Open accessResearch articleFirst published online 2022-8
Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping
This article investigates the influence of multiple-antenna deployment at access points on physical layer security under cell-free massive multiple-input multiple-output systems. To embody the concept of network multiple-input multiple-output, cell-free massive multiple-input multiple-output employs a great deal of geographically distributed access points, which jointly serve multiple users in the same frequency-time resource. Assuming a malicious active eavesdropper having knowledge of instantaneous channel state information, we derive the asymptotic closed-form expression of the achievable secrecy rate, which is used to evaluate network security performance. A distributed power allocation scheme is developed based on channel fading degrees of different users. All of access points distribute a larger proportion of local transmission power to the users with better channel conditions. We verified that the security performance of the multi-antenna access points outperforms that of the single one. Compared to equal power allocation, the proposed power control algorithm can further boost the network security performance.
Telatar,1 Foschini and Gans,2 Bell Laboratory, in their pioneering paper proposed the concept of multiple-input multiple-output (MIMO) system, which can provide spatial multiplexing and diversity gained by using multiple antennas on transmitter and receiver. Thus, MIMO systems can significantly increase spectral efficiency throughout without additional frequency, power, and time resources. As a scalable multiuser MIMO implementation, massive MIMO technology has been derived by Marzetta.3,4 Each base station (BS) is equipped with a large array of antenna elements. Massive MIMO has become one of the key technologies for 5G networks with a great capability of enhancing the spectrum and energy efficiency as well as reducing transmission power and inter-cell interference of the network through the deep mining of dimensional resources in a wireless communication environment.5 According to the deployment of antenna arrays on BS, massive MIMO systems can fall into collocated MIMO systems and distributed ones.6 The former is built with a compact large-scale antenna array in the BS, which has advantages of low data sharing cost and fronthaul requirements. The antenna of the latter is distributed over a wide area, which can provide uniformly good services for all authorized users as well as higher diversity against the shadow fading.7 Multicell distributed MIMO is a generalized concept, including network MIMO,8 coordinated multiple point (CoMP),9 and distributed antenna systems (DASs).10 In 2015, Nayebi et al.11 first proposed the network architecture of cell-free massive MIMO, which has received widespread attention. The different structure of massive MIMO systems is illustrated in Figure 1. Chien et al.12 investigated how to use power allocation to save load resources. To reduce the overhead for channel estimation, an aggregated channel estimation approach was introduced by Chien et al.13 These studies have explored more performance advantages for cell-free massive MIMO.
Illustration of the network architecture of collocated and distributed massive MIMO.
With the dramatic array gain, massive MIMO has great potential in physical layer security (PLS). Also, this topic has been developed in recent years.14 Due to the stronger directivity of the signal beam, the massive MIMO system has natural robustness to passive eavesdropping.15 To obtain more favorable information, smart eavesdroppers usually take action not only by overhearing but also by jamming. Time-division duplexing (TDD) mode has the advantage of making forward and reverse channels under massive MIMO systems reciprocal.16 It allows that only the uplink is used for channel estimation to acquire channel state information (CSI), dispensing with downlink estimation. At the same time, it provides a huge opportunity for active eavesdroppers to send spoofing pilot sequences, also called pilot spoofing attacks. The damage is to decrease the accuracy of channel estimation, and bring correlated precoding vectors between eavesdroppers and legitimate users,17 resulting in severe leaking of information. To mitigate the impact of active eavesdropping in massive MIMO systems, power control methods are commonly applied, such as trying to ensure the minimum transmit power required for reliable and secure communication,18 minimizing the signal-to-interference and -noise ratio (SINR) of eavesdroppers,19 and using game theory to maximize the SINR of legitimate users.20
The security aspect of the cell-free massive MIMO network under pilot spoofing attacks was first explored by Hoang et al.,21 which proposed a simple detection mechanism and designed power control schemes with the aim of security rate maximization and power consumption minimization. To continue handling the crisis of the active eavesdropper, Zhang et al.22 analyzed the security performance for the multigroup multicasting scenario. Besides, a comparison about the lower bound on security capacity between the collocated and cell-free massive MIMO has been presented by Timilsina et al.23 The achievable rate on legitimate users and the rate leaked to active eavesdroppers have been driven within the range of limited and unlimited numbers of APs. Research on security performance was expanded by introducing novel technologies.24,25 Alageli et al.24 have delved into the problem of secure communication assuming that there is an untrusted dual-antenna energy harvester in the network. One antenna is used to harvest energy, whereas the other one intercepts information signals as an active eavesdropper. Elhoushy et al.25 have enhanced the robustness of network security against pilot spoofing attacks by applying reconfigurable intelligent surface, which reconfigures the wireless propagation channels through software-controlled reflections. Based on more realistic consideration of low-resolution analog-to-digital converters, secure communication with active eavesdroppers has been studied by Zhang et al.26 However, the abovementioned research on PLS is all limited to single-antenna APs.
