This article studies the physical layer security of massive multiple-input multiple-output system in time-division-duplex mode. Specifically, a single-cell downlink massive multiple-input multiple-output communication system is considered. The resulting achievable secrecy rate is investigated in the presence of passive or active eavesdroppers. The analytical results reveal that the massive multiple-input multiple-output system is naturally immune to passive eavesdroppers, but will be dramatically degraded by active attack. On account of the risk caused by active attack, a simple and effective detection algorithm is proposed. Uplink pilots with random phases are transmitted during the detection operation. By comparing the phase deviation change of the received pilot signals’ cross product, the active eavesdroppers can be detected exactly. The closed-form expressions for probabilities of detection, false alarm, and false rejection are obtained respectively, which can demonstrate the robust performance of the proposed detection scheme. To maximize the secrecy energy efficiency of the system, the optimal power allocation strategy is studied under total power constraints. This optimization problem is efficiently solved by fractional programming. Numerical simulation results are derived to validate the secrecy performance of the massive multiple-input multiple-output system, the active pilot attacker detection performance, and the energy efficiency optimization effect.
The fifth-generation (5G) wireless network is expected to support a significantly large amount of mobile data capacity and achieve better quality of service (QoS) in terms of communication rate, delay, reliability, and security.1,2 Among the emerging technologies, massive multiple-input multiple-output (MIMO) as one of the most potential promising technologies has attracted much attention and has been well assessed through theoretical analysis and laboratory tests.3,4 Massive MIMO is a special MIMO technology where base station (BS) is equipped with large number of antennas, typically tens or hundreds. Combining with a time-division-duplex (TDD)-based transmission can help resolve many of the issues gaining channel state information.5,6 In TDD mode, massive MIMO systems could exploit the reciprocity to process the channel estimation on the uplink. In particular, the BS exploits law of large numbers like certainties as it serves each one over a combination of a large number of independent transmission channels. Large arrays can eliminate the noise and interference with simple signal processing, such as basic linear combination operations.7,8 So the multiplexing gain can be fully used to maximize the channel capacity. The advantages of massive MIMO include higher data rate, better reliability, and less noise and interference. Another advantage of massive MIMO is the potential of physical layer security as the huge degrees of freedom, especially against the passive eavesdroppers.9
The open broadcast nature of wireless medium results in information leakage to some unintended receivers. Physical layer security is promoted to achieve secure transmission by exploiting the inherent uncertainties and independent of wireless channels, noise, fading, and interference.10,11 And this security is achieved through information theory security rather than traditional encryption and decryption. Accordingly, physical layer security has the potential to push the secrecy performance toward a brand new level with its theoretically uncompromisable security guarantee.
Research on physical layer security in conventional MIMO system has obtained abundant results.12–14 As a promising candidate technology for meeting the upcoming 5G era, academia and industry has paid extensive attention to massive MIMO communication recently. However, the existing literature on the combination of physical layer security and massive MIMO is not sufficient. In the studies by Zhu et al.15 and Wu et al.,16 reliable secure downlink transmission in multi-cell multi-user massive MIMO systems with maximum ration transmission (MRT) precoding and artificial noise generation at BS was investigated in detail. A single-cell massive MIMO communication in the presence of an adversary capable of jamming and eavesdropping also have attracted attention of some researchers.9,17 These works show that massive MIMO is naturally resilient to passive eavesdroppers, but harmed by training-phase jamming. In addition, large antenna arrays can achieve excellent directional gain, so excellent beamforming design can be exploited to enhance the security performance.18,19 Moreover, Relaying is a potential technique to improve legitimate channel capacity and reduce the undesirable information leakage, so it can be introduced into massive MIMO system to improve the secrecy performance.20,21 Also few works focus some other special systems with massive MIMO, such as Internet of Things (IoT)22 and Device-to-Device (D2D).23 Additionally, the very large freedom of the massive MIMO system can generate extremely long secret encryption keys. Some secret keys generation methods have been proposed for massive MIMO system.24,25
According to some existing related studies,9,17 massive MIMO has potentiality of physical layer security against passive eavesdropping attacks. So smart eavesdroppers should switch from a passive mode to an active mode by pretending to be an intended user and transmitting pilot sequences of its own. The impact of this pilot contamination attack is that it will reduce the accuracy of BS’s channel estimation, which will infect the precoding filter design at transmitter to implicitly beamform toward active eavesdropper, leading to information leakage.26 So it is crucial to detect the active eavesdropper for the secure communication. Some simple detection strategy can be used during the training phase. For instance, BS can detect the active attacker by some slowly changing parameters, such as signal power, large-scale fading, or certain statistics.9 As the large-scale fading and noise power changes slowly at a long period, the received power will converge to some fixed value. If an active attacker exists, the received power will increase, so the active attacker can be detected.17 Unfortunately, the eavesdropper can adapt its transmitted power over several coherence intervals and emulate the natural change of the channel propagation environment. Through these operations, the eavesdroppers cannot be detected. Besides, when the eavesdroppers are absent, the covariance matrix of the received pilot signal converges to a rank-one matrix. Otherwise, the matrix will converge to a full rank matrix with a large probability when some eavesdroppers are present. So the eavesdropper can be detected by comparing the largest and second eigenvalues of the covariance matrix. This scheme can provide significant performance, but it needs some more observations and also needs a good estimation of the noise power. As we know, the inner product of the different received signals would converge to a fixed phase value if the pilots adopted phase-shift keying (PSK) signals.27 If any eavesdropper is present, this inner product value will converge to a different phase at a large probability. This scheme is easy, but the false alarm probability depends on the PSK constellation scale. Only when the size is very large, the detection probability can be close to 1. This scheme is hard for the actual system due to its low energy efficiency and high symbol error rate. In the study by Hou et al.,28 some random orthogonal pilot signals were used to operate the detection, and this scheme was robust even without any prior channel knowledge. However, these pilots should be designed carefully, which improves the complexity of the system.
Energy efficiency is a crucial design objective to reduce operating costs for mobile operators.4 The development of massive antennas array can achieve diversity gain with some simple beamforming techniques, such as maximum ratio transmission (MRT), zero forcing (ZF), and minimum mean square error (MMSE). Meanwhile, massive MIMO technology can provide high energy efficiency which is suitable for the future wireless communication network. Ngo et al.7 analyzed potential of energy efficiency of the massive MIMO in detail. In secure communication system, due to the simultaneous impact of legitimate users’ and eavesdroppers’ signal quality, transmit power has a bidirectional effect on the secrecy performance. Hence, power allocation scheme is significant for enhancing wireless security. Power allocation between desired signal and artificial noise is investigated by maximizing a lower bound on the achievable secrecy rate.29 In the study by Chen et al.,30 a joint optimization of source and amplify-and-forward (AF) relay power allocation scheme had been proposed to maximize the secrecy energy efficiency (SEE). And the optimal source and decode-and-forward (DF) massive array relay power allocation was analyzed in the study by Chen et al.31 Moreover, the optimal energy efficient power allocation for secure communication in massive MIMO had also been studied.32 These analysis methods and mathematical tools also can be used to analyze the SEE of the system in this article.
Active attacker detection and power allocation are all crucial factors that affect physical layer security performance in massive MIMO system. To the best of our knowledge, overall there is limited attention to these problems in existing works.33 In this article, we consider all these issues and give some valuable formulas, data, and conclusions. The contributions of this article are as follows:
The secrecy capacity analysis for the basic three-node massive MIMO model is provided. It reveals that the massive MIMO is robust against the passive eavesdroppers and harmed by active pilot attack. Also the nonnegative secrecy capacity condition is obtained. Results suggest that the secrecy capacity increases with the number of antennas. Moreover, the limit of the secure rate has been obtained as antenna number increase toward infinity.
