1. Trang chủ
  2. » Tất cả

Jammer detection by random pilots in massive mimo spatially uncorrelated rician channels

6 3 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Jammer detection by random pilots in massive MIMO spatially uncorrelated Rician channels
Tác giả Hung Tran, Giang Quynh Le Vu, Kien Trung Truong
Trường học Fulbright University Vietnam
Chuyên ngành Communication Systems
Thể loại Research Paper
Năm xuất bản 2021
Thành phố Hanoi
Định dạng
Số trang 6
Dung lượng 505,41 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Jammer Detection by Random Pilots in Massive MIMO Spatially Uncorrelated Rician Channels Jammer Detection by Random Pilots in Massive MIMO Spatially uncorrelated Rician Channels Giang Quynh Le Vu Facu[.]

Trang 1

Jammer Detection by Random Pilots in Massive MIMO Spatially-uncorrelated Rician Channels

Giang Quynh Le Vu

Faculty of Information Technology

National Academy of Education Management

Hanoi, Vietnam

Email: quynhgiang81@gmail.com

Hung Tran Faculty of Computer Science Phenikaa University Hanoi, Vietnam Email: hung.tran@phenikaa-uni.edu.vn

Kien Trung Truong Undergraduate Faculty Fulbright University Vietnam

Ho Chi Minh city, Vietnam Email: kien.truong@fulbright.edu.vn

Abstract—Pilot contamination is a major problem affecting

the secrecy capacity of communication systems The jammer

is difficult to detect This issue is also linked to numerous

research projects In this study, the authors propose a pilot

attack detection method with a high detection probability and

a reduced false-alarm probability in Massive MIMO

Spatially-uncorrelated Rician Channels

Index Terms—Massive MIMO, physical layer security, Rician

fading, eavesdropper detection, jammer detection

I INTRODUCTION Massive Multiple-Input Multiple-Output (MIMO) is a

sig-nificant transmission technology used in both 5th Generation

(5G) New Radio (NR) networks and 6th Generation (6G)

networks [?], [1]–[4] In such systems, a base station (BS)

with a higher number of antennas simultaneously supports

one or more antenna users Previous research has shown that

if the number of antennas at the base station is big enough, the

channels between the BS and the users are orthogonal to each

other under certain situations, but this does not negate the

im-pacts of noise and co-channel interference This orthogonality

of the transmission channels, in particular, makes Massive

MIMO systems with Rayleigh fading extremely safe at the

physical layer [5], [6] Unauthorized devices can influence

the security, integrity, and availability of information in ways

(passive eavesdropper and jammer) because of the features of

the radio environment These ways show up in the following

studies: [5], [7]–[11] Eavesdroppers and jammers use pilot

contamination as one way of listening to and trying to decode

the transmitter’s signal This has a negative influence on

legal communication networks, even disrupting them The

detection jammers in Massive MIMO uncorrelated Rician

fading channels were the subject of this study It should

be noted that practically all prior studies of systems with

one passive eavesdropper assumed Rayleigh fading channels

Because they incorporate a Line-Of-Sight component, the

Rician fading channels in this study are theoretically more

generic than the Rayleigh fading channels [12] In [13], [14]

the authors provided the analysis of the secrecy capacity

analysis of the point-to-point transmission systems with a

finite number of antennas In [15] We, also investigated a

way for detecting the existence of Eavesdropper, who induced

channel estimation jamming utilizing the contamination pilot

training approach Different from the methods in [7], [15] where only two pilots are selected as N-PSK, in this study

we use the method of randomly selecting a pair of pilots from a set of pilots which is phase-shift keying N-PSK This choice makes it difficult for jammers to correctly predict the user’s pilots and pretend to be the user This makes it easy for the system to detect jammers and reduces the false-alarms probability As pilot symbols that are transmitted by random,

we use phase-shift keying (N -PSK) Jammer’s existence was detected in the scalar product between the received vectors The remainder of this paper is organized as follows Section

I is Introduction II introduces the system model We present

a detection procedure based on random training pilots in the presence of received noise, as well as the construction of detection regions, in Section III The simulation results are presented in Section IV, and the paper is wrapped up in Section V

