Next Article in Journal
An Alternative for Indicators that Characterize the Structure of Economic Systems
Next Article in Special Issue
A Survey on Robust Interference Management in Wireless Networks
Previous Article in Journal
Multi-Objective Optimization for Solid Amine CO2 Removal Assembly in Manned Spacecraft
Previous Article in Special Issue
On the Energy-Distortion Tradeoff of Gaussian Broadcast Channels with Feedback
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination

by
Hayder Al-Hraishawi
1,*,
Gayan Amarasuriya Aruma Baduge
1 and
Rafael F. Schaefer
2
1
Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL 62901, USA
2
Information Theory and Applications Chair, Technische Universität Berlin, Berlin 10587, Germany
*
Author to whom correspondence should be addressed.
Entropy 2017, 19(7), 349; https://doi.org/10.3390/e19070349
Submission received: 2 June 2017 / Revised: 23 June 2017 / Accepted: 27 June 2017 / Published: 10 July 2017
(This article belongs to the Special Issue Network Information Theory)

Abstract

:
In this paper, a secure communication model for cognitive multi-user massive multiple-input multiple-output (MIMO) systems with underlay spectrum sharing is investigated. A secondary (cognitive) multi-user massive MIMO system is operated by using underlay spectrum sharing within a primary (licensed) multi-user massive MIMO system. A passive multi-antenna eavesdropper is assumed to be eavesdropping upon either the primary or secondary confidential transmissions. To this end, a physical layer security strategy is provisioned for the primary and secondary transmissions via artificial noise (AN) generation at the primary base-station (PBS) and zero-forcing precoders. Specifically, the precoders are constructed by using the channel estimates with pilot contamination. In order to degrade the interception of confidential transmissions at the eavesdropper, the AN sequences are transmitted at the PBS by exploiting the excess degrees-of-freedom offered by its massive antenna array and by using random AN shaping matrices. The channel estimates at the PBS and secondary base-station (SBS) are obtained by using non-orthogonal pilot sequences transmitted by the primary user nodes (PUs) and secondary user nodes (SUs), respectively. Hence, these channel estimates are affected by intra-cell pilot contamination. In this context, the detrimental effects of intra-cell pilot contamination and channel estimation errors for physical layer secure communication are investigated. For this system set-up, the average and asymptotic achievable secrecy rate expressions are derived in closed-form. Specifically, these performance metrics are studied for imperfect channel state information (CSI) and for perfect CSI, and thereby, the secrecy rate degradation due to inaccurate channel knowledge and intra-cell pilot contamination is quantified. Our analysis reveals that a physical layer secure communication can be provisioned for both primary and secondary massive MIMO systems even with the channel estimation errors and pilot contamination.

1. Introduction

Massive multiple-input multiple-output (MIMO) is currently being investigated as one of the key enabling technologies for the 5th generation wireless standard [1]. Specifically, in massive MIMO systems, very large antenna arrays are used for aggressive spatial multiplexing and focusing radiated energy towards desired spatial directions [2,3]. Thereby, massive MIMO can potentially provide unprecedented gains in spectral and energy efficiencies compared to conventional MIMO.
Confidentiality of transmitted information is one of the key challenges for system designers of next generation wireless communication networks [4]. To protect confidential communication against intruders and eavesdropper attacks, the concept of physical layer security [5,6,7,8,9] has recently attracted significant interest to complement current cryptographic approaches on higher layers. These techniques realize secure communication directly at the physical layer by exploiting the noisiness and imperfection of the wireless communication channel for degrading the quality of signal reception at eavesdroppers, and thereby prevent them from eavesdropping upon the confidential information from the intercepted signals [4].
Another concept that promises significant gains in performance for wireless communication networks are so-called cognitive radio networks. These cognitive networks allow secondary systems to access the licensed spectrum of the primary systems by exploiting the underlay spectrum sharing techniques, and thereby, mitigating the spectrum under-utilization of current wireless systems and significantly improving the spectral efficiency [10]. In cognitive radio systems, where the primary spectrum is an open medium to be accessed and utilized by the secondary systems, achieving end-to-end security is a crucial challenge to the system designs and configurations. Information theoretic secrecy provisioning for cognitive radio networks has been investigated, e.g., in [11,12].
In the event that the eavesdroppers intercept confidential signals passively, they do not transmit in order to conceal their existence. Therefore, the acquisition of the channel state information (CSI) of the eavesdropping channels at the massive MIMO base-stations (BSs) will be difficult. Although the null-space beamforming techniques can be effectively used in conventional MIMO BS for provisioning of physical layer security, constructing such sophisticated precoders at the massive MIMO BSs will be prohibitively complicated. Alternatively, artificial noise (AN) sequences can be exploited for massive MIMO BSs. In this context, massive MIMO techniques can be used in cognitive radio systems for provisioning physical layer security by exploiting the large antenna arrays at the BSs to simultaneously transmit confidential signals towards the legitimate user nodes and AN sequences towards eavesdroppers for perturbing the intercepted signals.
Notwithstanding that the massive MIMO techniques have received significant interest recently, little research exists on securing massive MIMO systems by exploiting physical layer security strategies. Next, some of the important contributions to the development of physical layer provisioning in massive MIMO systems are summarized. In [13], a secure transmission scheme for single-hop massive MIMO systems is investigated by deriving the secrecy rates and secrecy outage probabilities for perfect and imperfect CSI. Furthermore, in [14], the effects of linear precoding of data and AN in secure massive MIMO downlink are studied. Specifically, in [14], linear precoders that are based on matrix polynomials are proposed for both data and AN precoding, and consequently, the corresponding polynomial coefficients are optimized to minimize the sum mean-squared error and the AN leakage to the user nodes. In [15], optimal power allocation with security constraints in multi-user massive MIMO systems with distributed antennas is investigated. Moreover, in [16], the physical layer security and energy efficiency aspects are investigated for massive MIMO-enabled heterogeneous cloud radio access networks.
Although there is a symbiotic relationship between massive MIMO and cognitive radio networks to achieve a groundbreaking spectral and energy efficiencies for future wireless systems, facilitating secrecy at the physical layer of cognitive massive MIMO systems has not yet received any attention in the existing studies in the literature. To fill this gap, in this paper, a secure downlink transmission strategy is investigated for cognitive massive MIMO systems with underlay spectrum sharing in the presence of a passive multi-antenna eavesdropper. To this end, a secondary massive MIMO system is allowed to access the licensed spectrum of a primary massive system subject to an interference temperature constraint, which is the maximum tolerable co-channel interference (CCI) power at the primary system. Consequently, the secondary transmit power is constrained such that the CCI inflicted at the primary system due to secondary concurrent transmission is maintained below this interference temperature. The motive of the eavesdropper is to intercept the confidential transmissions of the primary or secondary systems. By assuming that the eavesdropper’s CSI is unavailable, AN sequences are generated at the primary base-station (PBS) for provisioning physical layer security by exploiting the additional degrees-of-freedom offered by its massive antenna array. The construction of null-space-based AN shaping precoders at the PBS is prohibitively complicated due to its massive antenna array, and hence, random AN shaping matrices are advocated. Furthermore, zero-forcing (ZF) based precoders are used at the PBS and the secondary base-station (SBS).
The uplink channels of the primary and secondary systems are estimated at the corresponding BSs by using pilots transmitted by the primary user nodes (PUs) and secondary user nodes (SUs), respectively. The number of orthogonal pilot sequences is limited and depends on the coherence interval of the wireless channels [2]. Hence, the same pilot sequence is shared among both PUs and SUs for minimum mean square error (MMSE) channel estimation. Nevertheless, a normalized pseudo-inverse of a complex Gaussian random matrix is used for AN shaping at the PBS, and thereby, the burden of estimating the eavesdropper’s channels is avoided.
The performance of the aforementioned system set-up is investigated by deriving the achievable secrecy rates in closed-form for both imperfect and perfect channel state information (CSI) cases. The impacts of the numbers of PBS and SBS antennas are investigated in the context of provisioning physical layer secure transmission for cognitive massive MIMO systems. Furthermore, the detrimental effects of intra-cell secondary interference, channel estimation errors, intra-cell pilot contamination, and AN leakage into the desired signals at the PUs and SUs are investigated for the imperfect and perfect CSI cases. Thereby, the achievable secrecy rate degradation due to intra-cell pilot contamination and inaccurate channel estimation is quantified.
Notation: A * , A T , A H , and [ A ] k , l denote the conjugate, transpose, Hermitian-transpose, and the ( k , l ) th element of a matrix A , respectively. E [ · ] is the expectation and the operator ⊗ denotes the Kronecker product.

