In this article, the secure communication in cell-free massive multiple-input multiple-output system with low-resolution analog-to-digital converters is investigated in the presence of an active eavesdropper. Specifically, in this article, the deterioration caused by the analog-to-digital converter imperfections on the accuracy of the channel estimation and secure transmission performance is studied. Besides, the additive quantization noise model is utilized to analyze the impacts of the low-resolution analog-to-digital converters. The minimum mean square error channel estimation results show that there is a nonzero floor caused by the coarse analog-to-digital converters. Then, the closed-form expressions for both the legitimate users achievable ergodic rate and the information leakage to the eavesdropper are derived, respectively. Moreover, tight approximated ergodic secrecy rate expression is also presented with respect to analog-to-digital converters quantization bits, number of antennas, pilot power, and so on. To degrade the impacts of the pilot spoofing attack, an active attack detection approach based on random matrix theory is proposed which can only be operated at one access point. Simulation results are provided to corroborate the obtained results and analyze the impacts of various parameters on system secrecy performance. Also, the superiority of the proposed active attacks detection method is confirmed via simulation results.
Massive multiple-input multiple-output (MIMO) is regarded as a promising wireless access technology for 5G and B5G wireless communication which can provide high spectral efficiency and high energy efficiency with simple signal processing.1,2 Cellular massive MIMO equips the large number of the antennas on a single base station (BS) which has been analyzed widely and deeply on various respects, such as performance analysis, beamforming, power control, secure communication, and so on.2–4 However, the performance of such cellular system is inevitably limited by the intercell interferences and channel correlation. One practical alternative is to install several antenna sets onto distributed physical locations which is also called distributed massive MIMO.5,6 As a scalable distributed massive MIMO concept, cell-free massive MIMO has been proved to be a promising wireless network architecture which can provide coherent service by geographically distributed access points (APs) for future wireless communication systems.7 Since its proposal, various works on performance evaluations and transmission schemes over cell-free massive MIMO have been investigated.8–10 Due to the broadcast nature of wireless channels, facilitating secure and reliable wireless transmission is a critical topic for future wireless communication systems.11–13 Despite the robustness of massive MIMO against passive eavesdropping, the active eavesdropping attacks are more relevant.14,15
Currently, most related literatures merely focused on the secure transmission in co-located massive MIMO systems,16–18 while secrecy provisions for cell-free massive MIMO have not been well explored. Hoang et al.19 discussed the secrecy performance and power allocation for cell-free massive MIMO with active eavesdropper. The effect of hardware impairments over secure cell-free massive MIMO system with active spoofing attack has been investigated in Zhang et al.20 However, all aforementioned works are based on adopting high-resolution analog-to-digital converters (ADCs) in massive MIMO systems. To reduce energy consumption and physical hardware costs, implementing finite-resolution ADCs in massive MIMO systems has been regarded as an effective approach. Several researchers have devoted to the implementation of finite-resolution ADCs in cell-free massive MIMO systems recently.21–23 Besides, the secure co-located massive MIMO with finite-resolution ADCs has been studied in Teeti.24 Nevertheless, the impact of ADCs quality on secrecy performance in cell-free massive MIMO has not been considered in existing research.
