We consider a broadcast channel, in which a multi-antenna transmitter (Alice) sends K confidential information signals to K legitimate users (Bobs) in the presence of L eavesdroppers (Eves). Alice uses MIMO precoding to generate the information signals along with her own (Tx-based) friendly jamming. Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves a "vulnerability region" around each Bob, which can be exploited by a nearby Eve. We address this problem by augmenting Tx-based friendly jamming (TxFJ) with Rxbased friendly jamming (RxFJ), generated by each Bob. Specifically, each Bob uses self-interference suppression (SIS) to transmit a friendly jamming signal while simultaneously receiving an information signal over the same channel. We minimize the powers allocated to the information, TxFJ, and RxFJ signals under given guarantees on the individual secrecy rate for each Bob. The problem is solved for the cases when the eavesdropper's channel state information is known/unknown. Simulations show the effectiveness of the proposed solution. Furthermore, we discuss how to schedule transmissions when the rate requirements need to be satisfied on average rather than instantaneously.Under special cases, a scheduling algorithm that serves only the strongest receivers is shown to outperform the one that schedules all receivers. Index termsBroadcast channel, channel correlation, friendly jamming, full-duplex, physical layer security I. INTRODUCTIONAs wireless systems continue to proliferate, confidentiality of their communications becomes one of the main concerns due to the broadcast nature of the wireless medium. Cryptographic techniques can be utilized to address these concerns, but such techniques often assume adversaries with limited computational capabilities. Physical (PHY) layer security, on the other hand, can be implemented regardless of the adversary's computational power. It also takes advantage of the characteristics of the wireless medium.The authors are with the The origins of PHY-layer security dates back to the pioneering work of Wyner [1] that studied the concept of secrecy capacity for the degraded wiretap channel. The authors in [2] extended Wyner's work to non-degraded discrete memoryless broadcast channels. Later on, the secrecy capacity of MIMO (multiple-input multiple-output) wiretap channel was obtained in [3]. The secrecy region of the Gaussian MIMO broadcast channel was studied in [4], [5], and [6]. The authors in [7] and [8] studied the problem of secure communications over broadcast channels under individual secrecy constraint, which guarantees that the information leakage to eavesdroppers from each information message vanishes. Even though the joint secrecy constraint, which ensures that the information leakage to eavesdroppers from all information messages vanishes, is stronger than the individual one, it is not always possible to satisfy. Moreover, the individual secrecy constraint still offers an acceptable secrecy level, while increasing transmission rates [7]. T...
We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker.The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, we study two attack models. In the first model, the attacker aims at minimizing the sum-rate of downlink transmissions by contaminating the uplink pilots. In the second model, the attacker exploits its in-band full-duplex capabilities to generate jamming signals in both the CSI estimation and data transmission phases. We study these attacks under two downlink power allocation strategies when the attacker knows and does not know the locations of the BS and users. The formulated problems are solved using stochastic optimization, Lagrangian minimization, and game-theoretic methods. A closed-form solution for a special case of the problem is obtained. Furthermore, we analyze the achievable individual secrecy rates under a pilot contamination attack, and provide an upper bound on these rates. Our results indicate that the proposed attacks degrade the throughput of a massive MIMO system by more than 50%. Index termsMassive MIMO, pilot contamination, physical layer security, active attack, stochastic optimization.
Directionality in millimeter-wave (mmW) systems make link establishment and maintenance challenging, due to the search-time overhead of beam scanning and the vulnerability of directional links to blockages. In this paper, we propose a communication protocol called SmartLink, which exploits the clustering phenomenon at mmW frequencies to establish a multibeam link between a base station and a user. By utilizing multiple clusters, SmartLink enables efficient link maintenance and sustained throughput. We develop a logarithmic-time search algorithm called multi-lobe beam search (MLBS), which is used in SmartLink to discover the clusters. MLBS probes several directions simultaneously, using multi-lobe beam patterns. The number of simultaneous lobes is selected to minimize the search time of the clusters. We provide detailed analysis of the false alarm and misdetection probabilities for the designed beam patterns. Following cluster discovery, SmartLink divides antennas into sub-arrays to generate the optimal multi-lobe beam pattern that maximizes the average data rate under blockage. Extensive simulations using actual channel traces obtained by utilizing phased-array antennas at 29 GHz are used to verify the efficiency of SmartLink. MLBS decreases the discovery time by up to 88% compared to common existing search schemes, and exploiting multiple clusters improves the average data rate by 10%.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.