when the switch frequency is low, the system performance will be reduced.
5 Conclusion
In this paper, the secure transmission for heterogeneous HSR communication system was studied, which contained a MBS, B RBSs, and K VSs on the top of the train, and a mobile eavesdropping UAV. Our goal was to maximize the sum of the minimum security rate of each time slot, and the constraint conditions contained the QoS, switch requirements, and the total power constraint. The original optimization problem was intractable to solve directly as it was mixedinteger and nonconvex. The BCD method was applied, and the original problem could be decoupled into two subproblems. The one was the joint BSVS association problem, and the other was the power control problem. The first subproblem of optimizing BSVS association could be solved by the SCA algorithm, and the second subproblem of optimizing transmit power could be solved by the Lagrangian dual method. In the future, we will consider the impact of beamforming and AN on the system security performance.
Abbreviations
 HSR:

Highspeed railway
 VS:

Vehicle stations
 UAV:

Unmanned aerial vehicle
 QoS:

Quality of service
 GSMR:

Global system for mobile communications for railway
 BS:

Base station
 MRS:

Mobile relay station
 DoD:

Direction of departure
 CA:

Colocated antennas
 DA:

Distributed antennas
 AN:

Artificial noise
 MIMO:

Multiple input multiple output
 RAU:

Remote antenna units
 BCD:

Block coordinate descent
 SCA:

Successive convex approximation
 MBS:

Macro base station
 RBS:

