Artificial-Noise-Aided Secure Multi-User Multi-Antenna Transmission With Quantized CSIT: A Comprehensive Design and Analysis

被引:13
作者
Sun, Liang [1 ]
Cao, Lu [1 ]
Tang, Zhiyao [1 ]
Feng, Yong [2 ]
机构
[1] Beihang Univ, Int Res Inst Multidisciplinary Sci, Beijing 100191, Peoples R China
[2] Kunming Univ Sci & Technol, Yunnan Key Lab Comp Technol Applicat, Kunming 650500, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical layer security; ergodic secrecy rate; artificial noise; limited feedback; zero-forcing beamforming; PHYSICAL LAYER SECURITY; LIMITED FEEDBACK; PERFORMANCE ANALYSIS; BROADCAST CHANNELS; DOWNLINK SDMA; NETWORKS; SUM; SYSTEMS;
D O I
10.1109/TIFS.2020.2998942
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a secure multi-user multi-antenna transmission framework based on artificial-noise-aided linear zero-forcing beamforming, with limited channel state information feedback from multiple distributed legitimate users (LUs). The secrecy performance of the proposed scheme is analytically investigated and optimized. We develop a new accurate closed-form expression of a lower bound on the ergodic secrecy rate (ESR) of each LU without assuming asymptotes for any system parameter. To make system design tractable, we develop another lower bound on ESR which is so analytically amenable that it enables one to not only extend the results of the previous related works but also explore some untouched aspects of the well known artificial-noise-aided scheme. We derive the optimized power allocation coefficient to message-bearing signals which maximizes the latter ESR lower bound. Furthermore, we theoretically study respectively the impacts of the two main parameters, i.e., transmit power P and the number of feedback bits of each LU B, on the power allocation coefficient, and show the asymptotic results for the high-power and high-quantization-resolution systems. We also develop a sufficient condition on P and B under which a positive ESR of each LU can be achieved. We study some important parameters called the minimum required transmit power (MRTP) and the minimum required number of feedback bits (MRFBs) for each LU to achieve a positive ESR or to achieve a target ESR, which have rarely been touched before. Besides, we propose the algorithms to obtain the MRTP and MRFBs. Numerical results are also provided to verify our theoretical results.
引用
收藏
页码:3734 / 3748
页数:15
相关论文
共 33 条
  • [1] Closed-form expressions for distribution of sum of exponential random variables
    Amari, SV
    Misra, RB
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 1997, 46 (04) : 519 - 522
  • [2] Adaptive Limited Feedback for Sum-Rate Maximizing Beamforming in Cooperative Multicell Systems
    Bhagavatula, Ramya
    Heath, Robert W., Jr.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (02) : 800 - 811
  • [3] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [4] Exploiting Multiple-Antenna Techniques for Non-Orthogonal Multiple Access
    Chen, Xiaoming
    Zhang, Zhaoyang
    Zhong, Caijun
    Ng, Derrick Wing Kwan
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) : 2207 - 2220
  • [5] Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback
    Chen, Xiaoming
    Yin, Rui
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2013, 2 (05) : 503 - 506
  • [6] Chiani M., 2010, IEEE T INFORM THEORY, V56, P993
  • [7] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [8] Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding
    Geraci, Giovanni
    Egan, Malcolm
    Yuan, Jinhong
    Razi, Adeel
    Collings, Iain B.
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (11) : 3472 - 3482
  • [9] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [10] Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed?
    Hu, Jianwei
    Yang, Nan
    Cai, Yueming
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) : 1622 - 1634