2. System, Channel, and Signal Models

In this section, the system, channel, and signal models of a cognitive multi-user massive MIMO system are presented.

2.1. System and Channel Model

We consider a cognitive multi-user MIMO network with underlay spectrum sharing (see Figure 1). A multi-user secondary MIMO system is underlaid within a primary multi-user MIMO system. The secondary system shares the same licensed frequency spectrum of the primary system by exploiting the concepts of cognitive underlay spectrum sharing [10]. The primary system consists of an N P -antennas PBS and K single-antenna PUs. In the secondary system, M single-antenna SUs are served by an N S -antenna SBS. The ratio between the numbers of BS antennas at the primary and secondary systems is defined as β = N P / N S . The numbers of antennas at the PBS and SBS can grow without limit compared to the numbers of PUs and SUs, ( N P K ) and ( N S M ), while keeping a fixed ratio β = N P / N S . Moreover, an N E -antenna eavesdropper seeks passively to eavesdrop upon the information transmitted to user nodes, either in the primary or secondary system.
Let F T C ( K × N P ) be the channel matrix between the PBS and PUs, and G T C ( M × N S ) is the channel matrix between the SBS and SUs. Here, V T C ( K × N S ) and U T C ( M × N P ) are the interference channel matrices between the SBS and PUs and between the PBS and SUs, respectively. Moreover, H P T C ( N E × N P ) is the channel matrix between the PBS and the eavesdropper, and H S T C ( N E × N S ) is the channel matrix between the SBS and the eavesdropper. For the sake of the brevity of exposition, all the aforementioned channels can be correspondingly defined in the following general expression:
C = D C 1 / 2 C ˜ ,
where C { F , G , V , U , H P , H S } , C ˜ CN P × Q 0 P × Q , I P I Q models the independent small-scale Rayleigh fading, and diagonal matrix D C = diag ( ζ C 1 , , ζ C Q ) captures the path-loss.

2.2. Uplink Training and Channel Estimation

In massive MIMO systems, the uplink CSI is estimated at the BS from the uplink pilot sequences transmitted by the user nodes during the training period of the coherence interval (T). Then, the downlink channel is obtained from the uplink CSI by exploiting the channel reciprocity in time-division duplex (TDD) mode of operation. Here, for the sake of exposition, we assume that the numbers of PUs and SUs are the same ( K = M ). Therefore, all the PUs and SUs transmit simultaneously ( τ ) symbols of T as pilot sequences. The received pilot signals at the PBS and SBS are given by:
Y P = τ P U F Φ P + τ P U U Φ S + Z P ,
Y S = τ P U G Φ S + τ P U V Φ P + Z S ,
respectively, where P U is the average transmit power of each pilot symbol, Φ P is a K × τ pilot symbol matrix transmitted by the PUs, where Φ P H is a τ × K unitary matrix ( τ K ) satisfying Φ P Φ P H = I K , and Φ S is an K × τ pilot symbol matrix transmitted by the SUs, where Φ S H is a τ × K unitary matrix ( τ K ) satisfying Φ S Φ S H = I K . Furthermore, Z P and Z S are additive white Gaussian noise (AWGN) matrices at the PBS and SBS with independent and identically distributed (i.i.d.) CN ( 0 , 1 ) elements, respectively. In (2), all pilot sequences are non-orthogonal, i.e., the primary and secondary systems share the same pilot sequences, i.e., Φ P = Φ S = Φ , which practically represents the worst-case scenario. Thus, the uplink channel estimates at the PBS and SBS are affected by pilot contamination, then the MMSE channel estimate of F can be derived as [3]:
F ^ = 1 τ P U Y P Φ P D F + D U + I K τ P U 1 D F (3) = F + U + Z F τ P U D F + D U + I K τ P U 1 D F ,
where Z F = Z P Φ P is an estimation noise matrix consisting of i.i.d. CN ( 0 , 1 ) elements. In (3), F and Z F are statistically independent. Let ε F be the estimation error matrix of F . By using MMSE properties, the channel can be decomposed as:
F = F ^ + ε F .
From the property of MMSE estimation, F ^ and ε F are independent. Furthermore, the rows of F ^ and ε F are mutually independent and distributed as CN ( 0 , D ^ F ) and CN ( 0 , D F D ^ F ) , respectively, where D ^ F is a diagonal matrix, whose k-th diagonal element is:
σ F ^ k 2 = τ P U ζ F k 2 τ P U ζ F k + ζ U k + 1 .
Next, by applying steps similar to those used for deriving (3), the MMSE channel estimate of G can be derived as follows:
G ^ = G + V + Z G τ P U D G + D V + I M τ P U 1 D G ,
where Z G = Z S Φ S is a noise matrix with i.i.d. CN ( 0 , 1 ) random variables. Both G and Z G in (6) are statistically independent. The estimation error matrix of G at SBS is denoted by ε G , where the channel can be decomposed as:
G = G ^ + ε G .
Again, G ^ and ε G are independent. Also, the rows of G ^ and ε G are mutually independent and distributed as CN ( 0 , D ^ G ) and CN ( 0 , D G D ^ G ) , respectively, where D ^ G is a diagonal matrix whose m-th diagonal element is given by:
σ G ^ m 2 = τ P U ζ G m 2 τ P U ζ G m + ζ V m + 1 .

