Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements

In this paper, we investigate the energy efficient physical layer security in large scale multiple-input multiple output (MIMO) cognitive radio networks where each secondary user has its imposed quality of service (QoS) constraint in terms of signal-to-interference-plus-noise ratio (SINR). In the proposed system model, eavesdroppers overhear the legitimate communication passively that results in loss in secrecy capacity/rate and jammers jam the legitimate communication with an aim to deteriorate the SINR at the receiver for the users. The legitimate secondary users in cognitive radio networks adapt their transmit waveforms and transmit powers on the fly to find the least jammed/interfered channels to communicate with high achievable data rates. The performance of the proposed approach is evaluated using numerical results obtained from simulations.

[1]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[2]  Pramod Viswanath,et al.  Optimal sequences, power control and capacity of spread spectrum systems with multiuser linear recei , 1968 .

[3]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[4]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[6]  Sachin Shetty,et al.  Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems , 2016, IEEE Systems Journal.

[7]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[9]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[10]  Danda B. Rawat ROAR: An architecture for Real-Time Opportunistic Spectrum Access in Cloud-assisted Cognitive Radio Networks , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[11]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[12]  Danda B. Rawat,et al.  A novel algorithm for secrecy rate analysis in massive MIMO system with target SINR requirements , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[13]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[14]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[15]  Sachin Shetty,et al.  Dynamic Spectrum Access for Wireless Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.

[16]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO transmission in the presence of an active eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).

[17]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[18]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[19]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[20]  Thomas L. Marzetta,et al.  Pilot Contamination and Precoding in Multi-Cell TDD Systems , 2009, IEEE Transactions on Wireless Communications.

[21]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[22]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[23]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Yu-Dong Yao,et al.  Opportunistic Distributed Space-Time Coding for Decode-and-Forward Cooperation Systems , 2012, IEEE Transactions on Signal Processing.

[25]  Sabina Jeschke,et al.  Industrial Internet of Things: Cybermanufacturing Systems , 2016 .

[26]  Mérouane Debbah,et al.  Massive MIMO: How many antennas do we need? , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[27]  Erik G. Larsson,et al.  Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..

[28]  Brian M. Sadler,et al.  Cognitive Medium Access: Constraining Interference Based on Experimental Models , 2008, IEEE Journal on Selected Areas in Communications.

[29]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[30]  Nathaniel E. Helwig,et al.  An Introduction to Linear Algebra , 2006 .

[31]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[32]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[33]  Danda B. Rawat,et al.  Cyber-Physical Systems: From Theory to Practice , 2015 .

[34]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.