Resource Allocation for a Massive MIMO Relay Aided Secure Communication

被引:62
作者
Chen, Jian [1 ,2 ]
Chen, Xiaoming [1 ,2 ]
Gerstacker, Wolfgang H. [2 ]
Ng, Derrick Wing Kwan [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Jiangsu, Peoples R China
[2] Univ Erlangen Nurnberg, Inst Digital Commun, D-91058 Erlangen, Germany
[3] Univ New S Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
基金
国家教育部博士点专项基金资助;
关键词
Physical layer security; massive MIMO; DF relaying protocol; resource allocation; PHYSICAL-LAYER SECURITY; SECRECY CAPACITY; FADING CHANNELS; WIRELESS; TRANSMISSION; NETWORKS; AF; SELECTION; SYSTEMS; DESIGN;
D O I
10.1109/TIFS.2016.2551685
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we address the problem of joint power and time allocation for secure communications in a decode- and-forward massive multiple-input multiple-output (M-MIMO) relaying system in the presence of a passive eavesdropper. We apply the M-MIMO relaying technique to enhance the secrecy performance under very practical and adverse conditions, i.e., no availability of instantaneous eavesdropper channel state information (CSI) and only imperfect instantaneous legitimate CSI. We first provide a performance analysis of secrecy outage capacity, which reveals the minimum required number of relay antennas for achieving a positive secrecy outage capacity. Then, we propose an optimization framework to jointly optimize source transmit power, relay transmit power, and transmission time in each hop, with the goal of maximizing the secrecy outage capacity. Although the secrecy outage capacity is not a concave function with respect to the optimization variables, we show that it can be maximized by first maximizing over some of the variables, and then maximizing over the rest. To this end, we first derive a closed-form solution of optimal relay transmit power, afterward obtain that of optimal source transmit power, and then derive the optimal ratio of the first-hop duration to a complete transmission time. Moreover, several important system design insights are provided through asymptotic performance analysis. Finally, simulation results validate the effectiveness of the proposed joint resource allocation scheme.
引用
收藏
页码:1700 / 1711
页数:12
相关论文
共 43 条
  • [1] Secrecy capacity of wireless channels
    Barros, Joao
    Rodrigues, Miguel R. D.
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 356 - +
  • [2] On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary
    Basciftci, Yuksel Ozan
    Gungor, Onur
    Koksal, Can Emre
    Ozguner, Fusun
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (03) : 1325 - 1343
  • [3] Boyd S., 2008, CONVEX OPTIMIZATION
  • [4] Secure Transmission in Wireless Powered Massive MIMO Relaying Systems: Performance Analysis and Optimization
    Chen, Xiaoming
    Chen, Jian
    Liu, Tao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (10) : 8025 - 8035
  • [5] Multi-Antenna Relay Aided Wireless Physical Layer Security
    Chen, Xiaoming
    Zhong, Caijun
    Yuen, Chau
    Chen, Hsiao-Hwa
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 40 - +
  • [6] Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF?
    Chen, Xiaoming
    Lei, Lei
    Zhang, Huazi
    Yuen, Chau
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) : 5135 - 5146
  • [7] Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI-A Unified Secrecy Performance Analysis
    Chen, Xiaoming
    Chen, Hsiao-Hwa
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (23) : 6286 - 6297
  • [8] Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback
    Chen, Xiaoming
    Yin, Rui
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2013, 2 (05) : 503 - 506
  • [9] Deng YS, 2015, IEEE ICC, P4877, DOI 10.1109/ICC.2015.7249095
  • [10] Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    Deng, Yansha
    Wang, Lifeng
    Elkashlan, Maged
    Nallanathan, Arumugam
    Mallik, Ranjan K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1128 - 1138