Joint Uplink Power Control, Downlink Beamforming, and Mode Selection for Secrecy Cell-Free Massive MIMO With Network-Assisted Full Duplexing

被引:15
作者
Xia, Xinjiang [1 ]
Fan, Zhenqi [3 ]
Luo, Wuyang [2 ]
Lu, An [3 ]
Wang, Dongming [2 ]
Zhao, Xinsheng [2 ]
You, Xiaohu [2 ]
机构
[1] Purple Mt Labs, Nanjing 211111, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[3] State Grid Elect Power Res Inst, Nanjing 211100, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 01期
基金
中国博士后科学基金;
关键词
Uplink; Downlink; Massive MIMO; Transceivers; Transmitting antennas; Array signal processing; Approximation algorithms; Access point (AP); artificial noise (AN); cell-free massive multiple-input multiple-output (MIMO); network-assisted full duplexing (NAFD); security spectral efficiency; ENERGY EFFICIENCIES; TRANSCEIVER DESIGN; SYSTEMS; OPTIMIZATION; ALLOCATION; ALGORITHM; SWIPT;
D O I
10.1109/JSYST.2022.3188514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate a secrecy cell-free massive multiple-input multiple-output system with network-assisted full duplexing for both noncolluding eavesdropper (Eve) and colluding Eve cases, where the access points (APs) are designed to serve downlink users and uplink users simultaneously and flexibly in the presence of Eves. To confirm the secrecy transmission, we consider the problem of jointly optimizing duplex mode selection and secrecy transceivers to maximize the overall secrecy spectral efficiency, where the information signals at APs are injected with artificial noise (AN) to prevent interception of information by Eves. Considering that downlink secure beamforming, uplink transmission power, and uplink receivers are tightly coupled in both the objective function and the constraints, we propose a two-loop strategy to solve the optimization problem. In particular, we propose a quantum-inspired tabu search algorithm to find a better duplex mode in the outer loop for each iteration. Then, for the inner loop, we propose a successive convex approximation based iterative algorithm to optimize the transceivers and AN by fixing the duplex mode selection vectors obtained from the outer loop. To address the proposed inner loop design subproblem, we resolve the subproblem by a series of nonconvex-convex approximate methods, such as the equivalent transformation and the iterative concave-convex procedure. The simulation results show that the proposed solution can achieve a higher secrecy spectral efficiency gain than the fixed-mode duplex scheme and simple greedy duplex mode selection schemes and achieve secrecy spectral efficiency performance similar to that of the optimal exhaustive search solution for both noncolluding Eve and colluding Eve cases.
引用
收藏
页码:720 / 731
页数:12
相关论文
共 47 条
[1]  
[Anonymous], 2002, Tech. Rep.
[2]  
Cela E., 2013, The quadratic assignment problem: theory and algorithms, V1
[3]  
da Silva J. M. B., 2018, 2018 IEEE INT C COMM, P1
[4]  
Dahlman E., 2018, 5G NR NEXT GENERATIO, P311
[5]   Exploiting RIS for Limiting Information Leakage to Active Eavesdropper in Cell-Free Massive MIMO [J].
Elhoushy, Salah ;
Ibrahim, Mohamed ;
Hamouda, Walaa .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (03) :443-447
[6]   Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial Noise Helpful or Not? [J].
Guan, Xinrong ;
Wu, Qingqing ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (06) :778-782
[7]   Quantum-inspired evolutionary algorithm for a class of combinatorial optimization [J].
Han, KH ;
Kim, JH .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (06) :580-593
[8]   Cell-Free Massive MIMO Networks: Optimal Power Control Against Active Eavesdropping [J].
Hoang, Tiep M. ;
Hien Quoc Ngo ;
Duong, Trung Q. ;
Hoang Duong Tuan ;
Marshall, Alan .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (10) :4724-4737
[9]   Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface [J].
Hong, Sheng ;
Pan, Cunhua ;
Ren, Hong ;
Wang, Kezhi ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (12) :7851-7866
[10]  
Imre S., 2005, Quantum Computing and Communications: An Engineering Approach