Next Article in Journal
On the Impossibility of First-Order Phase Transitions in Systems Modeled by the Full Euler Equations
Next Article in Special Issue
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel
Previous Article in Journal
Fusing Feature Distribution Entropy with R-MAC Features in Image Retrieval
Previous Article in Special Issue
Evaluating Secrecy Capacity for In-Body Wireless Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks

1
Department of Electronics Engineering, Chungnam National University, Daejeon 34134, Korea
2
School of Electrical, Electronic Communication and Computer Engineering, Chonnam National University, Yeosu 59626, Korea
*
Authors to whom correspondence should be addressed.
Entropy 2019, 21(11), 1038; https://doi.org/10.3390/e21111038
Submission received: 30 August 2019 / Revised: 15 October 2019 / Accepted: 24 October 2019 / Published: 25 October 2019
(This article belongs to the Special Issue Information-Theoretic Security II)

Abstract

:
In this paper, we propose a pseudo-random beamforming (PRBF) technique for improving physical-layer security (PLS) in multiple input multiple output (MIMO) downlink cellular networks consisting of a legitimate base station (BS), multiple legitimate mobile stations (MSs) and potential eavesdroppers. The legitimate BS can obtain available potential eavesdroppers’ channel state information (CSI), which is registered in an adjacent cell. In the proposed PRBF technique, the legitimate BS pseudo-randomly generates multiple candidates of the transmit beamforming (BF) matrix, in which each transmit BF matrix consists of multiple orthonormal BF vectors and shares BF information with legitimate MSs before data transmission. Each legitimate MS generates receive BF vectors to maximize the receive signal-to-interference-plus-noise (SINR) for all pseudo-randomly generated transmit beams and calculates the corresponding SINR. Then, each legitimate MS sends a single beam index and the corresponding SINR value of the BF vector that maximizes the received SINR for each BF matrix since a single spatial stream is sent to each legitimate MS. Based on the feedback information from legitimate MSs and the CSI from the legitimate BS to eavesdroppers, the legitimate BS selects the optimal transmit BF matrix and the legitimate MSs that maximizes secrecy sum-rate. We also propose a codebook-based opportunistic feedback (CO-FB) strategy to reduce feedback overhead at legitimate MSs. Based on extensive computer simulations, the proposed PRBF with the proposed CO-FB significantly outperforms the conventional random beamforming (RBF) with the conventional opportunistic feedback (O-FB) strategies in terms of secrecy sum-rate and required feedback bits.

1. Introduction

Security of wireless communication has received much attention from both academia and industry. Secure transmission is significantly important especially for military communications. To define the degree of security of communications, the concept of physical-layer security (PLS) was first defined in [1], and secrecy capacity has been used as a metric for PLS performance evaluations, which is defined as the difference between the channel capacity of authorized and unauthorized communication links [2,3,4,5].
Recent studies for improving PLS were reviewed and summarized in various multi-user wireless networks environments such as single-user single-antenna wire-tap channel, single-user multi-antenna wire-tap channel, wire-tap broadcast channel, wire-tap multiple-access channel, wire-tap interference channel, wire-tap relay and cooperative channels, etc. [6]. Several user scheduling algorithms combined with a beamforming (BF) technique were proposed for multi-user wireless networks for enhancing secrecy capacity. Jin et al. [7] showed that the optimal multi-user diversity can be obtained with a threshold-based user scheduling algorithm in a single-cell single-input single output (SISO) uplink wiretap network. In his another study [8], the threshold-based user scheduling algorithm for multi-cell SISO uplink wiretap networks was proposed. An artificial noise (AN)-aided opportunistic user scheduling algorithm was recently proposed for a single multi-user SISO uplink wiretap network with multiple eavesdroppers, where non-scheduled users generate AN in order to improve the PLS [9]. Even though there exist many recent BF techniques with an opportunistic user scheduling algorithm for a single-cell downlink wire-tap network in the literature, most recent studies assumed a single antenna at legitimate MSs and eavesdroppers.
Below are some of recent studies on multi-antenna based BF techniques for improving PLS. In [10], when an imperfect channel state information (CSI) between the legitimate base station (BS) and the eavesdropper is assumed, on–off opportunistic BF technique based on statistical CSI was proposed in a single-cell multi-user multiple-input single-output (MISO) downlink wire-tap network. In addition, a random beamforming (RBF) technique was proposed to maximize secrecy sum-rate in a single-cell multi-user MISO downlink network, where the legitimate BS selects a subset of active beams according to system parameters such as the number of users in a cell, the number of transmit antennas at the legitimate BS, and wireless channel conditions [11]. A RBF technique with variable number of active beams, which is similar to the one in [11], was also proposed to minimize secrecy outage capacity in a single-cell multi-user MISO downlink network [12]. A maximum signal-to-leakage-and-noise ratio (SLNR)-based BF technique was proposed in multiple input multiple output (MIMO) downlink wiretap networks [13], and, based on SLNR and zero-forcing technique, the BF matrix can be designed to increase the secrecy capacity.
Eavesdroppers are generally defined as passive or active eavesdroppers with respect to their eavesdropping strategies. A passive eavesdropper attempts to eavesdrop the data transmission without another operation [14,15,16]. However, an active eavesdropper attempts to eavesdrop the data transmission using fake information feedback [15,16]. Some eavesdroppers can also generate jamming signals, interfering with the data transmission of legitimate links [17,18,19,20,21]. They are called potential eavesdroppers, are registered in another cell but unauthorized in the legitimate cell, and can be classified as active eavesdroppers [22,23,24,25]. There are some related studies with respect to potential eavesdroppers. In [22], an orthogonal RBF technique with a opportunistic user scheduling algorithm was proposed to improve PLS in a single-cell MISO downlink cellular network where it is assumed that each legitimate MS is wire-tapped by an eavesdropper as a worst-case secrecy scenario. In particular, the authors called the eavesdroppers registered (but unintended) on the legitimate network. In addition, the eavesdroppers are obligated to feed their signal-to-interference-plus-noise ratio (SINR) values to the legitimate BS. Therefore, the authors considered a system model in which potential eavesdroppers exist. In [23], the authors considered potential eavesdropper that have a shorter access distance than legitimate receivers due to wireless channel attenuation. In secrecy wireless information and power transfer (SWIPT) systems, the legitimate transmitter can exploit near potential eavesdroppers’ CSI since they are legitimate devices for harvesting power. Then, based on potential eavesdroppers’ CSI, the legitimate transmitter can properly transmit to maximize PLS performance requirement of energy harvesting. In [24], the public access point (AP) for downlink transmission does not know which users are eavesdroppers. However, the AP considers only one legitimate user, which is selected for downlink transmission, and the other unscheduled users as potential eavesdroppers. In addition, the authors assumed the non-colluding eavesdroppers model (i.e., the non-cooperative potential eavesdroppers assumption). They also assumed that the secrecy rate only depends on the best CSI among potential eavesdropper. All users’ CSIs are estimated at AP by received packet from users. Then, the AP generates the BF vector based on all estimated CSIs for secure transmission. In [25], the authors considered a multi-user SISO uplink wire-tap network consisting of multiple users with a single antenna and multiple potential eavesdropper with a single antenna. Similar to [24], the authors considered a non-colluding eavesdroppers model. Thus, they considered only one potential eavesdropper, which has best CSI from the scheduled legitimate user. They proposed the optimal user scheduling and threshold-based user scheduling for PLS enhancement and analyzed the secrecy rate according to the proposed scheduling scheme.
There are some related studies with respect to beamforming algorithms for PLS enhancement.
  • In [13], the authors considered two wire-tap channel models in different users condition. In multiple-input single-output multi-eavesdropping antennas (MISOME) wiretap network, the authors assumed that all of the wireless channel matrices are known to the legitimate sender with multiple antennas and legitimate receiver with a single antenna. Otherwise, in multi-user multiple-input single-output multi-eavesdropping antennas (MU-MISOME) wire-tap network, the authors also assumed that all of wireless channel matrices are known to the legitimate sender with multiple antennas and multiple legitimate receivers with a single antenna. However, an eavesdropper with multiple antennas only knows the wireless channel matrices from legitimate sender in the above system models. The authors proposed some beamforming algorithms for improving PLS such as a maximum-SLNR-based beamforming algorithm and a zero-forcing beamforming algorithm based on the eavesdropper’s CSI in MISOME and MU-MISOME wire-tap networks.
  • In [26], the authors originally proposed a novel pseudo-random beamforming (PRBF) technique to maximize the achievable sum-rate in multi-cell downlink cellular networks. Each cell has a BS with multiple antennas and multiple MSs with a single antenna. By announcing an optimal BF candidate among multiple candidates of pseudo-randomly generated BF matrices at the BS coordinator, the multi-cell downlink sum-rate is maximized.
  • In [27], the authors proposed a PRBF technique to improve PLS in single-cell downlink cellular networks. In addition, the authors assumed a system model consisting a legitimate BS with multiple antennas, multiple legitimate MSs with a single antenna and a potential eavesdropper with a single antenna. To maximize the achievable secrecy sum-rate in downlink cellular networks consisting of legitimate MSs with a single antenna and a potential eavesdropper, the PRBF technique based on legitimate MSs’ feedback information and a potential eavesdropper’s CSI is proposed.
The main contributions of this paper are summarized as follows:
  • We investigate the secrecy sum-rate in single-cell MIMO downlink cellular networks consisting of a legitimate BS with multiple antennas, legitimate MSs with multiple antennas and eavesdroppers with multiple antennas.
  • We also consider the conventional F-FB, opportunistic feedback (O-FB) and newly proposed the codebook-based opportunistic feedback (CO-FB) strategy.
  • In addition, we compare the conventional F-FB, O-FB [26,27] and the proposed CO-FB in terms of secrecy sum-rate and required feedback bits (feedback overhead).
The remainder of this paper is organized as follows. In Section 2, we describe the system model of MIMO downlink celluar networks with eavesdroppers In Section 3, we explain the overall procedure of the proposed PRBF technique and also compare the conventional F-FB and O-FB with the proposed CO-FB. Computer simulation results are presented in Section 4. Finally, the conclusions are briefly drawn in Section 5.

2. System Model

Let us consider a TDD MIMO downlink network consisting of a legitimate BS with N T antennas, N MS legitimate MSs with N R antennas, and N E eavesdroppers with N R antennas, as shown in Figure 1.
We assume that the legitimate BS is in the blue box and other cell BSs are in the red box. In particular, legitimate MSs existing in other cells (marked with a red box) can become potential eavesdroppers who are unauthorized MSs for the legitimate network in the blue box. We assume the CSI of potential eavesdroppers is available at the legitimate BS, which implies that the legitimate BS is assumed to know the wireless channel from itself to the potential eavesdroppers. This is possible by overhearing the pilot signals from the potential eavesdroppers when the eavesdroppers send packets to their own BSs in TDD systems. Thus, each BS can estimate all the channel coefficients from not only the MSs belonging to itself but also the MSs in other cells, which is also known as local CSI assumption. Many studies on multi-cell MIMO networks assume the local CSI as well [28,29,30]. In addition, many previous studies on physical-layer security assume that the legitimate communication nodes know the wireless channel to the eavesdroppers based on local CSI assumption [7,8,25,27]. In addition, we assume that the same frequency band is used for data transmission. All devices are affected by the interference caused by the desired signal from other cells. M candidates of transmit BF matrix are pseudo-randomly generated at the legitimate BS. Then, M candidates of transmit BF matrix are represent as V [ 1 ] , , V [ M ] . The mth transmit BF matrix is denoted by V [ m ] = v [ m , 1 ] , , v [ m , b ] , , v [ m , B ] C N T × B , where m M { 1 , , M } and b B { 1 , , B ( = N T ) } . v [ m , b ] C N T × 1 represents the bth transmit BF vector in the mth transmit BF matrix. Corresponding to M B transmit BF vectors, each legitimate MS generates M B receive BF vectors based on MMSE. Then, M candidates of receive BF matrix at the ith legitimate MS are represented as U MS , i [ 1 ] , , U MS , i [ M ] , where i N MS { 1 , , N MS } . The mth receive BF matrix at the ith legitimate MS is represented as U MS , i [ m ] = u MS , i [ m , 1 ] , , u MS , i [ m , b ] , , u MS , i [ m , B ] C N R × B . In addition, u MS , i [ m , b ] C N R × 1 represents the bth receive BF vector in the mth receive BF matrix at the ith legitimate MS. Similarly, each eavesdropper also generates M B receive BF vectors corresponding M B transmit BF vectors based on MMSE. This assumption is reasonable to consider the worst-case in terms of PLS of legitimate devices. Then, M candidates receive BF matrix at the jth eavesdropper are represented by U E , j [ 1 ] , , U E , j [ M ] , where j N E { 1 , , N E } . The mth receive BF matrix at the jth eavesdropper is denoted as U E , j [ m ] = u E , j [ m , 1 ] , , u E , j [ m , b ] , , u E , j [ m , B ] C N R × B . u E , j [ m , b ] C N R × 1 denotes the bth receive BF vector in the mth receive BF matrix at the jth eavesdropper. H MS , i C N R × N T and H E , j C N R × N T denote the wireless channel matrix from the legitimate BS to ith legitimate MS and the wireless channel matrix from the legitimate BS to jth eavesdropper, respectively.
We assume that wireless channel components are independent and identically distributed (i.i.d.). In addition, we assume that wireless channel components are constant during one block (e.g., one frame), and large-scale fading components are equal to 1 from the legitimate BS to legitimate MSs and eavesdroppers. The legitimate BS transmits a data signal vector x x 1 , , x B T C B × 1 , which is satisfied by the power constraint E | x | 2 = P . Without any loss of generality, the received signal vector y MS , i [ m , b ] C N R × 1 at the ith legitimate MS with the bth transmit BF vector when the legitimate BS transmits a data signal vector x with the mth transmit BF matrix is given by
y MS , i [ m , b ] = H MS , i V [ m ] x + n MS , i = H MS , i v [ m , b ] x b + l b B H MS , i v [ m , l ] x l + n MS , i ,
where the additive thermal Gaussian noise vector at the ith legitimate MS is denoted by n MS , i C N R × 1 according to CN 0 , N 0 I N R .
The post-processed received signal y ˜ MS , i [ m , b ] C with the bth receive BF vector in the mth receive BF matrix is given as
y ˜ MS , i [ m , b ] = u MS , i [ m , b ] H y MS , i [ m , b ] = u MS , i [ m , b ] H H MS , i v [ m , b ] x b + u MS , i [ m , b ] H l b B H MS , i v [ m , l ] x l + u MS , i [ m , b ] H n MS , i = h ˜ MS , i [ m , b ] x b + u MS , i [ m , b ] H l b B h MS , i [ m , l ] x l + n ˜ MS , i ,
where the desired and interference signals at the ith legitimate MS are represented as the first and second terms on the right side of Equation (2), respectively. The post-processed additive thermal Gaussian noise at the ith legitimate MS follows n ˜ MS , i u MS , i [ m , b ] H n MS , i CN ( 0 , 1 ) . In this case, the post-processed effective channel h ˜ MS , i [ m , b ] C at the ith legitimate MS is defined as
h ˜ MS , i [ m , b ] u MS , i [ m , b ] H h MS , i [ m , b ] ,
where the effective channel vector is given by h MS , i [ m , b ] H MS , i v [ m , b ] C N R × 1 .
Similarly, the received signal vector y E , j [ m , b ] C N R × 1 at the jth eavesdropper with the bth transmit BF vector when the legitimate BS transmits a data signal vector x with the mth transmit BF matrix is given by
y E , j [ m , b ] = H E , j V [ m ] x + n E , j = H E , j v [ m , b ] x b + l = 1 , l b B H E , j v [ m , l ] x l + n E , j ,
where the additive thermal Gaussian noise vector at the jth eavesdropper is denoted by n E , j C N R × 1 following CN 0 , N 0 I N R . The post-processed received signal y ˜ E , j [ m , b ] C with the bth receive BF vector in the mth receive BF matrix is given as
y ˜ E , j [ m , b ] = u E , j [ m , b ] H y E , j [ m , b ] = u E , j [ m , b ] H H E , j v [ m , b ] x b + u E , j [ m , b ] H l b B H E , j v [ m , l ] x l + u E , j [ m , b ] H n E , j = h ˜ E , j [ m , b ] x b + u E , j [ m , b ] H l b B h E , j [ m , l ] x l + n ˜ E , j ,
where the desired and interference signals at the jth eavesdropper are represented as the first and second terms on the right side of Equation (5), respectively. The post-processed additive thermal Gaussian noise at the jth eavesdropper follows n ˜ E , j u E , j [ m , b ] H n E , j CN ( 0 , 1 ) . In this case, the post-processed effective channel h ˜ E , j [ m , b ] C at the jth eavesdropper is defined as
h ˜ E , j [ m , b ] u E , j [ m , b ] H h E , j [ m , b ] ,
where the effective channel vector is given by h E , j [ m , b ] H E , j v [ m , b ] C N R × 1 .

