Achieving physical layer security with massive MIMO beamforming

Physical layer security allows secure communications between a source and destination without the need to resort to key-based encryption techniques. Its increasing importance stems from the difficulty of implementing advanced encryption techniques in certain networks, such as the internet of things (IoT). In this paper, physical layer security is implemented by using massive multiple input multiple output (MIMO) techniques. Specifically, beamforming with large cylindrical antenna arrays is investigated. These arrays allow the transmission of both the useful signal to the destination and the jamming signal to the eavesdropper without resorting to the help of other nodes for relaying the signal and/or jamming the eavesdropper. Simulation results show that high levels of secrecy capacity can be achieved with the proposed approach.

[1]  Ali El-Hajj,et al.  Cylindrical Antenna Arrays for WCDMA Downlink Capacity Enhancement , 2006, 2006 IEEE International Conference on Communications.

[2]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[3]  Xiaoming Chen,et al.  On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Ali Chehab,et al.  Hybrid linear and circular antenna arrays , 2007 .

[5]  Mohammad Naser-Moghaddasi,et al.  Investigation of hybrid elliptical antenna arrays , 2008 .

[6]  Buon Kiong Lau,et al.  A Dolph-Chebyshev approach to the synthesis of array patterns for uniform circular arrays , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Muhammad Ali Imran,et al.  MmWave massive-MIMO-based wireless backhaul for the 5G ultra-dense network , 2015, IEEE Wireless Communications.

[9]  Constantine A. Balanis,et al.  Antenna Theory: Analysis and Design , 1982 .

[10]  C. Balanis Antenna theory , 1982 .

[11]  Eduard A. Jorswieck,et al.  To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.