Advanced Search
Volume 40 Issue 6
May  2018
Turn off MathJax
Article Contents
JIN Liang, SONG Haotian, ZHONG Zhou, XU Xiaoming. Adaptive Secure Transmission Strategy for Multiuser Massive MIMO[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1468-1475. doi: 10.11999/JEIT170974
Citation: JIN Liang, SONG Haotian, ZHONG Zhou, XU Xiaoming. Adaptive Secure Transmission Strategy for Multiuser Massive MIMO[J]. Journal of Electronics & Information Technology, 2018, 40(6): 1468-1475. doi: 10.11999/JEIT170974

Adaptive Secure Transmission Strategy for Multiuser Massive MIMO

doi: 10.11999/JEIT170974
Funds:

The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61471396, 61701538, 61601514, 61501516, 61521003)

  • Received Date: 2017-10-17
  • Rev Recd Date: 2018-01-16
  • Publish Date: 2018-06-19
  • Massive MIMO system using Space Division Multiple Access (SDMA) can improve system throughput, and the use of multi-user downlink signal collaboration can cause superimposed interference to the eavesdropper, bringing a natural security gain. However, the physical layer security research of the system still adopts the traditional artificial noise scheme to improve the system security, ignoring the safety gain caused by the multi-user signal interference, resulting in serious power waste. In response to this problem, the impact of multi-user signal interference on the system achievable average security rate and average safety energy efficiency is analyzed in this paper, and the optimal interval of access users is given. The research shows that the system security capability is weak when the number of access users is small or large. Therefore, an adaptive secure transmission strategy to transmit N scrambling beams and user scheduling based on user location is proposed respectively. Finally, the effectiveness of the theoretical derivation and the proposed strategy is verified through the simulation. By using the proposed strategy, the secure communication can be guaranteed when the system,s natural security capability is insufficient.
  • loading
  • ZHU Jun, SCHOBER R, and BHARGAVA V K. Secure transmission in multicell massive MIMO systems[J]. IEEE Transactions on Wireless Communications, 2014, 13(9): 4766-4781. doi: 10.1109/TWC.2014.2337308.
    RUSEK F, PERSSON D, LAU B K, et al. Scaling up MIMO: Opportunities and challenges with very large arrays[J]. IEEE Signal Processing Magazine, 2013, 30(1): 40-60. doi: 10.1109/ MSP.2011.2178495.
    ZHU Jun, SCHOBER R, and BHARGAVA V K. Linear precoding of data and artificial noise in secure massive MIMO systems[J]. IEEE Transactions on Wireless Communications, 2016, 15(3): 2245-2261. doi: 10.1109/TWC.2015.2500578.
    ZHU Jun and WEI Xu. Securing massive MIMO via power scaling[J]. IEEE Communications Letters, 2016, 20(5): 1014-1017. doi: 10.1109/LCOMM.2016.2532328.
    ZHONG Zhihao, PENG Jianhua, HUANG Kaizhi, et al. Secrecy spectrum and secrecy energy efficiency in massive MIMO enabled hetnets[J]. KSII Transactions on Internet Information Systems, 2017, 11(2): 628-649. doi: 10.3837/tiis. 2017.02.002.
    KRIKIDIS I and OTTERSTEN B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling[J]. IEEE Signal Processing Letters, 2013, 20(2): 141-144. doi: 10.1109/LSP.2012.2234109.
    CHEN Xiaoming and ZHANG Yu. Mode selection in MU-MIMO downlink networks: A physical-layer security perspective[J]. IEEE Systems Journal, 2017, 11(2): 1128-1136. doi: 10.1109/JSYST.2015.2413843.
    DENG Yansha, WANG Lifeng, WONG K K, et al. Safeguarding massive MIMO aided hetnets using physical layer security[C]. Wireless Communications Signal Processing, Nanijing, China, 2015: 1-5. doi: 10.1109/WCSP. 2015.7341120.
    ZHAO Long, ZHENG Kan, LONG Hang, et al. Performance analysis for downlink massive MIMO system with ZF precoding[J]. Transactions on Emerging Telecommunications Technologies, 2014, 25(12): 1219-1230. doi: 10.1002/ett.2745.
    WANG Huiming, ZHENG Tongxing, YUAN Jinhong, et al. Physical layer security in heterogeneous cellular networks[J]. IEEE Transactions on Communications, 2016, 64(3): 1204-1219. doi: 10.1109/TCOMM.2016.2519402.
    OGGIER F and HASSIBI B. The secrecy capacity of the MIMO wiretap channel[J]. IEEE Transactions on Information Theory, 2011, 57(8): 4961-4972. doi: 10.1109/ TIT.2011.2158487.
    BJORNSON E, SANGUINETTI L, HOYDIS J, et al. Designing multi-user MIMO for energy efficiency: When is massive MIMO the answer?[C]. Wireless Communications and Networking Conference, Istanbul, Turkey, 2014: 242-247. doi: 10.1109/WCNC.2014.6951974.
    MARZETTA T L. Noncooperative cellular wireless with unlimited numbers of base station antennas[J]. IEEE Transactions on Wireless Communications, 2010, 9(11): 3590-3600. doi: 10.1109/TWC.2010.092810.091092.
    LIU Haijing, GAO Hui, YANG Shaoshi, et al. Low- complexity downlink user selection for massive MIMO systems[J]. IEEE Systems Journal, 2017, 11(2): 1072-1083. doi: 10.1109/JSYST.2015.2422475.
    HE Anqi, WANG Lifeng, ELKASHLAN M, et al. Spectrum and energy efficiency in massive MIMO enabled hetnets: A stochastic geometry approach[J]. IEEE Communications Letters, 2015, 19(12): 2294-2297. doi: 10.1109/LCOMM.2015. 2493060.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1507) PDF downloads(138) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return