Secure Hybrid Digital and Analog Precoder for mmWave Systems with low-resolution DACs and finite-quantized phase shifters

Millimeter wave (mmWave) communication has been regarded as one of the most promising technologies for the future generation wireless networks because of its advantages of providing a ultra-wide new spectrum and ultra-high data transmission rate. To reduce the power consumption and circuit cost for mmWave systems, hybrid digital and analog (HDA) architecture is preferred in such a scenario. In this paper, an artificial-noise (AN) aided secure HDA beamforming scheme is proposed for mmWave MISO system with low resolution digital-to-analog converters (DACs) and finite-quantized phase shifters on RF. The additive quantization noise model for AN aided HDA system is established to make an analysis of the secrecy performance of such systems. With the partial channel knowledge of eavesdropper available, an approximate expression of secrecy rate (SR) is derived. Then using this approximation formula, we propose a two-layer alternately iterative structure (TLAIS) for optimizing digital precoder (DP) of confidential message (CM), digital AN projection matrix (DANPM) and analog precoder (AP). The inner-layer iteration loop is to design the DP of CMs and DANPM alternatively given a fixed matrix of AP. The outer-layer iteration loop is in between digital baseband part and analog part, where the former refers to DP and DANPM, and the latter is AP. Then for a given digital part, we propose a gradient ascent algorithm to find the vector of AP vector. Given a matrix of AP, we make use of general power iteration (GPI) method to compute DP and DANPM. This process is repeated until the terminal condition is reached. Simulation results show that the proposed TLAIS can achieve a better SR performance compared to existing methods, especially in the high signal-to-noise ratio region.


I. INTRODUCTION
With the rapid development of wireless communication technologies as well as explosive access of mobile terminals, the demand of wireless data traffic grows exponentially.However, the spectrum of current exiting wireless systems is highly congested, which brings a bottleneck for increasing wireless access rate ulteriorly.Millimeter wave (mmWave) communication, whose frequency band ranges from 30GHz to This work was supported in part by the National Natural Science Foundation of China (Nos.61771244, 61472190, 61702258, 61501238, and 61602245)(Corresponding authors: Feng Shu, Ling Xu, and Zhihong Zhuang).
Ling Xu, Feng Shu, Guiyang Xia, Yijin Zhang and Zhihong Zhuang are with School of Electronic and Optical Engineering, Nanjing University of Science and Technology, 210094, CHINA.E-mail:{shufeng, xul-ing}@njust.edu.cnJiangzhou Wang is with the School of Engineering and Digital Arts, University of Kent, Canterbury CT2 7NT, U.K. Email: {j.z.wang}@kent.ac.uk.
300GHz, emerges as a promising candidate way of addressing the problem of spectrum congestion [1]- [4].
Nevertheless, although the mmWave communication becomes more and more popular due to its abundant available and under-utilized spectrum, its realistic applications are under many constraints such as the severe free space path loss and rain attenuation [5].To overcome these challenges, multiple-input-multiple-output (MIMO) is usually adopted to compensate for these shortages.Meanwhile, hybrid digital and analog (HDA) architecture has been employed to further reduce the energy consumption of mmWave MIMO systems [6]- [13].The design of hybrid precoder was formulated as a problem of sparse signal reconstruction by exploiting the inherent spatial sparse structure of mmWave channel in [6], [7], where orthogonal matching pursuit (OMP) algorithm was used to achieve a comparatively good performance.In [8], the authors proposed three methods of innovative alternative minimization for both fully-connected and partially-connected hybrid combiner in mmWave MIMO systems, which confirms the feasibility and effectiveness of hybrid precoder in mmWave MIMO architecture.In [9], an energy-efficient successiveinterference-cancelation-based algorithm with low complexity was proposed for mmWave MIMO systems.Authors in [10] and [11] extended conventional flat-fading mmWave channels to broadband frequency-selective mmWave channels, where the joint analog beamforming for the entire band and respective baseband precoder for each sub-band were required to be designed carefully.Specifically, in [10] the heuristic algorithms in OFDM systems were developed for two scenarios: singleuser MIMO and multiple-user multiple-input-single-output scenarios.In [11], the authors developed a novel method by dynamically establishing the structure of sub-arrays.In [12] , the hybrid analog and digital (HAD) architecture was used at receiver to make a measurement of direction of arrival (DOA).Here, three low-complexity DOA estimation methods were proposed and the corresponding HAD Cramer-Rao lower bound was also derived.In [13], a robust beamforming method using HAD receive structure was proposed to achieve interference compression.
However, the aforementioned research works mainly focus on HDA mmWave systems without taking security into consideration.Wyner first proposed a discrete, memoryless wiretap channel model to investigate the secrecy of wireless communication [14].Based on the framework of Wyner's wiretap channel, multiple-antenna technique [15] is applied to enhance security and beamforming has been proven to be secrecy-capacity-achieving under the circumstances that the desired receiver has single antenna and full channel knowledge are available for all terminals [16], [17].If the transmitter can not obtain the simultaneous channel state information (CSI) of eavesdropper or only know the partial CSI of eavesdropper, artificial noise (AN) was shown to be an effective aiding method to strengthen security [18]- [21].Recently, some researchers paid a close attention to security in mmWave MIMO channel.Authors in [22] made a systematical investigation of the security performance in HDA mmWave systems under two different CSIs: full and partial.Here, maximum ratio transmission (MRT) method was extended to such scenarios and minimum secrecy outage probability was adopted to design the corresponding hybrid precoder.Considering the sparse features of millimeter wave channels in [23], a discrete angular domain channel model was proposed to meticulously derive the secure performance for the proposed transmission schemes in slow fading multipath channels.In [24], an ANaided hybrid precoder is proposed to maximize the lower bound of average secrecy rate (SR).
In practical applications, if low-resolution digital-to-analog converters (DACs) or analog-to-digital converters (ADCs) are adopted, the average power consumption of hybrid transceivers will be greatly reduced.Actually, a highresolution DACs/ADCs can be power-hungry [25].In [26], how to strike a trade-off between energy efficiency and spectrum efficiency was investigated for analog, hybrid, and digital receivers with low resolution ADCs, respectively.To further reduce energy consumption, hybrid beamforming and digital beamforming with low resolution ADCs are studied in [27].
Here, the authors find that digital beamforming equipped with finite resolution ADCs can achieve a higher achievable rate and can be more energy efficient than hybrid beamforming in the low signal-to-noise ratio (SNR) region.In [28], taking both low resolution DACs and RF losses in hybrid into account in mmWave MIMO system, a quantized hybrid transmitter with additive quantization noise model (AQNM) has been constructed for both fully-connected and partially-connected hybrid architecture, and a lower bound of achievable rate is presented.
However, to the best of our knowledge, there are few literature of making an investigation on how to achieve a security in hybrid mmWave systems with low resolution DACs.Therefore, in our paper, we propose an AN-aided hybrid mmWave transmitter with low resolution DACs and finite-quantized phase shifters.The transmitted signals with the help of AN are first precoded by digital precoder (DP) in baseband, then passing through low-resolution DACs and RF chains before analog precoder (AP).Here, the AQN model is adopted to approximate the quantized signal as a linear output, which simplifies the analysis of further secrecy rate.Since the optimization problem is non-convex and intractable to tackle, an alternate iteration algorithm is resorted to maximize the approximate expression of secrecy rate.Our main contributions are summarized as follows: 1) An AN-aided secure hybrid precoding system model with low-resolution DACs and finite-quantized phase shifters on RF is established.By taking two kinds of quantization errors (QEs) into consideration, the proposed model is completely distinct from conventional non-secure hybrid precoding system without considering QEs and the AQN quantized model is adopted in our system model to approximate the distortion from QE of low-resolution DACs as a linear output.With partial eavesdropping channel knowledge available, an approximate expression for secrecy rate (SR) is derived.This expression converts the original intractable problem into a more easy-to-handle one.Thus, the approximate SR (ASR) expression will significantly simplify the optimization and design of digital precoding (DP) vector of confidential messages, digital AN projection matrix (ANPM) and analog precoding (AP) vector in what follows.2) A two-layer alternatively iterative structure (TLAIS) is proposed to maximize the ASR by taking quantization errors from both low-resolution DAC and phase shifters into consideration.Given AP vector, the DP vector of confidential messages and ANPM are alternatively computed within an interior iterative loop by making use of general power iterative (GPI) method with the aim to maximize the approximate SR.In particular, by complex Kronecker product manipulation, the problem of maximizing ASR with respect to the optimization matrix ANPM is converted into one with respect to an optimization vector being the vectorization of the corresponding ANPM.Given the DP vector and digital ANPM, a steepest ascent algorithm is used to attain the updated AP vector.The above process is repeated until the terminal condition is reached.Finally, the phases of AP vector is directly taken out as the inputs of the finite quantized phase shifters on RF.More importantly, to reduce the computation complexity, we abstract the nonzero elements in analog part by taking advantage of the sparsity of analog precoder.
The remainder of this paper is organized as follows.Section II presents the system model of AN-aided HDA mmWave multiple input single output (MISO) system with low resolution DACs and finite-quantized phase shifters, and the approximate expression of SR is given in this section.Based on the approximate formula of SR, a TLAIS among DP of confidential message, digital AN projection matrix (DANPM) and AP is proposed in Section III.Performance analysis and simulation evaluations are presented in Section IV.Finally, we draw our conclusions in Section V.
Notation: throughout the paper, matrices, vectors, and scalars are denoted by letters of bold upper case, bold lower case, and lower case, respectively.p¨q T , p¨q ˚and p¨q H denote transpose, conjugate, and conjugate transpose, respectively.
¨ 2 and ¨ F denote the l 2 norm of a vector and Frobenius norm of a matrix, respectively.Trp¨q and vecp¨q are matrix trace and matrix vectorization; b and d indicate the Kronecker products and Hadamard products between two matrices, respectively.diagpAq returns a diagonal matrix consisting of the corresponding diagonal elements of matrix A. Diagblkpa 1 , a 2 , ¨¨¨, a N q returns the block diagonal matrix concatenated of a 1 , a 2 , ¨¨¨, a N .And Nras returns a vector consisting of the non-zero elements in a. Apm, nq denotes the element in m th row and n th column, Apm 1 : m 2 , n 1 : n 2 q returns a matrix consisting of m th 1 to m th 2 row and n th 1 to n th 2 column in A.

