Abstract

This article studies the physical layer security of massive multiple-input multiple-output system in time-division-duplex mode. Specifically, a single-cell downlink massive multiple-input multiple-output communication system is considered. The resulting achievable secrecy rate is investigated in the presence of passive or active eavesdroppers. The analytical results reveal that the massive multiple-input multiple-output system is naturally immune to passive eavesdroppers, but will be dramatically degraded by active attack. On account of the risk caused by active attack, a simple and effective detection algorithm is proposed. Uplink pilots with random phases are transmitted during the detection operation. By comparing the phase deviation change of the received pilot signals’ cross product, the active eavesdroppers can be detected exactly. The closed-form expressions for probabilities of detection, false alarm, and false rejection are obtained respectively, which can demonstrate the robust performance of the proposed detection scheme. To maximize the secrecy energy efficiency of the system, the optimal power allocation strategy is studied under total power constraints. This optimization problem is efficiently solved by fractional programming. Numerical simulation results are derived to validate the secrecy performance of the massive multiple-input multiple-output system, the active pilot attacker detection performance, and the energy efficiency optimization effect.

Highlights

  • The fifth-generation (5G) wireless network is expected to support a significantly large amount of mobile data capacity and achieve better quality of service (QoS) in terms of communication rate, delay, reliability, and security.[1,2] Among the emerging technologies, massive multiple-input multiple-output (MIMO) as one of the most potential promising technologies has attracted much attention and has been well assessed through theoretical analysis and laboratory tests.[3,4] Massive MIMO is a special MIMO technology where base station (BS) is equipped with large number of antennas, typically tens or hundreds

  • The results suggest that powers of Alice and Bob are interrelated under a total power limit, and both of them have a major influence on the secrecy performance

  • We only focus on maximizing secrecy energy efficiency (SEE) in the scenario where the total power is constrained, which can be formulated as

Read more

Summary

Introduction

The fifth-generation (5G) wireless network is expected to support a significantly large amount of mobile data capacity and achieve better quality of service (QoS) in terms of communication rate, delay, reliability, and security.[1,2] Among the emerging technologies, massive multiple-input multiple-output (MIMO) as one of the most potential promising technologies has attracted much attention and has been well assessed through theoretical analysis and laboratory tests.[3,4] Massive MIMO is a special MIMO technology where base station (BS) is equipped with large number of antennas, typically tens or hundreds. Assuming Alice knows Bob’s training power and the received noise power d2A, the linear minimum meansquare error (LMMSE) method[15] is applied to estimate the channel hAB, which can be given by. Larger antenna spacing and a sufficiently complex propagation environment will provide independent and identically (i.i.d) channel vectors, which are satisfied for Rayleigh fading channels This channel model has been considered in the vast majority of works on massive MIMO.[3,4,5,6,7,8,9,15,16,17,30,31,32,33] Recent channel measurement campaigns have testified that massive. According to the law of large numbers,[7,30] we can obtain that

M hABhHAB
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.