2.3. Signal Model

In this section, the signal model is presented, and thereby the signal-to-interference-plus-noise ratios (SINRs) are derived.

2.3.1. Transmit Power Constraint for the SBS

In underlay spectrum sharing cognitive systems, the power of the secondary transmissions is constrained such that the total interference power inflicted at the primary receivers is less than a predefined interference temperature [10]. Therefore, the transmit power of the SBS is constrained as follows:
P S = min P S max , I P E Tr V T W ^ S W ^ S H V * ,
where P S max is the maximum transmit power at the SBS. Furthermore, I P is the primary interference temperature, which is the maximum tolerable interference level that the PUs can endure without compromising the quality-of-service. In (9), W ^ S is the ZF precoder at the SBS and is defined as:
W ^ S = α S G ^ * G ^ T G ^ * 1 ,
where α S is a power normalization factor at the SBS and is defined as [17]:
α S = E Tr G ^ T G ^ * 1 1 / 2 = N S M m = 1 M σ G ^ m 2 .
For a finite number of antennas at the SBS, the transmit power constraint can be re-written as:
P S = min P S max , I P Δ ,
where Δ is approximated as (see Appendix A.1 for derivation):
Δ α S 2 Tr D V T + I M / τ P U 2 D G 2 + N S M N S Tr D G D ^ G (13) + ( N S M ) N S τ P U 2 Tr D G T D G T + D V T + I M τ P U 1 1 .
Next, the asymptotic transmit power constraint at the secondary system for infinitely many BS antenna can be derived by letting N S go to infinity in (12) as follows:
min N S P S = P S max .
Remark 1.
As N S , the secondary transmit power constraint (12) asymptotically becomes independent of the interference temperature of the primary system. Consequently, the secondary system with underlay spectrum sharing can be operated independent of the primary system, and hence, the secondary system can be asymptotically operated at its maximum transmit power level.

2.3.2. Signal Model for the Primary System

It is assumed that the eavesdropper’s CSI is unavailable at both PBS and SBS. Consequently, the PBS transmits an AN sequence for degrading the eavesdropper’s ability to decode the signals transmitted to its PUs. To this end, the N P K additional degrees-of-freedom offered by the large antenna array at the PBS are used to transmit this AN. Thus, the PBS transmits both confidential data and AN by using linear precoders in the downlink. In this context, the transmitted signal vector at the PBS can be written as:
x P t = P P W ^ P x P + P n W n a n ,
where P P and P n are the transmit powers allocated for confidential data and AN, respectively. In (15), W ^ P is the precoder used for pre-processing the confidential data at the PBS. Furthermore, W n C N P × ( N P K ) is the AN shaping matrix at the PBS, and a n is the AN vector and defined as a n CN ( N P K ) × 1 0 N P K , σ A 2 I N P K . In particular, W ^ P is designed based on the ZF criterion as:
W ^ P = α P F ^ * F ^ T F ^ * 1 ,
where α P is a normalization constant, and is defined as:
α p = E Tr F ^ T F ^ * 1 1 / 2 = N P K k = 1 K σ F ^ k 2 .
The construction of the AN shaping matrix can be described as follows: In conventional MIMO systems, the AN shaping matrix ( W n ) can be constructed by computing the null space of the desired channel matrix ( F ). In this context, the performance degradation due to the leakage of AN into desired signals can be mitigated. However, for a massive MIMO PBS, the computation of the null space based precoders is prohibitively complicated. Hence, W n can be constructed as the pseudo-inverse of a random matrix with mutually independent Gaussian random vectors. To this end, the AN shaping matrix can be defined as follows:
W n = α n R n * R n T R n * 1 ,
where R n T CN ( N P K ) × N P 0 ( N P K ) × N P , I N P K I N P , W n C N P × ( N P K ) , and α n is defined as:
α n = E Tr R n T R n * 1 1 / 2 = K ( N P K ) .
In particular, W n is designed as a normalized version of the pseudo-inverse of R n . Therefore, the aforementioned choice (18) facilitates the mathematical tractability of the asymptotic analysis.
The received signal vector at the PUs can be written as:
y P = P P F T W ^ P x P + P S V T W ^ S x S + P n F T W n a n + z P ,
where x P and x S are the transmitted signal vectors of the PBS and SBS satisfying E x P x P H = I K and E x S x S H = I M , respectively. Furthermore, z P is the AWGN vector at the PUs satisfying E z P z P H = I K σ P 2 . In (20), the first term accounts for the desired signal transmitted towards the PUs. The second term captures the intra-cell interference due to the concurrent secondary transmissions in the same frequency band. Moreover, the third term represents the AN leakage into the PUs.
Then, the received signal at the k-th PU (i.e., the k-th element of y P ) can be expressed as:
y P k = P P f k T w ^ P k x P k + j = 1 , j k K P P f k T w ^ P j x P j + P S v k T W ^ S x S + P n f k T W n a n + z P k ,
where w ^ P k and f k are the k-th columns of W ^ P and F , respectively, and x P k and z P k are the k-th element of x P and z P , respectively.

2.3.3. Signal Model for the Secondary System

The SUs are served by the SBS, where the received signal at the SUs is:
y S = P S G T W ^ S x S + P P U T W ^ P x P + P n U T W n a n + z S ,
where the first term represents the desired signal at the SUs. The second term captures the intra-cell interference from the concurrent primary transmissions. The third term accounts for the AN leakage into the SU’s reception. Moreover, z S models the AWGN vector at the SUs satisfying E z S z S H = I M σ S 2 . The received signal at the m-th SU can be written as:
y S m = P S g m T w ^ S m x S m + j = 1 , j m M P S g m T w ^ S j x S j + P S u m T W ^ P x P + P n u m T W n a n + z S m ,
where w ^ S m and g m are the m-th columns of W ^ S and G , respectively, and x S m and z S m are the m-th element of x S and z S , respectively.