To the best of the authors knowledge, there are no fruitful results with the cell-free massive MIMO system model established in multi-antenna APs. However, it is easier to realize channel hardening when each AP is deployed with 5–10 antennas.27 By channel hardening, fading multi-antenna channels can behave almost as deterministic scalar channels. This basic property simplifies the resource allocation28 and assists to deliver higher performance29 in the cellular massive MIMO system. Ngo et al.7 proved that the cell-free massive MIMO can also utilize channel hardening, but Chen and Bjoernson30 have proved that channel hardening is not always available to adopt in the cell-free massive MIMO network. So the studies on cell-free massive MIMO should deploy multi-antenna APs in the pursuit of relying on channel hardening. Vu et al.31 proposed a novel full-duplex mode, wherein the plurality of multi-antenna APs provided uplink and downlink services for multiple single-antenna users in the same frequency band. Considering imperfect CSI, non-orthogonal pilots, and power control, the spectral efficiency with respect to numbers of APs antennas and the users in cell-free massive MIMO system has been investigated by Mai et al.32
Motivated by the aforementioned discussion, we explore the PLS of cell-free massive MIMO systems with multi-antenna APs in the presence of an active eavesdropper. First of all, the closed-form expressions of downlink achievable rates at the legitimate users and the rate leaked to the wiretapper are derived. Second, we propose a distributed power control scheme that allocates power factors by estimated channel quality. This simple and feasible scheme puts power control operations locally. Moreover, the effect of the number of the antennas per AP is analyzed by the achievable secrecy rate. Simulation results show that the security improved by the multi-antenna APs consistently outperforms that of the single one in terms of achievable security rate. And dense nodes of APs cooperative with the aforesaid power allocation scheme can provide a respectable security performance.
The remainder of this article is organized as follows. In the section “Channel and System Model,” the system model including uplink channel estimation and downlink information transmission phase are presented. In section “Security Performance Analysis,” we carry out a set of general mathematical closed formulas for security performance analysis. In addition, we optimize the total downlink transmission power here. This is followed by the section “Numerical Results and Discussion,” where numerical results and discussion are presented. Finally, we provide our conclusion in the section “Conclusions.”
Notations: Boldface letters denote the vector or matrix, for example, . denotes the identity matrix. Conjugate, transpose, Hermitian, and trace operator are indicated by , , , and , respectively. and denote expectation and variance operations of random variables in brackets, respectively. stands for dimensional complex space. and represent absolute value and the Euclidean norm, respectively. is a complex Gaussian random vector with a mean vector of and covariance matrix of .
Channel and system model
Channel model
We consider a cell-free massive MIMO system with APs and users in the presence of an active eavesdropper (Eve). Each AP is equipped with antennas, and each user and Eve have one single antenna. All node positions are randomly located. The central processing unit (CPU) connects every AP nodes to perform joint signal processing, beamforming, and computing tasks via backhaul, such as fiber, cable, and microwave.6 Let us denote the channel response matrix between the AP and the user as , which can be expressed as
where is large-scale fading including shadow fading and path loss. It is related to the distance between the AP and the user, which can be considered as a constant.33 represents small-scale fading, which is composed of the superposition of the signal components generated by the reflection, scattering, and diffraction of the channel through various obstacles.
In addition, we discuss the Rayleigh fading channel, that is, is independent and identically distributed (i.i.d). The notation is the element of , .
