Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed?

被引:21
作者
Hu, Jianwei [1 ]
Yang, Nan [2 ]
Cai, Yueming [1 ]
机构
[1] PLA Army Engn Univ, Coll Commun Engn, Nanjing 210007, Jiangsu, Peoples R China
[2] Australian Natl Univ, Res Sch Engn, Canberra, ACT 0200, Australia
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Physical layer security; Internet of Things; optimal number of antennas; feedback bits allocation; PHYSICAL-LAYER SECURITY; CONFIDENTIAL MESSAGES; BROADCAST CHANNELS; ARTIFICIAL NOISE; WIRELESS SYSTEMS; CHALLENGES; SECRECY; CONSTRAINTS; NETWORKS; FEEDBACK;
D O I
10.1109/JSAC.2018.2825483
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Physical layer security is a promising way to secure the wireless communications in the Internet of Things (IoT). Motivated by the fact that the limited feedback resources in the IoT network would degrade the secrecy advantage of the multiple-antenna technique, we attempt to investigate the problem of how many transmit antennas should be utilized to perform secure communications. In particular, we consider the heterogeneous IoT downlink network and design a multiuser secure transmission scheme. In this scheme, the zero-forcing beamforming technique is adopted to serve the IoT legitimate users, and the remaining spatial freedoms are utilized to send artificial noise (AN) for confusing the passive eavesdroppers. Given the secrecy outage constraints, we derive the closed-form expression for the network secrecy throughput and formulate a non-convex optimization problem with multiple parameters, e.g., the number of transmit antennas, the wiretap codes, the feedback bits allocation strategy, and the power allocation ratio between the information bearing signal and the AN. To effectively tackle this problem, we develop an optimization framework involving the block coordinate descent algorithm and the 1-D search method. Simulation results validate the effectiveness of our proposed optimization framework and show that the optimal number of transmit antennas increases as the secrecy outage constraints become stricter, or the feedback resources become scarcer.
引用
收藏
页码:1622 / 1634
页数:13
相关论文
共 38 条
  • [1] [Anonymous], 1999, Athena scientific Belmont
  • [2] Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers
    Chen, Gaojie
    Coon, Justin P.
    Di Renzo, Marco
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1195 - 1206
  • [3] Narrowband Internet of Things: Implementations and Applications
    Chen, Jiming
    Hu, Kang
    Wang, Qi
    Sun, Yuyi
    Shi, Zhiguo
    He, Shibo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 2309 - 2314
  • [4] A Survey on Multiple-Antenna Techniques for Physical Layer Security
    Chen, Xiaoming
    Ng, Derrick Wing Kwan
    Gerstacker, Wolfgang H.
    Chen, Hsiao-Hwa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1027 - 1053
  • [5] Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective
    Chen, Xiaoming
    Zhang, Yu
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 1128 - 1136
  • [6] Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges
    Elsaadany, Mahmoud
    Ali, Abdelmohsen
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04): : 2544 - 2572
  • [7] Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers
    Geraci, Giovanni
    Singh, Sarabjot
    Andrews, Jeffrey G.
    Yuan, Jinhong
    Collings, Iain B.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (05) : 2931 - 2943
  • [8] Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages
    Geraci, Giovanni
    Couillet, Romain
    Yuan, Jinhong
    Debbah, Merouane
    Collings, Iain B.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1660 - 1671
  • [9] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [10] On the convergence of the block nonlinear Gauss-Seidel method under convex constraints
    Grippo, L
    Sciandrone, M
    [J]. OPERATIONS RESEARCH LETTERS, 2000, 26 (03) : 127 - 136