2.3.4. Signal Model for the Eavesdropper

The eavesdropper is interested in eavesdropping upon the confidential data transmitted to either PUs or SUs. For the sake of completeness, two cases, in which the eavesdropper intercepts (1) the k-th PU’s signal and (2) the m-th SU’s signal, are investigated. To this end, a generic expression for the received signal at the eavesdropper can be written as:
y E = P P H P T W ^ P x P + P n H P T W n a n + P S H S T W ^ S x S + z E
where z E is the AWGN vector at the eavesdropper satisfying E z E z E H = I N E σ E 2 . In (24), the first term corresponds to the signal transmitted by the PBS, the second term accounts for the AN leakage, and the third term captures the signal transmitted by the SBS. Then, the k-th PU signal intercepted at the eavesdropper can be re-written as:
y E k = P P h P T w ^ P k x P k + j = 1 , j k K P P h P T w ^ P j x P j + P n h P T W n a n + P S h S T W ^ S x S + z E k .
Whereas, the m-th SU signal intercepted at the eavesdropper can be re-written as:
y E m = P S h S T w ^ S m x S m + j = 1 , j m M P S h S T w ^ S j x S j + P n h P T W n a n + P P h P T W ^ P x P + z E m .

2.4. Achievable Rate Analysis

In this subsection, the achievable rate expressions at the PUs and SUs are derived by using the worst-case Gaussian noise approximation technique. This technique is widely used in sum rate analysis in wireless systems [17,18], and basically represents a lower bound of what can be achieved in practice. Accordingly, by using (21), the received signal at the k-th PU can be re-written as:
y P k = P P f k T w ^ P k x P k + n ˜ P k ,
where the first term accounts for the desired signal and n ˜ P k represents the effective noise, which is given by:
n ˜ P k = P P f k T w ^ P k E f k T w ^ P k x P k + j = 1 , j k K P P f k T w ^ P j x P j + P S v k T W ^ S x S (28) + P n f k T W n a n + z P k .
In (27), the desired signal and the effective noise are uncorrelated. The worst-case uncorrelated additive noise is independent Gaussian noise having the same variance, hence, the achievable rate at the k-th PU can be derived as:
R P k = log 2 1 + E P P f k T w ^ P k 2 P P V ar ( f k T w ^ P k ) + I P k + I S k + A N k + σ P 2 ,
where I P k , I S k , and A N k account for the primary inter-user interference, intra-cell interference due to concurrent secondary transmissions, and the AN leakage towards the k-th PU, respectively, and they are defined as:
I P k = j = 1 , j k K P P E f k T w ^ P j 2 ,
I S k = P S E v k T W ^ S 2 ,
A N k = P n E f k T W n 2 .
Similarly, by using (23), the received signal at the m-th SU can be re-written as:
y S m = P S g m T w ^ S m x S m + n ˜ S m ,
where the first term represents the desired signal and n ˜ S m is the effective noise, and is given by:
n ˜ S m = P S g m T w ^ S m E g m T w ^ S m x S m + j = 1 , j m M P S g m T w ^ S j x S j + P S u m T W ^ P x P (32) + P n u m T W n a n + z S m .
Hence, the achievable rate at the m-th SU can be derived as:
R S m = log 2 1 + E P S g m T w ^ S m 2 P S V ar ( g m T w ^ S m ) + I S m + I P m + A N m + σ S 2 ,
where I S m , I P m , and A N m represent the secondary inter-user interference, the CCI from SBS transmissions, and the AN leakage towards the m-th SU, respectively, and they are defined as:
I S m = j = 1 , j m M P S E g m T w ^ S j 2 ,
I P m = P P E u m T W ^ P 2 ,
A N m = P n E u m T W n 2 .

3. Secrecy Rate Analysis

An achievable secrecy rate of the k-th PU is given by the difference between channel capacities of the PBS to PU channel and the PBS to eavesdropper channel. Thus, the achievable secrecy rate at the k-th PU is:
R P k sec = R P k R k eve + ,
where [ λ ] + = max ( 0 , λ ) .
A lower bound for the achievable rate at the k-th PU can be derived from (29) as (see Appendix A.2 for the derivation):
R P k T τ T log 2 ( 1 + P P ( N P K ) j = 1 K σ F ^ j 2 P P ζ F k σ F ^ k 2 + P S ( N S M ) ( j = 1 M σ G ^ j 2 ( ζ G m 1 ( ζ V k + 1 τ P U ) 2 + 1 N S 2 ζ G m / τ P U ζ G m + ζ V k + 1 / τ P U 1 τ P U + ζ G m σ G ^ m 2 + P n K ζ F k N P K + σ P 2 ) .
The eavesdropper’s rate, on the other hand, cannot be lower bounded, since in that case the obtained secrecy rate is no longer a lower bound. Thus, the ergodic rate of the k-th PU signal leaked into the eavesdropper is computed as R k eve = E log 2 ( 1 + γ E k ) , where γ E k is a closed-form expression for the SINR of the k-th PU signal intercepted at the eavesdropper, which is derived from (24) as (by assuming eavesdropper is able to mitigate inter-pair interference [13]):
γ E k = P P h P k T w ^ P k 2 P S H S T W ^ S W ^ S H H S * k , k + P n H P T W n W n H H P * k , k + σ E 2 .
Similarly, the achievable secrecy rate of the m-th SU is:
R S m sec = R S m R m eve + ,
where R S m is an achievable rate of the m-th SU and its lower bound is derived by following steps similar to those used for deriving (36) as:
R S m T τ T log 2 ( 1 + P S ( N S M ) j = 1 M σ G ^ j 2 P S ζ G m σ G ^ m 2 + P P ( N P K ) ( j = 1 K σ F ^ j 2 ( ζ F k 1 ( ζ U m + 1 τ P U ) 2 + 1 N P 2 ζ F k / τ P U ζ F k + ζ U m + 1 / τ P U 1 τ P U + ζ F k σ F ^ k 2 + P n K ζ U m N P K + σ S 2 ) .
Furthermore, R m eve is the information leakage rate to the eavesdropper for decoding the m-th SU’s confidential information, and can be computed as: R m eve = E log 2 ( 1 + γ E m ) , where γ E m is the SINR expression of the m-th SU signal intercepted at the eavesdropper, which is derived from (24) as:
γ E m = P S h S m T w ^ S m 2 P P H P T W ^ P W ^ P H H P * m , m + P n H P T W n W n H H P * m , m + σ E 2 .