A new active eavesdropping detection scheme based on pilots with random phases is proposed at training phase. The scheme only needs uplink pilots with random phases. If an active eavesdropper are present, the phase of the received signals’ cross product will converge to a fixed value. So the detection can be operated by comparing the cross product’s phase to some threshold. System overhead will be very small. Then, the probabilities of detection, false alarm, and false rejection are analyzed respectively.
To maximize the SEE under some constraints, the optimal source power allocation scheme is studied in this article. The fractional programming and Lagrange multiplier method are adopted to solve the fractional programming problem. And the optimal value can be easily gained by limited iterations.
The remainder of this article is organized as follows. The system model and the secrecy performance are described in section “System model.” The proposed active attacker detection algorithm is presented in detail in section “Detection for active eavesdropper.” In section “SEE analysis,” the energy-efficient power allocation scheme is analyzed. In section “Numerical results,” the numerical and simulation results are presented to validate the effectiveness of the schemes in the article. Finally, section “Conclusion” draws the concluding remarks.
Notations: Bold face letters denote matrices and vectors, for example, , . And , , , and denote complex conjugate, transpose, Hermitian-transpose, and Euclidean norm of the vector, respectively. and represent the expectation and variance of variable . The notation stands for a circularly symmetric complex Gaussian random vector with mean and covariance . In addition, i.i.d indicates the abbreviation of independent and identically distributed. denotes the phase of the complex variable .
System model
We consider a typical three-node transmission system, consisting a legitimate transmitter (Alice), an intended receiver (Bob), an eavesdropper (Eve). The TDD massive MIMO system is considered, in which channel reciprocity holds perfectly in data block (one slot at least). As depicted in Figure 1, Alice is a massive antenna BS equipped with antennas where the value of is always over tens or hundreds, . In addition, Eve usually is a legitimate node or pretends to be a normal destination in the local cell, so we can assume that Eve is equipped with only one antenna as same as Bob, that is, . The wireless channels between the three terminals experience large-scale path loss as well as small-scale fading. In general, the large-scale fading coefficients change very slowly over time, which can be assumed invariant in a large period (one data block at least). The channels from Alice to Bob and from Alice to Eve are given as , , where , stand for the large-scale path fading including path loss and shadowing. and are the small-scale fading vectors, and each element of the two vectors is independent and identically distributed (i.i.d) complex Gaussian random variables with zero mean and unit variance.
The system model, one base station with massive antennas (Alice), one single antenna receiver (Bob), and one single antenna eavesdropper (Eve).
Channel estimation and precoding
The goal of the system is to provide reliable communication between Alice and Bob. Due to TDD model, it is effective for transmitter Alice to focus on the user Bob by precoding or beamforming design. That design requires the knowledge of to be obtained at Alice but mostly unknown to Eve. As the uplink and downlink channels are reciprocal, . This process can be realized using uplink training, that Bob send pilot signals to allow the channel estimation at Alice. We assume the channel fading gains are constant during one data transmission block and change to some independent values in the other blocks. So before data transmission, the uplink training is operated in advance.
During this training phase, Bob sends the pilot sequence of length to Alice, where . In addition, Eve may also send pilots to Alice for active attacking. In this article, we consider the worst case that the pilots sent by Bob and Eve are all same and perfectly synchronous. Now Alice’s received training signals, , can be expressed as
where , denote the training power at Bob and the pilot attack power at Eve, is the additive Gaussian noise matrix with zero mean, variance , . If Eve is passive, . In addition, assuming Alice knows Bob’s training power and the received noise power , the linear minimum mean-square error (LMMSE) method15 is applied to estimate the channel , which can be given by
We note that parameter is required for this LMMSE channel estimation. This value can be obtained by the mean power of the received signals, that is, , where is the arbitrary element of the matrix . In addition, training power of Eve also can be calculated by this formula if BS can determine the presence of an eavesdropper.
Then Alice treats the estimated channel as the true parameters to design the precoding vector . Since maximum ratio transmission (MRT) can achieve asymptotically optimal performance in massive MIMO system with low complexity,17,20 we utilize this simplest linear precoding scheme in this article, that is
where denotes the precoding vector. Thus, the received signals at Bob and Eve can be given by
where , represent the normalized additive white Gaussian noises at Bob and Eve respectively. is the transmit effective power of Alice.
Secrecy performance analysis
Accordingly, the instantaneous signal-to-noise ratio (SNR) at Bob is given by
Similarly, the SNR at Eve can be expressed as
In the massive MIMO system, the antenna arrays’ distance and the distance between Bob and Eve are typically longer than the half of the wave length , so that the channel responses and are less correlated. Larger antenna spacing and a sufficiently complex propagation environment will provide independent and identically (i.i.d) channel vectors, which are satisfied for Rayleigh fading channels. This channel model has been considered in the vast majority of works on massive MIMO.3–9,15–17,30–33 Recent channel measurement campaigns have testified that massive MIMO systems have characteristics that approximate the above assumption fairly well.2,6 We know that the antenna number of Alice is very large, . Then, according to the law of large numbers,7,30 we can obtain that
as , where represents the almost sure convergence.
In addition, according to the Lindeberg-Levy central limit theorem, we get this
where the denotes convergence in distribution.
Using the above conclusions, we can simplify the as equation (10)
Similar to Bob, average SNR at Eve is given by
As a result, the achievable secrecy rate is formulated as
where , as the secrecy rate is a nonnegative quantity. For simplicity, we set .
We can observe that if Eve is passive, , the system secrecy rate is almost equal with the Bob’s received information rate. If Eve is active, when , the achievable secrecy rate is zero. So only at the condition , the Bob can get the secrecy rate under the pilot attack.
The first-order derivative of with respect to can be calculated as (consider the as an continuous variable)
From equation (13), it can be derived easily that , when the Bob has nonzero secrecy rate, . Then, as increases, the secrecy capacity also increases.17
Meanwhile, we can get the upper limiting secrecy capacity when BS antennas number reach infinity
Detection for active eavesdropper
From the above analysis, we can understand that if Eve attempt to eavesdrop the useful message in massive MIMO system, a more effective strategy is to actively contaminate the pilot training phase. For fixed training scheme and most practical applications, as the cellular communication, the pilot set is public and used repeatedly. The eavesdroppers can easily survey and imitate the pilot signals. And once if Eve emits the same pilots as Bob, then the uplink channel estimation is correlated with . And it will change the direction of beamforming to Eve, so Eve can intercept signaling exchange between Alice and Bob. The consequence of this active attack is that the promising secrecy benefits of massive MIMO are lost if the attacker cannot be detected. Even worse, if Eve’s training power is higher, it will dominate the uplink channel estimation and the secrecy capacity will become zero.
As described previously, detection of an active attacker is crucial for secure communication in massive MIMO system. Since the channel vectors , are uncorrelated, the imperfect estimated channel would not result in decoding errors and packet loss. So the conventional pilot contamination detection, as packet reception, decoding error rate, does not apply successfully in massive MIMO system. As we know, if the active pilot attack cannot be detected effectively and timely at the training phase, it will be detrimental for the secure data transmission. Hence, attacking detection should be operated in the uplink training phase.
The large-scale fading changes very slowly at a long period, while the small-scale fading changes rapidly. The antenna number is very large, so the statistics of Alice’s received vector will converge to some fixed numerical value. In this section, we utilize phase of some statistics to detect the existence of active eavesdroppers.
In the detection scheme, Bob sends the normal uplink pilot signals to BS (Alice) in the training phase, but delivers some changed pilots with a known random phase symbol occasionally when BS tries to detect presence of active eavesdroppers. We assume two training slots are used for detection. denotes the normal pilot and represents the Bob’s detection pilot with random known phase. Meanwhile, the statistical characteristics of should be the same as the normal pilots to prevent Eve from being conscious of the detection. It is given that , . And the received signal at Alice is represented as
where the superscripts 1 and 2 represent different pilot moments.
Then, we can derive a statistical quantity (scaled cross product of the received vectors , ), .
The scalar product can also be denoted as equation (16)
Meanwhile, according to the central limit theorem, we can get that
where the variance can be given by
Furthermore, we can easily get that
When is extremely large, will be almost close to zero
From equations (16), (18), and (21), we know that the variance of is very small, even it can be treated as a constant. This feature makes suitable to be used for some judgment
Now we set that
To summarize, the procedure of the detection algorithm is as follows:
Bob send the pilots , with random phase at two different time slots;
Compute the cross product ;
Compare the phase to phase , obtain the phase difference ;
According to the phase difference, we can make a judgment. If , we predicate that the active eavesdropper exist. Else if , the result of the judgment is that there is no active attacker at training phase. Where the phase is the judgment threshold that we set before, .
From the above analysis, we can realize that approximately obeys the Gauss distribution, and the mean and variance can be given as
Without loss of generality, we can assume to simplify the analysis.
Detection algorithm depends on whether the scalar product is outside or inside the detection regions, as Figure 2. Following this, we can analyze the probabilities of false alarm and false rejection, respectively.
Illustration of the detection for active pilot attacker.
Under the hypothesis that there is no active eavesdropper in the cell, the product is a random variable obeying the Gauss distribution with mean and variance . Hence, BS can operate a simple hypothesis test from which it infers the active eavesdropper’s presence. Therefore, the threshold determines how large the pilot power of Eve that can be undetected. Statistic can be denoted as the sum of the mean and the error components, that is, , which also can be represented by vector graph as Figure 2. In the case of no active Eve present, and denote and . Only the amplitude of the noise component exceeds value and phase lies in and , a false alarm occurs. Angle is the threshold phase. In addition, the phase obeys uniform distribution. For fixed noise power , the false alarm probability is that . In order to obtain insightful results, we can derive a closed-form upper bound for the false alarm probability as equation (25), where the function is Gauss probability density function and is Q function
Moreover, if is large enough, goes to zero as , and the phase difference would also be quite small. Thus, for the massive MIMO system, the false alarm probability will be very small, and even need not consider the noise effects.
The detection probability and false rejection probability can also be analyzed using vector graph, as depicted in Figure 2. If Eve’s effective energy is not larger than the radius of the small circle, , the active attack cannot be detected at all. Besides, when lies between the two dashed lines and (two tangent lines of the small circle), Eve also cannot be detected. Otherwise, if lies outside of the region between lines and , the eavesdropper can be successfully detected.
Based on above description and discussion, we can easily obtain the probability of false rejection, which is given by
As the above analysis, we can easily derive the detection probability, that is, .
From these expressions, we can get the following conclusions:
The threshold phase is a key parameter for the detection performance, the probability of false alarm will decrease when increases. Otherwise, the probability of false rejection will increase. So we should choose an appropriate parameter.
Only when the antenna number is extremely large, we can ignore the influence of noise and obtain the detection performance. So this detection is naturally suitable for the massive MIMO system.
Eve’s effective power is another determining factor. With increasing, the detection probability will be improved rapidly.
In addition, if the probability of false rejection cannot exceed a certain proportion , that is, . Hence, we can further deduce that the Bob’s pilot signal effective power needs to meet the following condition
Evidently, the above results provide valuable reference for the pilot signal design of massive MIMO.
SEE analysis
The development of massive number of antennas can significantly enhance the spectral and energy efficiency of the future wireless network.3–7 We provide performance analysis of the secure massive MIMO system in previous section. The results suggest that powers of Alice and Bob are interrelated under a total power limit, and both of them have a major influence on the secrecy performance. So an optimal power allocation scheme is preferred. In this section, the SEE is considered, which is defined as sum secrecy rate divided by transmit power.
As a matter of fact, we derive the spectral efficiency capacity (bits/s/Hz) in section “System model,” as we have not considered the width of the system. Without loss of generality, we can replace the secrecy rate with the spectral efficiency capacity to calculate the SEE (bits/J/Hz).
In the first place, total power consumption of the system should be investigated prior to analysis. According to some existing related literatures,30,32 we can model the total energy consumption as a sum of some components, which can be given by
where represents total power consumption, and indicate the effective power of Alice and Bob, respectively; the factors and denote the power amplifiers efficiency of Alice and Bob. Apparently, we know that . Without loss of generality, we assume . In addition, is the total circuit power consumption in the transmission system, which can be regarded as a constant.
The SEE can be expressed as
Recalling equations (12), (28), and (29), both powers of Alice and Bob have a great impact on SEE. In this article, we only focus on maximizing SEE in the scenario where the total power is constrained, which can be formulated as
where is the minimum secrecy outage capacity which satisfy the requirement of the secure communication and is the maximum power of the communication system (total power limit). Since the objective function is a fractional form, the problem is non-convex.
According to some previous related works,30,32 problem can be equivalently transformed into a parameterized polynomial subtractive form. Then, the objective function is equivalent to , where is the maximum SEE, namely . In the actual system setting, Bob’s power can be designed related to the false detection probability, Eve’s effective power, channel estimation quality. Thus, we can transform the jointly convex optimization problem to a sub-problem which is to optimize the Alice’s power for a given Bob’s power . Thus, the optimization problem can be transformed to
This optimization problem has one property that the function is a concave function with respect to the transmit power at the feasible set.
Proof
Intuitively, since is affine, function has the same concavity as . So we can focus on the concavity of with respect to . The secrecy capacity can be denoted by
We define a new function , which can be transformed as
Since these parameters satisfy that , , , and (Bob has nonzero secrecy rate), it is clearly seen that function has the same convexity as . Therefore, is a concave function and , . Based on this, we can derive that
Thus, is a concave function, which finish the proof.
As proved before, the objective function is concave with the feasible set of . Hence, is a convex optimization problem. Thus, we can easily derive the optimal power allocation utilizing the standard convex algorithms.
Similar to previous works,32 we can use the Lagrange multipliers algorithm to resolve this problem. The objective function can be replaced with
where the Lagrange multipliers , associated with the constraints.
Meanwhile, the dual optimization problem is represented by
The optimal power for some fixed and can be obtained by solving the Karush–Kuhn–Tucker (KKT) condition, that is
Then, the optimal solution can be denoted by
where parameters are given by .
Then, SEE can be obtained by . The gradient method can be used to update the Lagrange multipliers, which are given by
where , are update step sizes, are fixed values, and is the iteration index.
We need repeated computing of the optimal solution and until has converged , where is the threshold value (precision). Then, can be regarded the optimal energy-efficient transmit power.
Numerical results
To examine and evaluate the accuracy and effectiveness of the results in our massive MIMO secure system, Monte Carlo simulations are operated in this section. In all simulations, we set the noise power is , and the power of the three terminals are all effective SNR in fact, the large-scale fading factor .
First, we show the secure capacity of the massive MIMO system with the increasing of the Alice’s antenna number , as Figure 3. Here, we set , , where the simulation is operated at . Also we can get the secure capacity at with unlimited antenna number , depicted in Figure 3. Given fixed , , we can see that the secrecy capacity improves with the increase in , approaching the limitation value (the three horizontal lines in Figure 3). In addition, when Bob has much more training power than Eve, system will achieve an excellent performance (obtain more secrecy rate). Simulation results confirm our analysis before.
Achievable secrecy rate against antenna number and the limitation of when , with passive Eve and active Eve .
To evaluate our new active pilot attack detection algorithm, we simulate the detection probability, the false alarm probability, and false rejection probability. A high probability of false alarm bring pointless communication pause event. Additional false rejection will impair the communication quality severely. As we know, parameter is the decisive factor of the detection performance. Without loss of generality, we also set for the sake of simplicity. Figure 4 shows the detection probability and false rejection probability of our detection scheme versus with , the judgment thresholds . As expected, the false rejection probability decreases sharply with , while the detection probability increases. And from the diagram we can also find that if exceeds –4 dB, detection probability will be improved above 98%, also these features can be demonstrated in Figure 5, which displays the detection probabilities versus parameter at . The results shown in Figure 5 can also prove the correctness of obtained probability expressions. Emulating a passive Eve , Figure 6 displays the correct decision probability and false alarm probability versus massive antennas number . As increases, the effect of noise diminishesand the false alarm probability will decrease gradually. These also confirm the analytical results and our reasonable inferences at above-mentioned section. As expected from the discussions, Figures 4 and 6 reveal that threshold phase has an important influence on the detection performance. We can observe that false rejection probability is an increasing function of , whereas false alarm probability is decreasing in .
Detection probability and false rejection probability versus parameter , when Eve is active.
Detection probability versus the parameter , when .
Correct decision probability and false alarm probability versus antennas number , when Eve is passive and .
Finally, some simulation results are presented to verify effectiveness of the energy-efficient power allocation scheme. Parameters are set to , , , , , , and . Moreover, initial value and threshold are set to and . The power optimization algorithm converges after 22 iterations. As seen in Figure 7, SEE is increasing as Alice power at lower power level. But when the power increases higher, the energy efficiency decreases rapidly. The reason is that the secrecy capacity increases logarithmically versus the power level. From the energy efficiency ergodic curve, we can easily observe that function is convex, which is in the agreement with previous analysis. Therefore, the optimal energy-efficient power allocation scheme can be obtained in theory.
Illustration of the energy efficiency optimization iterative process and the energy efficiency curve versus Alice’s power .
Conclusion
In this article, we investigate the secure downlink transmission in massive MIMO system. For the considered system model, we provide the secrecy capacity analysis in closed form. From the analysis results, we know that massive MIMO is robust against passive eavesdroppers, but will be damaged by active pilot attack. Detection of the active attack is important for secure communication. A new detection scheme is presented. The legitimate receiver sends uplink pilots with random phases, then the detection can be operated comparing phase deviation change of the received pilot signals cross product. To maximize the SEE, an optimization scheme of power allocation is presented in detail. Simulation results validate the secrecy performance, effect of the detection scheme, and SEE of this massive MIMO system.
Footnotes
The authors would like to thank all anonymous reviewers for valuable and helpful comments and suggestions,which largely improve and clarify this paper.
Handling Editor: Miguel A Zamora
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research,authorship,and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research,authorship,and/or publication of this article: This work was supported by the Jiangsu Provincial Natural Science Foundation of China (No. BK20141069).
ORCID iD
Kefeng Guo
References
1.
HossainERastiMTabassumHet al. Evolution towards 5G multi-tier cellular wireless networks: an interference management perspective. IEEE Wirel Commun2014; 21(3): 118–127.
2.
OsseiranABoccardiFBraunVet al. Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun Mag2014; 52(5): 26–35.
3.
MarzettaTL. Massive MIMO: an introduction. Bell Labs Tech J2015; 20: 11–22.
4.
BogaleTELeL. Massive MIMO and mmWave for 5G wireless HetNet potential benefits and challenges. IEEE T Veh Technol2016; 11(1): 64–75.
5.
DaiKZhuC. Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE T Wirel Commun2010; 9(11): 3590–3600.
6.
BjornsonELarssonEGMarzettaTL. Massive MIMO: ten myths and one critical question. IEEE Commun Mag2016; 54(2): 114–123.
7.
NgoHQLarssonEGMarzettaTL. Energy and spectral efficiency of very large multiuser MIMO systems. IEEE T Commun2013; 61(4): 1436–1449.
8.
RusekFPerssonDLauBKet al. Scaling up MIMO: opportunities and challenges with very large arrays. IEEE Signal Proc Mag2013; 30(1): 40–60.
9.
KapetanovicDZZhengGRusekF. Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun Mag2015; 53(6): 21–27.
YenerAUlukusS. Wireless physical-layer security: lessons learned from information theory. P IEEE2015; 103(10): 1814–1825.
12.
HongYWPLanPKuoCCJ. Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Proc Mag2013; 30(5): 29–40.
13.
ShlezingerNZahaviDMurinYet al. The secrecy capacity of Gaussian MIMO channels with finite memory. IEEE T Inform Theory2017; 63(3): 1874–1897.
14.
KhistiAWornellGW. Secure transmission with multiple antennas—part II: the MIMOME wiretap channel. IEEE T Inform Theory2010; 56(11): 5515–5532.
15.
ZhuJSchoberRBhargavaVK. Secure transmission in multicell massive MIMO systems. IEEE T Wirel Commun2014; 13(9): 4766–4781.
16.
WuYSchoberRNgDWKet al. Secure massive MIMO transmission with an active eavesdropper. IEEE T Inform Theory2016; 62(7): 3880–3900.
17.
Al-NahariA.Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers. IET Commun2016; 10(1): 50–56.
18.
LiuCMalaneyR. Location-based beamforming and physical layer security in Rician wiretap channels. IEEE T Wirel Commun2016; 15(11): 7847–7857.
19.
YaacoubEAl-HusseiniM. Achieving physical layer security with massive MIMO beamforming. In: Proceedings of the 2017 11th European conference on antennas and propagation (EUCAP), Paris, 19–24 March 2017, pp.1753–1757. New York: IEEE.
20.
ChenXChenJLiuT. Secure transmission in wireless powered massive MIMO relaying systems: performance analysis and optimization. IEEE T Veh Technol2016; 65(10): 8025–8035.
21.
ChenJChenXGerstackerW. Optimal power allocation for a massive MIMO relay aided secure communication. In: Proceedings of the 2015 IEEE global communications conference (GLOBECOM), San Diego, CA, 6–10 December 2015, pp.1–5. New York: IEEE.
22.
ChenBZhuCShuLet al. Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper. IEEE Access2016; 4: 5374–5384.
23.
HeAWangLChenYet al. Spectral and energy efficiency of uplink D2D underlaid massive MIMO cellular networks. IEEE T Commun2017; 65(9): 3780–3793.
24.
DeanTGoldsmithA. Physical-layer cryptography through massive MIMO. IEEE T Inform Theory2017; 63(8): 5419–5436.
25.
YaacoubE. On secret key generation with massive MIMO antennas using time-frequency-space dimensions. In: Proceedings of the IEEE Middle East conference on antennas and propagation (MECAP), Beirut, 20–22 September 2016, pp.1–4. New York: IEEE.
26.
ZhouXMahamBHjorungnesA. Pilot contamination for active eavesdropping. IEEE T Wirel Commun2012; 11(3): 903–907.
27.
KapetanovicDZhengGWongKet al. Detection of pilot contamination attack using random training and massive MIMO. In: Proceedings of the IEEE personal, indoor and mobile radio communications (PIMRC), London, 8–11 September 2013, pp.13–18. New York: IEEE.
28.
HouXGaoCZhuYet al. Detection of active attacks based on random orthogonal pilots. In: Proceedings of the 2016 8th international conference on wireless communications and signal process (WCSP), Yangzhou, China, 13–15 October 2016, pp.1–4. New York: IEEE.
29.
TsaiSHPoorHV. Power allocation for artificial-noise secure MIMO precoding system. IEEE T Signal Pr2014; 62(13): 3479–3493.
30.
ChenJChenXLiuTet al. Toward green and secure communications over massive MIMO relay networks: joint source and relay power allocation. IEEE Access2017; 5: 869–880.
31.
ChenJChenXGerstackerWHet al. Resource allocation for a massive MIMO relay aided secure communication. IEEE T Inf Foren Sec2016; 11(8): 1700–1711.
32.
LiBLiLHeDet al. Energy-efficient secure transmission in massive MIMO systems with pilot attack. In: Proceedings of the 2016 8th international conference on wireless communications and signal process (WCSP), Yangzhou, China, 13–15 October 2016, pp.1–5. New York: IEEE.
33.
BasciftciYOKoksalCEAshikhminA. Securing massive MIMO at the physical layer. In: Proceedings of the 2015 IEEE conference on communications and network security (CNS), Florence, 28–30 September 2015, pp.272–280. New York: IEEE.