Secure downlink transmission with finite resolution analog beamforming in massive multiple-input multiple-output system

To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system. This article investigates the secure downlink massive multiple-input multiple-output data transmission with artificial noise...

Full description

Bibliographic Details
Main Authors: Xianyu Zhang, Daoxing Guo, Kongzhe Yang, Silin Xie
Format: Article
Language:English
Published: SAGE Publishing 2018-09-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147718802254
Description
Summary:To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system. This article investigates the secure downlink massive multiple-input multiple-output data transmission with artificial noise at base station in the presence of a multi-antenna passive eavesdropper. The achievable user’s ergodic information rate and ergodic capacity of the eavesdropper are analyzed in detail, respectively. With maximum ratio transmission or maximum ratio combining, we derive closed-form expressions for a tight lower bound on ergodic secrecy rate and tight upper bound for secrecy outage probability. Based on these analytical expressions, the effects of various system parameters on secrecy performance, such as power allocation factor, number of eavesdropper’s antennas, number of the user terminals, total transmission power, and finite resolution analog beamforming parameters, are investigated in detail. Also, the optimal power allocation scheme between data and artificial noise signals is achieved in closed form to maximize the ergodic secrecy rate. In addition, we derive the conditions that the secure massive multiple-input multiple-output system need to meet to obtain a positive secrecy rate. Finally, numerical simulation results validate the system’s secrecy performance and verify all the theoretical analytical results.
ISSN:1550-1477