In a time-division duplex (TDD) massive MIMO system, the BS always acquires the channel state information (CSI) of the legitimate users via uplink training based on the reciprocity of the downlink and uplink channels. All legal users are required to send the redesigned and assigned pilot (training) signals to the BS in uplink training phase. Since all pilot signals are repeatedly used and publicly known by the BS and all users, a smart malicious eavesdropper can easily learn the target user’s pilot signals and transmit an identical pilot signal as that of a legitimate target user which is also called spoofing attack.25 Due to the spoofing attack operated by the active eavesdropper, the adversary could manipulate the CSI estimation which is the weighted sum of the target legitimate user and the eavesdropper’s channels. Consequently, the beamforming based on the estimated CSI during the data transmission results in information leakage to the eavesdropper. Some existing literatures show that the massive MIMO is robust against passive eavesdropping while the secrecy performance of the massive MIMO system is dramatically degraded by active attacks.14,15,26 Thus, detection of the active eavesdropper can be considered as an effective countermeasure to weaken the influence of active spoofing attacks. Kapetanović et al.27 proposed a detection scheme via random training pilots for massive MIMO system. However, some special pilot sequences are required to do the detection in this proposed method. Then, different schemes for active attack detection have been presented in Kapetanović et al.28 which are operated at different locations and based on different system parameters. It is noted that the precoder normalization is crucially important for these active eavesdropper detection schemes. Moreover, a simple detection protocol based on the statistical properties of the channel estimation has been provided in Al-Nahari,15 which is also determined by the correctness of the channel estimation. Besides, the minimum description length (MDL) source enumeration algorithm has been utilized for active eavesdropper detection in Tugnait,29,30 which can greatly improve the detection performance using short pilot sequences. According to Kritchman and Nadler31 and Tugnait,32 the random matrix theory (RMT) detection approach can achieve more precise results compared with MDL algorithm and has been proved to be highly effective in traditional MIMO system.
Motivated by the aforementioned observations, this article presents the first study of the security problem in cell-free massive MIMO system with finite-resolution ADCs against active eavesdropper. Furthermore, the tight asymptotic lower bound of achievable secrecy rate has been provided to enable the effects of ADC resolution, number of APs, each AP’s antenna number, and so on. Also, an active eavesdropping detection algorithm based on RMT is presented. And the proposed detection algorithm can be operated at one AP which only needs a simple procedure. The specific contributions of this article can be summarized as follows:
To capture the aggregate impacts of low-resolution ADCs, the additive quantization noise model (AQNM) is utilized to analyze the performance of the secure cell-free massive MIMO system. Specifically, this article operates the channel estimation via uplink training under minimum mean square error (MMSE) criterion. Moreover, the results show that the low-quality ADCs lead to a nonzero floor on the channel estimation. Also, more pilot power of the eavesdropper would bring larger damnification for channel estimation.
The downlink secrecy communication has been considered with the low-resolution ADCs. Based on the AQNM and the imperfect CSI, the closed-form expression of the secrecy rate has been derived with respect to key system parameters, including the quantization bits of the ADCs, the number of the total antennas, the pilot and data transmission power, and so on. These novel results can provide a effective tool to quantitatively analyze the impacts of system parameters on system secrecy performance.
To weaken the impacts taken by the active eavesdropping, an active attacks detection scheme based on the pilot self-contamination has been proposed which can only be operated at one AP. The detection is employed via determining the signal subspace rank which is estimated by RMT source enumeration approach. Also, the proposed detection approach has been illustrated accurate and effective via simulations.
The outline of the article is organized as follows. Section “System model” introduces the considered secure cell-free massive MIMO system model. Section “Uplink training” details the procedure of the uplink MMSE channel estimation. Section “Secrecy performance analysis” derives the achievable secrecy rate of the considered system. The RMT-based active eavesdropping detection is discussed in section “RMT-based pilot spoofing attack detection.” Simulation results are presented in section “Numerical results.” Finally, the article is concluded in section “Conclusion.”
Notation
Throughout this article, boldface lower case and upper case letters are utilized to represent vectors and matrices, for example, , . The superscript , , and stand for the conjugate, transpose and Hermitian transpose operation, respectively. In addition, the Euclidean norm of a vector and the absolute value of a scalar can be denoted as and , respectively. , , , and represent operations of expectation, variance, rank, and eigenvalue of a matrix, respectively. stands for a complex Gaussian random vector with mean and covariance matrix . and are dimensional identity matrix and dimensional complex space. Besides, independent and identically distributed is abbreviated as i.i.d. Finally, .
System model
As illustrated in Figure 1, the cell-free massive MIMO system comprising APs, one-antenna legitimate users, and an active eavesdropper (Eve) is considered in this article. Each AP is equipped with antennas. All APs are connected to a CPU through backhaul for sharing information. The Eve is equipped with single antenna and intends to contaminate the uplink training by pilot spoofing attack.19 The system is assumed operated in TDD mode, where the downlink and uplink channels are assumed to be reciprocal. Rayleigh block-fading channels are assumed between the APs and different terminals, where the channels remain constant in one time slot and vary independently afterward. Then, the channels between the AP and user (the Eve) can be denoted by7–9
where () represents the large-scale fading, () models the small-scale fading vector with elements being independent and identically distributed (i.i.d) random variables (RVs).
The architecture of the considered secure cell-free massive MIMO transmission system.
Since secure downlink transmission is investigated in this article, each time slot consists of uplink training and downlink transmission phases.
Uplink training
Due to the channel reciprocity, the CSI can be only acquired by uplink training. During this phase, all legitimate users send mutually orthogonal pilot sequences of length symbols for channel estimation at the APs, where . Let be the pilot vector sending by the user, where , represents the normalized pilot signal power. Since the pilot signals are repeatedly utilized and publicly predesigned, an intelligent eavesdropper can pretend to be a legitimate user by transmitting the identical pilot signals as the target user. No loss of generality, assuming that the Eve aims to eavesdrop the confidential information sending to the user, Eve’s pilot sequence can be denoted by , where , is the normalized transmit power of Eve. The received pilot matrix at the AP is given by
where denotes the additive white Gaussian noise matrix, whose elements are i.i.d RVs. By utilizing the additive quantization noise model (AQNM), the resulting signal after finite-resolution ADCs at AP can be given by21,22
where is scaling factor with respect to the ADC quantization bits , whose accurate values are shown in Table 1.
Corresponding scaling factors for different ADC quantization bits.
b
1
2
3
4
5
0.6366
0.8825
0.96546
0.990503
0.997501
Also, is the quantization noise matrix with covariance matrix as
Then, projecting onto , the post-processing signal can be rewritten as
where , .
By utilizing the MMSE estimation, the estimated channels can be written by16,21
where the estimate () and estimation error () are mutually independent, whose elements are zero mean i.i.d. RVs with variances () and .
Moreover, the channel estimation can be expressed as
Then, one important theorem can be given as follows.
Since the downlink beamformer is based on the estimated CSI via uplink training, the accuracy of the channel estimation is crucially important. Then, the normalized minimum square error (NMSE) of the target user can be used to evaluate the estimation performance which is defined as
To achieve some valuable insights, one limit behavior of the NMSE can be considered as follows. As , we can get the limit value of as
Thus, there is a nonzero floor on the channel estimation error NMSE caused by the ADCs imperfection. Besides, this zero floor cannot be compensated by increasing the pilot power of the legitimate users.
Secrecy performance analysis
In this section, we will focus on the performance analysis as a measure to evaluate the performance of the considered secure communication system.33–37 All APs perform conjugate beamforming to simultaneously transmit data to all users with the same time-frequency resource. Then, the signal transmitted by the AP can be represented by
where denotes the normalized signal intended to the user with , is the power control coefficient satisfying the power constraint as
Then, the received signal at the user and the Eve can be denoted by
where and represent received noise elements at the target user and the Eve, respectively. Operated by the low-resolution ADCs at the users, the output signal can be given by
where denotes the scaling factor of the ADCs at the users. Also, is the quantization noise with the variance as
We consider the realistic case that the target user cannot obtain its instantaneous CSI. Hence, the user will detect its desired signal by using the statistical CSI. Considering a pessimistic case, we assume that the Eve can obtain the perfect instantaneous CSI and has been equipped with high-quality hardware. Based on these settings, the lower bound on the target user’s achievable rate and the upper bound for the Eve’s ergodic capacity can be achieved. Furthermore, the signals at the user and the Eve can be rewritten as
where and denote the effective noise at the user and the Eve which are given by
In this article, the ergodic secrecy rate is chosen to evaluate the secrecy performance of the considered system. By considering the difference of the channel capacities between the target user and the Eve, the ergodic secrecy rate is given by
where () and () denote the achievable ergodic rate and signal-to-interference-noise ratio (SINR) at the user (the Eve). Then, we can get that
Subsequently, the closed-form expressions of and can be given in the following theorem.
