Leakage Rate Analysis for Artificial Noise Assisted Massive MIMO With Non-Coherent Passive Eavesdropper in Block-Fading

被引:11
作者
Song, Changick [1 ]
机构
[1] Korea Natl Univ Transportat, Dept Elect Engn, Chungju 27469, South Korea
基金
新加坡国家研究基金会;
关键词
Massive MIMO; artificial noise; non-coherent; wiretap channels; leakage rate; secrecy rate; SECURE TRANSMISSION; WIRETAP; COMMUNICATION; CAPACITY;
D O I
10.1109/TWC.2019.2899357
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Massive MIMO is one of the salient techniques for achieving high spectral efficiency in the next-generation wireless networks. Recently, a combined strategy of the massive MIMO and the artificial noise (AN), namely, AN assisted massive (ANAM) MIMO has been investigated for security enhancement. However, most of the recent studies have been built upon the assumption of perfect channel state information (CSI) at the eavesdropper (ED), the results of which may be too pessimistic in terms of security because there exists no ED-friendly downlink training from the base station in the practical ANAM systems. In this paper, we provide more sophisticated analysis on the secrecy performance of the ANAM systems assuming that the CSI of the ED channels are unknown to both the base station and the ED or partially known to the ED. We measure the secrecy in terms of the leakage rate to the ED (or the secrecy rate to the legitimate users) and characterize their upper and lower bounds in the high signal-to-noise ratio regime. Our analytical result is represented by a single compact expression as a function of the number of ED antennas, the dimensionality of signal space, and the channel coherence time, and thus offers useful insights that help us fully exploit the secrecy potential of the ANAM systems. Finally, several useful observations are made from the numerical examples.
引用
收藏
页码:2111 / 2124
页数:14
相关论文
共 32 条
[1]  
Anderson TW., 1958, INTRO MULTIVARIATE S
[2]  
[Anonymous], INT C SIGN PROC COMM
[3]  
[Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985
[4]  
[Anonymous], 2007, J. Commun.
[5]  
Boothby W. M., 1986, An introduction to differentiable manifolds and Riemannian geometry
[6]   Regularized Blind Detection for MIMO Communications [J].
Chi, Yuejie ;
Wu, Yiyue ;
Calderbank, Robert .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2108-2112
[7]  
Choi Y, 2015, PROC INT CONF ADV, P84, DOI 10.1109/ATC.2015.7388423
[8]   Blind noise and channel estimation [J].
Frikel, M ;
Utschick, W ;
Nossek, J .
PROCEEDINGS OF THE TENTH IEEE WORKSHOP ON STATISTICAL SIGNAL AND ARRAY PROCESSING, 2000, :141-145
[9]   Computing the distribution of the product of two continuous random variables [J].
Glen, AG ;
Leemis, LM ;
Drew, JH .
COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 44 (03) :451-464
[10]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189