Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers

Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the ef...

Full description

Saved in:
Bibliographic Details
Published inIET communications Vol. 10; no. 1; pp. 50 - 56
Main Author Al-nahari, Azzam
Format Journal Article
LanguageEnglish
Published The Institution of Engineering and Technology 04.01.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Physical layer security is considered as a promising technique that exploits the channel properties in order to send confidential messages to the legitimate receiver even in the presence of a powerful eavesdropper and the absence of its channel information. In this study, the authors consider the effect of massive multiple-input and multiple-output (MMIMO) system operating in TDD mode in improving the physical layer security in the presence of multi-antennas eavesdropper. The channel state information (CSI) of the eavesdropper is assumed not known at the transmitter side, and also imperfect CSI of the legitimate receiver is assumed. The first important finding is that MMIMO is a valuable technique to combat passive eavesdropping, where it is shown that the achievable secrecy rate increases logarithmically with the number of transmit antennas. However, the eavesdropper can be active and attack the training phase of the legitimate transmitter. As a consequence, this dramatically reduces the achievable secrecy rate. The second contribution of this study is a simple protocol that can effectively detect this attack so that a countermeasure can be taken. Closed-form expressions for the detection and false-alarm probabilities are derived. Moreover, the authors analyse the intercept probability and show that asymptotically exponential diversity is achieved.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1751-8628
1751-8636
1751-8636
DOI:10.1049/iet-com.2015.0216