Professional Documents
Culture Documents
An Adaptive Grey Wolf Optimization Algorithm For Secrecy Rate Optimization in Interference Limited Wireless Networks
An Adaptive Grey Wolf Optimization Algorithm For Secrecy Rate Optimization in Interference Limited Wireless Networks
Abstract—Throughout the revolving generations of cellular modeled. In the field of network security, choosing minimum
technologies, data security has been one of the biggest concerns. power, based on the required secrecy rate, is one such objective
In an interference-limited wireless network, this security concern function. Solving this function may efficiently help at the
becomes quite vital due to the intervention of eavesdroppers
in the network. As a result, the max-min secrecy throughput transmitter’s end to transmit at low power and at the same
problem appears to be one of the most significant optimization time, ensure the required secrecy rate. This problem is known
problems in the fields of wireless communication and network as max-min secrecy throughput optimization [6].
security. Nature-inspired optimization algorithms appear to be Deterministic algorithm has high computational time com-
quite vital tools for this kind of optimization problem. In pared to stochastic algorithm. So, solving such computation-
this paper, a problem specific adaptive version of the Grey
Wolf Optimization Algorithm has been used to solve this max- ally heavy objective function with stochastic algorithm can
min throughput problem and the performance of the proposed provide the transmitter enough useful information within the
algorithm has been compared with the existing methods and with limited time to take the optimum decision.
a few existing meta-heuristic algorithms. The balance between Swarm-based algorithms are famous in the optimization
the exploration and exploitation phase was controlled to enhance genre. Among many swarm-based algorithms Grey Wolf
the convergence speed to yield the optimal solution in the lowest
possible time. Optimization(GWO) algorithm [7] is famous for its unique
Index Terms—Wireless Communication, Secrecy, Data Security, cognitive component, modeled after the hunting nature of grey
Meta-heuristic, Optimization Algorithm, GWO, AGWO wolf. Any algorithm’s performance can be enhanced for a
particular problem by changing different parameters, such as,
I. I NTRODUCTION exploration-to-exploitation coefficient, applying Chaos equa-
Stochastic algorithms are really efficient in solving tion [8]in place of different random number, and so on.
multi-dimensional function–uni-modal or multi-modal. These In this work, GWO algorithm’s exploration-to-exploitation
stochastic algorithms are useful in the cellular communication, coefficient was changed for this problem, and its performance
specially in the era of fifth-generation (5G) cellular technology. in finding the optimal power in max-min secrecy through-
Many such complex functions in 5G are modeled for dynamic put optimization has been compared in terms of computa-
cellular environment. For example, in spectral management tional time and convergence curve with other famous swarm-
[1], resource allocation [2], wireless caching [3], edge com- based algorithms, namely, Particle Swarm Optimization (PSO)
puting [4], and network security [5], many such complex [9], Whale Optimization Algorithm (WOA) [10], and Harris
functions, which are also known as objective functions, are Hawks Optimization Algorithm (HHO) [11].
II. O BJECTIVE F UNCTION the Omega (ω). The flow of the solution set is dictated by the
The objective function is modeled after a interference- position of the Alpha, Beta and Delta. Initial solution set is
limited wireless network consisting of M number of users randomly allocated; however, solution set changes after each
where receiver a receives information from transmitter a, iteration based on the following equations modeled after grey
and both transmitter and receiver consist of single antenna. wolf [7].
The system-model is depicted in “Fig. 1” [6]. The user In “(2)”, X vector represents the position vector of a search
agent. The ω layer search agents – modeled after wolves–
update their positions according to the position of the α, β,
δ wolves to encircle the the solution that gives the desired
objective function value – modeled after prey of wolves.
The approximate position of the desired prey is calculated or
assumed by the positions of the α, β and δ wolves.
The encircling behavior is mathematically represented by
these equations.
In “Fig. 3”, for first 250 iterations, “(7)” gives the highest value
of a, so it gives the algorithm the opportunity to explore more,
Grey wolves hunt with the pack. Their positions are updated
and the stopping criterion condition isn’t met during the first
according to the positions of α, β and δ wolves. The wolves
few iteration. This improves the result and at the same time
diverge when they have to go to search for a better prey or a
AGWO does this in short amount of time.
more possible prey, and they converge – modeled after their
pursuing for the kill. A depicts this behaviour, and The range
of A depends on the value of a. When |A| < 1, the wolves
move to attack the prey. When |A| > 1, the wolves diverge to
go for a better prey.i.e. better solution.
Floswchart of the GWO is in “Fig. 2”.
TABLE I
C HANNEL PARAMETERS
V. C ONCLUSION
This paper provides a performance evaluation of an Adap-
tive Grey Wolf Algorithm (AGWO) in max-min secrecy
throughput problem in an interference limited wireless net-
work. The results signify the superiority of AGWO over the
existing path following algorithm and other 3 meta-heuristic
algorithms, specially in terms of computational complexity
and convergence speed. The adaptive algorithm has a faster
convergence due to its longer stay in exploration phase, which
resulted in an optimal result of max-min secrecy throughput
problem with relatively much less computational time. The
result also yields greater stability comparing to most of the