skip to main content
10.1145/2757743.2757745acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Radiated Power Scaling Factor and Its Effect on The Secrecy Performance of Multi-user Massive MIMO System

Authors Info & Claims
Published:22 June 2015Publication History

ABSTRACT

In this paper, we investigate the effect of radiated power scaling (RPS) factors on the secrecy performance of multiuser massive multiple-input multiple-output (MIMO) system. We consider secure forward link and reverse link transmissions in the scenario which includes a base station (BS) equipped with a large number of service antennas, multiple single-antenna legitimate users and a passive multi-antenna eavesdropper. Maximum ratio transmission (MRT) and maximum ratio combining (MRC) techniques are used as linear precoder and detector, respectively, on the forward and reverse links. Lower and upper bounds on the ergodic achievable rates corresponding to legitimate users and the eavesdropper are derived, respectively. Then the optimal RPS factors which minimize the upper bounds on the achievable rates of the eavesdropper while satisfying the rate constraints of legitimate users are presented. We also show that the corresponding required total radiated power decreases as the number of BS antennas grows larger. Moreover, in the limit of an infinite number of BS antennas, we prove that the optimal RPS factors converge to constant limits. Our work suggests that with proper selected RPS factors, massive MIMO itself is an effective and low power consuming scheme to achieve both the transmission and security performance. Extensive simulations corroborate the corresponding results.

References

  1. S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun., 7(6):2180--2189, June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. L. Swindlehurst. Fixed sinr solutions for the mimo wiretap channel. In Proc. of IEEE ICASSP, pages 2437--2440, Taipei, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Mukherjee and A. L. Swindlehurst. Robust beamforming for secrecy in mimo wiretap channels with imperfect csi. IEEE Trans. Signal Process., 59(1):351--361, January 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Romero-Zurita, M. Ghogho, and D. McLernon. Outage probability based power distribution between data and artificial noise for physical layer security. IEEE Signal Process. Lett., 19(2):71--74, February 2012.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Pei, J. Wei, K. K. Wong, and X. Wang. Masked beamforming for multiuser mimo wiretap channels with imperfect csi. IEEE Trans. Wireless Commun., 11(2):544--549, February 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. A. A. Fakoorian and A. L. Swindlehurst. On the optimality of linear precoding for secrecy in the mimo broadcast channel. IEEE J. Sel. Areas Commun., 31(9):1701--1713, September 2013.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei. On ergodic secrecy rate for miso wiretap broadcast channels with opportunistic scheduling. IEEE Commun. Lett., 18(1):50--53, January 2014.Google ScholarGoogle ScholarCross RefCross Ref
  8. W. Li, M. Ghogho, B. Chen, and C. Xiong. Secure communication via sending artificial noise by the receiver: outage secrecy capacity/region analysis. IEEE Commun. Lett., 16(10):1628--1631, October 2012.Google ScholarGoogle ScholarCross RefCross Ref
  9. N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami. Phylayer security based on protected zone and artificial noise. IEEE Signal Process. Lett., 20(5):487--490, May 2013.Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Khisti and G. Wornell. Secure transmission with multiple antennas i: the misome wiretap channel. IEEE Trans. Inf. Theory, 56(7):3088--3104, July 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Khisti and G. Wornell. Secure transmission with multiple antennas ii: the mimome wiretap channel. IEEE Trans. Inf. Theory, 56(11):5515--5532, November 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Dean and A. Goldsmith. Physical-layer cryptography through massive mimo. In IEEE Inf. Theory Workshop, pages 1--5, Seville, September 2013.Google ScholarGoogle ScholarCross RefCross Ref
  13. T. L. Marzetta. Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE Trans. Wireless Commun., 9(11):3590--3600, November 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson. Scaling up mimo: opportunities and challenges with very large arrays. IEEE Signal Process. Mag., 30(1):40--46, January 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta. Massive mimo for next generation wireless systems. IEEE Commun. Mag., 52(2):186--195, February 2014.Google ScholarGoogle ScholarCross RefCross Ref
  16. J. Zhu, R. Schober, and V. K. Bhargava. Secure transmission in multicell massive mimo systems. IEEE Trans. Wireless Commun., 13(9):4766--4781, September 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. M. Tulino and S. Verdú. Random matrix theory and wireless communications. Communications and Information theory, 1(1):1--182, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Radiated Power Scaling Factor and Its Effect on The Secrecy Performance of Multi-user Massive MIMO System

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MSCC '15: Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication
        June 2015
        66 pages
        ISBN:9781450335188
        DOI:10.1145/2757743

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 June 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate6of6submissions,100%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader