{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:20:39Z","timestamp":1760239239275,"version":"build-2065373602"},"reference-count":49,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Herein, we focus on energy efficiency optimization for massive multiple-input multiple-output (MIMO) downlink secure multicast transmission exploiting statistical channel state information (CSI). Privacy engineering in the field of communication is a hot issue under study. The common signal transmitted by the base station is multicast transmitted to multiple legitimate user terminals in our system, but an eavesdropper might eavesdrop this signal. To achieve the energy efficiency utility\u2013privacy trade-off of multicast transmission, we set up the problem of maximizing the energy efficiency which is defined as the ratio of the secure transmit rate to the power consumption. To simplify the formulated nonconvex problem, we use a lower bound of the secure multicast rate as the molecule of the design objective. We then obtain the eigenvector of the optimal transmit covariance matrix into a closed-form, simplifying the matrix-valued multicast transmission strategy problem into a power allocation problem in the beam domain. By utilizing the Minorize-Maximize method, an iterative algorithm is proposed to decompose the secure energy efficiency optimization problem into a sequence of iterative fractional programming subproblems. By using Dinkelbach\u2019s transform, each subproblem becomes an iterative problem with the concave objective function, and it can be solved by classical convex optimization. We guarantee the convergence of the two-level iterative algorithm that we propose. Besides, we reduce the computational complexity of the algorithm by substituting the design objective with its deterministic equivalent. The numerical results show that the approach we propose performs well compared with the conventional methods.<\/jats:p>","DOI":"10.3390\/e22101145","type":"journal-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T10:18:00Z","timestamp":1602497880000},"page":"1145","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy Efficiency Optimization in Massive MIMO Secure Multicast Transmission"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6291-5869","authenticated-orcid":false,"given":"Bin","family":"Jiang","sequence":"first","affiliation":[{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4759-2851","authenticated-orcid":false,"given":"Linbo","family":"Qu","sequence":"additional","affiliation":[{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2455-2710","authenticated-orcid":false,"given":"Yufei","family":"Huang","sequence":"additional","affiliation":[{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6456-1286","authenticated-orcid":false,"given":"Yifei","family":"Zheng","sequence":"additional","affiliation":[{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8600-1423","authenticated-orcid":false,"given":"Li","family":"You","sequence":"additional","affiliation":[{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"},{"name":"Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space, Ministry of Industry and Information Technology, Ministry of Industry and Information Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"},{"name":"Purple Mountain Laboratories, Nanjing 211100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5600-6589","authenticated-orcid":false,"given":"Wenjin","family":"Wang","sequence":"additional","affiliation":[{"name":"National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China"},{"name":"Purple Mountain Laboratories, Nanjing 211100, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/MCOM.2014.6736761","article-title":"Massive MIMO for Next Generation Wireless Systems","volume":"52","author":"Larsson","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Guariglia, E. (2018). Harmonic Sierpinski Gasket and Applications. Entropy, 20.","DOI":"10.3390\/e20090714"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3590","DOI":"10.1109\/TWC.2010.092810.091092","article-title":"Noncooperative cellular wireless with unlimited numbers of base station antennas","volume":"9","author":"Marzetta","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MCOM.2012.6353684","article-title":"Evolved multimedia broadcast\/multicast service (eMBMS) in LTE-advanced: Overview and Rel-11 enhancements","volume":"50","author":"Lecompte","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/COMST.2016.2594120","article-title":"Fundamental Green Tradeoffs: Progresses, Challenges, and Impacts on 5G Networks","volume":"19","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"46074","DOI":"10.1109\/ACCESS.2018.2865998","article-title":"Robust multigroup multicast transmission for frame-based multi-beam satellite systems","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_7","first-page":"46074","article-title":"Outage constrained robust multigroup multicast beamforming for multi-beam satellite