Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 5396092, 10 pages
https://doi.org/10.1155/2017/5396092
Research Article

Joint Design of Massive MIMO Precoder and Security Scheme for Multiuser Scenarios under Reciprocal Channel Conditions

1Instituto de Telecomunicações and DETI, University of Aveiro, Aveiro, Portugal
2Instituto de Telecomunicações, Department of Electrical and Computer Engineering, University of Coimbra, Coimbra, Portugal
3CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal

Correspondence should be addressed to Gustavo Anjos; tp.au@sojnaovatsug

Received 25 August 2017; Revised 30 October 2017; Accepted 13 November 2017; Published 10 December 2017

Academic Editor: Daniele Pinchera

Copyright © 2017 Gustavo Anjos et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727–1765, 2016. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Atallah, G. Kaddoum, and L. Kong, “A survey on cooperative jamming applied to physical layer security,” in Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, ICUWB 2015, Canada, October 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. W. Stallings, Cryptography and Network Security Principles and Practice, Prentice Hall, NY, USA, 2006.
  4. B. Schneier, “Cryptographic design vulnerabilities,” The Computer Journal, vol. 31, no. 9, pp. 29–33, 1998. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Sandirigama and R. Idamekorala, “Security weaknesses of WEP protocol IEEE 802.11b and enhancing the security with dynamic keys,” in Proceedings of the IEEE Toronto International Conference—Science and Technology for Humanity, TIC-STH'09, pp. 433–438, Canada, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. S. A. A Mukherjee, J. Fakoorian, A. L. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014. View at Publisher · View at Google Scholar
  7. M. Bloch, M. Hayashi, and A. Thangaraj, “Error-Control Coding for Physical-Layer Secrecy,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1725–1746, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, “Coding for secrecy: An overview of error-control coding techniques for physical-layer security,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 41–50, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Sarmento, J. Vilela, W. K. Harrison, and M. Gomes, “Interleaved coding for secrecy with a hidden key,” in Proceedings of the IEEE Globecom Workshops, GC Wkshps 2015, USA, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. J. P. Vilela, M. Gomes, W. K. Harrison, D. Sarmento, and F. Dias, “Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime,” IEEE Signal Processing Letters, vol. 23, no. 3, pp. 356–360, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. V. R. Cadambe and S. A. Jafar, “Interference alignment and degrees of freedom of the k-user interference channel,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 54, no. 8, pp. 3425–3441, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  12. D. Castanheira, A. Silva, and A. l. Gameiro, “Retrospective interference alignment: degrees of freedom scaling with distributed transmitters,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 63, no. 3, pp. 1721–1730, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 54, no. 6, pp. 2735–2751, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. A. L. Swindlehurst, “Fixed SINR solutions for the MIMO wiretap channel,” in Proceedings of the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2009, pp. 2437–2440, Taiwan, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Wang and A. L. Swindlehurst, “Cooperative jamming in MIMO ad-hoc networks,” in Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers, pp. 1719–1723, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 256–266, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4871–4884, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  18. J. Yang, I.-M. Kim, and D. I. Kim, “Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2840–2852, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Xie and S. Ulukus, “Secure degrees of freedom of one-hop wireless networks,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 60, no. 6, pp. 3359–3378, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186–195, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: benefits and challenges,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 742–758, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. K. Zheng, L. Zhao, J. Mei, B. Shao, W. Xiang, and L. Hanzo, “Survey of large-scale MIMO systems,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1738–1760, 2015. View at Publisher · View at Google Scholar
  23. A. Swindlehurst, E. Ayanoglu, P. Heydari, and F. Capolino, “Millimeter-wave massive MIMO: the next wireless revolution?” IEEE Communications Magazine, vol. 52, no. 9, pp. 56–62, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure Massive MIMO transmission in the presence of an active eavesdropper,” in Proceedings of the IEEE International Conference on Communications, ICC 2015, pp. 1434–1440, UK, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Zhu, R. Schober, and V. K. Bhargava, “Secure transmission in multicell massive MIMO systems,” IEEE Transactions on Wireless Communications, vol. 13, no. 9, pp. 4766–4781, 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. B. Chen, C. Zhu, W. Li, J. Wei, V. C. M. Leung, and L. T. Yang, “Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper,” IEEE Access, vol. 4, pp. 3016–3025, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. B. Chen, C. Zhu, L. Shu et al., “Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper,” IEEE Access, vol. 4, pp. 5374–5384, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. G. Anjos, D. Castanheira, A. Silva, and A. Gameiro, “Exploiting reciprocal channel estimations for jamming to secure wireless communications,” in Proceedings of the Wireless Days (WD), pp. 136–142, Porto, Portugal, March 2017. View at Publisher · View at Google Scholar
  30. T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley & Sons, NJ, USA, 2012. View at MathSciNet