139 research outputs found
Secure Power Control for Downlink Cell-Free Massive MIMO With Passive Eavesdroppers
This work studies secure communications for a cell-free massive
multiple-input multiple-output (CF-mMIMO) network which is attacked by multiple
passive eavesdroppers overhearing communications between access points (APs)
and users in the network. It will be revealed that the distributed APs in
CF-mMIMO allows not only legitimate users but also eavesdroppers to reap the
diversity gain, which seriously degrades secrecy performance. Motivated by
this, this work proposes an artificial noise (AN)-aided secure power control
scheme for CF-mMIMO under passive eavesdropping aiming to achieve a higher
secrecy rate and/or guarantee security. In particular, it will be demonstrated
that a careful use of AN signal in the power control is especially important to
improve the secrecy performance. The performance of the proposed power control
scheme is evaluated and compared with various power control schemes via
numerical experiments, which clearly shows that the proposed power control
scheme outperforms all the competing schemes.Comment: 5 pages, 3 figures. This work has been submitted to the IEEE for
possible publication. Copyright may be transferred without notice, after
which this version may no longer be accessibl
RIS-Aided Cell-Free Massive MIMO Systems for 6G: Fundamentals, System Design, and Applications
An introduction of intelligent interconnectivity for people and things has
posed higher demands and more challenges for sixth-generation (6G) networks,
such as high spectral efficiency and energy efficiency, ultra-low latency, and
ultra-high reliability. Cell-free (CF) massive multiple-input multiple-output
(mMIMO) and reconfigurable intelligent surface (RIS), also called intelligent
reflecting surface (IRS), are two promising technologies for coping with these
unprecedented demands. Given their distinct capabilities, integrating the two
technologies to further enhance wireless network performances has received
great research and development attention. In this paper, we provide a
comprehensive survey of research on RIS-aided CF mMIMO wireless communication
systems. We first introduce system models focusing on system architecture and
application scenarios, channel models, and communication protocols.
Subsequently, we summarize the relevant studies on system operation and
resource allocation, providing in-depth analyses and discussions. Following
this, we present practical challenges faced by RIS-aided CF mMIMO systems,
particularly those introduced by RIS, such as hardware impairments and
electromagnetic interference. We summarize corresponding analyses and solutions
to further facilitate the implementation of RIS-aided CF mMIMO systems.
Furthermore, we explore an interplay between RIS-aided CF mMIMO and other
emerging 6G technologies, such as next-generation multiple-access (NGMA),
simultaneous wireless information and power transfer (SWIPT), and millimeter
wave (mmWave). Finally, we outline several research directions for future
RIS-aided CF mMIMO systems.Comment: 30 pages, 15 figure
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
- …