4.7 Article

Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems

Journal

IEEE TRANSACTIONS ON SIGNAL PROCESSING
Volume 64, Issue 15, Pages 4050-4064

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSP.2016.2558164

Keywords

Physical layer security; distributed antenna systems; artificial noise; random matrix theory; non-convex optimization

Funding

  1. Foundation for the Author of National Excellent Doctoral Dissertation of China [201340]
  2. New Century Excellent Talents Support Fund of China [NCET-13-0458]
  3. National High-Tech Research and Development Program of China [2015AA01A708]
  4. Fok Ying Tong Education Fund [141063]
  5. Young Talent Support Fund of Science and Technology of Shaanxi Province [2015KJXX-01]
  6. MEST, NRF, Korea [R1A2A1A05000977]

Ask authors/readers for more resources

This paper studies the artificial noise (AN) assisted secure transmission for a distributed antenna systems (DAS). To avoid a significant overhead caused by full legitimate channel state information (CSI) acquisition, tracking and collection in the central processor, we propose a distributed AN scheme utilizing the large-scale CSI of the legitimate receiver and eavesdropper. Our objective is to maximize the ergodic secrecy rate (ESR) via optimizing the power allocation between the confidential signal and AN for each remote antenna (RA) under the per-antenna power constraint. Specifically, exploiting random matrix theory, we first establish an analytical expression of the achievable ESR, which leads to a non-convex optimization problem with multiple non-convex constraints in the form of high-order fixed-point equations. To handle the intractable constraints, we recast it into a max-min optimization problem, and propose an iterative block coordinate descent (BCD) algorithm to provide a stationary solution. The BCD algorithm is composed of three subproblems, where the first two subproblems are convex with closed-form solutions, and the last one is a convex-concave game whose saddle-point is located by a tailored barrier algorithm. Simulation results validate the effectiveness of the proposed iterative algorithm and show that our scheme not only reduces the system overhead greatly but also maintains a good secrecy performance.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available