A. System model
In this section, we consider a system model with HDA transmitter of low resolution DACs as shown in Fig. 1.There are three network nodes: Alice, Bob, and Eve.Working as a transmitter, Alice uses a partially connected hybrid architecture in this paper, where each RF chain is connected to a subset of antennas.Assume the transmit antennas at transmitter is N T , and the number of RF chains is K, then it is clear that N T " KT with each sub-array having T antennas.
The transmit signal can be expressed as follows: x " where P is the effective transmitted power, β denotes the power allocation (PA) factor of confidential message, and 1 ´β indicates the PA factor of AN. f BB P C Kˆ1 and T BB P C KˆK represent the digital beamforming vector of confidential message and AN projection matrix, respectively.To satisfy the transmit power constraint, we have Etxx H u " P T .F RF P C N ˆK is the analog precoding matrix with the following structure: where f RF k denotes a vector defined as where where F RF represents the set of b ps -bit-quantized phases with b ps being the number of quantization bits of phase shifters at RF.In this paper, we apply the additive quantization noise (AQN) model in [26], [28] to approximate the DACs quantization as a linear output for the simplicity of analysis, which can be formulated as where η is defined as the reciprocal of signal-to-quantizationnoise ratio.n q is the additive quantization noise vector and uncorrelated with the input u, that is, Erun H q s " Ern q u H s " 0. Therefore, the transmitted signal in (1) can be rewritten as According to [26], the covariance of the quantization noise can be given by where R uu " βP f BB f H BB `p1 ´βqP T BB T H BB .Therefore, the received signal at Bob can be represented as Similarly, the receive signal at eavesdropper can be given as where n b " CN p0, σ 2 b q and n e " CN p0, σ 2 e q are additive white Gaussian noise (AWGN) at Bob and Eve, respectively.For the convenience of analysis, we set σ 2 b " σ 2 e .Therefore, the achievable rate at Bob and Eve can be formulated in (10) and (11), respectively.And we can express the optimization problem of maximizing the SR as Since it is assumed that only the partial knowledge of wiretap channel at Eve is available, we can only obtain the average achievable rate of Eve.Meanwhile, because of partiallyconnected structure, we have F H RF F RF " I K .To obey the power constraint, we should have }f BB } 2 " }T BB } 2 F " 1, and P " PT p1´ηq 2 `ηp1´ηq .Therefore, the objective function in optimization problem (12) can be lower bounded as: where paq holds due to Therefore, replacing the objective function R s in (12) by Rs forms the following simplified optimization problem