communication systems","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1109\/TWC.2017.2776906","article-title":"LTE Multimedia Broadcast Multicast Service Provisioning Based on Robust Header Compression","volume":"17","author":"Jiang","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1109\/JSAC.2014.2328144","article-title":"Massive MIMO multicasting in noncooperative cellular networks","volume":"32","author":"Xiang","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/TWC.2017.2777987","article-title":"Max-min fair transmit precoding for multi-group multicasting in massive MIMO","volume":"17","author":"Sadeghi","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"6375","DOI":"10.1109\/TWC.2018.2854554","article-title":"Joint unicast and multi-group multicast transmission in massive MIMO systems","volume":"17","author":"Sadeghi","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhang, X., Sun, S., Qi, F., Bo, R., and Qian, Y. (2016, January 4\u20138). Massive MIMO Based Hybrid Unicast\/Multicast Services for 5G. Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2016.7841974"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","article-title":"Principles of physical layer security in multiuser wireless networks: A survey","volume":"16","author":"Mukherjee","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCOM.2015.7120012","article-title":"Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks","volume":"53","author":"Zheng","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_15","first-page":"e3805.1","article-title":"Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO","volume":"31","author":"Deepanramkumar","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/TMM.2016.2545403","article-title":"On the Optimal Linear Network Coding Design for Information Theoretically Secure Unicast Streaming","volume":"18","author":"Wang","year":"2016","journal-title":"IEEE Trans. Multimedia"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3880","DOI":"10.1109\/TIT.2016.2569118","article-title":"Secure massive MIMO transmission with an active eavesdropper","volume":"62","author":"Wu","year":"2016","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7113","DOI":"10.1109\/TVT.2018.2827785","article-title":"Beam domain secure transmission for massive MIMO communications","volume":"67","author":"Wu","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1109\/JSAC.2015.2416984","article-title":"Secrecy transmit beamforming for heterogeneous networks","volume":"33","author":"Lv","year":"2015","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1109\/LSP.2019.2900940","article-title":"Secure Multicast Transmission for Massive MIMO With Statistical Channel State Information","volume":"26","author":"You","year":"2019","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/LCOMM.2013.111213.132253","article-title":"Joint beamforming and user selection in multicast downlink channel under secrecy-outage constraint","volume":"18","author":"Liu","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3536","DOI":"10.1109\/TSP.2014.2326617","article-title":"On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks","volume":"62","author":"Hanif","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5401","DOI":"10.1109\/TCOMM.2017.2748118","article-title":"Artificial noise-aided secure multicasting design under secrecy outage constraint","volume":"65","author":"Wang","year":"2017","journal-title":"IEEE Trans. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TWC.2016.2621040","article-title":"Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead","volume":"16","author":"Hu","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1561\/0100000088","article-title":"Energy efficiency in wireless networks via fractional programming theory","volume":"11","author":"Zappone","year":"2015","journal-title":"Found. Trends Commun. Inf. Theory"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"You, L., Wang, W., and Gao, X. (2018). Energy-Efficient Multicast Precoding for Massive MIMO Transmission with Statistical CSI. Energies, 11.","DOI":"10.3390\/en11113175"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2011.6056691","article-title":"How much energy is needed to run a wireless network?","volume":"18","author":"Auer","year":"2012","journal-title":"IEEE Wirel. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/LCOMM.2014.2317786","article-title":"Energy Efficiency of Hybrid Cellular With Heterogeneous QoS Provisions","volume":"18","author":"Ru","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3292","DOI":"10.1109\/TWC.2012.072512.111850","article-title":"Energy-Efficient Resource Allocation in OFDMA Systems with Large Numbers of Base Station Antennas","volume":"11","author":"Ng","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1109\/TWC.2015.2400437","article-title":"Optimal Design of Energy-Efficient Multi-User MIMO Systems: Is Massive MIMO the Answer?","volume":"14","author":"Sanguinetti","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/LCOMM.2015.2420565","article-title":"Energy Efficient Coordinated Beamforming Design in Multi-Cell Multicast Networks","volume":"19","author":"He","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"4904","DOI":"10.1109\/TSP.2018.2864636","article-title":"Energy-Efficient Multicell Multigroup Multicasting With Joint Beamforming and Antenna Selection","volume":"66","author":"Tervo","year":"2018","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"6854","DOI":"10.1109\/TWC.2015.2461211","article-title":"Jamming-aided secure communication in massive MIMO Rician channels","volume":"14","author":"Wang","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2170","DOI":"10.1109\/TCOMM.2015.2425882","article-title":"Beam division multiple access transmission for massive MIMO communications","volume":"63","author":"Sun","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3352","DOI":"10.1109\/TWC.2015.2404839","article-title":"Pilot reuse for massive MIMO transmission over spatially correlated Rayleigh fading channels","volume":"14","author":"You","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1109\/TSP.2015.2502550","article-title":"Channel acquisition for massive MIMO-OFDM with adjustable phase shift pilots","volume":"64","author":"You","year":"2016","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3735","DOI":"10.1109\/TIT.2009.2023737","article-title":"Statistical eigenmode transmission over jointly correlated MIMO channels","volume":"55","author":"Gao","year":"2009","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/JSAC.2017.2699100","article-title":"BDMA for millimeter-wave\/Terahertz massive MIMO transmission with per-beam synchronization","volume":"35","author":"You","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/TSP.2013.2295059","article-title":"Adaptive limited feedback for MISO wiretap channels with cooperative jamming","volume":"62","author":"Pei","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"065011","DOI":"10.1088\/0266-5611\/28\/6\/065011","article-title":"Majorize-minimize linesearch for inversion methods involving barrier function optimization","volume":"28","author":"Chouzenoux","year":"2012","journal-title":"Inverse Probl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/TSP.2016.2601299","article-title":"Majorization-Minimization Algorithms in Signal Processing, Communications, and Machine Learning","volume":"65","author":"Sun","year":"2016","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1162\/NECO_a_00283","article-title":"A proof of convergence of the concave-convex procedure using Zangwill\u2019s theory","volume":"24","author":"Sriperumbudur","year":"2012","journal-title":"Neural Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1287\/mnsc.13.7.492","article-title":"On Nonlinear Fractional Programming","volume":"13","author":"Dinkelbach","year":"1967","journal-title":"Manag. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2844","DOI":"10.1109\/TSP.2017.2673813","article-title":"Globally Optimal Energy-Efficient Power Control and Receiver Design in Wireless Networks","volume":"65","author":"Zappone","year":"2017","journal-title":"Trans. Sig. Proc."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Couillet, R., and Debbah, M. (2011). Random Matrix Methods for Wireless Communications, Cambridge Univ. Press.","DOI":"10.1017\/CBO9780511994746"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"4604","DOI":"10.1109\/TIT.2016.2573309","article-title":"Free deterministic equivalents for the analysis of MIMO multiple access channel","volume":"62","author":"Lu","year":"2016","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2883","DOI":"10.1109\/TCOMM.2011.081111.100585","article-title":"On the Sum-Rate of Multiuser MIMO Uplink Channels with Jointly-Correlated Rician Fading","volume":"59","author":"Wen","year":"2011","journal-title":"IEEE Trans. Commun."},{"key":"ref_48","unstructured":"Salo, J., Del Galdo, G., Salmi, J., Ky\u00f6sti, P., Milojevic, M., Laselva, D., and Schneider, C. (2020, October 10). MATLAB Implementation of the 3GPP Spatial Channel Model (3GPP TR 25.996). Available online: http:\/\/www.mweda.com\/img\/smqh\/tongxin\/tongxin-3300qsdyezswos.pdf."},{"key":"ref_49","unstructured":"Lapidoth, A. (2004, January 14\u201316). The capacity of a MIMO Ricean channel is monotonic in the singular values of the mean. Proceedings of the 5th International ITG Conference on Source and Channel Coding (SCC), Erlangen, Germany."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/10\/1145\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:19:29Z","timestamp":1760177969000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/10\/1145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":49,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2020,10]]}},"alternative-id":["e22101145"],"URL":"https:\/\/doi.org\/10.3390\/e22101145","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2020,10,12]]}}}