Physically Securing Energy-Based Massive MIMO MAC via Joint Alignment of Multi-User Constellations and Artificial Noise

This paper investigates the artificial noise (AN) aided physical layer security (PLS) for energy-based massive multi-input multi-output multi-access channels with finite-alphabet data inputs, where both the legitimate base station (Bob) and the passive eavesdropper (Eve) are equipped with large antenna arrays and each user has multiple antennas. For such system, the main challenge is how to allocate power between the transmitted constellation of finite size and AN for both interference management and PLS enhancement. To this end, we first characterize a distance-optimal (DO) constellation structure that maximizes the minimum Euclidean distance of the received signals with energy detection. It turns out that the DO multiuser constellations constitute a commonly-used pulse amplitude modulation (PAM) constellation at the receiver side. Then, we specifically design an energy-efficient PAM-constellation alignment to form a received sizeable PAM constellation by adaptively aligning the power of multi-users’ PAM sub-constellations. This design provides us with a new finite-alphabet non-orthogonal multi-access scheme as well as with a stepped water filling (SWF) power allocation between the constellation and AN for each user, which can provide the power-domain freedom for PLS. To spatially exploit this freedom, a SWF-based product-constant AN generation algorithm is developed such that the product of Bob’s channel and the AN is a constant which can be inferred by Bob, and the channel-noise product for Eve cannot be uniquely determined, even for noise-free channels. Simulations indicate that for SWF, Bob’s error rate will vanish when the number of the receiver antennas goes to large, but Eve’s error rate has a non-vanishing lower-bound, even with an unlimited number of antennas. In addition, PAMA, as a new finite-alphabet NOMA scheme, has significant advantages in both security and communication error performance over the time division multi-access.

[1]  Andrea J. Goldsmith,et al.  Design and performance of noncoherent massive SIMO systems , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).

[2]  G. Ascheid,et al.  Security-Constrained Power Allocation in MU-Massive-MIMO With Distributed Antennas , 2016, IEEE Transactions on Wireless Communications.

[3]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[4]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[5]  Ning Wang,et al.  Secure Massive MIMO Systems With Limited RF Chains , 2016, IEEE Transactions on Vehicular Technology.

[6]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[7]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[8]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[9]  Iain B. Collings,et al.  Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[10]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[11]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[12]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[13]  Geoffrey Ye Li,et al.  Modulation and Multiple Access for 5G Networks , 2017, IEEE Communications Surveys & Tutorials.

[14]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[15]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[16]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[17]  Antonia Maria Tulino,et al.  Optimum power allocation for parallel Gaussian channels with arbitrary input distributions , 2006, IEEE Transactions on Information Theory.

[18]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[19]  Robert Schober,et al.  Secure Transmission With Large Numbers of Antennas and Finite Alphabet Inputs , 2017, IEEE Transactions on Communications.

[20]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[21]  Andrea J. Goldsmith,et al.  Scaling Laws for Noncoherent Energy-Based Communications in the SIMO MAC , 2016, IEEE Transactions on Information Theory.

[22]  Petar Popovski,et al.  The METIS 5G System Concept: Meeting the 5G Requirements , 2016, IEEE Communications Magazine.

[23]  Meixia Tao,et al.  Linear Precoding for Fading Cognitive Multiple-Access Wiretap Channel With Finite-Alphabet Inputs , 2017, IEEE Transactions on Vehicular Technology.

[24]  Naofal Al-Dhahir,et al.  Secure Alamouti MAC Transmissions , 2017, IEEE Transactions on Wireless Communications.

[25]  Il-Min Kim,et al.  Cooperative jamming polar codes for multiple-access wiretap channels , 2016, IET Commun..

[26]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[27]  Yi Hong,et al.  Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.

[28]  Tommy Svensson,et al.  The role of small cells, coordinated multipoint, and massive MIMO in 5G , 2014, IEEE Communications Magazine.

[29]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[30]  Paul Fortier,et al.  Physical layer security of multiple-input-multiple-output systems with transmit beamforming in Rayleigh fading , 2015, IET Commun..

[31]  Rodney G. Vaughan,et al.  A statistical basis for lognormal shadowing effects in multipath fading channels , 1998, IEEE Trans. Commun..

[32]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[33]  Andrea J. Goldsmith,et al.  Energy-Based Modulation for Noncoherent Massive SIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[34]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.