Beamforming design for secure downlink transmission of MU-MIMO systems with multi-antenna eavesdropper

In this paper we investigate the physical layer security for downlink MU-MIMO systems where the transmitter and the eavesdropper are equipped with multiple antennas, while the legitimate users have single antenna. This is a more challenging topic because the eavesdropper appears to be more powerful than the legitimate users. We propose a transmission scheme able to enhance secure transmission for legitimate users, by intentionally applying different beamforming matrices to pilot signals and data signals. The beamforming matrix for data signals is constructed in a way that legitimate users can derive the channel matrix experienced by data signals based on pilot signals, whereas the eavesdropper fails to obtain the channel matrix experienced by data signals even with the aid of pilot signals. Therefore coherent detection at the eavesdropper is impossible and the signal-plus-interference-to-noise (SINR) of the eavesdropper is significantly degraded. In addition, the proposed beamforming design is formulated as an optimization problem to maximize the minimum SINR. We theoretically prove that with this formulation, the resultant optimal SINR is not affected by the proposed format of beamforming matrix for data signals. Numerical results show that, the proposed beamforming design outperforms the conventional beamforming design in terms of ergodic secrecy sum rate. Furthermore, with suitable beamforming designs, the ergodic secrecy sum rate achieved will not be noticeably affected by the number of antennas at the eavesdropper, although it is significantly degraded with conventional beamforming design.

[1]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[2]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[3]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  L. C. Godara,et al.  Handbook of Antennas in Wireless Communications , 2001 .

[6]  Shi Jin,et al.  Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis , 2014, IEEE Communications Letters.

[7]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[8]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[9]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[10]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[12]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[13]  Wei Xu,et al.  On Performance and Feedback Strategy of Secure Multiuser Communications With MMSE Channel Estimate , 2016, IEEE Transactions on Wireless Communications.

[14]  Xiaoming Chen,et al.  On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications With Imperfect CSI , 2016, IEEE Transactions on Vehicular Technology.

[15]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[16]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[17]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[18]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[19]  Stéphane Y. Le Goff,et al.  Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.

[20]  Yan Zhang,et al.  Investigation of Transmission Schemes for Millimeter-Wave Massive MU-MIMO Systems , 2017, IEEE Systems Journal.

[21]  Xiangyun Zhou,et al.  A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems , 2014, IEEE Transactions on Communications.

[22]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[23]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[24]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.