Theorem 2
In the considered cell-free massive MIMO system, the SINRs at the user and the Eve can be given by equations (26) and (27) shown at the top of the next page
According to some existing papers, it is reasonable to operate the pilot spoofing attack detection based on the uplink training. Our proposed detection scheme is to perform source enumeration using RMT algorithm which is based on both the distribution of the signal eigenvalues and noise eigenvalues with the presence of noise. Also, to improve the detection accuracy, the uplink training can be divided into two phases: uplink training and uplink active attack detection. In the detection, it is set that only the legitimate target user send the pilot signal which can be designed that a fraction of the pilot power is allocated to a scalar random sequence . The superimposing random sequence is normalized () and zero-mean whose elements can be chosen from finite alphabet: BPSK or QPSK. Therefore, instead of the pilot signal , the pilot signal used for detection at the target user (the user) is given by
To keep the detection processing confidential, the random sequence is unknown to the APs and to the Eve in advance as it is designed randomly at the user terminal. The detection problem is in fact a binary statistical hypothesis testing problem framework, where the two hypotheses can be made with the null hypothesis denoting no attacks and the alternative hypothesis representing existing active eavesdropping. The two hypotheses can be presented as follows
where is the effective noise component including the quantization noise matrix and additive noise matrix.
Obviously, the received signals under these two hypotheses can be modeled as Gaussian variable with different expectation. According to the existing literature,29–32 the deterministic signals can be used for source enumeration to detect the existing active attacks.
Then, we can define that the correlation matrix of the received signal as
Furthermore, the correlation matrix of the source signals is given by
As such, the matrix under the two hypotheses can be represented as
where the matrices and are defined as
It is noted that . Due to the fact that , we can derive that with .
Moreover, we can derive that
where is the variance of the noise matrix . Let and denote the nonzero eigenvalues of correlation matrix and . Hence, the eigenvalues of can be given by
Thus, the two hypotheses can be distinguished by estimating the dimension or of the signal subspace which can be operated by the RMT estimator. Thus, the two hypotheses in equation (29) can be reformulated as
The RMT approach considers distribution of the noise eigenvalues of with the absence of signals, that is, . In particular, the distribution of the largest eigenvalue of a pure noise matrix based on a certain asymptotic limit of the distribution is used for matrix rank judgment. Then, we define the correction matrix as
The eigenvalues of can be ordered as . As the joint limit with , the largest eigenvalue converges to a Tracy-Widom distribution of order 2, that is
where represents the Tracy-Widom probability distribution function of order 2. Besides, and denote the centering and scaling parameters which are only determined by and . Furthermore, the parameters and can be denoted by
Then, we should consider the behavior of correlation matrix adding the signals. In this case, the eigenvalue of matrix also follows a Tracy-Widom distribution. Hence, the signal dimension can be estimated by judging whether the largest eigenvalue is over some deterministic threshold. Motivated by the above analysis, the RMT algorithm for signal subspace rank estimation can be defined by
where , satisfies that , denotes the false alarm probability. In addition, with the assumption of signals, the noise variance can be estimated by maximum likelihood estimator as
The above RMT approach can be used for signal subspace rank estimation based on the fact whether or . Hence, the algorithm can only be performed in small set that is . Furthermore, this detection algorithm can be only operated at one AP. To ensure the detection performance, we can choose the AP which is nearest to the user and the Eve for active attack detection. Therefore, the AP can achieve the largest SNR and can get a larger detection probability.
Numerical results
In the simulations, all APs, users, and the Eve are randomly located over a circle cell of radius 300 m. A simplified path-loss model has been used as , where , , and represent real geographical distance, reference distance, and loss coefficient, respectively.38 To quantitatively illustrate the results, key system parameters are set that , , , , and . Besides, the average power allocation scheme has been used in the simulations. All shown results were averaged over 5000 independent Monte Carlo trials.