Notation: a is scalar, a is vector, A is matrix, [A]i,jrepresents (i, j), AH, is Hermitian matrix transposed, E[˙] is main value

II SYSTEMMODEL

We study a network with a single-cell single-user massive multiple-input multiple-output (MIMO) system where a base station A communicates with a legitimate user terminal B

in the presence of an illegitimate user terminal J, also known as a jammer, as illustrated in Fig 1 For notation convenience, denote X = {B, J}, which is the index set

of user terminals The base station A is equipped with M antennas, where M ≫ 2, while both the user terminals are single antenna Assume the system operates in the half-duplex time division half-duplexing (TDD) mode, where the base station and the user terminals cannot transmit and receive

at the same time Moreover, the uplink transmission and the downlink transmission happen in the same frequency

We assume frequency-flat block-fading channel model where channel coefficients keep unchanged during the duration of each radio frame and change independently frame-by-frame Let hX,k ∈ CM ×1 be the uplink channel coefficient vector from user terminal X ∈ X to base station A during radio frame k Assume that channel reciprocity is perfect, thus

hH X,k∈ C1×Mis the downlink channel coefficient vector from the base station to user terminal X ∈ X

Trang 2

Fig 1 A diagram depicting the geometry of the investigated system model,

in which a base station A connects with a legitimated user terminal B and

illegal user terminal J.

We assume that the transmission between the legitimate

user B and the base station is perfectly frame synchronized

This means that the base station knows exactly the position of

training symbols in the uplink radio frame Denote Kk be the

index set of those symbols in radio frame k Obtaining

accu-rate channel state information is crucial for the base station to

perform data detection and to design downlink beamforming

vectors Thus, one of the most effective strategy for the

illegit-imate user terminal J to attack the legitillegit-imate communication

is to contaminate the uplink training phase Let S be the set of

all possible pilot symbols for uplink training In practice, for

most standardized wireless applications, the pilot set S used

by legitimate user terminals are often explicitly specified in

the technical specifications In the paper, we assume that S

is a N -PSK alphabet with N possible symbols defined as

S = {ejm2π/N

: m ∈ Z, 0 ≤ m ≤ (N − 1)}

Denote pX as the transmit power of user terminal X ∈ X

during the training period Assume that pX remains constant

over many frames In training symbol ℓ ∈ Kk, we assume

that legitimate user terminal B is able to transmit a random

pilot symbol sB,k,ℓ ∈ S in order to make it unpredictable

by illegitimate user terminal J In other words, at any time,

illegitimate user terminal J knows exactly S but it does

not know which pilot symbol is transmitted Thus, one of

the best strategies that illegitimate user terminal J could

do is to transmit a random pilot symbol sJ,k,ℓ ∈ S We

can rewrite sJ,k,ℓ = sJ,k,ℓs∗B,k,ℓsB,k,ℓ = sk,ℓsB,k,ℓ where

sk,ℓ= sJ,k,ℓs∗B,k,ℓ∈ S because sJ,k,ℓ, sB,k,ℓ∈ S

Define αk,ℓ as the indicator parameter such that αk,ℓ = 1

if illegitimate user terminal J transmits in training symbol

ℓ ∈ Kk and that αk,ℓ = 0 if illegitimate user terminal

J does not transmit In other words, pilot contamination

occurs in training symbol ℓ ∈ Kk if and only if αk,ℓ = 1

Denote nk,ℓ ∈ CM ×1 as additive white Gaussian noise at

the base station in the training symbol ℓ ∈ Kk such that

nk,ℓ ∼ CN (0M ×1, σ2IM ×M) Denote yk,ℓ ∈ CM ×1 as the

received training signal in training symbol ℓ ∈ Kk, which is

given by

yk,ℓ=√

pBhB,ksB,k,ℓ+ αk,ℓ

pJhJ,ksJ,k,ℓ+ nk,ℓ (1) Let fk,ℓ∈ CM ×1be the equivalent channel coefficient vector, which is defined as

fk,ℓ=√

pBhB,k+ αk,ℓ√

pJhJ,ksk,ℓ (2)

