2022
DOI: 10.1109/lwc.2021.3130169
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting RIS for Limiting Information Leakage to Active Eavesdropper in Cell-Free Massive MIMO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…For the RIS-assisted massive multiple-input multiple-output (MIMO) scenario with an eavesdropper, it is time-consuming to find optimal beamforming and phase shifter by alternating optimization because the dimensionality of parameters is very large. In this case, Elhoushy et al simplified the RIS-assisted PLS scheme by using closed-form beamforming, i.e., the zero-forcing (ZF) precoding technology, then found the optimal phase shifter matrix to improve the secrecy rate [20]. Nowadays, the RIS device is deployed in the millimeter-wave system where a stochastic learning method is presented to tackle the random blockage problem [25].…”
Section: B Secure Beamforming With Phase Shifter Adjustmentsmentioning
confidence: 99%
See 1 more Smart Citation
“…For the RIS-assisted massive multiple-input multiple-output (MIMO) scenario with an eavesdropper, it is time-consuming to find optimal beamforming and phase shifter by alternating optimization because the dimensionality of parameters is very large. In this case, Elhoushy et al simplified the RIS-assisted PLS scheme by using closed-form beamforming, i.e., the zero-forcing (ZF) precoding technology, then found the optimal phase shifter matrix to improve the secrecy rate [20]. Nowadays, the RIS device is deployed in the millimeter-wave system where a stochastic learning method is presented to tackle the random blockage problem [25].…”
Section: B Secure Beamforming With Phase Shifter Adjustmentsmentioning
confidence: 99%
“…The instantaneous CSIs of eavesdroppers are usually unknown when the eavesdroppers keep silent, which is a usual issue but ignored in recent RIS-assisted PLS researches [10]- [20]. The above works maximize the secrecy capacity or secrecy rate via beamforming and phase shifter optimization, assuming that instantaneous CSIs of eavesdroppers are available.…”
Section: Introductionmentioning
confidence: 99%
“…e authors of [27] proposed the use of an IRS to enhance the secrecy of a cell-free massive MIMO system in an experimental pilot spoofing attack scenario. By optimizing the transmit power coefficient of the AP and the IRS phase shift to design a secure and robust downlink transmission scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Research on security performance was expanded by introducing novel technologies. 24,25 Alageli et al 24 have delved into the problem of secure communication assuming that there is an untrusted dual-antenna energy harvester in the network. One antenna is used to harvest energy, whereas the other one intercepts information signals as an active eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…One antenna is used to harvest energy, whereas the other one intercepts information signals as an active eavesdropper. Elhoushy et al 25 have enhanced the robustness of network security against pilot spoofing attacks by applying reconfigurable intelligent surface, which reconfigures the wireless propagation channels through software-controlled reflections. Based on more realistic consideration of low-resolution analog-to-digital converters, secure communication with active eavesdroppers has been studied by Zhang et al 26 However, the abovementioned research on PLS is all limited to single-antenna APs.…”
Section: Introductionmentioning
confidence: 99%