Secure transmission for heterogeneous cellular network with limited feedback

  • PDF / 622,718 Bytes
  • 14 Pages / 595 x 842 pts (A4) Page_size
  • 68 Downloads / 189 Views

DOWNLOAD

REPORT


. RESEARCH PAPER .

December 2020, Vol. 63 220304:1–220304:14 https://doi.org/10.1007/s11432-019-2836-0

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond

Secure transmission for heterogeneous cellular network with limited feedback Wenyu JIANG, Kaizhi HUANG* , Shuaifang XIAO & Xiaoming XU PLA Strategic Support Force Information Engineering University, Zhengzhou 450002, China Received 30 November 2019/Accepted 16 March 2020/Published online 11 November 2020

Abstract We study physical layer secure transmission with limited feedback in heterogeneous cellular networks. A transmission protocol is designed to obtain more secure and accurate channel state information (CSI) for enhancing the secrecy performance. Under the proposed protocol, we derive expressions of coverage probability and secrecy outage probability to analyze the security performance with different system parameters such as feedback CSI length and number of antennas. Furthermore, an iteration algorithm is proposed to balance the tradeoff between the feedback and transmission time, and maximize the average secrecy throughput under coverage and secrecy outage constrains. Numeric results demonstrate the optimal feedback overhead and the maximum average secrecy throughput are influenced by the number of antennas. Keywords physical layer security, heterogeneous cellular networks, limited feedback, secure transmission, average secrecy throughput Citation Jiang W Y, Huang K Z, Xiao S F, et al. Secure transmission for heterogeneous cellular network with limited feedback. Sci China Inf Sci, 2020, 63(12): 220304, https://doi.org/10.1007/s11432-019-2836-0

1

Introduction

Heterogeneous cellular networks (HCNs) have become a promising approach in 5G network which demands high data rate and wide coverage. The infrastructure in HCNs is classified into different types such as macro, micro, and home base stations (BS) according to the deployment locations and equipment parameters [1]. Generally, the macro BSs provide wide coverage and large scale access. The low power nodes (LPNs) such as micro BSs located in hot spot or uncovered area result in more comprehensive coverage area and higher spectral efficiency. Generally, BSs always use the open access mechanism in order to sever more users, which is widely accepted by the most of network operators in the world. In other words, users are allowed to access each BS without restriction. However, due to the open architecture and broadcast nature of HCNs, the private information sending by BSs is more vulnerable to be eavesdropped. The eavesdroppers (Eves) close to the BS are easier to decode the secrecy information than the users in overlapping coverage areas of different type BSs. Ghosh et al. [1] pointed out that it is necessary to involve the security in HCNs, and the security problem in HCNs has been gradually recognized. Physical layer security (PLS) technology, utilizing endogenous security of wireless channels to transmit private information, can effectively improve the security perfo