4. Asymptotic Secrecy Rate Analysis

In this section, the asymptotic secrecy rates are derived whenever the numbers of antennas at the PBS and SBS grow without limit while keeping a fixed ratio β = N P / N S . In this context, the pilot transmit power is assumed to be fixed, whereas the transmit powers at the PBS and SBS are scaled as follows: P P = E P / N P , P n = E n / N P , and P S = E S / N S , where E P , E n , and E S are constants [3]. Hence, by letting N P , N S in (35), the corresponding achievable secrecy rate for the case in which the eavesdropper intends to intercept the confidential signal transmitted to the k-th PU can be derived as (see Appendix A.3 for the derivation):
R P k , sec = T τ T log 2 1 + E P j = 1 K σ F ^ j 2 E S m a x j = 1 M σ G ^ j 2 ( ζ G m 1 ( ζ V k + 1 τ P U ) ) 2 + σ P 2 .
The corresponding achievable secrecy rate for the case in which the eavesdropper is intercepting the confidential signal transmitted to the m-th SU can be derived, by letting N P , N S in (38), as (see Appendix A.3 for the derivation):
R S m , sec = T τ T log 2 1 + E S max m = 1 M σ G ^ m 2 E P j = 1 K σ F ^ j 2 ( ζ F k 1 ( ζ U m + 1 τ P U ) ) 2 + σ S 2 .
Remark 2.
The achievable asymptotic secrecy rate expressions in (41) and (42) are independent of the BS-to-eavesdropper channels. Consequently, the corresponding information leakage rate at the eavesdropper vanishes in the limit of infinitely many BS antennas.
In particular, the transmit powers of the payload data at both BSs and the transmit power of AN sequence at the PBS can be scaled inversely proportional to the number of BS antennas without incurring any performance penalty. Moreover, the asymptotic secrecy rates are independent of the fast fading components of the corresponding wireless channels.

5. Performance Analysis for Perfect CSI

For further investigations, the performance analysis of the considered system is provided in this section for the idealistic scenario of having perfect CSI, i.e., F ^ = F and G ^ = G . Hence, the amounts of performance degradation due to inaccurate channel knowledge and pilot contamination are quantified and compared. To this end, the ZF detectors at the PBS and SBS can be constructed by assuming the availability of the genie-aided perfect CSI as follows:
W P = F * F T F * 1 Tr ( F T F * ) 1 ,
W S = G * G T G * 1 Tr ( G T G * ) 1 .

5.1. Secondary Transmit Power Constraint for Perfect CSI Case

The secondary transmit power constraint for perfect CSI can be re-written as:
P S = min P S max , I P Tr G T G * N S 1 N S Tr V T G * N S G T G * N S 1 G T G * N S 1 G T V * N S .
Next, the maximum transmit power at the SBS is scaled inversely proportional to the number of antennas as P S max = E S max / N S . The secondary transmit power constraint can then be rewritten as:
P S = min E S max N S , I P N S Tr G G H N S 1 Tr V G H N S G G H N S 1 G G H N S 1 G V H N S .
By first letting N S in (46) and then using the identities (A15) and (A16) given in the appendix, an asymptotic expression for the transmit power constraint at the SBS can be derived as:
lim N S P S N S E S max .

5.2. Achievable Rate Analysis for Perfect CSI Case

In this subsection, the achievable rate at the PUs, SUs, and eavesdropper are derived by replacing W P T and W S T with W ^ P T and W ^ S T in (20), (22), and (24), respectively. To this end, by using (20), the achievable rate at the k-th primary user node can be computed as R P k = E log 2 ( 1 + γ P k ) , where γ P k is:
γ P k = P P / Tr ( F T F * ) 1 P n F T W n W n H F * k , k + P S V T W S W S H V * k , k + σ P 2 .
Similarly, by using (22), the achievable rate at the m-th secondary user node can be derived as R S m = E log 2 ( 1 + γ S m ) , where γ S m is given by
γ S m = P S / Tr ( G T G * ) 1 P P U T W P W P H U * m , m + P n U T W n W n H U * m , m + σ S 2 .
Next, by using (24) and by assuming the eavesdropper is capable of fully mitigating the inter-substream interference, the information leakage rate to the eavesdropper for decoding the k-th PU’s confidential information is computed as R k eve = E log 2 ( 1 + γ E k ) , where γ E k is the SINR expression of the k-th PU signal intercepted at the eavesdropper, which is given by:
γ E k = P P H P T W P W P H H P * k , k P S H S T W S W S H H S * k , k + P n H P T W n W n H H P * k , k + σ E 2 .
Similarly, the rate of the m-th SU signal leaked into the eavesdropper is computed as R m eve = E log 2 ( 1 + γ E m ) , where γ E m is a closed-form expression for the SINR of the m-th SU signal intercepted at the eavesdropper, which is derived from (24) as:
γ E m = P S H S T W S W S H H S * m , m P P H P T W P W P H H P * m , m + P n H P T W n W n H H P * m , m + σ E 2 .

5.3. Asymptotic Secrecy Rate Analysis for Perfect CSI Case

In this subsection, the asymptotic secrecy rate expressions are derived for both primary and secondary systems when the numbers of antennas at the PBS and SBS grow without limit, while keeping a fixed ratio β = N P = N S . In this context, the transmit powers at the PBS and SBS are scaled inversely proportional to the number of BS antennas as P P = E P / N P , P n = E n / N P , and P S = E S / N S , where E P , E n , and E S are constants. Whenever N P and N S grow without bound, the corresponding achievable secrecy rate for the case in which the eavesdropper intends to intercept the confidential signal transmitted to the k-th primary user is derived as (see Appendix B for the derivation):
R P k , sec = lim N P , N S R P k sec = log 1 + E P σ P 2 Tr D F 1 .
Similarly, the corresponding asymptotic secrecy rate for the case in which the eavesdropper intends to intercept the confidential signal transmitted to the m-th SU is given by:
R S m , sec = lim N P , N S R S m sec = log 1 + E S max σ S 2 Tr D G 1 .
Remark 3.
The achievable asymptotic secrecy rate expressions in (52) and (53) are independent of the BS-to-eavesdropper channels. Consequently, the corresponding rate at the eavesdropper vanishes in the limit of infinitely many BS antennas.

6. Numerical Results

In Figure 2, the achievable secrecy sum rates at the PUs and SUs are plotted. Furthermore, the information leakage rates to the eavesdropper from the primary and secondary transmissions are plotted against N P while keeping N E fixed. The exact (simulation) curves are generated by using (29), (33), (37), and (40) through Monte-Carlo simulations. Moreover, the asymptotic secrecy rate is plotted by using (41) and (42). Figure 2 reveals that the corresponding information leakage rates to the eavesdropper asymptotically vanish when N P and N S . Hence, the secrecy rate asymptotically approaches the achievable rate at the user nodes. Therefore, the intra-cell pilot contamination effects in cognitive massive MIMO systems do not hinder the use of random pseudo-inverse based AN shaping matrices.
To investigate the impact of the primary interference temperatures on the secondary system transmissions for the imperfect and perfect CSI cases, the transmit power constraint of the SUs is plotted, in Figure 3, against the number of PBS antennas for two different primary interference temperatures. The asymptotic transmit power constraints are plotted by using the asymptotic analysis in (14) and (47), while the exact curves are plotted by using Monte-Carlo simulations. Figure 3 clearly reveals that the transmit power of the secondary system approaches its allowable peak value when the number of PBS antennas grows large. However, the rate of asymptotic convergence depends on the CSI assumption and the primary interference temperature. Specifically, the curves corresponding to imperfect CSI exhibit the lowest rate of asymptotic convergence compared to the perfect CSI case. Moreover, the asymptotic rate of convergence decreases whenever the primary interference temperature decreases.
In Figure 4, the transmit power constraint at the secondary system is plotted versus the number of PBS antennas by varying the number of user nodes for the cases of imperfect and perfect CSI. Figure 4 shows that the secondary system transmit power asymptotically approaches its peak level as the number of PBS antennas grows without bound, irrespective of the number of user nodes. Nevertheless, the rate of asymptotic convergence decreases when the numbers of user nodes increase. Therefore, the secondary system can asymptotically be operated at its peak transmit power, regardless of the number of user nodes and primary interference temperature, whenever the PBS is equipped with a very large antenna array.
Figure 5 depicts the achievable secrecy rate of the primary and secondary systems against the number of PBS antennas for the perfect CSI case. The asymptotic secrecy rate curves are plotted by using (52) and (53), whereas the exact sum rate curves are plotted by using Monte-Carlo simulations. As shown in Figure 5, for a fixed number of antennas at the eavesdropper ( N E = 100 ), the achievable secrecy rates at the primary and secondary systems go up gradually with the growing of N P and N S until they approach their corresponding asymptotic curves, which basically means the capability of the eavesdropper decreases and eventually vanishes whenever the number of antennas grows large.

7. Conclusions

In this paper, a secure communication model for cognitive multi-user massive MIMO networks with underlay spectrum sharing has been proposed and analyzed. The extra degrees-of-freedom provided by the massive MIMO have been exploited to transmit AN sequences to incapacitate the eavesdropper’s ability to decode the confidential data. The asymptotic achievable secrecy rates of this system model have been derived in closed form for imperfect and perfect CSI cases. Thereby, the detrimental effects of AN leakage into the desired signals and performance degradation due to pilot contamination have been investigated. Random AN shaping matrices can be employed in this model, and avoid the complication of designing a null-space based precoder, without any asymptotic performance penalty. The transmit power allocated for the AN sequence can be scaled down inversely proportional to the number of PBS antennas, and hence, a significant energy efficiency gain can be attained. The secondary transmit power constraint becomes independent of the primary interference temperature, and consequently, the secondary system can be operated independent of the primary system in the limit of infinitely many BS antennas. The asymptotic information leakage into the eavesdropper vanishes whenever the numbers of PBS and SBS antennas grow without bound, and hence, the asymptotic secrecy rates become independent of the BS-to-eavesdropper channels. Therefore, our work brings some valuable designing insights on physical layer security analysis in cognitive massive MIMO networks, and proposes an elegant mechanism for strengthening the security of communications against the potential attacks in the cognitive radio networks.

Author Contributions

All authors contributed equally to this work.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Derivations for the Performance Metrics for Imperfect CSI Case

In this appendix, derivations for the secrecy performance metrics are outlined. The achievable rates at the primary and secondary systems, and the transmit power constraint are derived arbitrarily for many antennas at the PBS and SBS. The asymptotic secrecy rates corresponding to the primary and secondary systems are derived when the numbers of antennas at the BS grow large.

Appendix A.1. Transmit Power Constraint at the Secondary System

The transmit power constraint in (9) can be re-written as:
P S = min P S max , I P / Δ ,
where Δ = E Tr V T W ^ S W ^ S H V * . To begin with, G ^ and V T are dependent; the channel V T , by using (6), can be re-written as:
V T = D ˜ G 1 G ^ T G T Z G T τ P U ,
where,
D ˜ G = D G T D G T + D V T + I M τ P U 1 .
Then, by using (A2), Δ can be derived as follows:
Δ = E Tr D ˜ G 1 G ^ T G T Z G T τ P U W ^ S W ^ S H G ^ * D ˜ G 1 G * Z G * τ P U = Tr ( E [ D ˜ G 1 G ^ T W ^ S G ^ T + ε G T W ^ S Z G T τ P U W ^ S * * * * * W ^ S H G ^ * D ˜ G 1 W ^ S H G ^ * + ε G * W ^ S H Z G * τ P U ] ) = Tr ( E [ α S 2 D ˜ G 2 2 α S 2 D ˜ G 1 D ˜ G 1 G ^ T W ^ S W ^ S H Z G * τ P U + α S 2 I M * * * * * + ε G T W ^ S W ^ S H ε G * + G ^ T W ^ S W ^ S H Z G * τ P U Z G T τ P U W ^ S W S H G ^ * D ˜ G 1 (A4) * * * * * + Z G T τ P U W ^ S W S H G ^ * D ˜ G 1 + Z G T τ P U W ^ S W ^ S H Z G * τ P U ] ) .
Here, from (10), W ^ S W ^ S H = α S 2 G ^ * G ^ T G ^ * 1 G ^ T G ^ * 1 G ^ T , since N S M , the law of large numbers can be used to do this approximation, G ^ T G ^ * N S D ^ G , and consequently, W ^ S W ^ S H α S 2 N S 2 G ^ * D ^ G 2 G ^ T . Moreover, the term Z G T G ^ * , by using (6) can be simplified as D ˜ G Z G T Z G * / τ P U . Thus,
Δ α S 2 Tr D ˜ G 1 I M 2 + N S M N S Tr D G D ^ G + 2 τ P U Tr D ˜ G 1 τ P U .
By substituting (A5) into (9), the transmit power constraint for finitely many SBS antennas can be derived as shown in (12).

Appendix A.2. R P k for Finite Antenna Numbers

The achievable rate at the k-th PU is derived when both BSs are equipped with finite antenna numbers. From (29) the desired power can be derived as ( F T W ^ P ) by invoking (16) and (4) as follows:
F T W ^ P = ( F ^ T + ε F T ) W ^ P (A6) = α P I K + ε F T W ^ P .
Then, the desired power for the k-th PU can be re-written as:
f k T w ^ P k = α P + ε F k T w ^ P k
where ε F k T is the k-th column of ε F T , since w ^ P k and ε F k T are uncorrelated, and ε F k T is a zero-mean random variable, E [ ε F k T w ^ P k ] = 0 . Thus,
E f k T w ^ P k = α P .
Next, the first term of the effective noise in (29), V ar ( f k T w ^ P k ) , can be derived by using (A7) and (A8) as:
V ar ( f k T w ^ P k ) = E ε F k T w ^ P k 2 = ( ζ F k σ F ^ k 2 ) E w ^ P k 2 = α P 2 ( ζ F k σ F ^ k 2 ) E F ^ * F ^ T 1 k , k = α P 2 ζ F k σ F ^ k 2 σ F ^ k 2 K E Tr ( X 1 ) (A9) = α P 2 ζ F k σ F ^ k 2 σ F ^ k 2 ( N P K ) .
where X is a K × K central Wishart matrix with N P degrees of freedom and covariance matrix I K , where Tr ( X 1 ) = K / ( N P K ) [19].
The derivations for the remaining terms of the effective noise in (30) are given in the following:
  • Deriving I P k : From (A6), f k T w ^ P j = ε F k T w ^ P j T for j k . Since ε F k T and w ^ P j are uncorrelated, then,
    E f k T w ^ P j 2 = ζ F k σ F ^ k 2 E w ^ P j 2 (A10) = α P 2 ζ F k σ F ^ k 2 σ F ^ j 2 ( N P K ) .
    Hence,
    I P k = P P j = 1 , j k K α P 2 ζ F k σ F ^ k 2 σ F ^ j 2 ( N P K ) .
  • Deriving I S k : From (30b), I S k can be re-written as:
    P S E v k T W ^ S 2 = P S E v k T W ^ S W ^ S H v k * .
    By following the same derivation steps that used to drive Z in (A5), I S k can be approximated as:
    I S k P S ( N S M ) ( j = 1 M σ G ^ j 2 ( ζ G m 1 ( ζ V k + 1 / τ P U ) ) 2 (A13) + 1 N S 2 ζ G m / τ P U ζ G m + ζ V k + 1 / τ P U 1 τ P U + ζ G m σ G ^ m 2 ) .
  • Deriving A N k : Similarly, A N k can be derived as:
    P n E f k T W n 2 = P n K ζ F k N P K .
Next, by substituting (A8), (A9), (A11), (A13), and (A14) into (29), a lower bound approximation for the achievable rate at the k-th PU can be derived as shown in (36).

Appendix A.3. Asymptotic Achievable Rate at the Eavesdropper

To evaluate the asymptotic achievable rate at the eavesdropper when the PBS and SBS are deploying massive antenna arrays, the following identities are recalled from [20].
For a random matrix A C M × N having elements of zero mean and unit variance, as N the column vectors of A become orthogonal, and hence, the following identity holds:
lim N A A H / N = I M .
Also, whenever a random matrix B C M × N is independently distributed with A , the following identity holds:
lim N A B H / N = 0 .
By first letting P P = E P / N P and P n = E n / N P , and then by substituting (10), (16), and (18) into (37), the SINR of the k-th PU signal intercepted at the eavesdropper can be re-written as:
γ E k = E P α P 2 N P H P T F ^ * N P F ^ T F ^ * N P 2 F ^ T H P * N P k , k E S α S 2 N S H S T G ^ * N S G ^ T G ^ * N S 2 G ^ T H S * N S k , k + E n α n 2 N P H P T R n * N P R n T R n * N P 2 R n T H P * N P k , k + σ E 2 .
Next, by letting N P and N S in (A17) and then by invoking (A15) and (A16), it can be shown that:
lim N P , N S γ E k = 0 .
Similarly, by using (40), the SINR at the eavesdropper, who is interested in intercepting the signal of the m-th SU, can be re-written as:
γ E m = E S α S 2 N S H S T G ^ * N S G ^ T G ^ * N S 2 G ^ T H S * N S m , m E P α P 2 N P H P T F ^ * N P F ^ T F ^ * N P 2 F ^ T H P * N P m , m + E n α n 2 N P H P T R n * N P R n T R n * N P 2 R n T H P * N P m , m + σ E 2 .
Then, by invoking (A15) and (A16), and when N S and N P go to infinity in (A19), it can be shown that:
lim N P , N S γ E m = 0 .

Appendix B. Derivations the Asymptotic Performance Metrics for Perfect CSI

In this appendix, the derivations of the asymptotic rates of primary and secondary systems with perfect CSI are outlined. To begin with, by letting P P = E P / N P , P n = E n / N P , and P S = E S / N S and then by substituting (43), (44) and (18) into (48), the end-to-end SINR at the k-th PU can be re-written as:
γ P k = E P / Tr F T F * N P 1 E n σ n 2 Tr R n T R n * N P 1 F T R n * N P R n T R n * N P 2 R n T F * N P k , k + P S N S Tr G T G * N S 1 V T G * N S G T G * N S 2 G T V * N S k , k + σ P 2 .
Next, by letting N S and N P in (A21) and then by using (47), (A15) and (A16), the asymptotic SINR for the k-th PU can be written as:
γ P k = E P σ P 2 Tr D F 1 .
Moreover, by using steps similar to those used for deriving (A21), the end-to-end SINR at the m-th SU can be re-written as:
γ S m = P S N S / Tr G T G * N S 1 E n σ n 2 Tr R n T R n * N P 1 U T R n * N P R n T R n * N P 2 R n T U * N P m , m + E P Tr F T F * N P 1 U T F * N P F T F * N P 2 F T U * N P m , m + σ S 2 .
Again, by letting N S and N P in (A23) and then by using (47), (A15) and (A16), the asymptotic SINR for the m-th SU can be written as:
γ S m = E S max σ S 2 Tr D G 1 .
Furthermore, the end-to-end SINR at the eavesdropper, who is interested in intercepting the signal of the k-th PU, can be obtained by substituting (44), (43) and (18) into (37) as follows:
γ E k = E P H P T F * N P F T F * N P 2 F T H P * N P k , k / Tr F T F * N P 1 P S N S Tr G G H N S 1 H S G H N S F G H N S 2 G H S H N S k , k + E n σ n 2 Tr R n T R n * N P 1 H P T R n * N P R n T R n * N P 2 R n T H P * N P k , k + σ E 2 .
Next, by letting N S and N P in (A25) and then by using (47), (A15) and (A16), the asymptotic SINR at the eavesdropper, who is interested in intercepting the signal of the k-th PU, can be derived as:
lim N P , N S γ E k = γ E k 0 .
Similarly, by substituting (44), (43) and (18) into (40), the end-to-end SINR at the eavesdropper, who is interested in intercepting the signal of the m-th SU, can be re-written as:
γ E m = P S N S H S T G * N S G T G * N S 2 G T H S * N S m , m / Tr G T G * N S 1 E P Tr F T F * N P 1 H P T F * N P F T F * N P 2 F T H P * N P m , m + E n σ n 2 Tr R n T R n H N P 1 H P T R n * N P R n T R n * N P 2 R n T H P * N P m , m + σ E 2 .
Again, by letting N S and N P in (A27) and then by using (47), (A15) and (A16), the asymptotic SINR at the eavesdropper, who is interested in intercepting the signal of the m-th SU, can be derived as:
lim N P , N S γ E m = γ E m 0 .
Next, by using (35), an achievable asymptotic secrecy rate at the k-th PU can be written as:
R P k , sec = log 1 + γ P k log 1 + γ E k + .
By substituting (A22) and (A26) into (A29), the desired asymptotic secrecy rate can be derived as given in (52).
Similarly, by using (35), the asymptotic secrecy rate at the m-th SU can be written as:
R S m , sec = log 1 + γ S m log 1 + γ E m + .
By substituting (A24) and (A28) into (A30), the desired asymptotic secrecy rate can be derived as given in (53).

