Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks

被引:35
作者
Li, Guyue [1 ,2 ]
Sun, Chen [2 ,3 ]
Jorswieck, Eduard A. [4 ]
Zhang, Junqing [5 ]
Hu, Aiqun [2 ,3 ]
Chen, You [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Purple Mt Labs Network & Commun Secur, Nanjing 210096, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Tech Univ Carolo Wilhelmina Braunschweig, Inst Commun Technol, D-38106 Braunschweig, Germany
[5] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
基金
中国国家自然科学基金;
关键词
MIMO communication; Antennas; Channel models; Security; Uplink; Downlink; Channel estimation; Physical layer security; secret key generation; multi-user massive MIMO; beam domain; PHYSICAL-LAYER; GENERATION; SECURITY;
D O I
10.1109/TIFS.2020.3026466
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Physical-layer key generation (PKG) based on channel reciprocity has recently emerged as a new technique to establish secret keys between devices. Most works focus on pairwise communication scenarios with single or small-scale antennas. However, the fifth generation (5G) wireless communications employ massive multiple-input multiple-output (MIMO) to support multiple users simultaneously, bringing serious overhead of reciprocal channel acquisition. This paper presents a multi-user secret key generation in massive MIMO wireless networks. We provide a beam domain channel model, in which different elements represent the channel gains from different transmit directions to different receive directions. Based on this channel model, we analyze the secret key rate and derive a closed-form expression under independent channel conditions. To maximize the sum secret key rate, we provide the optimal conditions for the Kronecker product of the precoding and receiving matrices and propose an algorithm to generate these matrices with pilot reuse. The proposed optimization design can significantly reduce the pilot overhead of the reciprocal channel state information acquisition. Furthermore, we analyze the security under the channel correlation between user terminals (UTs), and propose a low overhead multi-user secret key generation with non-overlapping beams between UTs. Simulation results demonstrate the near-optimal performance of the proposed precoding and receiving matrices design and the advantages of the non-overlapping beam allocation.
引用
收藏
页码:968 / 982
页数:15
相关论文
共 31 条
[1]  
Bai TY, 2015, IEEE INT WORK SIGN P, P620, DOI 10.1109/SPAWC.2015.7227112
[2]   Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey [J].
Busari, Sherif Adeshina ;
Huq, Kazi Mohammed Saidul ;
Mumtaz, Shahid ;
Dai, Linglong ;
Rodriguez, Jonathan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02) :836-869
[3]   Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology [J].
Chan Dai Truyen Thai ;
Lee, Jemin ;
Prakash, Jay ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (01) :18-33
[4]   Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients [J].
Chen, Chan ;
Jensen, Michael A. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) :205-215
[5]   Securing the Internet of Things in a Quantum World [J].
Cheng, Chi ;
Lu, Rongxing ;
Petzoldt, Albrecht ;
Takagi, Tsuyoshi .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (02) :116-120
[6]   Spatially Sparse Precoding in Millimeter Wave MIMO Systems [J].
El Ayach, Omar ;
Rajagopal, Sridhar ;
Abu-Surra, Shadi ;
Pi, Zhouyue ;
Heath, Robert W., Jr. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (03) :1499-1513
[7]   How much training is needed in multiple-antenna wireless links? [J].
Hassibi, B ;
Hochwald, BM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) :951-963
[8]   Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel [J].
Ho, Zuleita ;
Jorswieck, Eduard ;
Engelmann, Sabrina .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1672-1686
[9]   Information reconciliation schemes in physical-layer security: A survey [J].
Huth, Christopher ;
Guillaume, Rene ;
Strohm, Thomas ;
Duplys, Paul ;
Samuel, Irin Ann ;
Gueneysu, Tim .
COMPUTER NETWORKS, 2016, 109 :84-104
[10]  
Jiao L, 2018, IEEE INT CONF SENS, P406