3. Pseudo-Random Beamforming for Improving Physical-Layer Security

In this section, we explain the proposed technique for PLS enhancement in downlink cellular networks in detail. Pseudo-random beamforming algorithm for PLS enhancement, as shown in Algorithm 1.
Algorithm 1: Pseudo-random beamforming algorithm for PLS enhancement.
 1 Initialization
 2 Generate V [ 1 ] , , V [ M ] at legitimate BS and share transmit BF information with legitimate MSs
 3 Broadcast a pilot signal at legitimate BS
 4 Obtain h MS , i , h E , j at legitimate MSs and eavesdroppers   

 5 Generate of receive BF vectors
 6 Generate u MS , i [ m , b ] for all m and b at legitimate MSs
 7 Generate u E , j [ m , b ] for all m and b at eavesdroppers   

 8 Feedback of SINR values
 9 Feedback the SINRs Γ MS , i [ m , b ] and corresponding b and m at legitimate MSs
10 Calculate the SINRs Γ E , j [ m , b ] and corresponding b and m of eavesdroppers at legitimate BS   

11 User scheduling
12 Calculate R MS [ m ] and R E [ m ] for all m at legitimate BS   

13 Data transmission
14 Transmit data signals x via V [ m ^ ] to maximize the secrecy sum-rate at legitimate BS
15 Achieve the secrecy sum-rate R S [ m ^ ] for downlink data transmission at legitimate BS

3.1. Initialization

M candidates of transmit BF matrix are generated by the legitimate BS in a pseudo-random manner. These candidates are shared with legitimate MSs. After that, to announce a wireless channel vector from the legitimate BS to legitimate MS, the legitimate BS broadcasts a pilot signal.

3.2. Generate of Receive Beamforming Vectors

Legitimate MSs who received a pilot signal generate M B receive BF vectors based on effective channel vector h MS , i . Based on MMSE, the receive BF vector u MS , i [ m , b ] corresponding to the bth transmit BF vector in the mth transmit BF matrix for all m and b is given by
u MS , i [ m , b ] = N 0 I N R + R MS , i [ m , b ] 1 h MS , i [ m , b ] N 0 I N R + R MS , i [ m , b ] 1 h MS , i [ m , b ] , m , b ,
where the interference covariance matrices R MS , i C N R × N R for all m and b are given by
R MS , i [ m , b ] = E y MS , i y MS , i H h MS , i [ m , b ] h MS , i [ m , b ] H N 0 I N R , m , b .
Similar to the above procedure, by considering worst-case at legitimate devices, eavesdroppers also generate M B received BF vectors based on MMSE, which are given by
u E , j [ m , b ] = N 0 I N R + R E , j [ m , b ] 1 h E , j [ m , b ] N 0 I N R + R E , j [ m , b ] 1 h E , j [ m , b ] , m , b ,
where the interference covariance matrices R E , j C N R × N R for all m and b are given by
R E , j [ m , b ] = E y E , j y E , j H h E , j [ m , b ] h E , j [ m , b ] H N 0 I N R , m , b .

3.3. Feedback of SINR Values

The SINR values at the ith legitimate MS for all m and b can be calculated by
Γ MS , i [ m , b ] = u MS , i [ m , b ] H h MS , i [ m , b ] 2 u MS , i [ m , b ] H N 0 I N R + R MS , i [ m , b ] u MS , i [ m , b ] , m , b .
Similarly, the SINR values at the jth eavesdropper for all m and b can be calculated at the legitimate BS.
Γ E , j [ m , b ] = u E , j [ m , b ] H h E , j [ m , b ] 2 u E , j [ m , b ] H N 0 I N R + R E , j [ m , b ] u E , j [ m , b ] , m , b .
We consider three types of feedback strategies: the conventional full feedback (F-FB), the conventional opportunistic feedback (O-FB) [26,27], and the proposed codebook-based opportunistic feedback (CO-FB) strategy. For the detailed explanations, we assume that the number of required bits to deliver the quantized SINR value is Q bits .
  • In the conventional F-FB strategy [26,27], each legitimate MS provides a feedback of the maximal SINR value for all m. Hence, M SINR values are received back at the legitimate BS from each legitimate MS. Then, the number of required feedback bits per legitimate MS is represented as
    N F FB = M log 2 B + Q .
    However, many feedback bits are required. Thus, we consider opportunistic feedback strategies for the reduction of feedback bits.
  • In the conventional opportunistic feedback (O-FB) strategy [26,27], each legitimate MS selects n M maximal SINR values among M transmit BF vectors, where n is a predetermined value based on policy before data transmission. n SINR values and beam indices are received back from each legitimate MS. Then, the number of required feedback bits per legitimate MS is represented as
    N O FB = n ( log 2 M B + Q ) .
  • To further reduce the required feedback bits per legitimate MS, the proposed codebook-based opportunistic feedback (CO-FB) strategy can be applied instead of the conventional O-FB with one-time codebook sharing before data transmission. Each legitimate MS selects the maximal SINR in n transmit BF matrices out of M transmit BF matrix candidates. n SINR values and n codebook indices are received back from each legitimate MS. Then, the number of required feedback bits per legitimate MS is represented as
    N CO FB = log 2 M n + n log 2 B + Q .
To compare the feedback amount for each feedback strategy, we consider the number of required feedback bits per legitimate MS when the number of candidates of transmit BF matrix M is equal to 16, the number of transmit BF vectors in each transmit BF matrix B is equal to 3, and the number of required bits for the quantized SINR Q is equal to 6 bits . In the conventional F-FB strategy, the number of required feedback bits per legitimate MS can be calculated by N F FB = 16 log 2 3 + 6 = 128 bits . On the other hand, the number of required feedback bits per legitimate MS in the conventional O-FB strategy can be calculated as N O FB = 4 ( log 2 16 × 3 + 6 ) = 48 bits when the predetermined valued is equal to n = 4 . Furthermore, in the proposed CO-FB strategy, the number of required feedback bits per legitimate MS can be calculated as N CO FB = log 2 16 4 + 4 log 2 3 + 6 = 43 bits .

3.4. User Scheduling

Since eavesdroppers’ CSI is available at the legitimate BS, the legitimate BS selects the optimal transmit BF matrix based on legitimate MSs’ feedback information and eavesdroppers’ CSI. In the first step, the legitimate BS selects a legitimate MSs with the maximal SINR value for all b. Then, the achievable sum-rate for all m is given by
R MS [ m ] = b = 1 B log 2 1 + max 1 i N MS Γ MS , i [ m , b ] , m .
Similarly, the eavesdropping rate due to eavesdropper for all m is given by
R E [ m ] = b = 1 B log 2 1 + max 1 j N E Γ E , j [ m , b ] , m .

3.5. Data Transmission

In the last step, the legitimate BS transmits a data signal vector x with the m ^ th optimal transmit BF matrix. Thus, the achievable secrecy sum-rate is obtained as
R S [ m ^ ] = R MS [ m ^ ] R E [ m ^ ] + .
The achievable secrecy sum-rate can be obtained from both the achievable sum-rate in Equation (16) and the data-loss in Equation (17).

4. Simulation Results

We evaluated the conventional RBF and the proposed PRBF in MIMO downlink cellular network consisting of legitimate MSs and eavesdroppers according to various system parameters such as the number of transmit BF matrix candidates, the number of legitimate MSs, and the predetermined value in the conventional O-FB and the proposed CO-FB. The system parameter definitions are shown in Table 1. We also analyzed the number of required feedback bits at each legitimate MSs with all of considered feedback strategies.
Figure 2 shows that the secrecy sum-rate according to the number of transmit BF matrix candidates M when the number of eavesdroppers N E is equal to 2, and the number of antennas at legitimate BS N T , the number of antennas of both the legitimate MSs and eavesdroppers N R and the number of transmit BF vectors in each transmit BF matrix candidate B are all equal to 3. In addition, the received SNR at each communication device (legitimate MS or eavesdropper) is equal to 0 dB . When the number of transmit BF matrix candidates is equal to 1, the curves show the secrecy sum-rate of the conventional PRBF. When the number of transmit BF matrix candidates is 2 or more, the curves show the secrecy sum-rate of the proposed PRBF. In addition, we consider the number of legitimate MSs N MS = 10 and 40 cases in all of considered feedback strategies. The conventional O-FB and the proposed CO-FB show the same performance in terms of secrecy sum-rate with the same system parameters. Hence, we only consider the secrecy sum-rate of the proposed CO-FB in the following figures. The secrecy sum-rate increases as the number of transmit BF matrix candidates M increases in the conventional F-FB. In both the conventional O-FB and the proposed CO-FB, as the number of transmit BF matrix candidates M increases, the secrecy sum-rate does not always monotonically increase since the number of legitimate MSs N MS and the predetermined value n are not large enough. However, when the predetermined value n or the number of legitimate MSs N MS are large enough, the proposed CO-FB and the conventional F-FB show almost the same performance in terms of secrecy sum-rate.
Figure 3 shows that the secrecy sum-rate according to the number of legitimate MSs N MS when the number of eavesdroppers N E is equal to 2, and the number of antennas at legitimate BS N T , the number of antennas at both of legitimate MSs and eavesdroppers N R , the number of transmit BF vectors in each transmit BF matrix candidate B are all equal to 3. In addition, the received SNR at each communication device is equal to 0 dB . In general, as the number of legitimate MSs N MS increases, the secrecy sum-rate increases in the all of feedback strategies. The proposed CO-FB does not reach the performance of the conventional F-FB in terms of secrecy sum-rate when the predetermined value n or the number of legitimate MSs N MS are not large enough. When the predetermined value n or the number of legitimate MSs N MS are large enough, the proposed CO-FB and the conventional F-FB show almost the same performance in terms of secrecy sum-rate.
Figure 4 shows that the secrecy sum-rate according to the received SNR at each communication device when the number of legitimate MSs N MS is equal to 100, snf the number of eavesdroppers N E is equal to 2, the number of antennas of both legitimate MSs and eavesdroppers N R , and the number of transmit BF vectors in each transmit BF matrix candidate B are all equal to 3. The secrecy sum-rate increases as the received SNR and the number of transmit BF candidates M increases. In particular, when the number of transmit BF candidates M is equal to 4, the proposed PRBF with the conventional F-FB outperforms the proposed PRBF with the proposed CO-FB and the predetermined value n = 1 in terms of secrecy sum-rate. However, the proposed PRBF with the conventional F-FB and the proposed PRBF with the proposed CO-FB and the predetermined value n = 4 are almost the same in terms of secrecy sum-rate. When the predetermined value n is large enough, the proposed CO-FB and the conventional F-FB show almost the same performance in terms of secrecy sum-rate. However, when the predetermined value n increases, the number of required feedback bits per legitimate MS also increases.
Figure 5 shows that the number of required feedback bits per legitimate MS according to the number of transmit BF matrix candidates M and the predetermined value n when the number of transmit BF vectors in each transmit BF matrix candidate B is equal to 3, and the number of required bits for SINR quantization Q is equal to 6 bits . As explained in Section 3.2, each legitimate MS provides back totally M SINR values and beam indices in the conventional F-FB. In the conventional F-FB, the number of required feedback bits do not depend on the predetermined value n. Thus, the number of required feedback bits is fixed regardless of the predetermined value n. When the number of transmit BF matrix candidates M is equal to 16 and the number of transmit BF vectors in each transmit BF matrix candidate B is equal to 3 in the conventional F-FB strategy, each legitimate MS provides back totally 16 SINR values for 16 BF matrix candidates regardless of n. On the other hand, each legitimate MS provides back totally n SINR values and beam indices in both of the conventional O-FB and the proposed CO-FB. The predetermined value n indicates the number of feedback SINR values, and the number of required feedback bits depends on the predetermined value n in both of the conventional O-FB and the proposed CO-FB. When the predetermined value n and the number of transmit BF vectors in each transmit BF matrix candidate M are equal to 4 and 16, respectively, each legitimate MS provides back only four maximal SINR values for 16 BF matrix candidates in the conventional O-FB. Furthermore, in the proposed CO-FB, the number of required feedback bits per legitimate MS can be reduced compared to the conventional O-FB. The conventional F-FB shows the best performance than the proposed CO-FB in terms of secrecy sum-rate. However, it is difficult to apply the conventional F-FB in practice due to the large number of required feedback bits. Hence, the proposed CO-FB maintains a similar performance as the conventional F-FB in terms of secrecy sum-rate when the number of legitimate MSs, the number of transmit BF matrix candidates M and the predetermined value n are large enough. As a result, the feedback overhead can be significantly reduced.
In summary, the conventional PRBF uses only one pseudo-random BF matrix ( M = 1 ) for downlink data transmission. Accordingly, each legitimate MS feedbacks SINR values with transmit BF vector index to the legitimate BS according to the number of transmit BF vectors B. However, the proposed PRBF uses one more pseudo-random BF matrix candidates ( M 2 ) . Thus, each legitimate MS feedbacks SINR values with transmit BF vector and matrix index to the legitimate BS according to the number of transmit BF matrix candidates M and the number of transmit BF vectors B. The proposed PRBF technique has the effect of increasing the number of legitimate MSs who feedback CSI by the number of transmit BF matrix candidates M. In other words, the proposed PRBF technique exploits multi-user diversity gain. As the number of transmit BF matrix candidates M increases, the sum-rate increases, however, the feedback overhead also significantly increases in the proposed PRBF with the conventional F-FB. Thus, the proposed PRBF technique should be used with the conventional O-FB or the proposed CO-FB, which can significantly reduce the feedback overhead. However, in the proposed PRBF with the conventional O-FB or the proposed CO-FB, if the number of transmit BF matrix candidates M is large and the number of legitimate MSs N MS is small, the sum-rate is reduced because some transmit BF vectors may not be selected and used during user scheduling. To solve this problem, the predetermined value n should be designed considering the number legitimate MSs N MS in a downlink cell to obtain a sufficient sum-rate improvement.

5. Conclusions

In this paper, we propose a PRBF technique for MIMO downlink cellular networks. Legitimate MSs can receive the data signal from the legitimate BS via MMSE-based receive BF vector. By considering worst-case at legitimate devices, we assume that potential eavesdroppers can also receive the data signal via MMSE-based receive BF vector. Based on the feedback information from legitimate MSs and potential eavesdroppers’ CSI, the legitimate BS selects the optimal transmit BF matrix among multiple BF candidates in order to maximize the secrecy sum-rate performance. Extensive computer simulations show that the proposed PRBF outperforms the conventional RBF in terms of secrecy sum-rate. In addition, the proposed CO-FB and the conventional O-FB have the same performance in terms of secrecy sum-rate; however, the proposed CO-FB outperforms the conventional O-FB in terms of required feedback bits. Furthermore, when the number of legitimate MSs and the predetermined value are large enough, the proposed PRBF with the proposed CO-FB outperforms the conventional RBF with the conventional O-FB in terms of sum-rate and required feedback bits for user scheduling at the legitimate BS.

Author Contributions

Formal analysis, W.S.; Investigation, W.S., H.S.J., and B.C.J.; Methodology, B.C.J.; Project administration, B.C.J.; Resources, B.C.J.; Software, W.S.; Supervision, H.S.J. and B.C.J.; Validation, H.S.J.; Writing—original draft, W.S.; and Writing—review and editing, H.S.J. and B.C.J.

Funding

This research received no external funding.

Acknowledgments

This work was supported in part by the NRF through the Basic Science Research Program funded by the Ministry of Science and ICT under Grant NRF2019R1A2B5B01070697 and in part by the NRF grant funded by the Korea government Ministry of Science and ICT (No. 2019R1F1A1061023).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 10, 656–715. [Google Scholar] [CrossRef]
  2. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  4. Bloch, M.; Barros, J.; Rodrigues, M.R.D.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 24, 451–456. [Google Scholar] [CrossRef]
  5. Shiu, Y.-S.; Chang, S.Y.; Wu, H.-C.; Huang, S.C.-H.; Chen, H.-H. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [Google Scholar] [CrossRef]
  6. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tuts. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  7. Jin, H.; Shin, W.-Y.; Jung, B.C. On the multi-user diversity with secrecy in uplink wiretap networks. IEEE Commun. Lett. 2013, 17, 1778–1781. [Google Scholar] [CrossRef]
  8. Jin, H.; Jung, B.C.; Shin, W.-Y. On the secrecy capacity of multi-cell uplink networks with opportunistic scheduling. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016. [Google Scholar]
  9. Bang, I.; Kim, S.M.; Sung, D.K. Artificial noise-aided user scheduling for optimal secrecy multiuser diversity. IEEE Commun. Lett. 2017, 21, 528–531. [Google Scholar] [CrossRef]
  10. Pei, M.; Swindlehurst, A.L.; Ma, D.; Wei, J. On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling. IEEE Commum. Lett. 2014, 18, 50–53. [Google Scholar] [CrossRef]
  11. Wang, L.; Wang, Z.; Pei, M. Orthogonal random beamforming with beam selection for MISO wiretap broadcast channels. In Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 14–17 October 2016. [Google Scholar]
  12. Chen, X.; Zhang, Y. Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Syst. J. 2015, 11, 1128–1136. [Google Scholar] [CrossRef]
  13. Gao, C.; Han, S.; Wang, X.; Meng, W.; Gao, F. Performance Analysis of Beamforming Algorithms In Physical Layer Security. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018. [Google Scholar]
  14. Mukherjee, A.; Swindlehurst, A.L. Detecting passive eavesdroppers in the MIMO wiretap channel. In Proceedings of the 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, 25–30 March 2012. [Google Scholar]
  15. Chorti, A.; Perlaza, S.M.; Han, Z.; Poor, H.V. Physical layer security in wireless networks with passive and active eavesdroppers. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012. [Google Scholar]
  16. Kapetanovic, D.; Zheng, G.; Rusek, F. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Commun. Mag. 2015, 53, 21–27. [Google Scholar] [CrossRef] [Green Version]
  17. Do, T.T.; Ngo, H.Q.; Duong, T.Q.; Oechtering, T.J.; Skoglund, M. Massive MIMO pilot retransmission strategies for robustification against jamming. IEEE Wirel. Commun. Lett. 2017, 6, 58–61. [Google Scholar] [CrossRef]
  18. Tseng, S.-M.; Chen, Y.-F.; Chiu, P.-H.; Chi, H.-C. Jamming resilient cross-layer resource allocation in uplink HARQ-based SIMO OFDMA video transmission systems. IEEE Access 2017, 5, 24908–24919. [Google Scholar] [CrossRef]
  19. Guo, J.; Zhao, N.; Yu, F.R.; Zhang, S.; Yang, Z.; Leung, V.C. Disrupting Anti-Jamming Interference Alignment Sensor Networks with Optimal Signal Design. IEEE Sens. Lett. 2017, 1, 7500204. [Google Scholar] [CrossRef]
  20. Liang, L.; Cheng, W.; Zhang, W.; Zhang, H. Mode hopping for anti-jamming in radio vortex wireless communications. IEEE Trans. Veh. Technol. 2018, 67, 7018–7032. [Google Scholar] [CrossRef]
  21. Wang, H.; Fu, Y.; Song, R.; Shi, Z.; Sun, X. Power Minimization Precoding in Uplink Multi-Antenna NOMA Systems With Jamming. IEEE Trans. Green Commun. Netw. 2019, 3, 591–602. [Google Scholar] [CrossRef]
  22. Krikidis, I.; Ottersten, B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling. IEEE Signal Process Lett. 2012, 20, 141–144. [Google Scholar] [CrossRef]
  23. Chen, X.; Ng, D.W.K.; Chen, H.-H. Secrecy wireless information and power transfer: Challenges and opportunities. IEEE Wirel. Commun. 2016, 23, 54–61. [Google Scholar] [CrossRef]
  24. Abbas, M.A.; Song, H.; Hong, J.-P. Opportunistic scheduling for average secrecy rate enhancement in fading downlink channel with potential eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2019, 14, 969–980. [Google Scholar] [CrossRef]
  25. Bang, I.; Jung, B.C. Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers. IEEE Access 2019, 7, 127078–127089. [Google Scholar] [CrossRef]
  26. Son, W.; Jung, B.C.; Shin, W.-Y.; Shin, Y. Multi-cell pseudo-random beamforming: Opportunistic feedback and beam selection. In Proceedings of the 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, South Korea, 18–20 October 2017. [Google Scholar]
  27. Son, W.; Jung, B.C.; Kim, C.-Y.; Kim, J.M. Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security. In Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 3–6 July 2018. [Google Scholar]
  28. Yang, H.J.; Shin, W.-Y.; Jung, B.C.; Paulraj, A. Opportunistic interference alignment for MIMO interfering multiple-access channels. IEEE Trans. Wirel. Commun. 2013, 12, 2180–2192. [Google Scholar] [CrossRef]
  29. Yang, H.J.; Shin, W.-Y.; Jung, B.C.; Suh, C.; Paulraj, A. Opportunistic downlink interference alignment for multi-cell MIMO networks. IEEE Trans. Wirel. Commun. 2017, 16, 1533–1548. [Google Scholar] [CrossRef]
  30. Ko, K.S.; Jung, B.C.; Hoh, M. Distributed interference alignment for multi-antenna cellular networks with dynamic time division duplex. IEEE Commun. Lett. 2018, 22, 792–795. [Google Scholar] [CrossRef]
Figure 1. System model of MIMO downlink cellular network.
Figure 1. System model of MIMO downlink cellular network.
Entropy 21 01038 g001
Figure 2. Secrecy sum-rate according to the number of BF candidates.
Figure 2. Secrecy sum-rate according to the number of BF candidates.
Entropy 21 01038 g002
Figure 3. Secrecy sum-rate according to the number of legitimate MSs.
Figure 3. Secrecy sum-rate according to the number of legitimate MSs.
Entropy 21 01038 g003
Figure 4. Secrecy sum-rate according to the received SNR.
Figure 4. Secrecy sum-rate according to the received SNR.
Entropy 21 01038 g004
Figure 5. Required feedback bits per legitimate MS according to the predetermined value.
Figure 5. Required feedback bits per legitimate MS according to the predetermined value.
Entropy 21 01038 g005
Table 1. System parameters.
Table 1. System parameters.
DefinitionParameter
Number of antennas at the legitimate BS N T
Number of antennas at the legitimate MSs and eavesdroppers N R
Number of legitimate MSs N MS
Number of eavesdroppers N E
Number of transmit BF matrix candidatesM
Number of transmit BF vectors in each BF matrix candidate B ( = N T )
Number of bits for SINR quantizationQ
Predetermined value in O-FB and CO-FBn

Share and Cite

MDPI and ACS Style

Son, W.; Jang, H.S.; Jung, B.C. A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks. Entropy 2019, 21, 1038. https://doi.org/10.3390/e21111038

AMA Style

Son W, Jang HS, Jung BC. A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks. Entropy. 2019; 21(11):1038. https://doi.org/10.3390/e21111038

Chicago/Turabian Style

Son, Woong, Han Seung Jang, and Bang Chul Jung. 2019. "A Pseudo-Random Beamforming Technique for Improving Physical-Layer Security of MIMO Cellular Networks" Entropy 21, no. 11: 1038. https://doi.org/10.3390/e21111038

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop