To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system. This article investigates the secure downlink massive multiple-input multiple-output data transmission with artificial noise at base station in the presence of a multi-antenna passive eavesdropper. The achievable user’s ergodic information rate and ergodic capacity of the eavesdropper are analyzed in detail, respectively. With maximum ratio transmission or maximum ratio combining, we derive closed-form expressions for a tight lower bound on ergodic secrecy rate and tight upper bound for secrecy outage probability. Based on these analytical expressions, the effects of various system parameters on secrecy performance, such as power allocation factor, number of eavesdropper’s antennas, number of the user terminals, total transmission power, and finite resolution analog beamforming parameters, are investigated in detail. Also, the optimal power allocation scheme between data and artificial noise signals is achieved in closed form to maximize the ergodic secrecy rate. In addition, we derive the conditions that the secure massive multiple-input multiple-output system need to meet to obtain a positive secrecy rate. Finally, numerical simulation results validate the system’s secrecy performance and verify all the theoretical analytical results.
Massive multiple-input multiple-output (MIMO) using a few hundred or more antennas for multiuser service is an attractive emerging technology for 5G,1,2 which enables extremely high spectral efficiency and energy efficiency.3,4 Because of this distinctive feature, massive MIMO can reduce the burden of user terminals (UTs), that is, low hardware cost, limited power, and low storage capacity, which can boost the promotion of the forthcoming green communications and future networks, along with Internet-of-Things (IoT) and wireless sensor network (WSN).5,6 Moreover, to obtain the array gain, each antenna needs a complete radio-frequency (RF) chain.7,8 In fact, the large number of antenna elements will bring an extremely high hardware cost in massive MIMO systems. Hence, some new architectures for massive MIMO with low-complexity RF hardware and small number of RF chains should be studied to tackle these issues.
By certain iterative algorithms, phase-only precoding can obtain full diversity gain and near-optimal beamforming performance.7,9 In Liang et al.’s10 article, the RF phase-only analog precoder was designed by extracting the phases of the conjugate transpose of the transmission channel in massive MIMO system. In addition, using the finite resolution analog beamforming (FRAB) can effectively reduce hardware cost.11 FRAB is cost-effectively applied to high-dimensional antenna array implementing some variable phase shifters with current circuitry technology, which only modifies signals’ phases and does not change amplitudes as digital beamforming. Finite-precision analog-to-digital conversion (ADC) and quantized phase (QP) control have been taken into account in previous works.8,12 And the finite resolution constraint is meaningful due to the fact that a practical circuit is finite. A new combining architecture for massive MIMO receivers was proposed consisting of RF antenna switches and finite constant phase shifters in Alkhateeb et al.11 and Zhu et al.12 This phase-only combining architecture can reduce the number of required RF chains and power consumption. Ding et al.13 utilized non-orthogonal multiple access (NOMA) to mitigate the reduced degrees of freedom brought by FRAB, which can obtain the diversity gain to shed light on the loss caused by FRAB.
Security takes an increasingly critical role in wireless communication. Physical layer security is an essentially information-theoretic security.14 Secure communication in MIMO systems has been studied extensively and has obtained fruitful research results.15,16 Lin et al.17 studied the impact of quantized channel direction information (CDI) on the achievable secrecy rate with artificial noise (AN) generation, which shows that system’s achievable secrecy rate will has a significant loss under quantized CDI. Also, the article derives a scaling law between feedback bits and transmission power to maintain a constant secrecy rate loss. For large multiple-input single-output (MISO) broadcast channels, Geraci et al.18 obtained a deterministic approximation for the achievable secrecy sum rate as the number of transmit antennas and the number of users K grow to infinity but with a fixed ratio . Based on these results, this article provides an optimal regularized channel inversion (RCI) precoding scheme for this large MISO system. Using large system analysis and AN generation, Li et al.19 derived a closed-form expression for the ergodic secrecy sum rate in large multiuser downlink secure communication system with a passive eavesdropper. Meanwhile, the article studies the optimal power allocation between information signals and the AN. There is a common perspective that massive MIMO is merely an extensive of MIMO and all the ways are propitious to the security of massive MIMO system. In fact, massive MIMO has unique qualities, and we cannot address many standard approaches directly.20,21 A large number of antennas will average the interference, channel estimation errors, and hardware impairments.4,5 These random impairments will vanish when the number of antennas grows extremely large, leaving pilot contamination only to limit the secure performance. Unperfect channel state information (CSI) may be a major threat to the security in massive MIMO systems. Therefore, physical layer security of massive MIMO provides a new research avenue, which needs a separate treatment of its own.
The existing literatures about combination of physical layer security and massive MIMO are not sufficient. Kapetanovic et al.21 studied the physical-layer security of downlink massive MIMO communication in detail, which revealed that massive MIMO system was naturally immune to passive eavesdropping, but harmed by training-phase jamming. Some works have presented many insightful researches on passive eavesdropping attacks and active attacks on training phase of massive MIMO system.22–24 A single-cell massive MIMO system in the presence of an adversary capable of jamming and eavesdropping has been presented in Wu et al.22 Al-nahari23 and Zhang et al.24 achieved the closed-form achievable secrecy rate for passive and active attacking, which also provided active attacking detection schemes, as realizing the presence of active eavesdropper is crucial to the system’s security. Secure transmission in multi-cell multiuser massive MIMO systems with maximum ratio transmission (MRT) or zero forcing (ZF) precoding and AN generation has been investigated by Zhu et al.25–27 Large antenna array can get excellent directional gain, so beamforming can be exploited to enhance the security performance.28,29 In IoT scenario, secure uplink and downlink transmissions for massive MIMO system in the presence of a massive MIMO eavesdropper have been studied in Chen et al.30,31 Due to the excessive components of massive MIMO system, using cheap and power-efficient hardware is desirable to reduce the overall capital expenditures. The secrecy performance of massive MIMO system with non-ideal hardware has received much attention by some researchers and obtained some research productions.32,33 However, there are no sufficient considerations of how the FRAB affects system security, and how to improve security under some practical constraints in massive MIMO systems.
Motivated by the aforementioned description, to reduce hardware cost, this article focuses on the physical layer security in massive MIMO exploiting FRAB and AN. To the best of our knowledge, this problem is still an open topic. The contributions of this article are summarized as follows:
The achievable ergodic information rate and eavesdropper’s ergodic capacity are analyzed in detail. Under some assumptions, closed-form expressions of one tight lower bound on the ergodic secrecy rate and a tight upper bound for the secrecy outage probability are derived in this article.
Based on the achieved ergodic secrecy rate, we derive closed-form expression of the optimal power allocation schemes for the data signals and the AN signals. Meanwhile, the design scheme of the reliable secure massive MIMO system is revealed to achieve positive secrecy rate.
The impacts of various system parameters on the ergodic secrecy rate are investigated in detail, such as power allocation factor, number of eavesdropper’s antennas, number of the UTs, total transmission power, and FRAB parameters. The results of these analyses can provide significant insight for secure massive MIMO system design.
The remainder of this article is organized as follows. Section “System model” describes the system model and also introduces the scheme of the downlink data transmission and the architecture of the FRAB. In section “Secrecy performance analysis,” we obtain the UT’s achievable ergodic information rate and eavesdropper’s capacity in detail. Also, we provide a tight lower bound for ergodic secrecy rate and a tight upper bound on secrecy outage probability in closed form. In section “Impact of various parameters on secrecy performance,” we give the details of the impacts by various system parameters on the ergodic secrecy rate, which can provide meaningful insight for secure massive MIMO system design. The numerical and simulation results are presented in section “Numerical results.” Finally, we provide the concluding remarks in section “Conclusion.”
Notations
Bold-face letters denote vectors, for example, . And , , , and denote complex conjugate, transpose, Hermitian transpose, and Euclidean norm of the vector , respectively. j represents the imaginary unit, that is, . and denote expectation and variance. The notation stands for a circularly symmetric complex Gaussian random vector x with mean m and covariance matrix A. represents dimensional space with complex-valued elements. denotes the lower bound of statistic R. In addition, i.i.d indicates the abbreviation of independent and identically distributed. Finally, .
System model
In this article, we consider a typical massive MIMO cellular communication system, where base station (BS) equipped with a massive antenna array (antenna number ) serves K single-antenna UTs. Specifically, downlink data transmission is considered in this article. The considered system model is depicted in Figure 1. Alice is the massive MIMO BS. Without loss of generality, we assume Alice attempts to transmit a confidential signal to the kth UT (Bob) in the cellular cell. In the cell, there is an eavesdropper (Eve) with antennas who seeks to recover the confidential message . The channels between BS and these terminals experience large-scale path loss as well as small-scale fading, which can be denoted by and , where and . and are the non-negative large-scale path fading including path loss and shadow fading from Alice to ith UT and Eve. and represent the corresponding small-scale fading components, respectively. In addition, we assume the transmission experiences Rayleigh fading, hence the elements of the two vectors are modeled as i.i.d complex Gaussian random variables with zero mean and unit variance. We assume the BS has accurate CSI of all UTs.
Considered massive MIMO secure downlink transmission model, including one massive antenna BS with FRAB precoder and AN generation, K single-antenna UTs, and a multi-antenna Eve.
Downlink data transmission
During the downlink data transmission phase, Alice (BS) sends the data signals to UTs. In addition, Alice simultaneously allocates some power to emit AN signals to degrade Eve’s ability to eavesdrop the intended data to Bob. We assume the transmitter employ RF chains. For the sake of simplification, we assume that BS only uses K RF chains serving a multiplicity of K autonomous terminals. Usually, precoding is utilized to reinforce the decoding performance of desired legitimate users constructively and degrade the wiretapping ability of the present eavesdroppers. In fact, compared to the conventional MIMO system, some linear precoding schemes (MRT, ZF, and MMSE) have been exploited extensively in massive MIMO system to obtain large gains in power/bandwidth efficiency.1,4 However, utilizing these precoding schemes, the massive MIMO system should allocate one complete RF chain to per antenna, which will be too expensive for practical implementation. To reduce power consumption and the complexity of the system structure, we exploit FRAB11,13 in this article, which employs finite phase shifters. The RF precoding matrix can be made by some constant phase shifters. We can rewrite as a set of column vectors, that is, . All columns of the precoding matrix are normalized with unit norm, that is, . As mentioned in the previous analysis, to degrade decoding ability of the existing eavesdropper, Alice simultaneously transmit both data signals and AN signals to Bob. The AN shaping matrix is denoted by . Similar to the conventional MIMO (non-massive) systems, AN signals are chosen to lie in the null space of the UTs’ transmission channel matrix, so these AN signals only degrade Eve’s received signal-to-interference-plus-noise ratio (SINR) performance, but take little effect to legitimate UTs,25,26 that is, . In this article, to obtain some fundamental insights, for simplification, the uniform power allocation scheme is used across the UTs and AN signals, respectively. We assume each UT has same power p and each one-dimensional AN signal’s power is q. The transmission signal vector of the BS can be given by
where ; ; s and z represent the data vector and AN vector, respectively, whose elements obey independent and standardized Gaussian distribution: and ; is the total transmit power at BS; and is the power allocation factor to strike a balance between the information signal and AN signals.
Accordingly, Bob’s received signals in the cell can be denoted by
Similarly, the received signals at Eve are represented by
In the above expressions, is the receiving filter used by Eve, and and are the received additive Gauss thermal noise components. With no loss of generality, we set to simplify the analysis in this article.
FRAB
In this section, we discuss the design and implementation of the phase-only RF precoding with low complexity. Due to the power constraints, we can set , where represents the (m, n)th element of . To gain the highest array gain of the large-scale antennas, the optimal phase-only RF design with continuous phase (CP) can be given by
where is the mth element of vector (the channel vector between nth UT and BS) and variable denotes the phase of , .
As the practical implementation always exploits QP shifters instead of CP values, according to some previous works,8,10,11 the matrix can be quantized to B bits of precision. In this architecture, each element is quantized to its nearest phase value. The beamforming vector can be denoted by
where and is the dimensional binary phase switching matrix. is the (m, n)th element of matrix , which is subjected to these constraints ; , that is, for , only one element of each row vector is 1, , where and is the nth element of vector p. In fact, the operation is to find the QP value which is nearest to channel parameter phase .
Secrecy performance analysis
In this section, the achievable intended information rate and Eve’s ergodic capacity will be analyzed under the perfect CSI assumption. Subsequently, exploiting these results, a simple tight lower bound on the ergodic secrecy rate and a closed-form upper bound for secrecy outage probability are derived. Following, we analyze the achievable rate of Bob, Eve’s ergodic capacity, achievable ergodic secrecy rate, and secrecy outage probability in following subsections.
Achievable ergodic information rate of Bob
Accordingly, Bob’s received SINR () is denoted by
Obviously, calculating the accurate results of the is very sophisticated. According to some previous works,25–27 we can achieve a tight lower bound of the achievable rate of Bob’s MISO noise channel as formula (2). This resulting lower bound can be represented by
where denotes the lower bound of the . This lower bound for achievable UT’s ergodic rate is achieved assuming legitimate UT only has the statistic information of its own effective channel, that is, . The assumption on the legitimate users is reasonable and has been widely used in existing papers.25,34,35 is given by
In the above expression, the expection and variance operator are taken with respect to all channel realizations. We can first analyze the optimal phase-only RF beaforming SINR performance. As described before, each element of the small-scale channels is i.i.d complex Gaussian random variable with zero mean and unit variance. Thus, we can conclude that follows Rayleigh distribution, whose mean and variance are and , respectively. According to the Lindeberg–Lévy central limit theorem,4,10 the desired signal term can be expressed as
According to Lemma 1 in the literature,10 the interference term from other UTs in the denominator of equation (8) has its distribution as
So, also follows Rayleigh distribution with mean and variance . Clearly, plugging the numerator and denominator into formula (8), the lower bound of the achievable rate of Bob with CP analog precoder can be given by
According to these results, we conclude that the upper limit SINR gain of the phase-only RF combining is of the gain achieved by fully digital transmission (MRT).23,24
Then, we consider the FRAB with QP shifters. The received intended signal power component can be expressed as
where . These phases lie in with uniform distribution. Considering the independence between channel amplitude and the phase error, it is known that and obey Rayleigh distribution and uniform distribution, respectively. Furthermore, and are mutually independent.10,11 So, we can obtain that
Thus, we know that
Moreover, can be expressed as equation (15), shown at the top of the next page
Hence, the variance of can be gained by
Similarly, the interference component from other UTs have the following distribution as
Finally, we can get the exploiting FRAB, which is given by
This result reveals that is increasing in quantitative precision B. As , has an upper bound as same as . This is in agreement with our expectation.
Ergodic capacity of Eve
Since Eve is assumed to be totally passive, its CSI and noise power level are not acknowledged by BS. Unlike UT’s ergodic rate, we cannot obtain a lower bound for Eve’s rate since, otherwise, we cannot get a lower bound on the ergodic secrecy rate. Therefore, we attempt to analyze an upper bound for Eve’s ergodic capacity. It is assumed that Eve can acquire perfect knowledge of to cancel the received signals from all UTs except the intended signal. Actually, it is scarcely possible to gain the perfect CSI if the Eve is pure passive in the cell. So, this assuming is extremely pessimistic. Based on the effective CSI, Eve is able to obtain the array gain by performing maximum ratio combining (MRC). In addition, since BS has no knowledge of the Eve’s noise level, we consider the worst case that the additive thermal noise at Eve is negligible, that is, . Hence, we can denote the SINR of Eve as
MRC is usually preferred in massive MIMO system, which can achieve an approximately optimal performance with linear operations. So, the receive filter can be designed as
For the convenience of analysis, we rewrite the Eve’s SINR expression as
where , and U and T denote the numerator and denominator of , respectively.
So, the ergodic capacity of Eve is given by
The received intended signal power at the eavesdropper can be given by
where , in which , and and obey scaled chi-square distribution with 2 and degrees of freedom, respectively. Hence, we can get that
And the probability density function (PDF) of U can be represented by
where denotes gamma function. Then, we consider the term T. From the statistical meaning, variable T is equivalent to a weighted sum of two scaled chi-square distributed variables, which can be expressed as25,27
where and denote scaled chi-square distributed variables with and degrees of freedom, respectively.
By exploiting Laplace transform and inverse Laplace transform, the PDF of T can be given by
where the individual fractions of the numerators are given by
As U and T are mutually independent, we can obtain the cumulative density function (CDF) of Eve’s SINR exploiting the definition .
Thus, we can obtain the CDF expression of and Eve’s ergodic capacity as equations (30) and (31), where
Note that, the exact expression of the ergodic capacity of Eve is not difficult to achieve. However, the expressions are complicated and difficult for theoretical calculation and analysis, which are not easy to provide some insightful results. In the following, we analyze a simple tight upper bound on the ergodic capacity of Eve.
Using Jensen’s inequality, a tight upper bound on Eve’s ergodic capacity is obtained as
The above equality is based on independence between U and T. Specifically, recalling some existing results in Zhu et al.,25,27 the variable T can be approximatively regarded as one single-scaled chi-square distributed variable , where . And the parameters and should be selected to make the first two moments of T and equal. Equating the two moments of the matrices’ traces leads to
and
Utilizing the inverse Wishart matrix’s expectation expression, we can obtain that
Plugging these results into equation (32), the upper bound of Eve’s ergodic capacity can be obtained by
where represents the ratio of the number of UTs in the cell to the number of BS antennas (), denotes the ratio of Eve’s antenna number to the number of BS antennas ().
As Eve’s noise component is considered negligible in our analysis, we note that is independent of the path loss .
Achievable ergodic secrecy rate
If the system can afford delays and operate coding over many independent channel realizations, the ergodic secrecy rate is one suitable secrecy performance measure. Based on the previous analysis, a simple lower bound for the ergodic secrecy rate with FRAB can be given by equation (37), where
The large-scale path fading always changes on a very slow time scale, as these path-loss values generally depend on the geographic location and transmission environment. To obtain more insights into various parameters’ impact, we can simplify that . So the lower bound of the ergodic secrecy rate can be further simplified as
Secrecy outage probability
However, secrecy outages will be unavoidable when the system only afford limited delays, as BS have no information of Eve’s channel and decoding ability. Secrecy outage probability is an appropriate metric to evaluate the system’s secrecy performance, which is defined as the probability that the actual achieved instantaneous secrecy rate is less than the target secrecy rate . For massive MIMO system, we know that the desired information rate is deterministic as , but Eve’s achievable capacity is a random variable. Hence, a secrecy outage occurs when Eve’s capacity exceeds the system’s security threshold. According to equations (22) and (30), the secrecy outage probability can be given by
where denotes system’s desirable target secrecy rate. Then, we can derive an upper bound for the secrecy outage probability by substituting for . We can obtain the closed-form expression of secrecy outage probability as equation (40), where
Impact of various parameters on secrecy performance
In this section, we analyze the impacts of the various system parameters on secrecy performance in detail. To gain some insightful and instructive results, we exploit the achieved lower bound on the ergodic secrecy rate to make the following analysis.
Power allocation factor
First, we can consider one special case, that is, normalized number of UTs and the passive eavesdropper’s antenna number are fixed as . Under this setting, we are reminded that is negligible, that is, . Thus, we can obtain the as
We note that the secrecy performance is restricted by and (multiuser interference) and the secrecy rate increases significantly with the increase in . We realize the information leakage is almost negligible if Eve only exploits finite antennas in massive MIMO system. This is consistent with some previous researches.22–24 Hence, if the massive MIMO system informs the Eve only have small number of antennas in advance, and BS can allocate total power for data transmission, that is, . And the desired UT can obtain the maximal secrecy information rate, that is, .
For the general situation, first of all, we can reveal the conditions of zero secrecy rate, that is, . It is easy to see that the solutions of the equation are and . Specifically, can be obtained by
From the expression, we can conclude that this massive MIMO system can obtain positive secrecy rate as or . Otherwise, in order to achieve secrecy rate, the power allocation factor should meet the condition that .
Easily, we can get that which can prove that the function is a concave function with respect to at . Hence, we can obtain the optimal that maximizes the ergodic secrecy rate. The optimal can be gained by derivative operation from equation (38) as
where if , if , and if .
Numbers of Eve’s antennas and the UTs
In this section, we use the normalized ratios and to evaluate the influence of K and .
To investigate the influence of , the expression of can be rewritten as
According to relational expression equation (42), it is easily known that
Thus, the ergodic secrecy rate is a monotonically decreasing function of . We can explain that as the number of UTs increases, the power allocated to each UT decreases and the multiuser interference term increases. To overcome this effect, more power should be allocated for data transmission. Moreover, from equations (18) and (36), it is shown that the changes in have a greater effect on the achievable information rate than Eve’s ergodic capacity. Similarly, the secrecy rate decreases as increases. This is easily explained that Eve can achieve higher capacity with more antennas, while more Eve’s antennas has no effect on Bob’s achievable rate. Hence, if Eve get the knowledge of the power allocation scheme and the precoding architecture of BS, Eve can fully eavesdrop the intended information by equipping adequate antennas, which can be represented as
Total transmit power PT
It is noted that the exact expression of the Eve’s achievable capacity is complicated and not easy to evaluate. So, we can utilize the upper bound for Eve’s ergodic capacity as equation (36) in the following analysis. For , it is easy to find that has nothing to do with .
Then, we focus on the UT’s achievable ergodic information rate. From equation (18), we observe that only affects component in the denominator of . Hence, the UT’s ergodic information rate monotonically increases in . Based on equations (18) and (36), we can conclude that the ergodic secrecy rate is an increasing function of . As , the achievable secrecy rate becomes deterministic, which can be upper bounded by
FRAB parameter B
Now, we analyze the impact of the FRAB parameter B. In this article, we choose the phase shifters with uniform phases. So, B is the only parameter that determines the precision of FRAB. Physically, larger B means FRAB is closer to CP precoder and can get a larger array gain. Moreover, as we know, Eve’s channel is independent with the column vectors of precoding matrix . Hence, parameter B has no effect on Eve’s ergodic capacity, which can be proved by formula (36).
Then, we consider the impact of parameter B on Bob’s ergodic information rate. From equations (8) and (18), we know that
As is a logarithmic function of variable , and have the same monotonicity of B. By introducing a new function , we first consider the monotonicity of by calculating the first-order derivative with respect to as
With , it is easily observed that . Thereby monotonically increases in . Then can be rewritten as
Hence, is also a monotonically increasing function of B. We can conclude that Bob’s ergodic information rate and the ergodic secrecy rate are both monotonically increasing functions in quantization precision B. Meanwhile, for , the upper bound of the ergodic secrecy rate by FRAB precoder actually is the same as the secrecy rate by exploiting CP beamforming. This can be expressed as
Numerical results
In this section, the secrecy performance of the considered massive MIMO system is evaluated by Monte Carlo simulations. Without loss of generality, we set and , . We assume all UTs have the identical receiving and processing abilities, so all UTs have the same achievable secrecy rate. The total secrecy rate of the cell can be counted by multiplying the single UT’s secrecy rate by UTs’ number K. It is a meaningful topic to evaluate the system-wide secure performance. As this issue is outside the scope of this article, we will pay attention to this secrecy indicator in the future works.
We first illustrate the impact of the power allocation factor on the ergodic secrecy rate. Figure 2 shows the achievable ergodic secrecy rates as functions of with different values and . In the simulations, we set and . As expected, the secrecy rate increases first and then decreases with the power allocation factor increasing from . For any scenario, to maximize the ergodic secrecy rate, there will be an optimal power allocation scheme that are denoted by small circles in the curves. The values of the optimal are in good agreement with the obtained functional expression in the previous section as equation (43). In addition, we note that the optimal decreases when increases, that is, more power needs to be used for AN generation when Eve equips more antennas. Under these simulation conditions, we note that . For , the non-negative secrecy rate can be gained regardless of the value of power allocation factor . However, for , should meet the condition that to achieve a positive secrecy rate. We can observe that the limit of to gain a positive secrecy rate monotonically decreases in , that is, more Eve’s antennas will significantly damage the system’s secrecy performance. In addition, we can observe that increasing or brings about a negative effect on the ergodic secrecy rate, whereas as expected.
Ergodic secrecy rate versus power allocation factor for a system with total transmit power , FRAB parameter , and under different system parameters and .
In Figure 3, the ergodic secrecy rate curves are depicted as functions of and , respectively. The values of the ergodic secrecy rate are calculated exploiting the optimal power allocation scheme which was gained in equation (43) or fixed allocation factor under different and , respectively. From the two simulation diagrams, it is easy to see that the ergodic secrecy rate monotonically decreases with or . We can explain this situation that each UT’s power decreases as increases, which means that the UT’s achievable ergodic secrecy rate decreases. Moreover, increasing Eve’s antenna number can improve its eavesdropping ability, that is, increasing the ergodic capacity of Eve. Hence, the ergodic secrecy rate decreases in or , which is in the agreement with the analysis results in section “Numbers of Eve’s antennas and the UTs.” Furthermore, there is a performance gap between schemes with optimal power allocation and one fixed random allocation scheme. In each curve, there is only one coincident point where the power allocation value is just equal with the optimal value .
Ergodic secrecy rate versus the normalized number of UTs and the normalized number of eavesdropper antennas , with total transmit power , FRAB parameter , and different system parameters and , utilizing the optimal power allocation scheme or fixed allocation factor .
Figure 4 depicts the ergodic secrecy rate versus FRAB precision parameter B under different total transmit power . Also, the upper bounds of Bob’s achievable ergodic rate with CP RF precoder or full-digital MRT precoder (DP) are achieved and shown in the figure. First, we can observe that there is a fix performance difference between the CP RF precoder with unbounded and the full-digital MRT, that is, the SINR of the CP RF precoder is of the full-digital MRT. This result accords with the conclusion in Alkhateeb et al.11 From Figure 4, it is obvious that both and B have an important impact on the system secrecy performance. The achieved ergodic secrecy rate monotonically increases with and B. Moreover, the figure indicates that the performance of the FRAB architecture is close to the upper bound with a high phase precision () thanks to the large antenna array gain. However, CP RF precoder or full-digital MRT needs full-complexity RF chains, which is practically costly and infeasible. Our quantized FRAB scheme suffers measurably negligible degradation compared to CP phase beamforming solution, only exploiting finite phase shifters and limited power consumption. Due to the potential advantages to reduce the hardware cost and improve power efficiency, the FRAB architecture is extremely suitable for the massive MIMO system that can keep the total capital expenditures manageable. Figure 4 also considers the ergodic secrecy rate with different transmit power level. As expected from the previous analysis, the ergodic secrecy rate increases with increasing . In addition, simulation results indicate that upper bounds of the ergodic secrcy rate converge to finite limit as . This means we cannot get an unbound capacity even with infinite power. We should set an appropriate transmit power in practical system design.
Achievable ergodic secrecy rate with transmit power converges to the derived analytical limit exploiting CP precoder (FRAB with parameter ). Total system secrecy rate converges to an upper bound as .
Figures 5 and 6 depict the secrecy outage probabilities as functions of the target secrecy rate , where the curves are gained at different FRAB precisions and BS antenna numbers . We know that the achievable ergodic rate of legitimate UT monotonically increases at B, so secrecy outage probability decreases with increasing B, which is consistent with the results in Figure 5. And the curve is close to the lower bound by CP beamforming as , which is in accordance with the previous analysis of Figure 4. In addition, we can observe that B only affects the parameter in equation (40). And will converge to an upper bound value as . Hence, we can obtain a limit lower bound of the secrecy outage probabilities, which is shown as the solid line in Figure 5. However, Figure 6 shows that the performance of secrecy outage probability can also be improved by enlarging the scale size of the BS’s antenna array . In conclusion, we can improve the performance of the secrecy outage probability by exploiting more phase shifters or increasing the size of the antenna array as expected.
Secrecy outage probability versus target secrecy rate , for a system with total power , , , , and under different FRAB parameters .
Secrecy outage probability versus target secrecy rate , for a system with total power , , , , and under different BS antenna numbers .
Conclusion
In this article, we investigated a secure massive MIMO system exploiting simple FRAB and AN with a multi-antenna eavesdropper. Tight closed-form lower bound and upper bound for the achievable ergodic information rate and the eavesdropper’s ergodic capacity were analyzed in detail. Meanwhile, to evaluate the secrecy performance, a tight lower bound of the ergodic secrecy rate and an upper bound on secrecy outage probability were achieved. Based on these results, we achieved optimal power allocation scheme and the conditions of non-zero secrecy rate. Also, some significant insights have been provided about the impacts of various system parameters on secrecy performance. The proposed FRAB architecture could obtain comparable secrecy rate to CP scheme only utilizing inexpensive ADC and limited baseband processing power, which makes the application of low-cost devices desirable in massive MIMO systems. Moreover, this article only studies the system’s performance with perfect CSI. We will further consider the imperfect CSI scene in future.
Footnotes
The authors would like to thank all anonymous reviewers for valuable and helpful comments and suggestions,which largely improve and clarify this paper.
Handling Editor: Olivier Berder
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research,authorship,and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research,authorship,and/or publication of this article: This work was supported by the Jiangsu Provincial Natural Science Foundation of China (no. BK20141069).
References
1.
MarzettaTL.Massive MIMO: an introduction. Bell Labs Tech J2015; 20: 11–22.
2.
BogaleTELeLB.Massive MIMO and mmWave for 5G wireless HetNet potential benefits and challenges. IEEE Veh Technol Mag2016; 11(1): 64–75.
3.
RusekFPerssonDLauBKet al. Scaling up MIMO opportunities and challenges with very large arrays. IEEE Signal Proc Mag2013; 30(1): 40–60.
4.
NgoHQLarssonEGMarzettaTL.Energy and spectral efficiency of very large multiuser MIMO systems. IEEE T Commun2013; 61(4): 1436–1449.
5.
BjornsonELarssonEGMarzettaTL.Massive MIMO: ten myths and one critical question. IEEE Commun Mag2016; 54(2): 114–123.
6.
LarssonEGEdforsOTufvessonFet al. Massive MIMO for next generation wireless systems. IEEE Commun Mag2014; 52(2): 186–195.
7.
ZhengXXieYLiJet al. MIMO transmit beamforming under uniform elemental power constraint. IEEE T Signal Proces2007; 55(11): 5395–5406.
8.
VenkateswaranVVeenAVD. Analog beamforming in MIMO communications with phase shift networks and online channel estimation. IEEE T Signal Proces2010; 58(8): 4131–4143.
9.
LoveDJHeathRW.Equal gain transmission in multiple-input multiple-output wireless systems. IEEE T Commun2003; 51(7): 1102–1110.
10.
LiangLXuWDongX.Low-complexity hybrid precoding in massive multiuser MIMO systems. IEEE Wireless Commun Le2014; 3(6): 653–656.
11.
AlkhateebANamYHZhangJet al. Massive MIMO combining with switches. IEEE Wireless Commun Le2016; 5(3): 232–235.
12.
ZhuJXuWWangN.Secure massive MIMO systems with limited RF chains. IEEE T Veh Technol2017; 66(6): 5456–5461.
13.
DingZDaiLSchoberRet al. NOMA meets finite resolution analog beamforming in massive MIMO and millimeter-wave networks. IEEE Commun Lett2017; 21(8): 1879–1882.
HongYWPLanPKuoCCJ.Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Proc Mag2013; 30(5): 29–40.
16.
ShlezingerNZahaviDMurinYet al. The secrecy capacity of Gaussian MIMO channels with finite memory. IEEE T Inform Theory2017; 63(3): 1874–1897.
17.
LinSCChangTHLiangYLet al. On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: the noise leakage problem. IEEE T Wirel Commun2011; 10(3): 901–915.
18.
GeraciGCouilletRYuanJet al. Large system analysis of linear precoding in MISO broadcast channels with confidential messages. IEEE J Sel Area Commun2013; 31(9): 1660–1671.
19.
LiNTaoXWuHet al. Large system analysis of artificial noise assisted communication in the multiuser downlink: ergodic secrecy sum-rate and optimal power allocation. IEEE T Veh Technol2016; 65(9): 7036–7050.
20.
YangNWangLGeraciGet al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag2015; 53(4): 20–27.
21.
KapetanovicDZZhengGRusekF.Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun Mag2015; 53(6): 21–27.
22.
WuYSchoberRNgDWKet al. Secure massive MIMO transmission with an active eavesdropper. IEEE T Inform Theory2016; 62(7): 3880–3900.
23.
Al-nahariA.Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers. IET Commun2016; 10(1): 50–56.
24.
ZhangXGuoDGuoKet al. Secure performance analysis and detection of pilot attack in massive multiple-input multiple-output system. Int J Distrib Sens N2018; 14(5): 1–12.
25.
ZhuJSchoberRBhargavaVK.Secure transmission in multicell massive MIMO systems. IEEE T Wirel Commun2014; 13(9): 4766–4781.
26.
ZhuJSchoberRBhargavaVK.Linear precoding of data and artificial noise in secure massive MIMO systems. IEEE T Wirel Commun2016; 15(3): 2245–2261.
27.
ZhuJSchoberRBhargavaVK.Secure transmission in multi-cell massive MIMO systems. In: Proceedings of the IEEE Globecom workshops (GC Wkshps), Atlanta, GA, 9–13 December 2013, pp.1286–1291. New York: IEEE.
28.
LiuCMalaneyR.Location-based beamforming and physical layer security in rician wiretap channels. IEEE T Wirel Commun2016; 15(11): 7847–7857.
29.
YaacoubEAl-HusseiniM.Achieving physical layer security with massive MIMO beamforming. In: Proceedings of the 11th European conference on antennas and propagation (EUCAP), Paris, 19–24 March 2017, pp.1753–1757. New York: IEEE.
30.
ChenBZhuCShuLet al. Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper. IEEE Access2016; 4: 5374–5384.
31.
ChenBZhuCLiWet al. Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper. IEEE Access2016; 4: 3016–3025.
32.
ZhuJNgDWKWangNet al. Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE T Wirel Commun2017; 16(3): 2001–2016.
33.
ZhuJSchoberRBhargavaVK. Physical layer security for massive MIMO systems impaired by phase noise. In: Proceedings of the IEEE 17th international workshop on signal processing advances in wireless communications (SPAWC), Edinburgh, 3–6 July 2016, pp.1–5. New York: IEEE.
34.
MarzettaTL.Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE T Wirel Commun2010; 9(11): 3590–3600.
35.
JoseJAshikhminAMarzettaTLet al. Pilot contamination and precoding in multi-cell TDD systems. IEEE T Wirel Commun2011; 10(8): 2640–2651.