B. Channel model
In what follows, a narrow-band clustered mmWave channel model is used with L propagation paths, which can be described as follows: where b Nt L is the normalized factor, l stands for the index of paths, and L is the number of channel paths.The path gains g l " CN p0, 1q depicts the complex gain of the l th path.a t pφ l q is the corresponding response vector of transmit antenna array, with φ l denotes the azimuth angles, respectively.For uniform linear array with N elements, the array response vector can be represented as where λ and d are the wavelength of the signal and distance spacing between the antenna elements.Since we consider the mmWave channel with partial channel knowledge of Eve, i.e., the full knowledge of angles of departure (AoD) and the distribution of the gains of mmWave paths α l .As we can see from (16), the channel can be written more compactly as with g " rg 1 , g 2 , ¨¨¨, g L s and A t " ra H t,1 , a H t,2 , ¨¨¨, a H t,L s T .Since the each element in g follows the complex Gaussian distribution with zero mean and unit variance, g is the i.i.d.complex Gaussian vector with probability density function as Therefore, the expectation EtSINR e u can be approximated as (20).The approximation in pbq is similarly adopted in [29]- [31].

III. DESIGN AND OPTIMIZATION OF DP APAND ANPM
In this section, we propose a TLAIS of maximizing the ASR by taking quantization errors from both low-resolution DAC and phase shifters into account as shown in Fig. 2. For the outer loop, given the initial DP vector of confidential messages and ANPM, a steepest ascent algorithm is used to attain the updated AP vector by maximizing the approximate SR (ASR).After completing this, the optimization process turns to the inner loop.Given the AP matrix, the DP vector of confidential messages and ANPM are alternatively attained within an interior iterative loop by using GPI method with the aim to maximize the ASR.The two loops are repeated until their individual terminal conditions are satisfied.
A. Design of AP matrix Observing the structure of the numerator in (20), we can simplify it to the following expression where F BB " pf BB f H BB q T P C KˆK and A " A H te,m A te,m P C NT ˆNT .In the above equation, pcq holds due to the fact that Since the analog beamforming matrix F RF (21) is block diagonal and most of its elements are zeros, i.e., the dimension of F RF is N T ˆK.In other words, there are N T non-zero elements and pK ´1qN T zero elements for matrix F RF , so the matrix F RF can be viewed as a sparse matrix.In order to reduce the computational complexity and dimension in the following, only non-zero elements of F RF are required to be extracted.Because there are N T non-zero elements in F RF , let us define represent the mathematic operation of extracting all non-zero elements from F RF .To match the above operation, now, let us extract extract the corresponding N ˆN elements from N K ˆN K matrix pF BB b Aq in (21).The rule of extracting method is as follows: matrix F BB b A can be partitioned into K ˆK or K 2 block matrices with each being N ˆN submatrix, each block matrix can be expressed as F BB pm, nq b A with m " 1, ¨¨¨, K, n " 1, ¨¨¨, K.Only M ˆM elements per block matrix are extracted with the following rule: Γ ppm ´1qM `1 : mM, pn ´1qM `1 : nM q "rF BB pm, nq b As ppm ´1qM `1 : mM,pn ´1qM `1 : nM q (24) Via the above manipulation, we have a simple form of (21) as follows In the same fashion, (20) can be rewritten in a more concise way as follows: Similarly, the achievable rate of Eve is also rewritten as

˙(27)
with and Similarly, the SINR b can be also expressed as (30).Therefore, we can further write the achievable rate of Bob as and Finally, the optimization problem of maximizing Rs (15) can be further recasted as

˙(34)
Since the Rs is the non-convex function of d.In particular, all elements in d have the unit modulus, which satisfies d P F RF .Therefore, a gradient ascent (GA) method is used to compute the AP matrix.Let us define The gradient of Rs with respect to d in can be given by where

B. Design of DP vector of confidential message
In this section, we will design the DP vector f BB assuming the other two precoders F RF and T BB are known in advance.To optimize f BB , the achievable rate of Bob is represented as a function of f BB as follows and Equality pdq in (38) is achieved because diagrAs " Ad I and peq holds due to the fact that TrrpA d IqBs " TrrApI d Bqs.Now, we can rewrite EtSINR e u as a function of f BB from (20) as follows: where and Ãte " A te F RF .Using the above expression of EtSINR e u , we directly have the average achievable rate at Eve as follows: where and Combining ( 38)and ( 49) yields the expression of Rs as Observing the form of ( 52) is the product of fractional quadratic functions, one efficient way to address this problem is GPI algorithm [32].Therefore, we can obtain the solution to f BB by resorting to GPI algorithm.

C. Design of ANPM
In this subsection, we will optimize the digital ANPM by fixing F RF and f BB .Under this condition, we can rewrite the R b as a function of T BB as follows: where w " vec pT BB q , (54) and To obtain the Rs , EtSINR e u is rewritten as a function of where and Therefore, we can obtain with and Making use of ( 53) and (66), the Rs can be reformulated as a function of w with F RF and f BB fixed as follows: where w " vec pT BB q.
Algorithm 2 Iterative method for digital precoders Input: (1) Fixed F RF , initialize f Similarly, w can be solved with GPI, and the corresponding ANPM can be obtained by reverse operation of vector-tomatrix operator.
Until now, we have completed the design of secure hybrid precoders.Our iterative idea can be described as follows: for given AP matrix F RF , the near-optimal DP vector f BB and ANPM T BB are iteratively computed; Then given the DP vector f BB and ANPM T BB , we renew the AP matrix F RF by GA method.The alternative iterations among F RF , f BB , and T BB is repeated until a stop criterion satisfies.Here, stop criterion is chosen as follows: R pp`1q s ´Rppq s ď ǫ with p being the iteration index.The proposed method is summarized in Algorithm 3.

D. Initialization of TLAIS
In the following, we will show how to set the initial values of the proposed TLAIS.In other words, we need to make an initialization for three matrices AP, DP, and ANPM, respectively.Since the optimization problem in ( 15) is nonconvex and intractable to be directly handled.Thus, to simplify it, we first consider the scenario without AN, i.e. β " 1, as in [24].In this case, the achievable rate of Bob can be expressed as where µ 1 " P p1 ´ηq 2 and µ 2 " ηp1 ´ηqP .If a fully digital architecture is adopted, i.e., F RF " I N t , then (71) can be simplified as where and Similarly, the log 2 p1 `ErSINR e sq at Eve can be rewritten as where µ 3 " P p1 ´ηq Therefore, the approximate expression Rs of SR can be expressed as Therefore, f F D can be solved with GPI algorithm.After obtaining f F D , we can obtain analog beamforming F RF as f RF,l " 1 ?T exp jQ bps rf F D,pl´1qM:lM s ( , l " 1, 2, ¨¨¨, K. ( where Q bps denotes the operation of quantizing each phase of the f F D to its nearest value in discrete phase set F RF . Observing (71), we can assign the initial value of f BB by rewriting (71) as Similarly, we have the approximate rate at Eve as Xe " and Then the Rs can be rewritten as Therefore, the initial value of f BB can be obtained by maximizing (86) via GPI scheme.
To set a good initial value of ANPM, it's reasonable to assign the initial value of T BB by the concept of null-space projection, which forces the T BB in the null space of channel of desired user, thus eliminating the interference of AN to the intended user.The expression of the initial value of T BB can be given as follows: where hb " h b F RF stands for the equivalent channel of intended user.Since the beamforming matrices f BB and T BB are closely related to the power allocation factor β in accordance with (52) and ( 70), the reasonable way to find the optimal PA is achieved by the conventional 1-D linear search.

IV. NUMERICAL RESULTS
In this section, we will present the numerical simulations to evaluate the SR performance of our proposed method and compare it with existing methods like AN-aided method in [24].Here it is particularly pointed out that since it's infeasible to directly apply the algorithm without taking low-resolution DACs into account in [24] to our paper.Then, the idea in [24] is modified to suit our model and at the same time choose it as our initial value of our proposed precoders.The second algorithm is the maximum ratio transmission (MRT) algorithm.To guarantee the fair of performance comparison, the same AN power is introduced to MRT.What's more, to reveal the importance of AN, we simultaneously make a comparison of our proposed method without AN-aided together with MRT algorithm.The parameters are chosen as follows.In our simulation experiment, the transmitter at Alice is equipped with 32 transmit antennas with 4 RF chains, and mmWave channel model is also adopted in our paper with L " 12 and azimuth angles being a uniform distribution over r0, 2πs.Secrecy rate (bits/s/Hz) Proposed TLAIS method Max-SR plus NSP in [24] MRT+AN [11] Proposed no-AN aided method MRT [11] b DAC =1 b DAC =8 Fig. 3. SR versus SNR with b DAC " 8 bits.
Fig. 3 demonstrates the SR performance versus SNR with number b DAC of quantization bits of ADC being 8.As can be seen from this figure, the proposed TLAIS method performs better than AN-aided method in [24] and MRT plus AN method in terms of SR performance.From this figure, we find an important fact that AN has an important impact on SR performance.Taking the proposed TLAIS as an example, the proposed TLAIS performs much better than the corresponding one without AN.More important, with the help of AN, the SR performance of all three methods including our proposed method gradually grows with increase in SNR.Conversely, without the aid of AN, all methods exist the effect of SR performance ceil as SNR increases.The main reason that our proposed method is better than MRT can be explained as follows: unlike our method, the major goal of MRT algorithm is to maximize the receive SNR at Bob and don't concern the receive SNR at Eve.However, our method is to maximize SR.Thus, our proposed method can achieve a better SR performance.Fig. 4 shows the optimal PA factor β versus SNR with b DAC " 8, where β is to maximize SR by adjusting PA between confidential message and AN.From Fig. 4, it is seen that, in the low SNR region, the optimal PA factor always remains 1, which implies that in this scenario all power should be allocated to transmit confidential message to guarantee the communication quality, and AN has a trivial impact on SR performance.Furthermore, as SNR increases, the optimal PA factor declines gradually.This reveals a fact that more power should be allocated to AN to interfere with eavesdropper, and improves the security of communication.Fig. 4 verifies the effectiveness of AN-aided method especially in the medium and high SNR regions.Secrecy rate (bits/s/Hz) Proposed TLAIS method Max-SR plus NSP in [24] MRT+AN [11] Proposed no-AN aided method MRT [11] Fig. 5. SR versus number of quantization bits of DAC with SNR=15dB.
Fig. 5 illustrates the SR versus number b DAC of quantization bits of DAC with SNR " 15dB.For the small value of b DAC , the SR is small and its performance loss is significant because the distortion of low-resolution DACs is extremely severe.As b DAC increases, the SR performance improves dramatically, especially when b DAC ranges from 1 to 6 bits.It's noted that the SR performance of five methods all tend to stable when b DAC reach up to 6.In such a situation, the performance loss is negligible.What's more, given a fixed value of b DAC , our proposed method achieves a higher SR performance than other algorithms.Secrecy rate (bits/s/Hz) Proposed TLAIS method Max-SR plus NSP in [24] MRT+AN [11] Proposed no-AN method MRT [11] Fig. 6.SR versus number of quantization bits of phase shift with SNR=15dB.
Fig. 6 plots the SR versus number b P S of quantization bits of phase shifters with SNR " 15dB and b DAC " 8.The proposed TLAIS performs much better than MRT and MRT with AN in terms of SR for all cases.Additionally, we also find the fact that their SR tend to a flat rate ceil with increase in number of quantization bits of phase shifts.From Fig. 6, it follows that the SR loss due to the effect of quantization error from phase shifters becomes trivial when b P S ě 4 .Secrecy rate (bits/s/Hz) Proposed TLAIS method Max-SR plus NSP in [24] Proposed no-AN method MRT+AN [11] MRT [11] Fig. 7. SR versus number of quantization bits of phase shifter with SNR=15dB and b DAC " 4.
Fig. 7 plots the SR versus number b P S of quantization bits of phase shifters with SNR " 15dB and b DAC " 4. It is noted that Fig. 7 shows the similar performance trend with Fig. 6.In other words, it follows that our proposed no-AN aided method is still better than MRT plus AN method in medium and high values of b P S .This result is consistent with that Fig. 5 at b DAC " 4.

V. CONCLUSION
In this paper, a TLAIS was proposed for AN-aided hybrid precoding by taking the low-resolution DACs and finitequantized phase shifters into account.First, we developed a quantized DAC model for AN aided hybrid precoding based on AQN model including the effect of quantization noise.Then, an approximate expression of SR with partial channel knowledge of eavesdropper was also derived.Based on the derived approximate expression,a TLAIS was presented to optimize the design of DP vector, ANPM, and AP matrix by resorting to the principle of GPI.Considering the unit modulus constraints of AP, we adopted a GA algorithm to compute the AP matrix.Furthermore, to reduce the computation complexity, only the non-zero elements in AP matrix were abstracted by taking advantage of the sparsity features of partially-connected hybrid architecture to form an optimization vector.Simulation results indicate that our proposed method can achieve a better SR performance than existing methods such as MRT and Max-SR+NSP.

BBAlgorithm 3
and F RF , search the optimal β 0 by 1-D search; Repeat 1: Solve T pk`1q BB using f pkq BB and F RF through (70); 2: Solve f pk`1q BB using T pkq BB and F RF through (52); 3: Compute R pk`1q s using T pk`1q BB , f pk`1q BB and F RF , search the optimal β k`1 by 1-D search; 4: k " k `1; Proposed TLAIS algorithm Input: (1) Initialize F p0q RF , f p0q BB and T p0q BB according to (79), (86) and (87), respectively and set p " 0, threshold value ǫ; (2) For F p0q RF , update f p0q BB and T p0q BB with Algorithm 2; Repeat 1: For f ppq BB and T ppq BB , using Algorithm 1 to obtain F
EtSINR e u " E # βP p1 ´ηq 2 Nt L g e A te F RF f BB f H BB F H RF A H te g H e p1 ´βqP p1 ´ηq 2 Nt L g e A te F RF T BB T H BB F H RF A H te g H g e A te,m F RF R nqnq F H Nt L g e A te F RF f BB f H Nt L g e A te F RF T BB T H Nt L E trrg H e g e,m A te,m F RF f BB f H e`NtL L TrrE tg H e g e u A te Fixed f BB and T BB , compute R T BB as follows: te Ãte `α4 C e `ωe I K uT BB s " κ e trrT H BB F e T BB s (62

2
Nt L , µ 4 " ηp1 ´ηqP Nt L .The approximation pf q in (75) holds because β " 1 and pgq is true due to F RF " I Nt .What's more, X e " µ 4 rI Nt d pA H te A te qs `σ2 I Nt `µ3 A H te A te , (76) and Y e " µ 4 rI Nt d pA H te A te qs `σ2 I Nt