Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping

被引:30
作者
Timilsina, Santosh [1 ]
Baduge, Gayan Amarasuriya Aruma [1 ]
Schaefer, Rafael F. [2 ]
机构
[1] Southern Illinois Univ, Dept Elect & Comp Engn, Carbondale, IL 62901 USA
[2] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10587 Berlin, Germany
关键词
Massive MIMO; spectrum-sharing; security; COGNITIVE RADIO NETWORKS; PHY SECURITY; WIRELESS; TRANSMISSION; INTERFERENCE; PILOTS;
D O I
10.1109/TCCN.2018.2833848
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure communication in underlay spectrum sharing multi-user massive multiple-input multiple-output systems with active eavesdropping is investigated. The primary base-station (PBS) shares its licensed spectrum with the secondary base-station (SBS), which constrains its transmit power subject to a primary interference temperature. The active eavesdropper contaminates the uplink pilots in an attempt to intercept the confidential downlink transmissions toward the legitimate primary/secondary user nodes (PUs/SUs). The achievable PU/SU rates, the rates leaked into the active eavesdropper, and the achievable secrecy rates are derived for the finite and infinite PBS/SBS antenna regimes. A power-ratio-based active pilot attack detection scheme is investigated, and thereby, the probability of detection is derived. Our analysis and simulation results reveal that the active pilot attacks severely degrades the achievable secrecy rates even in the asymptotic PBS/SBS antenna regime. Hence, in order to provide guaranteed physical layer security, the active pilot attacks must be detected, and dynamic pilot decontamination techniques need to be employed.
引用
收藏
页码:390 / 405
页数:16
相关论文
共 41 条
[1]  
Al-Hraishawi H., 2017, P IEEE GLOB COMM C G, P1
[2]   Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination [J].
Al-Hraishawi, Hayder ;
Baduge, Gayan Amarasuriya Aruma ;
Schaefer, Rafael E. .
ENTROPY, 2017, 19 (07)
[3]  
Bloch M., 2001, Physical-Layer Security: From Information Theory to Security Engineering
[4]   Five Disruptive Technology Directions for 5G [J].
Boccardi, Federico ;
Heath, Robert W., Jr. ;
Lozano, Angel ;
Marzetta, Thomas L. ;
Popovski, Petar .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (02) :74-80
[5]   Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks [J].
Deng, Yansha ;
Wang, Lifeng ;
Zaidi, Syed Ali Raza ;
Yuan, Jinhong ;
Elkashlan, Maged .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (05) :2116-2129
[6]   Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints [J].
Gabry, Frederic ;
Zappone, Alessio ;
Thobaben, Ragnar ;
Jorswieck, Eduard A. ;
Skoglund, Mikael .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (04) :437-440
[7]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[8]   Security-Constrained Power Allocation in MU-Massive-MIMO With Distributed Antennas [J].
Guo, Kaifeng ;
Guo, Yan ;
Ascheid, Gerd .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) :8139-8153
[9]   How much training is needed in multiple-antenna wireless links? [J].
Hassibi, B ;
Hochwald, BM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) :951-963
[10]   Cognitive radio: Brain-empowered wireless communications [J].
Haykin, S .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (02) :201-220