Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming

Cooperative jamming is deemed as a promising physical layer-based approach to secure wireless transmissions in the presence of eavesdroppers. In this paper, we investigate cooperative jamming in a two-tier 5G heterogeneous network (HetNet), where the macrobase stations (MBSs) at the macrocell tier are equipped with large-scale antenna arrays to provide space diversity and the local base stations (LBSs) at the local cell tier adopt non-orthogonal multiple access (NOMA) to accommodate dense local users (LUs). In the presence of imperfect channel state information, we propose three robust secrecy transmission algorithms that can be applied to various scenarios with different security requirements. The first algorithm employs robust beamforming (RBA) that aims to optimize the secrecy rate of a marcouser (MU) in a macrocell. The second algorithm provides robust power allocation (RPA) that can optimize the secrecy rate of an LU in a local cell. The third algorithm tackles a robust joint optimization (RJO) problem across tiers that seek the maximum secrecy sum rate of a target MU and a target LU robustly. We employ convex optimization techniques to find feasible solutions to these highly non-convex problems. The numerical results demonstrate that the proposed algorithms are highly effective in improving the secrecy performance of a two-tier HetNet.

[1]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[2]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[3]  Qi Zhang,et al.  Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.

[4]  Chen-Mou Cheng,et al.  Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.

[5]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[6]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[7]  Zhen Li,et al.  Worst-Case Jamming for Secure Communications in Multi-antenna Cooperative Cognitive Radio Networks with Energy Harvesting , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[8]  Kai-Kit Wong,et al.  Safeguarding massive MIMO aided hetnets using physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[9]  Xiaofeng Tao,et al.  Secrecy Outage Probability in Multi-RAT Heterogeneous Networks , 2016, IEEE Communications Letters.

[10]  Tiejun Lv,et al.  Semi-Blind Channel Estimation Relying on Optimum Pilots Designed for Multi-Cell Large-Scale MIMO Systems , 2016, IEEE Access.

[11]  Xiaoshuang Xing,et al.  Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[12]  Hyung Yun Kong,et al.  CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security , 2014, IEEE Communications Letters.

[13]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[14]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[15]  Georges Kaddoum,et al.  A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[16]  Xiaoshuang Xing,et al.  Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks , 2017, IET Commun..

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  João P. Vilela,et al.  Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers , 2018, IEEE Transactions on Information Forensics and Security.

[19]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[20]  Qi Zhang,et al.  Robust Beamforming for Nonorthogonal Multiple-Access Systems in MISO Channels , 2016, IEEE Transactions on Vehicular Technology.

[21]  A. Lee Swindlehurst,et al.  Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[22]  J. Magnus,et al.  Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .

[23]  Zhijin Qin,et al.  Non-Orthogonal Multiple Access in Large-Scale Heterogeneous Networks , 2017, IEEE Journal on Selected Areas in Communications.

[24]  Jinho Choi,et al.  Downlink Throughput Maximization for OFDMA Systems With Feedback Channel Capacity Constraints , 2011, IEEE Transactions on Signal Processing.

[25]  J. Magnus,et al.  Matrix Differential Calculus with Applications in Statistics and Econometrics (Revised Edition) , 1999 .

[26]  H. Vincent Poor,et al.  Non-Orthogonal Multiple Access in Multi-Cell Networks: Theory, Performance, and Practical Challenges , 2016, IEEE Communications Magazine.

[27]  Bjorn Ottersten,et al.  Optimal Downlink BeamformingUsing Semidefinite Optimization , 1999 .

[28]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[29]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[30]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[31]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[32]  Shi Jin,et al.  Performance Analysis of Mixed-ADC Massive MIMO Systems Over Rician Fading Channels , 2017, IEEE Journal on Selected Areas in Communications.

[33]  Mounir Ghogho,et al.  Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[34]  Yongbin Wei,et al.  A survey on 3GPP heterogeneous networks , 2011, IEEE Wireless Communications.

[35]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[36]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[37]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[38]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[39]  Tiejun Lv,et al.  Robust Beamforming and Power Allocation for Secrecy in DF Relay Networks With Imperfect Channel State Information , 2016, IEEE Access.

[40]  Hongjian Sun,et al.  Unified Framework for the Effective Rate Analysis of Wireless Communication Systems Over MISO Fading Channels , 2017, IEEE Transactions on Communications.

[41]  Andrea J. Goldsmith,et al.  Optimality of zero-forcing beamforming with multiuser diversity , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[42]  Liang Huang,et al.  Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information , 2017, WASA.

[43]  Chunqiang Hu,et al.  A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI , 2017, IEEE Access.

[44]  Jin Xu,et al.  Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.

[45]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[46]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[47]  Zhen Li,et al.  Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.

[48]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[49]  Eduard A. Jorswieck Secrecy capacity of single- and multi-antenna channels with simple helpers , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).

[50]  Haralabos C. Papadopoulos,et al.  Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design , 2004, IEEE Transactions on Signal Processing.

[51]  Marwan Krunz,et al.  Friendly Jamming in a MIMO Wiretap Interference Network: A Nonconvex Game Approach , 2017, IEEE Journal on Selected Areas in Communications.

[52]  George K. Karagiannidis,et al.  Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.

[53]  Xianbin Wang,et al.  Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.

[54]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[55]  Xiaohong Jiang,et al.  On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.

[56]  Jeffrey G. Andrews,et al.  Heterogeneous cellular networks: From theory to practice , 2012, IEEE Communications Magazine.

[57]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[58]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[59]  Philippe Loubaton,et al.  A subspace algorithm for certain blind identification problems , 1997, IEEE Trans. Inf. Theory.

[60]  Ha H. Nguyen,et al.  Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.

[61]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[62]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[63]  Qi Zhang,et al.  Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.