2018
DOI: 10.1109/tvt.2018.2827785
|View full text |Cite
|
Sign up to set email alerts
|

Beam Domain Secure Transmission for Massive MIMO Communications

Abstract: We investigate the optimality and power allocation algorithm of beam domain transmission for single-cell massive multiple-input multiple-output (MIMO) systems with a multiantenna passive eavesdropper. Focusing on the secure massive MIMO downlink transmission with only statistical channel state information of legitimate users and the eavesdropper at base station, we introduce a lower bound on the achievable ergodic secrecy sum-rate, from which we derive the condition for eigenvectors of the optimal input covari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 47 publications
0
16
0
Order By: Relevance
“…Then, replacing f k (Λ) with its firstorder Taylor expansion △f k,ub (Λ), the non-concave term K k=1 (g k (Λ) − f k (Λ)) in problem P 3 can be lower-bounded by a concave function. This approximation has been used in some previous works [33], [43], [44], where its effectiveness has also been verified. By doing so, problem P 3 is tackled through solving the following optimization subproblems…”
Section: Mm-based Power Allocation Algorithmmentioning
confidence: 94%
“…Then, replacing f k (Λ) with its firstorder Taylor expansion △f k,ub (Λ), the non-concave term K k=1 (g k (Λ) − f k (Λ)) in problem P 3 can be lower-bounded by a concave function. This approximation has been used in some previous works [33], [43], [44], where its effectiveness has also been verified. By doing so, problem P 3 is tackled through solving the following optimization subproblems…”
Section: Mm-based Power Allocation Algorithmmentioning
confidence: 94%
“…Under the above assumptions, we calculate the ergodic data rate of UT-(k, u) as in [38], [39], i.e.,…”
Section: B Problem Formulationmentioning
confidence: 99%
“…Specifically, with the precision set to be d digits [46], the required number of iterations for Newton's method is log d [49]. Then, the computational complexity of Algorithm 2 is O(L S U KM (log d + 1)) [39], where L S is the number of iterations in the subgradient method, and K = For the distributed approach where the problem P…”
Section: Complexity Analysismentioning
confidence: 99%
“…High angular resolution is one of the most important properties of the massive MIMO systems which can be used for combating different challenges of these networks [20,21]. Accurate directional information provided by high angular resolution can be also utilized to mitigate the undesirable effects of the jamming and eavesdropping attacks [22][23][24][25]. For example, a secure downlink transmission scheme exploiting angular information is suggested in [22] where the authors assume the BS has perfect knowledge of the eavesdropper's directional information and propose three precoding methods based on this information.…”
Section: Introductionmentioning
confidence: 99%