System model
The system model of the cell-free massive MIMO network is shown in Figure 2. We assume that the system is operated in TDD mode. The length of a TDD coherent interval is . Considering the downlink secure transmission, each coherence interval consists of two phases: uplink channel estimation and downlink information transmission.
System model of the cell-free massive MIMO network.
Uplink channel estimation: During the pilot sequence training duration , every legitimate user sends its own unique pilot sequence to all APs, and APs process these orthogonal mixed pilot sequences by multiplying the conjugation of the user’s own pilot sequence. Through the estimator, it can be used to obtain the estimation of channels that meet different needs. In this article, we adopt the minimum mean square error (MMSE) estimation method, often referred to as the optimal estimate.
In detail, the system design vectors as standard and public pilot sequences. It has to satisfy in the case of , and in the case of . The user sends to all APs, and Eve sends the same one with the target intercepted user. Generally assuming that Eve desires to wiretap the confidential messages from the user, that is, , the process is completely synchronous. Hence, the received pilot vector at the AP is
where and are normalized signal-to-noise ratio (SNR) of each pilot symbol. and are the average uplink power of each user and Eve, respectively. is an additive white Gaussian noise (AWGN) matrix. The elements of obey distribution with , i.i.d. Then, the projection process can be put into as
The MMSE estimation of and can be given locally at the AP by
where
To facilitate later calculations, let us define
and
We can see that is a diagonal matrix with identical elements, and so is . These two statistics describe the estimated large-scale fading of APs. Assuming the antennas by each AP are uncorrelated, they are expressed directly and briefly as , .
Downlink data transmission: During this phase, the AP expects to transmit the normalized signal for the user such that and utilizes the uplink estimated channel to perform beamforming. Then, the AP transmits the mixed signal for users as
where is the downlink power allocated by the AP to the user. represents the payload data precoding vector of the AP to the user. Maximum ratio transmission (MRT) is a simple linear precoding scheme that can provide nearly optimal performance. Therefore, using MRT scheme in this article, we define as . For the sake of simplicity, the operation is aimed at . After that, the received signal at the user from all APs is given by
where . It means the strength of the message that the user has received is however intended for the user. And is an AWGN.
As such, Eve will receive the information signal as
where is the intercepted signal gain. is AWGN satisfying .
Security performance analysis
In this section, we analyze the security performance by achievable security rate. The security rate can be defined as the difference between the information rate of legitimate users and Eve. Also, the achievable rate of legitimate users and the information leakage rate into Eve are deduced.
Achievable rate of legitimate users
On the basis of information theory, the achievable rate of the user can be given as
where is the SINR of the user. Due to the fact that multi-antenna APs deployment makes it realize the property of channel hardening, legitimate users have access to statistic CSI without downlink training.27,30 The achievable rate of legitimate users can be regarded as the lower bound for mutual information between and . Based on Hoang et al.,21 and considering that the effective noises are pair-wisely uncorrelated, we can obtain the lower-bound SINR of the user as
As the user only gains the statistic CSI, is substituted for denoting the strength parts of . is the strength difference of the desired signal caused by the inaccuracy of the statistic CSI, which expatiates on the source of in the above formula.
Lemma 1
Let be a complex-valued random vector with , .
Proof: The reader could be referred to Bjoernson et al.,33 Lemma 2.
Theorem 1
When an active eavesdropper conducts a pilot spoofing attack, and all APs are configured with multi-antenna and conjugate beamforming technology, the closed-form expression of the user’s SINR could be condensed as equation (14) by Lemma 1, where Qiu et al.34 has not coped completely.
In this article, we focus on the worst-case scenario in terms of network security. The Eve has knowledge of instantaneous channel gain to get a genie-aided rate. Based on Jensen’s inequality, , if is convex. The Eve gets the upper-bound eavesdropping information rate, which can be represented as
Theorem 2
The closed-form expression of the active eavesdropper’s SINR when every AP has multi-antenna and adopts conjugate beamforming is
Proof: See Appendix 2.
Achievable secrecy rate
The above analysis lays the foundation for the derivation of the lower-bound secrecy rate at the user. Following Wu et al.14 and Jose et al.,16 the achievable secrecy rate can be expressed as
where the notation is . We regard the worst-case secrecy performance for the network, which is of utmost importance. Under any other conditions, such as legitimate users having perfect CSI, or Eve not being capable of achieving instantaneous CSI, the secrecy performance would be elevated spontaneously.
Power allocation scheme
In this subsection, we present a distributed power allocation (DPA) scheme, which is simple to implement for cell-free massive MIMO. Most power control algorithms take a certain utility metric as the optimization goal, depending on the powerful computing capability of the CPU, huge backhaul capacity, and perfect calibration of the hardware chains. Backhaul overhead is defined as the execution cost of computation task among cooperating APs.35 Because distributed antenna networks increase in size and density, it is urgent to reduce backhaul overhead.36 When the backhaul load is heavily limited, it is an alternative approach to conduct power control to APs locally. Assuming that the network does not detect the presence of active eavesdropping, each AP divides their power by the channel strength of different users. In this scenario, the influence of the unauthorized access of the active eavesdropper on the network can be more intuitive, credible, and persuasive. In our power allocation schemes, channel strength is measured on the basis of , so the downlink transmission power allocated from the AP to the user can be acquired as
where is the total transmission power of each AP.
Dealing with power control, it is traditional to adopt equal power allocation (EPA) scheme in collocated massive MIMO systems. Because the distance is so close among antennas in the BS, all are regarded to be set up in the same place. The channel quality between each antenna and users is in equilibrium. While CPU supports distributed scenarios in cell-free massive MIMO systems, APs have widely divergent locations. If a certain AP is relatively far from some users, or has serious interferences, it will be sensible to make these power control factors smaller. In consideration of the above, DPA is more appropriate in the light of the distribution network traits. It is also easy to implement after CSI estimated by each AP.
Numerical results and discussions
In this section, we present the numerical results of the security performance under the multi-antenna cell-free massive MIMO network in the presence of an active eavesdropper. Unless noted additionally, system parameters are set as shown in Table 1.
Setting of simulation parameters.
Symbol
Parameter meaning
Value
The length of pilot
15 (samples)
Bandwidth
Carrier frequency
AP antenna height
User/Eve antenna height
Noise temperature
290 (Kelvin)
The standard deviation of shadowing fading
8 (dB)
Uplink pilot power of legitimate users
0.6 (W)
Total downlink power
20 (W)
AP: access point.
Besides, the amount of APs, users, and Eve nodes are uniformly distributed over the area of . Each point in the figure is shown by average value through 100 executions of the trivial for the location randomization. And there are times independent Monte-Carlo experiments verified for the following scenario: the large-scale fading by employing Hata-COST231 propagation model37 can be described as
where and denote the normalized distribution of shadowing fading. and represent the path loss as
where
and where is the generalized notation in for or . (or ) represents the distance between the AP and the user (or Eve). By the way, and .
Moreover, the noise power can be given by
where is the Boltzmann constant, equal to , and the noise figure is .
Figure 3 shows the cumulative distribution function (CDF) of the achievable secrecy rate by the user. We focus on the performance gain brought by multi-antenna APs deployment. When , it is the special case that all APs are single antenna in prior studies. Considering EPA for simplicity, no matter how many APs are deployed by single antenna or multiple antennas, the achievable secrecy rate is almost zero. With DPA, achievable secrecy rates are monotonically increasing with the antenna number of APs. This can be explained by the fact that when rises, the legitimate channels between APs and users are more favorable. -likely performance7 is observable to analyze the level, which has a % chance to be achieved. Zooming in on the lower segment of the plot in Figure 3, the security rate of the user when each AP is set with 5 or 8 antennas deployment is about 2 bit/s/Hz, which is twice as high as that of only single antenna. It also proves the conclusion by Irmer et al.9 that multi-antenna APs can inherit benefits from channel hardening.
Cumulative distribution of achievable secrecy rate with , , and .
As shown in Figure 4, we explore the intuitive influence on multi-antenna APs. As the amount of antennas by APs increases from 1 to 10, the achievable secrecy rate increases proportionally. With EPA, the number of antennas by APs and the number of legitimate users within the supported range, that is, , have no perceptible effect on the achievable secrecy rate. However, by applying DPA, the performance improvement is substantial. Even the number of legitimate users has reached its limit, that is, , which is the maximum interference from other legitimate users. From the growth trend, we can see the great promotion of achievable secrecy rate gains from single APs to the multi-antenna configuration. This is also the most challenging step for all network construction. In theory, random matrices are used to deduce the expected value for future simplification. In practical application, multi-antenna APs increase the multiplexing gain with moderate physical sizes.
Achievable secrecy rate versus the number of antennas per AP with and .
In Figure 5, the achievable secrecy rate is plotted as a function of spoofing pilot power by Eve. If Eve cannot transmit training pilots, that is, , the action will degenerate into passive eavesdropping. Between the active one and passive one, it is a significant decline of the achievable secrecy rate by EPA. But with our proposed DPA scheme, the performance gap is not such a great divergence, which indicates that power control is an effective method to restrain the harm of a pilot spoofing attack. When the power of Eve sending the training pilots is larger, the degree of pilot spoofing attack becomes more serious. Yet the damage to the target wiretapped users is not obvious. The reason is that DPA makes transmission power of each AP distributed to the legitimate users based on the channel conditions, which is used as the performance metric. Particularly for the user, suffers from the uplink power of Eve . If spoofing pilot power of Eve increases, channel estimation of the wiretapped user would be more inaccurate. This can lead to weaker estimated channel and channel statistics , which makes the downlink transmission power received to Eve smaller. Therefore, DPA can exploit power control against Eve, which has strong spoofing pilot power.
Achievable secrecy rate versus spoofing pilot power of Eve with and .
Specifically, the achievable secrecy rate with single-antenna AP ranges from 1.769 bit/s/Hz with to 1.675 bit/s/Hz with . When the number of antennas per AP grows up to 5, the achievable secrecy rate value raises about 3.311 and 3.234 bit/s/Hz when pilot power of Eve increases 10 times from 0.1 W. In the same case with , the achievable secrecy rate shows a slighter downward trend from 3.996 to 3.862 bit/s/Hz. On one hand, the introduction of multi-antenna APs can eliminate some negative effects in the worst-case scenario in which Eve has strong power to send pilots. This means the beamforming vector has to be more inclined toward the direction of Eve. On the other hand, the power allocation scheme is of great assistance to the security performance enhancement. All APs only consider the channel condition of legitimate users to distribute themselves local power. Eve has no chance to change the received signal strength. During the downlink transmission phase, the identity of Eve is a passive eavesdropper. This DPA scheme transfers the difficult assignment from CPU to AP nodes. It can reduce the cell-free massive MIMO system workload and can handicap Eve’s position.
The achievable secrecy rate is depicted as a function of in terms of parameters with various amounts of antennas by APs shown in Figure 6. Under the worst-case security assumption, the network is coupled with a natural bias that Eve has more knowledge about CSI than legitimate users. Regardless of power control, there is terrible security performance whatever the number of antennas by APs or the number of APs by applying EPA. In our proposed DPA scheme, we generally demonstrate that a higher level of security performance can be gained from services provided by more APs. This also takes advantage of the typical narrow beam orientation of massive MIMO systems. As a result of each five antenna point intervals, the curves are not very smooth. We could still find that multi-antenna APs deployment is a bigger contributor to security performance improvement. When , the achievable secrecy rate climbs up from 0.950 to 2.143 bit/s/Hz. There are a dramatic rise of achievable secrecy rate in the case of and , from 2.323 to 4.113 bit/s/Hz and from 2.897 to 4.630 bit/s/Hz between and , respectively. Although densely random AP nodes in cell-free massive MIMO systems must have a closer geographical distance to Eve, the user-centric ideological concept can lead to significantly better security performance for legitimate users. Besides, in Figures 5 and 6, the simulation result is in keeping with the theoretical value to verify the correctness of secrecy performance analysis.
Achievable secrecy rate versus the number of APs with and .