Figure 2 depicts the NMSE of the channel estimation versus the SNR of the legitimate user pilot signal as a function of the quantization bits and Eve’s pilot power. It is noted that NMSE is monotonically increasing for decreasing the quantization bits . As expected, increasing the power of the active eavesdropper has a negative effect on the MMSE channel estimation. The dashed horizontally lines in Figure 2 denote the asymptotic limits of the NMSE in high power regime. The results illustrate that the coarse low-resolution ADCs result in a nonzero floor on NMSE which cannot be compensated by increasing the pilot power. On the contrary, there are no nonzero floors with implementing perfect ADCs at the transceivers which illustrates that equipping perfect ADCs could achieve an error-free channel estimation with larger pilot power.
The NMSE versus the pilot power of the legitimate users.
Since the derived secrecy rate expression in Theorem 1 is an appropriate tool for secrecy performance measure, the tightness of expression (23) should be verified via numerical results. Figure 3 shows the analytical and numerical results versus the number of the APs where the results are achieved by averaging over 5000 channel realizations and randomly locations. It is observed that the analytical results can match exactly with the simulated values which can validate the correctness of the obtained analytical expressions. As can be readily noted, deploying more APs yields better secrecy performance which can be explained that both the channel responses and the diversity gains can be improved with deploying more APs. From Figure 1, another interesting observation is that the system suffers a trivial performance loss by low-resolution ADCs of the APs, but cannot tolerate low-quality ADCs at the users.
Analytical and simulated results of the achievable secrecy rate versus the number of the APs.
Figure 4 shows the achievable ergodic secrecy rate versus different ADC quantization bits with . Obviously, we can observe that the achievable ergodic secrecy rate increases with the ADC quantization bits. It can be explained that low-quality ADCs at APs and users bring larger channel estimation error and more signal quantization noise, which can cause a lower SINR (low achievable rate) at the target users. Besides, with the increase in the bits, the secrecy rate increases and converges to a finite rate limit (the dashed horizontally lines in Figure 4) which can be explained that the quantization distortion factor is very close to 1 when . As expected, the considered cell-free massive MIMO system can obtain more secrecy rate with high-resolution ADCs at the users. Hence, low-resolution ADCs can be widely used at APs instead of the users.
The achievable secrecy rates versus ADC quantization bits.
Figure 5 depicts the achievable secrecy rate as a function of the pilot power ratio between the Eve and the legitimate user, where and denote the quantization bits of low-resolution ADCs at APs and users, represents perfect high-resolution ADC. Interestingly, the results in Figure 2 further confirm the conclusions in Figure 1. Besides, Figure 5 illustrates that the antenna configuration at APs brings a significant impact on system performance. With the fixed total number of antennas, more APs can provide better quality of service, which is consistent with the results in Hu et al.21 Also, Figure 5 shows that the Eve can overhear information to one target user with a less power budget when the system exploits low-resolution ADCs. Hence, a trade-off between costs and performance is required in practical system design.
The achievable secrecy rates versus pilot power difference.
In Figure 6, the active attacks detection probability versus the pilot power of the Eve with various parameters are depicted when and , where the results are obtained by 10,000 independent runs. The curves in Figure 6 illustrate that the detection performance improves with the increasing ADCs quantization bits and the antenna number of each AP. Moreover, it can be observed that the proposed RMT detector can detect active attacks at relative low power level. Also, we can note that the detection probability is over when for all parameter choices shown in Figure 6. Specifically, with more antennas at each AP (), the detection probability can reach to 1 when the Eve’s pilot power is about lower than that of the legitimate user.
Probability of the active attack detection versus the pilot power of the Eve.
Figure 7 shows the detection probability of the proposed RMT-based approach versus the power allocation factor with fixed total power and . At first, the results in Figure 7 indicate that the detection probability increases with the increasing . This can be explained that the correlation between the two column vectors of matrix defined in equation (47) decreases with increasing which can lead to one relatively larger eigenvalue . It is propitious for promoting the RMT-based detection probability. The used pilot signal is publicly known and predesigned, while the detection signal is designed with adding a random sequence. Besides, a smart eavesdropper will wiretap and transmit the spoof pilot sequence. Thus, to make the detection procedure confidential and imperceptible, the power allocation factor should be as small as possible. For comparison, Figure 7 shows the detection performance under different and ADCs quantization bits , which illustrates that the required allocation power for random sequence decreases with increasing or with the fixed detection probability. These results are valuable and significant for practical detection algorithm design and application.
