2016
DOI: 10.1109/twc.2015.2500578
|View full text |Cite
|
Sign up to set email alerts
|

Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems

Abstract: In this paper, we consider secure downlink transmission in a multi-cell massive multiple-input multiple-output (MIMO) system where the numbers of base station (BS) antennas, mobile terminals, and eavesdropper antennas are asymptotically large. The channel state information of the eavesdropper is assumed to be unavailable at the BS and hence, linear precoding of data and artificial noise (AN) are employed for secrecy enhancement. Four different data precoders (i.e., selfish zero-forcing (ZF)/regularized channel… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
168
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 186 publications
(169 citation statements)
references
References 37 publications
1
168
0
Order By: Relevance
“…Power control schemes for training and data transmission to enhance the security of massive MIMO systems with the help of artificial noise were studied in [11]. In [12], the authors proposed various data precoders and artificial noise precoder to secure downlink transmission of a multi-cell massive MIMO system with large numbers of terminal users and antennas at the eavesdropper. The aforementioned works focused on designing the protecting schemes for the legitimate side and considered the passive eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Power control schemes for training and data transmission to enhance the security of massive MIMO systems with the help of artificial noise were studied in [11]. In [12], the authors proposed various data precoders and artificial noise precoder to secure downlink transmission of a multi-cell massive MIMO system with large numbers of terminal users and antennas at the eavesdropper. The aforementioned works focused on designing the protecting schemes for the legitimate side and considered the passive eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Expanding the work of [20], a Gaussian degraded wiretap channel was investigated in [21]. Based on these theoretical fundamentals, a large amount of literature were produced focusing on the physical layer security of various multiple-antenna systems [22]- [28]. Specifically, a security beamforming strategy was designed for the multiple-input single-output (MISO) system in [22], [23], the single-input multiple-output (SIMO) system in [24], and the MIMO system in [25]- [28].…”
Section: Introductionmentioning
confidence: 99%
“…Based on these theoretical fundamentals, a large amount of literature were produced focusing on the physical layer security of various multiple-antenna systems [22]- [28]. Specifically, a security beamforming strategy was designed for the multiple-input single-output (MISO) system in [22], [23], the single-input multiple-output (SIMO) system in [24], and the MIMO system in [25]- [28]. In particular, to effectively balance the security performance among different links of an MIMO network, the work [25] proposed a game theory based collaborative transmission scheme, while an artificial noise scheme was proposed in [26] for secure communications of the two-way relaying MIMO network under a realistic scenario that the CSI of eavesdropper is unavailable.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations