2018
DOI: 10.1109/jsac.2018.2825140
|View full text |Cite
|
Sign up to set email alerts
|

Secure Massive MIMO With the Artificial Noise-Aided Downlink Training

Abstract: This paper considers a massive MIMO network that includes one multiple-antenna base station, one multiple-antenna eavesdropper, and K single-antenna users. The eavesdropper operates in passive mode and tries to overhear the confidential information from one of the users in the down-link transmission. In order to secure the confidential information, two artificial noise (AN)-aiding schemes are proposed. In the first scheme, AN is injected into the downlink training signals to prevent the eavesdropper from obtai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 60 publications
(25 citation statements)
references
References 25 publications
0
25
0
Order By: Relevance
“…is the gamma function, step (b) is based on the fact that ĥ m has a scaled Chi distribution with 2N t degrees of freedom by a factor of 1 √ 2 [27]. Therefore, E ĥ m = Γ(Nt+ 1 2 ) Γ(Nt) , and step (c) is obtained by using the approximation…”
Section: A Ergodic Secrecy Ratementioning
confidence: 99%
See 2 more Smart Citations
“…is the gamma function, step (b) is based on the fact that ĥ m has a scaled Chi distribution with 2N t degrees of freedom by a factor of 1 √ 2 [27]. Therefore, E ĥ m = Γ(Nt+ 1 2 ) Γ(Nt) , and step (c) is obtained by using the approximation…”
Section: A Ergodic Secrecy Ratementioning
confidence: 99%
“…The inter-user interference was utilized to enhance the secrecy performance of the network. Artificial noise (AN) has proven its effectiveness to secure the legitimate side from malicious attempts [26], [27]. Recently, in [28], the authors have proposed a joint alignment of multi-user constellations and AN to secure the massive MIMO-NOMA networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The AN jamming can be deployed in the downlink transmission phase to provide direct power transfer and to degrade the information signal quality at the EHs [9]. In [12], the use of AN is extended for both the downlink training and payload data transmission phases to further degrade the eavesdropping capabilities of the information EV. The authors in [13] considered joint enhancement of the secrecy and power transfer in the presence of an active dualantenna information-untrusted EH.…”
Section: Introductionmentioning
confidence: 99%
“…Most studies on physical layer security in massive MIMO systems assume that the eavesdropper is passive and does not attack the communication process of the system [19][20][21][22][23]. However, a smart eavesdropper can perform a pilot contamination attack to impair the channel estimation process at the base station [24].…”
Section: Introductionmentioning
confidence: 99%