Probability of the active attack detection versus the pilot power allocation ratio .
Conclusion
This article adopted the well-established distortion model (AQNM) to reveal the secure performance of cell-free massive MIMO system with low-resolution ADCs. Uplink MMSE channel estimation has been operated in the presence of active eavesdropping attack which shows that there was a nonzero floor on the channel estimation error brought by the ADC impairments. Based on the imperfect CSI, conjugate beamforming has been performed for downlink transmission. Then, we derived the closed-form expression of the achievable ergodic secrecy rate. To weaken the influence of the active attacks, any effective resisting measure was to detect the presence of the active eavesdropper. This article exploited the RMT-based detection approach to detect the dimension of the signals embedded in noise space. Finally, numerical results have been presented to verify derived results and the effectiveness of the active attack detection scheme.
Footnotes
Handling Editor: Yanjiao Chen
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research,authorship,and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research,authorship,and/or publication of this article: This work was supported in part by China Postdoctoral Science Foundation under Grant 2021MD703980,in part by the National Natural Science Foundation of China under Grant 61901502.
ORCID iD
Xianyu Zhang
References
1.
MarzettaTL. Massive MIMO: an introduction. Bell Labs Tech J2015; 20: 11–22.
2.
LarssonEGEdforsOTufvessonF, et al. Massive MIMO for next generation wireless systems. IEEE Commun Mag2014; 52(2): 186–195.
3.
BjörnsonELarssonEGMarzettaTL. Massive MIMO: ten myths and one critical question. IEEE Commun Mag2016; 54(2): 114–123.
4.
ZhuJSchoberRBhargavaVK. Secure transmission in multicell massive MIMO systems. IEEE Trans Wirel Commun2014; 13(9): 4766–4781.
5.
ZhangJWenCJinS, et al. On capacity of large-scale MIMO multiple access channels with distributed sets of correlated antennas. IEEE J Select Area Commun2013; 31(2): 133–148.
6.
GuoKGuoYAscheidG. Security-constrained power allocation in MU-massive-MIMO with distributed antennas. IEEE Trans Wirel Commun2016; 15(12): 8139–8153.
7.
NgoHQAshikhminAYangH, et al. Cell-free massive MIMO versus small cells. IEEE Trans Wirel Commun2017; 16(3): 1834–1850.
8.
NgoHQTranLDuongTQ, et al. On the total energy efficiency of cell-free massive MIMO. IEEE Trans Green Commun Netw2018; 2(1): 25–39.
9.
MaiTCNgoHQDuongTQ. Downlink spectral efficiency of cell-free massive MIMO systems with multi-antenna users. IEEE Trans Commun2020; 68(8): 4803–4815.
10.
BjörnsonESanguinettiL. Making cell-free massive MIMO competitive with MMSE processing and centralized implementation. IEEE Trans Wirel Commun2020; 19(1): 77–90.
11.
YangNWangLGeraciG, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag2015; 53(4): 20–27.
12.
GuoKAnKZhangB, et al. Physical layer security for multiuser satellite communication systems with threshold-based scheduling scheme. IEEE Trans Veh Technol2020; 69(5): 5129–5141.
13.
GuoKAnKZhouF, et al. On the secrecy performance of NOMA-based integrated satellite multiple-terrestrial relay networks with hardware impairments. IEEE Trans Veh Technol2021; 70(4): 3661–3676.
14.
KapetanovićDZhengGRusekF. Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks. IEEE Commun Mag2015; 53(6): 21–27.
15.
Al-NahariA. Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers. IET Commun2016; 10(1): 50–56.
16.
ZhuJSchoberRBhargavaVK. Linear precoding of data and artificial noise in secure massive MIMO systems. IEEE Trans Wirel Commun2016; 15(3): 2245–2261.
