Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective

In this paper, we consider a homogenous multiantenna downlink network, where a passive eavesdropper intends to intercept the communication between a base station and multiple secure users (SUs) over Rayleigh fading channels. In order to guarantee the security of information transfer, physical-layer security is employed accordingly. For such a multiple user (MU) secure network, the number of accessing SUs, i.e., the transmission mode, has a great impact on the secrecy performance. Specifically, on one hand, a large number of accessing SUs will result in high interuser interference at SUs, resulting in a reduction in the capacity of the legitimate channel. On the other hand, high interuser interference will interfere with the eavesdropper and thus degrades the performance of the eavesdropper channel. Generally speaking, the harmful interuser interference may be transformed as a useful tool in antieavesdropping. The focus of this paper is on selecting the optimal transmission mode according to channel conditions and system parameters to maximize the sum secrecy outage capacity. Moreover, through asymptotic analysis, we present several simple mode selection schemes in some extreme cases. Finally, simulation results validate the effectiveness of the proposed mode selection schemes in MU secure communications.

[1]  Xiaoming Chen,et al.  Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback , 2013, IEEE Wireless Communications Letters.

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[3]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[4]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[5]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[6]  David Tse,et al.  Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.

[7]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[8]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[9]  Jeffrey G. Andrews,et al.  Space Division Multiple Access With a Sum Feedback Rate Constraint , 2007, IEEE Transactions on Signal Processing.

[10]  A. Lee Swindlehurst,et al.  On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling , 2014, IEEE Communications Letters.

[11]  Tao Liu,et al.  Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[12]  Hyundong Shin,et al.  Power Allocation and Achievable Secrecy Rates in MISOME Wiretap Channels , 2011, IEEE Communications Letters.

[13]  Jeffrey G. Andrews,et al.  Opportunistic Space-Division Multiple Access With Beam Selection , 2006, IEEE Trans. Commun..

[14]  D. F. Hays,et al.  Table of Integrals, Series, and Products , 1966 .

[15]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[16]  Aria Nosratinia,et al.  Opportunistic Downlink Transmission With Limited Feedback , 2007, IEEE Transactions on Information Theory.

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Björn E. Ottersten,et al.  Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.

[19]  Shi Jin,et al.  Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis , 2014, IEEE Communications Letters.

[20]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[21]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[22]  Xiaoming Chen,et al.  Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.

[23]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[24]  Hsiao-Hwa Chen,et al.  Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.

[25]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[26]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[27]  Abdul L. Bello,et al.  Tables of Integrals, Series, and Products , 1995 .

[28]  Chao Wang,et al.  Adaptive Mode Selection for Multiuser MIMO Downlink Employing Rateless Codes with QoS Provisioning , 2012, IEEE Transactions on Wireless Communications.

[29]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[30]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[31]  Tiejun Lv,et al.  Beamforming for secure two-way relay networks with physical layer network coding , 2014, 2014 IEEE Global Communications Conference.

[32]  Jeffrey G. Andrews,et al.  WLCp1-16: Capacity of Opportunistic Space Division Multiple Access with Beam Selection , 2006, IEEE Globecom 2006.

[33]  Tiejun Lv,et al.  Robust Beamforming and Jamming for Secure AF Relay Networks with Multiple Eavesdroppers , 2014, 2014 IEEE Military Communications Conference.

[34]  Jeffrey G. Andrews,et al.  Multi-Mode Transmission for the MIMO Broadcast Channel with Imperfect Channel State Information , 2009, IEEE Transactions on Communications.

[35]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[36]  Chau Yuen,et al.  Achieving near-capacity at low SNR on a multiple-antenna multiple-user channel , 2009, IEEE Transactions on Communications.

[37]  Elza Erkip,et al.  On beamforming with finite rate feedback in multiple-antenna systems , 2003, IEEE Trans. Inf. Theory.