We can rewrite yk,ℓ as

yk,ℓ=fk,ℓsB,k,ℓ+ nk,ℓ (3) Assume that the locations of the base station and the user terminals do not change over many frames For analytical tractability, we assume that the antenna elements of base station A collectively form a Uniform Linear Array (ULA) Denote ¯dA = πdA/λ as the normalized distance between adjacent antennas at the base base station, where dA is the distance between the adjacent antenna elements at base station

A and λ is the wavelength corresponding to the carrier frequency Denote dX, ∀X ∈ X , is the distance from the base station to user terminal X Denote θX ∈ [−π, π], ∀X ∈ X ,

as the angle between the line connecting the base station

to user terminal X and the boresight of the antenna array

of the base station We believe that this system model is

a good starting point for analytical tractability in order to obtain useful insights More complicated models, such as those with a larger number of user terminals and/or with multiple-antenna user terminals, are left for future work Under the assumption of uniformly-linear array (ULA) at the base station, the array response gX ∈ CM ×1 of the channel vector hX,kis independent of radio frame k and is computed as

gX=h1 ej2 ¯dA sin θX · · · ej2 ¯ dA(M −1) sin θX T (4) Note that gHXgX= M, ∀X ∈ X and

gHJ gB=sin(M ¯dA(sin θB− sin θJ))

sin( ¯dA(sin θB− sin θJ)) e

j(M −1) ¯ d A (sin θ B −sin θ J )

(5)

It can be proved that

¯ ψ(θB, θJ) = lim

M →∞

|ψ(θB, θJ, M )|

=

(

1, if sin θB= sin θJ,

In this paper, we assume spatially-uncorrelated Rician fading channels [16] Denote κX as the Rician coefficient and

βXas the large-scale fading coefficient of hX In general, κX

and βX remain constant in many consecutive radio frames

In other words, they are independent of the radio frame index Thus, it is justifiable to assume that κX and βX are known perfectly Define the large-scale fading coefficients

Trang 3

corresponding to the Line-of-Sight (LoS) part and the

Non-Line-of-Sight (NLoS) part of hX,k as

βX,L= κX

κX+ 1βX; βX,N=

1

κX+ 1βX. (9) The channel vector hX,kis decomposed as follows

hX,k=β1/2X,LgX+ βX,N1/2wX,k (10) where βX,L1/2gX ∈ CM ×M is the LoS part and βX,N1/2wX ∈

CM ×M with wX ∼ CN (0M ×1, IM ×M) is the NLoS part

The Rayleigh fading model considered in much related prior

work corresponds to a special case of having no LoS part in

this uncorrelated Rician fading channel model, i.e κX = 0

and hence βX,L = 0 and βX,L = βX for all X ∈ X For

notational convenience and for later comparison purposes, let

the following two subscripts ()Ri and ()Ra indicate the

pa-rameters related to the Rician fading channel model and those

related to the Rayleigh fading channel model, respectively

III PROPOSEDRANDOMPILOTCONTAMINATION

DETECTIONMETHOD

In this section, we propose a new pilot contamination

detection method that takes into account the special

charac-teristics of the Rician channel model We first present how the

detection regions are constructed and the detection algorithm

We then show that the proposed detection method is likely

to take the advantage of the features of the Rician channel

to provide a higher detection probability than the prior work

that only works in the Rayleigh channel model Similarly, let

()Jand ()0indicate the parameters when the illegitimate user

terminal J transmits jamming signals and those when J does

not transmit jamming signals, respectively

A Proposed Metric

We propose a new scalar-valued metric that is defined as

a scaled inner product of the received signals in two random

different training symbols ℓ ∈ Kk and u ∈ Kq as follows

zk,q=√1

My

H k,ℓyq,u (11) Although the proposed metric has a similar expression as the

one proposed in [7] for the Rayleigh channel model, it does

not require that the two training symbols be in the same radio

frame Define sB = s∗B,q,usB,k,ℓ, which is also a N -PSK

symbol because both s∗B,q,u and sB,k,ℓ are N -PSK symbols

For notational convenience, we define

ak,q=√1

Mf

H q,ufk,ℓ (12)

nk,q=√1

H q,unk,ℓ+ nHq,ufk,ℓ+ nHq,unk,ℓ (13)