References

  1. Boccardi, F.; Heath, R.; Lozano, A.; Marzetta, T.; Popovski, P. Five disruptive technology directions for 5G. IEEE Commun. Mag. 2014, 52, 74–80. [Google Scholar] [CrossRef]
  2. Marzetta, T.L. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas. IEEE Trans. Wirel. Commun. 2010, 9, 3590–3600. [Google Scholar] [CrossRef]
  3. Ngo, H.Q.; Larsson, E.G.; Marzetta, T.L. Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems. IEEE Trans. Commun. 2013, 61, 1436–1449. [Google Scholar]
  4. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  5. Liang, Y.; Poor, H.V.; Shamai, S. Information Theoretic Security. Found. Trends Commun. Inf. Theor. 2009, 5, 355–580. [Google Scholar] [CrossRef]
  6. Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
  7. Kapetanovic, D.; Zheng, G.; Russek, F. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 2015, 53, 21–27. [Google Scholar] [CrossRef]
  8. Schaefer, R.F.; Boche, H.; Khisti, A.; Poor, H.V. Information Theoretic Security and Privacy of Information Systems; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
  9. Poor, H.V.; Schaefer, R.F. Wireless physical layer security. Proc. Natl. Acad. Sci. USA 2016, 114, 19–26. [Google Scholar] [CrossRef] [PubMed]
  10. Goldsmith, A.; Jafar, S.A.; Maric, I.; Srinivasa, S. Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective. Proc. IEEE 2009, 97, 894–914. [Google Scholar] [CrossRef]
  11. Liang, Y.; Somekh-Baruch, A.; Poor, H.V.; Shamai, S.; Verdú, S. Capacity of cognitive interference channels with and without secrecy. IEEE Trans. Inf. Theor. 2009, 55, 604–619. [Google Scholar] [CrossRef]
  12. Gabry, F.; Zappone, A.; Thobaben, R.; Jorswieck, E.A.; Skoglund, M. Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks with Secrecy Constraints. IEEE Wirel. Commun. Lett. 2015, 4, 437–440. [Google Scholar]
  13. Zhu, J.; Schober, R.; Bhargava, V. Secure Transmission in Multicell Massive MIMO Systems. IEEE Trans. Wirel. Commun. 2014, 13, 4766–4781. [Google Scholar] [CrossRef]
  14. Zhu, J.; Schober, R.; Bhargava, V.K. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems. IEEE Trans. Wirel. Commun. 2016, 15, 2245–2261. [Google Scholar] [CrossRef]
  15. Guo, K.; Guo, Y.; Ascheid, G. Security-Constrained Power Allocation in MU-Massive-MIMO with Distributed Antennas. IEEE Trans. Wirel. Commun. 2016, 15, 8139–8153. [Google Scholar] [CrossRef]
  16. Wang, L.; Wong, K.K.; Elkashlan, M.; Nallanathan, A.; Lambotharan, S. Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference. IEEE J. Sel. Top. Signal Process. 2016, 10, 1375–1389. [Google Scholar] [CrossRef]
  17. Yang, H.; Marzetta, T.L. Performance of Conjugate and Zero-Forcing Beamforming in Large-Scale Antenna Systems. IEEE J. Sel. Areas Commun. 2013, 31, 172–179. [Google Scholar] [CrossRef]
  18. Hassibi, B.; Hochwald, B.M. How much training is needed in multiple-antenna wireless links? IEEE Trans. Inf. Theor. 2003, 49, 951–963. [Google Scholar] [CrossRef]
  19. Tulino, A.M.; Verdú, S. Random matrix theory and wireless communications. Found. Trends Commun. Inf. Theor. 2004, 1, 1–128. [Google Scholar] [CrossRef]
  20. Cramer, H. Random Variables and Probability Distributions; Cambridge University Press: Cambridge, UK, 1970. [Google Scholar]
Figure 1. System model for a multi-user cognitive massive multiple-input multiple-output (MIMO) network in the presence of a multi-antenna eavesdropper. PBS: primary base station; SBS: secondary base station; PU: primary user node; SU: secondary user node.
Figure 1. System model for a multi-user cognitive massive multiple-input multiple-output (MIMO) network in the presence of a multi-antenna eavesdropper. PBS: primary base station; SBS: secondary base station; PU: primary user node; SU: secondary user node.
Entropy 19 00349 g001
Figure 2. The achievable secrecy rates versus the number of PBS antennas for imperfect channel state information (CSI) case.
Figure 2. The achievable secrecy rates versus the number of PBS antennas for imperfect channel state information (CSI) case.
Entropy 19 00349 g002
Figure 3. The transmit power constraint of the secondary system versus the number of PBS antennas by varying I P .
Figure 3. The transmit power constraint of the secondary system versus the number of PBS antennas by varying I P .
Entropy 19 00349 g003
Figure 4. The transmit power constraint of the secondary system versus the number of PBS antennas by varying M.
Figure 4. The transmit power constraint of the secondary system versus the number of PBS antennas by varying M.
Entropy 19 00349 g004
Figure 5. The achievable secrecy rates versus the number of PBS antennas for perfect CSI case.
Figure 5. The achievable secrecy rates versus the number of PBS antennas for perfect CSI case.
Entropy 19 00349 g005

Share and Cite

MDPI and ACS Style

Al-Hraishawi, H.; Baduge, G.A.A.; Schaefer, R.F. Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination. Entropy 2017, 19, 349. https://doi.org/10.3390/e19070349

AMA Style

Al-Hraishawi H, Baduge GAA, Schaefer RF. Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination. Entropy. 2017; 19(7):349. https://doi.org/10.3390/e19070349

Chicago/Turabian Style

Al-Hraishawi, Hayder, Gayan Amarasuriya Aruma Baduge, and Rafael F. Schaefer. 2017. "Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination" Entropy 19, no. 7: 349. https://doi.org/10.3390/e19070349

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop