Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping

Secure communication in underlay spectrum sharing multi-user massive multiple-input multiple-output systems with active eavesdropping is investigated. The primary base-station (PBS) shares its licensed spectrum with the secondary base-station (SBS), which constrains its transmit power subject to a primary interference temperature. The active eavesdropper contaminates the uplink pilots in an attempt to intercept the confidential downlink transmissions toward the legitimate primary/secondary user nodes (PUs/SUs). The achievable PU/SU rates, the rates leaked into the active eavesdropper, and the achievable secrecy rates are derived for the finite and infinite PBS/SBS antenna regimes. A power-ratio-based active pilot attack detection scheme is investigated, and thereby, the probability of detection is derived. Our analysis and simulation results reveal that the active pilot attacks severely degrades the achievable secrecy rates even in the asymptotic PBS/SBS antenna regime. Hence, in order to provide guaranteed physical layer security, the active pilot attacks must be detected, and dynamic pilot decontamination techniques need to be employed.

[1]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[2]  Thomas L. Marzetta,et al.  Performance of Conjugate and Zero-Forcing Beamforming in Large-Scale Antenna Systems , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Babak Hassibi,et al.  How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.

[4]  Kwok Hung Li,et al.  Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.

[5]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[6]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[7]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Paul Cuff,et al.  Information Theoretic Security and Privacy of Information Systems , 2016 .

[9]  Robert W. Heath,et al.  Five disruptive technology directions for 5G , 2013, IEEE Communications Magazine.

[10]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[11]  G. Ascheid,et al.  Security-Constrained Power Allocation in MU-Massive-MIMO With Distributed Antennas , 2016, IEEE Transactions on Wireless Communications.

[12]  Erik G. Larsson,et al.  Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.

[13]  Ning Wang,et al.  Secure Massive MIMO Systems With Limited RF Chains , 2016, IEEE Transactions on Vehicular Technology.

[14]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[15]  Gayan Amarasuriya Aruma Baduge,et al.  Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination , 2017, Entropy.

[16]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[17]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[18]  Tao Zhang,et al.  Secure Transmission in Cognitive MIMO Relaying Networks With Outdated Channel State Information , 2016, IEEE Access.

[19]  Imran Shafique Ansari,et al.  Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.

[20]  Jitendra K. Tugnait Detection and Identification of Spoofed Pilots in TDD/SDMA Systems , 2017, IEEE Wireless Communications Letters.

[21]  Andrea J. Goldsmith,et al.  Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.

[22]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.

[23]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[24]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[25]  Mazen O. Hasna,et al.  A Collaboration Incentive Exploiting the Primary-Secondary Systems’ Cross Interference for PHY Security Enhancement , 2016, IEEE Journal of Selected Topics in Signal Processing.

[26]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[27]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[28]  Hui-Ming Wang,et al.  On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system , 2016, IEEE Access.

[29]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[30]  Yu-Cheng He,et al.  Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Communications.

[31]  Shlomo Shamai,et al.  Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.

[32]  George K. Karagiannidis,et al.  Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications , 2017, IEEE Transactions on Cognitive Communications and Networking.

[33]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[34]  Erik G. Larsson,et al.  No Downlink Pilots Are Needed in TDD Massive MIMO , 2016, IEEE Transactions on Wireless Communications.

[35]  Trung Quang Duong,et al.  Secure Transmission in Spectrum Sharing MIMO Channels With Generalized Antenna Selection Over Nakagami- $m$ Channels , 2016, IEEE Access.

[36]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[37]  Gayan Amarasuriya Aruma Baduge,et al.  Secure Communication in Underlay Cognitive Massive MIMO Systems with Pilot Contamination , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[38]  Kai-Kit Wong,et al.  Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[39]  Mohamed-Slim Alouini,et al.  On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Cognitive Communications and Networking.