Conclusion
In this article, we have studied a cell-free massive MIMO network in the presence of an active eavesdropper, which is a smart attacker imitating the legitimate users’ training pilots and sending the same one to all APs. Combined with previous research, it has proven the channel hardening that exists when multiple antennas are configured at APs. Therefore, it is imperative to consider the scenario of multi-antenna APs under cell-free massive MIMO networks, which is also the first time to focus on the security with arbitrary finite number of antennas deployed by APs. Taking MMSE estimation method and conjugate beamforming technology into accounts, we derive general closed-form expressions of the achievable rate at the legitimate user nodes, the information rate leaked into the eavesdropper, and the achievable secrecy rate. Moreover, a DPA scheme is proposed and contrasts with EPA. This power control algorithm could be used as a prototype for the user-centric network. Taking achievable secrecy rate as the performance security evaluation in simulations, our results reveal that it is superb to employ multi-antenna APs to enhance the security of wireless communication networks. That also corresponds with the application condition of the channel hardening mentioned above.
Footnotes
Handling Editor: Yanjiao Chen
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research,authorship,and/or publication of this article.
Funding
The authors disclosed receipt of the following financial support for the research,authorship,and/or publication of this article: This work was supported by China Postdoctoral Science Foundation (Grant No. 2021MD703980).
FoschiniGJGansMJ. On limits of wireless communication in a fading environment when using multiple antennas. Wirel Person Commun1998; 6(3): 311–335.
3.
MarzettaTL. Multi-cellular wireless with base stations employing unlimited numbers of antennas. In: Proceedings of annual information theory & applications workshop UCSD, February2010, https://iwct.sjtu.edu.cn/Personal/zychen/Massive%20MIMO.pdf
4.
MarzettaTL. Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE Trans Wirel Commun2010; 9(11): 3590–3600.
5.
JungnickelVManolakisKZirwasW, et al. The role of small cells, coordinated multipoint, and massive MIMO in 5G. IEEE Commun Mag2014; 52(5): 44–51.
6.
LarssonEGEdforsOTufvessonF, et al. Massive MIMO for next generation wireless systems. IEEE Commun Mag2014; 52(2): 186–195.
7.
NgoHQAshikhminAYangH, et al. Cell-free Massive MIMO versus small cells. IEEE Trans Wirel Commun2017; 16(3): 1834–1850.
8.
VenkatesanSLozanoAValenzuelaR. Network MIMO: overcoming intercell interference in indoor wireless systems. In: Proceedings of the 2007 conference record of the forty-first Asilomar conference on signals, systems and computers, Pacific Grove, CA, 4–7 November 2007, pp.83–87. New York: IEEE.
9.
IrmerRDrosteHMarschP, et al. Coordinated multipoint: concepts, performance, and field trial results. IEEE Commun Mag2011; 49(2): 102–111.
10.
YouXWangDShengB, et al. Cooperative distributed antenna systems for mobile communications [Coordinated and Distributed MIMO]. IEEE Wirel Commun2010; 17(3): 35–43.
11.
NayebiEAshikhminAMarzettaTL, et al. Cell-free massive MIMO systems. In: Proceedings of the 2015 49th Asilomar conference on signals, systems and computers, Pacific Grove, CA, 8–11 November2015, pp.695–699. New York: IEEE.
12.
ChienTVBjornsonELarssonEG. Joint power allocation and load balancing optimization for energy-efficient cell-free massive MIMO networks. IEEE Trans Wirel Commun2020; 19(10): 6798–6812.
13.
ChienTVNgoHQChatzinotasS, et al. Reconfigurable intelligent surface-assisted cell-free massive MIMO systems over spatially-correlated channels, https://arxiv.org/pdf/2104.08648.pdf
14.
WuYKhistiAXiaoC, et al. A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE J Select Areas Commun2018; 36(4): 679–695.
15.
Al-nahariA. Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers. IET Commun2016; 10(1): 50–56.
16.
JoseJAshikhminAMarzettaT, et al. Pilot contamination and precoding in multi-cell TDD systems. IEEE Trans Wirel Commun2011; 10(8): 2640–2651.
17.
Gutierrez-EstevezDM. Interference-aware flexible TDD design for massive MIMO 5G systems. In: Proceedings of the 2017 IEEE wireless communications and networking conference, San Francisco, CA, 19–22 March 2017. New York: IEEE.
18.
WuYSchoberRNgDWK, et al. Secure massive MIMO transmission with an active eavesdropper. IEEE Trans Inform Theor2016; 62(7): 3880–3900.
19.
LuXYangWGuanX, et al. DCE-based secure transmission for massive MIMO relay system against active eavesdropper. IEEE Trans Vehicul Technol2020; 69(11): 13045–13059.
20.
RawatDBNeupaneKSongM. A novel algorithm for secrecy rate analysis in massive MIMO system with target SINR requirements. In: Proceedings of the 2016 IEEE conference on computer communications workshops (INFOCOM WKSHPS), San Francisco, CA, 10–14 April 2016, pp.53–58. New York: IEEE.
21.
HoangTMNgoHQDuongTQ, et al. Cell-free massive MIMO networks: optimal power control against active eavesdropping. IEEE Trans Commun2018; 66(10): 4724–4737.
22.
ZhangXGuoDAnK, et al. Secrecy analysis and active pilot spoofing attack detection for multigroup multicasting cell-free massive MIMO systems. IEEE Access2019; 7: 57332–57340.
23.
TimilsinaSKudathanthirigeDAmarasuriyaG. Physical layer security in cell-free massive MIMO. In: Proceedings of the 2018 IEEE global communications conference, Abu Dhabi, United Arab Emirates, 9–13 December 2018, pp.1–7. New York: IEEE.
24.
AlageliMIkhlefAAlsifianyF, et al. Optimal downlink transmission for cell-free SWIPT massive MIMO systems with active eavesdropping. IEEE Trans Inform Foren Sec2020; 15: 1983–1998.
25.
ElhoushySIbrahimMHamoudaW. Exploiting RIS for limiting information leakage to active eavesdropper in cell-free massive MIMO. IEEE Wirel Commun Lett2021; 11: 443–447.
26.
ZhangXLiangTAnK. Secrecy performance analysis of cell-free massive MIMO in the presence of active eavesdropper with low resolution ADCs. Wirel Netw2021; 27: 4839–4852.
27.
ChenZBjoernsonE. Channel hardening and favorable propagation in cell-free massive MIMO with stochastic geometry. IEEE Trans Commun2018; 66(11): 5205–5219.
28.
BjoernsonEHoydisJSanguinettiL. Massive MIMO networks: spectral, energy, and hardware efficiency. Found Trends Sig Process2017; 11(3–4): 154–655.
29.
MarzettaTLLarssonEGYangH, et al. Fundamentals of massive MIMO. Cambridge: Cambridge University Press, 2016.
30.
ChenZBjoernsonE. Can we rely on channel hardening in cell-free massive MIMO. In: Proceedings of the 2017 IEEE Globecom workshops, Singapore City, Singapore, 4–8 December 2017, pp.1–6. New York: IEEE.
31.
VuTTNgoDTNgoHQ, et al. Full-duplex cell-free massive MIMO. In: Proceedings of the 2019 IEEE international conference on communications, Shanghai, China, 20–24 May 2019, pp.1–6. New York: IEEE.
32.
MaiTCQuoc NgoHDuongTQ. Cell-free massive MIMO systems with nulti-antenna users. In: Proceedings of the 2018 IEEE global conference on signal and information processing, Anaheim, CA, 26–29 November 2018, pp.828–832. New York: IEEE.
33.
BjoernsonEMatthaiouMDebbahM. Massive MIMO with non-ideal arbitrary arrays: hardware scaling laws and circuit-aware design. IEEE Trans Wirel Commun2015; 14(8): 4353–4368.
34.
QiuJXuKXiaX, et al. Downlink power optimization for cell-free massive MIMO over spatially correlated Rayleigh fading channels. IEEE Access2020; 8: 56214–56227.
35.
PhamQVLeLBChungSH, et al. Mobile edge computing with wireless backhaul: joint task offloading and resource allocation. IEEE Access2019; 7: 16444–16459.
36.
GaoZDaiLMiD, et al. MmWave massive-MIMO-based wireless backhaul for the 5G ultradense network. IEEE Trans Wirel Commun2015; 22(5): 13–21.