تخصیص بهینه توان در سیستم رله انبوه آنتنی کاملاً دوطرفه متشکل از چند جفت فرستنده-گیرنده و در حضور شنودگر

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشکده فنی و مهندسی، دانشگاه شهرکرد، شهرکرد، ایران

2 دانشکده فنی و مهندسی - دانشگاه شهرکرد

چکیده

در این مقاله، امنیت لایه فیزیکی یک شبکه مشارکتی متشکل از چند جفت گره منبع-مقصد را در حضور یک گره شنودگر بررسی می‌کنیم. ارتباط ببن گره‌های فرستنده و گیرنده به‌طور همزمان و از طریق یک ایستگاه رله کاملاً دوطرفه مجهز به آرایه آنتنی عظیم برقرار می‌شود و شنودگر منفعل ارتباط بین یک جفت گره‌ موجود در شبکه را استراق سمع می‌کند. فرض می‌کنیم رله از تکنیک‌های پردازش خطی اجبار به صفر، بیشینه نسبت ترکیب و بیشینه نسبت ارسال برای دریافت اطلاعات از گره‌های منبع و ارسال مجدد آن به گره‌های مقصد استفاده می‌کند. در بخش اول مقاله نرخ محرمانگی هر یک از این تکنیک‌های پردازش خطی را محاسبه می‌کنیم و نتایج را به‌فرم بسته و به‌صورت توابعی از پارامترهای سیستم، شامل تعداد جفت گره‌های موجود در سیستم، تعداد آنتن‌های گیرنده و فرستنده در ایستگاه رله و نیز ضرایب تخمین کانال استخراج می‌کنیم. در بخش دوم مقاله و با هدف بهبود امنیت سیستم، یک روش تخصیص توان بهینه در ایستگاه رله و بین گره‌های منبع ارایه می‌شود. مسئله فرموله شده یک مسئله پیچیده غیرمحدب می‌باشد که با تبدیل به یک مسئله برنامه‌ریزی هندسی حل می‌شود. نتایج شبیه‌سازی نشان می‌دهد که روش تخصیص توان ارایه شده می‌تواند نرخ محرمانگی سیستم را تا حد قابل قبولی بهبود دهد.

کلیدواژه‌ها


عنوان مقاله [English]

Optimal Power Allocation in Multipair Full-duplex Relaying Massive MIMO Networks in Presence of Eavesdropper

نویسندگان [English]

  • Akram Bagheri 1
  • Mohammadali. Mohammadi 2
1 Faculty of engineering, Shahrekord university, Shahrekord, Iran
2 Faculty of Engineering, Shahrekord University.
چکیده [English]

 In this paper, we investigate the physical layer secrecy of a multipair cooperative network in presence of an eavesdropper. Simultaneous ccommunication between the transmitter and receiver pairs is established through a massive antenna array equipped full-duplex relay station, while the passive eavesdropper overhears communication between one pair. We consider that the relay uses zero-forcing, maximum mixing ratio, and maximum transmission ratio linear processing techniques. In the first part of the paper, we study the secrecy rate of the adopted linear processing techniques. We derive closed-form expressions for the average secrecy rate as a functions of the system parameters, such as number of pairs, the number of relay’s transmit and receive antennas, and the channel estimation coefficients. In the second part of the paper, in order to improve the system’s secrecy, an optimal power allocation scheme is presented at the relay station and source nodes. The formulated problem is a complex non-convex problem that is solved by recasting as a geometric programming problem. The simulation results show that the proposed power allocation scheme significantly improves the system's secrecy rate.

کلیدواژه‌ها [English]

  • Full-duplex communication
  • massive antenna array
  • secrecy rate
  • achievable rat
  • optimal power allocation
G. Larsson, F. Tufvesson, O. Edfors, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE Commun. Mag., vol.52, no. 2, pp. 186–195, Feb. 2014.
Lu, G. Li, A. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: Benefits and challenges,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 742–758, Oct 2014.
Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral efficiency of very large multiuser MIMO systems,” IEEE Trans. Commun., vol. 61, no. 4, pp. 1436-1449, April 2013.
Q. Ngo, H. A. Suraweera, M. Matthaiou, and E. G. Larsson, “Multipair full-duplex relaying with massive arrays and linear processing,” IEEE J. Sel. Areas Commun., vol. 32, pp. 1721-1737, June 2014.
Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and R. Wichman, “In-band full-duplex wireless: Challenges and opportunities,” IEEE J. Sel. Areas Commun., vol. 32, pp. 1637-1652, Sep. 2014.
Everett, A. Sahai, and A. Sabharwal, “Passive self-interference suppression for full-duplex infrastructure nodes,” IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 680–694, Feb. 2014
S. Hong, J. Brand, J. I. Choi, M. Jain, J. Mehlman, S. Katti, and P. Levis, “Applications of self-interference cancellation in 5G and beyond,” IEEE Commun. Mag., vol. 52, no. 2, pp. 114–121, Feb. 2014.
Riihonen, S. Werner, and R. Wichman, “Mitigation of loopback self-interference in full-duplex MIMO relays,” IEEE Trans. Signal Process., vol. 59, pp. 5983–5993, Dec. 2011.
Mohammadi, B. K. Chalise, H. A. Suraweera, C. Zhong, G. Zheng, and I. Krikidis, “Throughput analysis and optimization of wireless-powered multiple antenna full-duplex relay systems,” IEEE Trans. Commun., vol. 64, no. 4, pp. 1769–1785, Apr 2016.
Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, “Safeguarding 5G wireless communication networks using physicallayer security,’’ IEEE Commun. Mag., vol. 53, no. 4, pp. 20–27, Apr. 2015.
Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surv. Tutorials, vol. 16, no. 3, pp. 1550–1573, Mar. 2014.
Goel and R. Negi, “Guaranteeing Secrecy Using Artificial Noise,” IEEE Trans. Wireless Commun., 2008, pp. 2180–89
Mobini, M. Mohammadi, and C. Tellambura, “Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications,” IEEE Trans. Inf. Forensics and Security, vol. 14, no. 3, pp. 621-634, Mar. 2019.
Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011.
I. Kim, I. M. Kim, and J. Heo, “Secure transmission for multiuser relay networks,” IEEE Trans. Wireless Commun., vol.14, no. 14, pp. 3724-3737, Jul. 2015.
Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010
Hoang, et al., “Cooperative beamforming and user selection for improving the security of relay-aided systems,” IEEE Trans. Commun., vol. 63, no. 12, pp. 5039-5051, Dec. 2015.
Huang, J. Wang, C. Zhong, T. Q. Duong, and G. K. Karagiannidis, ‘‘Secure transmission in cooperative relaying networks with multiple antennas,’’ IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6843–6856, Oct. 2016.
Chen, L. Lei, H. Zhang, and C. Yuen, “Large-scale MIMO relaying techniques for physical layer security: AF or DF?” IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sept. 2015.
Chen, X. Chen, W. H. Gerstacker, and D. W. K. Ng, ‘‘Resource allocation for a massive MIMO relay aided secure communication,’’ IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, pp. 1700–1711, Aug. 2016.
Li, M. Zhang, Y. Rong and Z. Han, "Artificial Noise-Aided Secure Relay Communication with Unknown Channel Knowledge of Eavesdropper," IEEE Trans. Wireless Commun., Accepted, 2021.
Lee, J. Bang and H. -H. Choi, "Secrecy Outage minimization for wireless-powered relay networks with destination-assisted cooperative jamming," IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1467-1476, 1 Feb.1, 2021.
Zhang, D. Guo and K. Guo, "Secure performance analysis for multi-pair AF relaying massive MIMO systems in Ricean channels," IEEE Access, vol. 6, pp. 57708-57720, 2018
Zhang, D. Guo, K. An, X. Liang and W. Ma, "Secure transmission in multi-pair AF relaying massive MIMO networks against active pilot spoofing attacks," IEEE Access, vol. 7, pp. 3547-3560, 2019.
Yang and T. L. Marzetta, “Performance of conjugate and zero-forcing beamforming in large-scale antenna systems,” IEEE J. Sel. Areas Commun., vol. 31, no. 2, pp. 172–179, Feb. 2013.
Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, “Pilot contamination and precoding in multi-cell TDD systems,” IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2640–2651, Aug. 2011.
Hassibi and B. M. Hochwald, “How much training is needed in multiple-antenna wireless links?” IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 951–963, Apr. 2003
M. Tulino and S. Verdu, “Random matrix theory and wireless communications,” Foundations and Trends in Communications and Information Theory, vol. 1, no. 1, pp. 1–182, Jun. 2004.
Kudathanthirige, S. Timilsina, and G. A. A. Baduge, ‘‘Secure communication in relay-assisted massive MIMO Downlink with active pilot attacks,’’ IEEE Trans. Inf. Forensics Security, vol. 14, no. 11, pp. 2819–2833, Nov. 2019.
M. Hoang, H. Q. Ngo, T. Q. Duong, H. D. Tuan, and A. Marshall, ‘‘Cell-free massive MIMO networks: Optimal power control against active eavesdropping,’’ IEEE Trans. Commun., vol. 66, no. 10, pp. 4724–4737, Oct. 2018.
Hoydis, S. ten Brink, and M. Debbah, “Massive MIMO in the UL/DL of cellular networks: How many antennas do we need?” IEEE J. Sel. Areas Commun., vol. 31, no. 2, pp. 160- 171, 2013.
Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal design of energy-efficient multi-user MIMO systems: Is massive MIMO the answer?” IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3059– 3075, Jun. 2015
N. Boroujerdi, S. Haghighatshoar and G. Caire, "Low-Complexity Statistically Robust Precoder/Detector Computation for Massive MIMO Systems," IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 6516-6530, Oct. 2018,
Van der Perre, L. Liu, and E. G. Larsson, “Efficient DSP and circuit architectures for massive MIMO: State of the art and future directions,” IEEE Trans. Signal Process., vol. 66, no. 18, pp. 4717-4736, Sept. 2018.
Prabhu, J. N. Rodrigues, L. Liu, and O. Edfors, “A 60pJ/b 300Mb/s 128x8 Massive MIMO precoder-detector in 28nm FD-SOI,” in Proc. IEEE Intl. Solid-State Circuits Conf. (ISSCC), 2017, pp. 60-61.
Malkowsky, et al., “The world’s first real-time testbed for massive MIMO: Design, implementation, and validation,” IEEE Access, vol. 5, pp. 9073-9088, 2017.
Zhang, S. Jin, K.-K. Wong, H. Zhu, and M. Matthaiou, “Power scaling of uplink massive MIMO systems with arbitraryrank channel means,” IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 966–981, Oct. 2014
Boyd, S. J. Kim, L. Vandenberghe, and A. Hassibi, “A tutorial on geometric programming,” Optimization and Engineering, vol. 8, no. 1, pp. 67–127, 2007.
Pourjafari, J. Seifali Harsani, ``On the complete convergence of channel hardening and favorable propagation properties in massive-MIMO communications systems,” Journal of Mathematical Modeling, vol. 7, No. 4, 2019, pp. 429-443, 2019.