By substituting (3) into (11), we obtain

zk,q=ak,qsB+ nk,q (14) Note that (28) can be treated as the input-output relationship

of a single-input single-output (SISO) channel where sBis the

transmitted N -PSK symbol, ak,q is the equivalent complex channel coefficient and nk,q is equivalent noise

Since it is challenging to determine the exact distribution

of nk,q, we adopt the same approach as [7] in which we study its statistical property when M is large enough For

a given realization of the channel vectors and the trans-mitted pilot symbols, both fq,u and fk,ℓ are given Note that nk,q = √1

MyH k,ℓyq,u − ak,qsB, where yk,ℓ and yq,u are two independent Gaussian vectors of size M with the same variance N0IM and means fk,ℓsB,k,ℓ and fq,usB,q,u, respectively It follows that E[nk,q] = 0 It also follows that

nk,qis a sum of M complex-valued normal product Gaussian variables By applying the Lyapunov central limit theorem, we obtain

lim

M →∞

nk,q

σM

d

where σM is defined as below and will be shown later to be finite when M grows very large

σ2M =N0

M ∥fq,u∥2+ ∥fk,ℓ∥2+ M N0 (16)

In other words, when M grows very large, nk,q converges in distribution to a complex-valued Gaussian random variable with mean 0 and variance σM2 Numerical results in [7] showed that this approximation is relatively tight even for the not-so-large number of antennas at the base station M = 5 In general, the effective noise variance σM2 depends on a number

of factors, including the presence of jamming signals, the channel model, and the positions of the two training symbols

B With Jamming Signals When there are jamming signals in both training symbols, i.e αk,ℓ= αq,u= 1 Replacing these values into (16) results

σ2Ri,J,M= N0

M



∥√pBhB,k+√

pJhJ,ksk,ℓ∥2

+ ∥√

pBhB,q+√

pJhJ,qsq,u∥2+ M N0

 (17)

As M grows very large, we have

¯

σRi,J2 = lim

M →∞σRi,J,M2 (18)

= N0



2 ¯βB,k,k+ 2 ¯βJ,k,k+ N0

+ 2 q

¯

βB,k,kβ¯J,k,kψ(θB, θJ)Re{sk,ℓ+ sq,u} (19) The equivalent channel coefficient in this case is given by

aRi,J,k,q =√1

M(

pBhB,q+√

pJhJ,qsq,u)H

× (√pBhB,k+√

pJhJ,ksk,ℓ) (20) This parameter depends on whether the two training symbols are in the same radio frame or not It also depends on whether the training symbols guessed by J match with those

Trang 4

transmitted by B, i.e., sq,u= sk,ℓ, or not Define

¯

aRi,J,k,q= lim

M →∞

aRi,J,k,q

= ¯βB,k,q+ ¯βJ,k,qs∗q,usk,ℓ

+

q

¯

βB,k,qβ¯J,k,qψ(θB, θJ)(s∗q,u+ sk,ℓ) (22) When sq,u = sk,ℓ, which happens with the probability of

1/N , then ¯aRi,J,k,q is a real-valued scalar value regardless

of the comparison of k and q In this case, it has a high

probability that the contaminated metric zk,qis located within

the circle of radius ¯σRi,J and centered at an N -PSK symbol

scaled by ¯aRi,J,k,q When sq,u ̸= sk,ℓ, which happens with

the probability of (N − 1)/N , then ¯aRi,J,k,q is a

complex-valued scalar In this case, it has a high probability that the

contaminated metric zk,qis located within the circle of radius

¯

σRi,Jand centered at an N -PSK symbol scaled by |¯aRi,J,k,q|

and rotated by a certain angle

C Without Jamming Signals

When the illegitimate user terminal J does not transmit

signals in both training symbols, we have αk,ℓ = αq,u = 0

Denote σ20,M as the corresponding value of σ2M Replacing

αk,ℓ= αq,u = 0 into (16) and (12), we obtain

aRi,0,k,q= √1

Mh

H B,qhB,k, (23)

σ2Ri,0,M= N0

M pB∥hB,k∥2+ pB∥hB,q∥2+ M N0 (24)

For notational convenience, we define for all X ∈ X

¯

βX,k,q =

(

pXβX, if k = q,

pXβX,L, otherwise (25) Using the properties of the Rician channel model provided in

Section II and after some manipulation, we obtain

¯

aRi,0,k,q= lim

M →∞

|aRi,0,k,q|

M = ¯βB,k,q (26)

¯

σ2Ri,0= lim

M →∞σ2Ri,0,M= N0 2 ¯βB,k,k+ N0 (27)

While ¯aRi,0,k,q depends on the positions of the training

symbols, ¯σ2

Ri,0does not

D Proposed Detection Algorithm

Recall that zk,q can be treated as the equivalent received

signal of the SISO channel with the input-output relationship

given in (28) We now construct the detection region based

on the scalar metric zk,qso that the base station could decide

whether an illegitimate user terminal is contaminating the

desired pilots or not Recall that zk,qis the sum of a N -PSK

symbol scaled by aRi,0,k,q and a Gaussian noise with mean

0 and variance σ2

Ri,0,M In general, the base station has not obtained accurate estimates of small-scale fading coefficients

before the training periods This means that it hasn’t known

exactly aRi,0,k,q and σ2

Ri,0,M before the making the decision

on the presence of jamming signals Nevertheless, as the

user terminals do not move in a long enough period, it is

justifiable to assume that the base station could estimate the large-scale fading coefficients βBand βB,Laccurately enough Thus, for a given N -PSK modulation scheme and for a large-enough number of antennas M , we propose the detection regions as the circles of radius ¯σRi,0 with the centers at the scaled N -PSK symbols with the common scaling factor

of √

M ¯aRi,0,k,q In order to reduce the effects of noise on detection accuracy, we also propose that K, where K ≥ 2,

N -PSK pilots are used for jammer detection purpose Based

on these detection regions and the use of K training symbols,

we propose the following detection method

• The base station selects a number of different pairs of training symbols from the K training symbols Note that the maximum number of pairs of training symbols is K(K − 1)/2

• For each pair of training symbols ℓ ∈ Kk and u ∈ Kq, the base station performs the following steps:

– Compute the scalar-valued equivalent received sig-nal zk,q

– Compute dm = |zk,q −√M ¯aRi,0,k,qejm2π/N| for each m ∈ 0, 1, · · · , N − 1 Note that dm can be considered as the distance from the scalar-valued equivalent received signal to the mth scaled N -PSK symbol

– Compute the minimum distance dmin = min0≤m≤(N −1)dm

– If dmin< ¯σRi,0then the base station decides that the training symbols are not contaminated; otherwise, it decides that they are contaminated, i.e there exists

an active illegitimate user terminal

• The base station makes the decision on the existence

of the jamming signals based on the majority of the detection results of the selected pairs

Note that the larger the number of selected pairs, the more accurate the detection decision The benefits, however, comes

at the cost of more overhead and more computational com-plexity Note also that the use of more pairs of training symbols to take the advantage of temporal diversity is one

of the main differences of this paper in relative comparison with prior work, including our own prior work

E Asymptotical Analysis of Detection Probability

In this section, we analyze the detection probability of the proposed method when the number of antennas M at the base station grows very large to obtain insights on the impacts of the channel model By dividing both sides of (28) by ak,q, which is non-zero, we obtain the following processed metric

˜k,q=sB+nk,q

ak,q

The radius of each proposed detection region is proportional

to with DRi,0,k,q= σ

2 Ri,0,k,q

|aRi,0,k,q| 2 In addition, the radius of the circle in which the metric zk,qlies with high probability when there exist jamming signal is proportional to DRi,J,k,q =

σRi,J,k,q2

|aRi,J,k,q| 2 In principle, the detection probability is close

Trang 5

to zero when DRi,J,k,q ≤ DRi,0,k,q and it increases with

the ratio of DRi,J,k,q/DRi,0,k,q when DRi,J,k,q > DRi,0,k,q

Thus, it is desired that DRi,J,k,q/DRi,0,k,q is as large as

possible Notably, we can show that DRi,J,k,q/DRi,0,k,q =

DRi,J,k,k/DRi,0,k,kfor all q This means that the performance

of the proposed approach does not depend on the number of

radio frames containing the two considered training symbols

In other words, the proposed approach allows flexibility and

frequent checking of the existence of jamming signals

IV NUMERICAL RESULTS

We simulate the detection probability and the false-alarm

probability to evaluate the efficiency of our detection scheme

The probability of false alarm is defined as the probability

that jammer is detected because jammer does not exist We

studied a network with only one cell, where the base station

is at the cell’s center and the legitimated user Bob and the

eavesdropper device are randomly across the cell Assuming

the effect of shadowing is ignored, then large-scale fading is

computed as [17]

βX,Y= 32.4 + 10nYlog10(d3D,X) + 20 log10(fc)

where X ∈ X , Y ∈ Y = {L, N}, d3D,X is the distance in

meters from base station to node X in 3-D space,fc = 3.5GHz

is the carrier frequency, nY is the exponential coefficient of

transmission Moreover, we assume that d3D,Xis computed as

follows d3D,X=qd2

2D,X+ (hA− hX)2, where d2D,X is the distance from the base station to the node X in the 2-D space,

hA is height of the base station A, and hX is height of the

node X [17] Suppose hA= 10m and hB = hJ= 1.5m The

paper investigates the urban cell environment, then nL = 2

for LOS and nN = 2.9 for NLOS Follow [17], for UMa

environment then κ measured in dB is a Gaussian random

variable N (9, 3.5) For simplicity, we assume κB = κJ =

9dB We assume that the system works at bandwidth 10MHz

and that the base station transmission power is pd= 43dBm

We assume that the distance between adjacent antennas at the

base station is half wavelength, that is dA= 0.5λ Simulation

results are averaged over 100.000 realizations

First, we consider a simulation scenario where the

illegit-imate user terminal J is 300 meters from the legitillegit-imate user

terminal B The parameters of the Rician channel model is

selected as κB = κJ = 9dB Fig 2 shows the detection

probability as a function of SNR when the base station has

M = 128 antennas and uses 8-PSK pilots As expected,

the probability of detection increases SNR; in the high SNR

domain, detection probability go to 1 Notably, even with a

small number of pilots, e.g K = 5, we have a very high

probability of detecting jammers, much higher than using only

a pair of pilots, i.e K = 2

Figure 3 presents the detection probability as a function of

SNR for a number of N -PSK pilots when the base station has

only M = 64 antennas Notice that the detection probability

also increases with SNR and gets very close to 1 when SNR is

larger than 15dB From this observation, we can conclude that

Fig 2 Detection probability as a function of SNR for M = 128, N = 8 and for different values of K.

Fig 3 Detection probabilities vs SNR for K = 10, M = 64 antennas, and N = 4; 8; 16-PSK

by using a sufficient number of pilots, the base station does not need to use too many antennas for the jammer detection purpose

Figure 4 presents the numerical results of the false-alarm probability as a function of the number of antennas M as the base station when 8-PSK pilots are used at the SNR of 5dB As expected, the false-alarm probability decreases with the number of antennas at the base station Moreover, this result show that the likelihood of false-alarms probability is relatively low when a sufficient number of pilots are used When the number of antennae is big enough, the false-alarm probability rapidly approaches zero This means that

Trang 6

Fig 4 False-alarm probabilities N = 8 PSK , SNR=5; K = 2; 5; 10; 15

the jammer can be detected with very high probability by

using a large number of pilots as well as a large number of

antennas

V CONCLUSION AND FUTURE WORK

We proposed a strategy for detecting the presence of an

illegitimate user terminal based on the use of random PSK

pilots in a massive MIMO system under the assumption of

Rician spatially-uncorrelated channel model We proposed

performance metric that measure a form of correlation

be-tween the received signals in two different training symbols

The main idea for the detection strategy was based on

the analytical results of the differences in the value of the

performance metric when the jamming signal was present

and when it was absent Moreover, our proposed method

could take the advantage of the temporal diversity of training

symbols to reduce the negative effects of noise on detection

accuracy The numerical results showed that the proposed

method could achieve relatively high detection probability and

relatively low false-alarm probability in various simulation

scenarios Suggestions for future work could focus on a

more complicated channel model, such as spatially-correlated

Rician channel model, and/or on the use of other pilot signal

modulations

REFERENCES [1] T L Marzetta, “Noncooperative cellular wireless with unlimited num-bers of base station antennas,” IEEE Trans on Wireless Commun., vol 9, no 11, pp 3590–3600, 2010.

[2] J Zhang, J Fan, B Ai, and D W K Ng, “Noma-based cell-free massive mimo over spatially correlated rician fading channels,” in ICC

2020 - 2020 IEEE International Conference on Communications (ICC),

2020, pp 1–6.

[3] L Sanguinetti, E Bj¨ornson, and J Hoydis, “Toward massive mimo 2.0: Understanding spatial correlation, interference suppression, and pilot contamination,” IEEE Transactions on Communications, vol 68, no 1,

pp 232–257, 2020.

[4] I F Akyildiz, A Kak, and S Nie, “6g and beyond: The future of wireless communications systems,” IEEE Access, vol 8, pp 133 995–

134 030, 2020.

[5] D Kapetanovic, G Zheng, and F Rusek, “Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks,” IEEE Commun Mag., vol 53, no 6, pp 21–27, 2015 [6] Y Zou, J Zhu, X Wang, and L Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proc of the IEEE, vol 104, no 9, pp 1727–1765, Sep 2016.

[7] D Kapetanovi´c, G Zheng, K Wong, and B Ottersten, “Detection of pilot contamination attack using random training and massive MIMO,”

in Proc of IEEE Int Symp Personal, Indoor, Mobile Radio Commun (PIMRC), Sep 2013, pp 13–18.

[8] T Yang, R Zhang, X Cheng, and L Yang, “Secure massive MIMO under imperfect CSI: Performance analysis and channel prediction,” in IEEE Trans Info Forensics Security, 2018.

[9] X Zhang, D Guo, and K Guo, “Secure performance analysis for multi-pair AF relaying massive MIMO systems in Ricean channels,” IEEE Access, vol 6, pp 57 708–57 720, 2018.

[10] A Mukherjee and A Swindlehurst, “A full-duplex active eavesdropper

in MIMO wiretap channels: Construction and countermeasures,” in Proc IEEE Asilomar Conf on Signals, Systems and Computers, Pacific Grove, U.S.A., Nov 2011, pp 265–269.

[11] D B Rawat, K Neupane, and M Song, “A novel algorithm for secrecy rate analysis in massive MIMO system with target SINR requirements,”

in Proc of IEEE Int Conf Computer Commun (INFOCOM), Apr.

2016, pp 53–58.

[12] O Ozdogan, E Bjornson, and E G Larsson, “Massive MIMO with spatially correlated rician fading channels,” in IEEE Trans Commun., 2018.

[13] G Q L Vu and K T Truong, “Secret capacity of massive mimo with a passive eavesdropper,” Journal of Research and Development

on Information and Communication Technology, vol V-3, no 40, p 1,

12 2018.

[14] C.-Y Yeh and E W Knightly, “Feasibility of passive eavesdropping in massive MIMO: An experimental approach,” in Proc of IEEE Conf Commun Network Security (CNS), Beijing, China, May 2018 [15] G Q Le Vu, T Le Nhat, and K T Truong, “Physical layer security

of massive mimo spatially-uncorrelated rician channels,” in 2021 Inter-national Conference on Advanced Technologies for Communications (ATC), 2021, pp 22–27.

[16] L Sanguinetti, A Kammoun, and M Debbah, “Theoretical perfor-mance limits of massive MIMO with uncorrelated Rician fading chan-nels,” IEEE Trans Commun., 2018.

[17] 3GPP TR 38.901, “Study on channel model for frequencies from 0.5

to 100 GHz,” 3GPP, Technical Report v.15.0.0, Jun 2018.

Ngày đăng: 22/02/2023, 22:48

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w