17.
ZhangXGuoDGuoK. Secure performance analysis for multi-pair AF relaying massive MIMO systems in Ricean channels. IEEE Access2018; 6: 57708–57720.
18.
WuYWenCChenW, et al. Data-aided secure massive MIMO transmission under the pilot contamination attack. IEEE Trans Commun2019; 67(7): 4765–4781.
19.
HoangTMNgoHQDuongTQ, et al. Cell-free massive MIMO networks: optimal power control against active eavesdropping. IEEE Trans Commun2018; 66(10): 4724–4737.
20.
ZhangXGuoDAnK, et al. Secure communications over cell-free massive MIMO networks with hardware impairments. IEEE Syst J2020; 14(2): 1909–1920.
21.
HuXZhongCChenX, et al. Cell-free massive MIMO systems with low resolution ADCs. IEEE Trans Commun2019; 67(10): 6844–6857.
22.
ZhangYZhouMQiaoX, et al. On the performance of cell-free massive MIMO with low-resolution ADCs. IEEE Access2019; 7: 117968–117977.
23.
ZhangYZhouMCaoH, et al. On the performance of cell-free massive MIMO with mixed-ADC under Rician fading channels. IEEE Commun Lett2020; 24(1): 43–47.
24.
TeetiMA. Downlink secrecy rate of one-bit massive MIMO system with active eavesdropping. IEEE Access2020; 8: 37821–37842.
25.
XiongQLiangYLiKH, et al. Secure transmission against pilot spoofing attack: a two-way training-based scheme. IEEE Trans Inform Foren Sec2016; 11(5): 1017–1026.
26.
ZhangXGuoDGuoK, et al. Secure performance analysis and detection of pilot attack in massive multiple-input multiple-output system. Int J Distrib Sens Netw2018; 14(5): 1–12.
27.
KapetanovićDZhengGWongKK, et al. Detection of pilot contamination attack using random training and massive MIMO. In: Proceedings of the 2013 IEEE 24th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), London, 8–11 September 2013, pp.13–18. New York: IEEE.
28.
KapetanovićDAl-NahariAStojanovicA, et al. Detection of active eavesdroppers in massive MIMO. In: Proceedings of the 2014 IEEE 25th annual international symposium on personal, indoor, and mobile radio communication (PIMRC), Washington, DC, 2–5 September 2014, pp.585–589. New York: IEEE.
29.
TugnaitJK. Self-contamination for detection of pilot contamination attack in multiple antenna systems. IEEE Wirel Commun Lett2015; 4(5): 525–528.
30.
TugnaitJK. Detection and identification of spoofed pilots in TDD/SDMA systems. IEEE Wirel Commun Lett2017; 6(4): 550–553.
31.
KritchmanSNadlerB. Non-parametric detection of the number of signals: hypothesis testing and random matrix theory. IEEE Trans Signal Process2009; 57(10): 3930–3941.
32.
TugnaitJK. Pilot spoofing attack detection and countermeasure. IEEE Trans Commun2018; 66(5): 2093–2106.
33.
GuoKLinMZhangB, et al. On the performance of LMS communication with hardware impairments and interference. IEEE Trans Commun2019; 67(2): 1490–1505.
34.
GuoKLinMZhangB, et al. Performance analysis of hybrid satellite-terrestrial cooperative networks with relay selection. IEEE Trans Veh Technol2020; 69(8): 9053–9067.
35.
GuoKAnKZhangB, et al. On the performance of the uplink satellite multiterrestrial relay networks with hardware impairments and interference. IEEE Syst J2019; 13(5): 2297–2308.
36.
ZhouFChuZSunH, et al. Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT. IEEE J Select Area Commun2018; 36(4): 918–931.
37.
ZhouFLiZChengJ, et al. Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT. IEEE Trans Wirel Commun2017; 16(4): 2450–2464.
38.
TimilsinaSKudathanthirigeDAmarasuriyaG. Physical layer security in cell-free massive MIMO. In: Proceedings of the 2018 IEEE global communications conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018, pp.1–7. New York: IEEE.