Roadside base station
References
C. Wang, A. Ghazal, B. Ai, Y. Liu, P. Fan, Channel measurements and models for highspeed train communication systems: a survey. IEEE Commun. Surv. Tutor.18(2), 2016.
B. Ai, Challenges toward wireless communications for highspeed railway. IEEE Trans. Intell. Transp. Syst.15(5), 2143–2158 (2014).
T. Zhou, H. Li, Y. Wang, L. Liu, C. Tao, Channel modeling for future highspeed railway communication systems: a survey. IEEE Access. 52818–52826:, 7 (2019).
Z. Jiang, C. Xu, J. Guan, Stochastic analysis of DASHbased video service in highspeed railway networks. IEEE Trans. Multimed.21(6), 1577–1592 (2019).
S. Xu, G. Zhu, B. Ai, A survey on highspeed railway communications: a radio resource management perspective. Comput. Commun.1228:, 86 (2016).
Z. R. Wen, R. S. He, B. Ai, B. Zhang, M. Yang, W. Wang, Z. D. Zhong, H. X. Zhang, Measurement and modeling of LTErailway channels in highspeed railway environment. Radio Sci.55(4), 1–12 (2020).
R. Chen, W. Long, G. Mao, C. Li, Development trends of mobile communication systems for railways. IEEE Commun. Surv. Tutor.20(4), 3131–3141 (2018).
S. Xu, G. Zhu, C. Shen, Y. Lei, in 2013 8th International Conference on Communications and Networking in China (CHINACOM). Delayaware fair scheduling in relayassisted highspeed railway networks (IEEE, 2013), pp. 17–21.
C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, L. Yang, Spectralefficient cellular communications with coexistent one and twohop transmissions. IEEE Trans. Veh. Technol.65(8), 6765–6772 (2016).
C. Li, F. Sun, J. M. Cioffi, L. Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst. II Express Briefs. 6(7), 531–535 (2014).
J. Zhao, Y. Liu, Y. Gong, C. Wang, L. Fan, A duallink soft handover scheme for C/U plane split network in highspeed railway. IEEE Access. 12473–12482:, 6 (2018).
J. Zhao, Y. Liu, C. Wang, Highspeed based adaptive beamforming handover scheme in LTER. IET Commun.12(10), 1215–1222 (2018).
H. Yin, R. Jiang, Y. Xu, in 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP). An mmwavebased adaptive multibeamforming scheme for high speed railway communications (IEEE, 2018), pp. 1–6.
W. Zhang, A beamforming scheme with doppler suppression for highmobility wireless communications. IEEE Wirel. Commun. Lett.9(10), 1768–1772 (2020).
C. Wang, R. T. Xu, Z. D. Zhong, in Proceedings of IEEE International Conference on Signal Processing. Distributed beamforming for high speed railway (IEEE, 2012), pp. 1410–1414.
S. Xu, G. Zhu, C. Shen, Analysis and optimization of resource control in highspeed railway wireless networks. Math. Probl. Eng.2014:, 1–13 (2014).
S. Xu, G. Zhu, C. Shen, S. Li, Z. Zhong, in 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). Delayaware dynamic resource management for highspeed railway wireless communications (IEEE, 2016), pp. 1–5.
Z. Liu, J. Wu, P. Fan, in 2014 IEEE 79th Vehicular Technology Conference (VTC Spring). On the uplink capacity of high speed railway communications with massive mimo systems (IEEE, 2014), pp. 1–5.
J. Yang, B. Ai, An effificient mimo channel model for LTER network in highspeed train environment. IEEE Trans. Veh. Technol. 68(4), 3189–3200 (2019).
C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Multiuser overhearing for cooperative twoway multiantenna relays. IEEE Trans. Veh. Technol.65(5), 3796–3802 (2016).
P. V. Craven, S. Craven, in Proceedings of the 2005 ASME/IEEE Joint Rail Conference. Security of ATCS wireless railway communications (IEEE, 2005), pp. 227–238.
C. Meng, G. Wang, X. Dai, Secure energyefficient transmission for SWIPT intelligent connected vehicles with imperfect CSI. IEEE Access. 7:, 49–154658 (2019).
C. Meng, G. Wang, B. Yan, Energy efficiency optimization for secure SWIPT system. IEICE Trans. Commun.E103.B(5), 582–590 (2020).
Y. Cui, X. Fang, in The Sixth International Workshop on Signal Design and Its Applications in Communications. A physical layer secure wireless communication scheme for high speed railway (IEEE, 2013), pp. 114–117.
Q. Ding, T. Xi, Lian Y., Joint power allocation scheme for distributed secure spatial modulation in highspeed railway. IEEE Syst. J.https://doi.org/10.1109/JSYST.2020.3008441.
X. Gao, H. Han, K. Yang, J. An, Energy efficiency optimization for D2D communications based on SCA and GP method. China Commun.14(3), 66–74 (2017).
Y. Zhou, C. Pan, P. L. Yeoh, Secure communications for UAVenabled mobile edge computing systems. IEEE Trans. Commun.68(1), 376–388 (2020).
H. M. Wang, X. Zhang, UAV secure downlink NOMA transmissions: a secure users oriented perspective. IEEE Trans. Commun.68(9), 5732–5746 (2020).
Acknowledgements
Not applicable.
Funding
This research was supported in part by the key Programs of Technological R&D of China Academy of Railway Sciences under the Grant 1951TH6804.
Declarations
Author information
Authors and Affiliations
Contributions
Authors’ contributions
The research and the outcome of this specific publication are result of a long cooperation between the authors about fundamentals and applications of secure HSR communication systems. For the present manuscript, we make a contribution to joint optimization of BSVS association and power control. All authors read and approved the final manuscript.
Authors’ information
Hao Xu received the B.S degrees in Communication engineering from Lanzhou Jiao tong University, Lanzhou, China, in 2005, the M.S degrees in Communication and information system from Lanzhou Jiao tong University in 2008, and in the PhD. Program of Traffic Information Engineering and Control in China Academy of Railway Sciences. He is currently an associate researcher who worked in Signal and Communication Research Institute of China Academy of Railway Sciences. He has been engaged in the research and development of high speed railway communication system, comprehensive dispatching system, synthetic automation of marshalling yard, and comprehensive scientific management during past 12 years.
Lu Yan received the B.S degrees in Automation Science and Electronic Engineering from Beijing University of Aeronautics and Astronautics, Beijing, China, in 2005, the M.S degrees in Measuring and Testing Technologies and Instruments from Beijing University of Aeronautics and Astronautics in 2008, and in the PhD. Program of Traffic Information Engineering and Control in China Academy of Railway Sciences. She is currently an associate researcher of China Academy of Railway Sciences, and a manager in Science and Information Technology Department. Her research interests include railway signal and communication, integrated dispatching, highspeed railway earthquake early warning, disaster warning, etc. She has participated many national scientific projects in China and has rich experience in system.
Haixiang Liu received the B.S degrees in Traffic signal and control engineering from Shanghai Tiedao University, Shanghai, China, in 1996. He is currently a Professor with Signal and Communication Research Institute, China Academy of Railway Sciences. He has been engaged in the research and development of railway communication system, computer interlocking system, and railway traffic control system during past many years.
Ke Li received the Ph.D. degreee from Tianjin University, Tianjin, China, in 2011. He is currently an associate researcher at Signal and Communication Research Institute, China Academy of Railway Sciences Corporation Limited. His research interests include railway signal and communication, railway dynamic monitoring technology, and intelligent data fusion technology.
Jian Wang received the B.S. degree in Automation from Beijing Jiaotong University, Beijing, China, in 2005, the M.S. degree in Traffic Information Engineering and Control from Beijing Jiaotong University, Beijing, China, in 2008, and in the Ph.D program of Traffic Information Engineering and Control in China Academy of Railway Sciences. He is currently an Associate Researcher at Signal and Communication Research Institute, China Academy of Railway Sciences Corporation Limited, and an Information Technology Project Management Professional. His research interests include railway signal and communication, and railway intelligent control and dispatching.
Corresponding author
Ethics declarations
Consent for publication
Informed consent was obtained from all authors included in the study.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Xu, H., Yan, L., Liu, H. et al. Joint optimization of BSVS association and power control in secure HSR communication systems. EURASIP J. Adv. Signal Process. 2021, 64 (2021). https://doi.org/10.1186/s1363402100774y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363402100774y
Keywords
 Secure transmission
 HSR communication system
 Eavesdropping user
 UAV
 Security rate