Secure Communications in Tiered 5G Wireless Networks with Cooperative Jamming

Yan Huo*, Xin Fan, Liran Ma, Xiuzhen Cheng, Zhi Tian, Dechang Chen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

57 Scopus citations

Abstract

Cooperative jamming is deemed as a promising physical layer-based approach to secure wireless transmissions in the presence of eavesdroppers. In this paper, we investigate cooperative jamming in a two-Tier 5G heterogeneous network (HetNet), where the macrobase stations (MBSs) at the macrocell tier are equipped with large-scale antenna arrays to provide space diversity and the local base stations (LBSs) at the local cell tier adopt non-orthogonal multiple access (NOMA) to accommodate dense local users (LUs). In the presence of imperfect channel state information, we propose three robust secrecy transmission algorithms that can be applied to various scenarios with different security requirements. The first algorithm employs robust beamforming (RBA) that aims to optimize the secrecy rate of a marcouser (MU) in a macrocell. The second algorithm provides robust power allocation (RPA) that can optimize the secrecy rate of an LU in a local cell. The third algorithm tackles a robust joint optimization (RJO) problem across tiers that seek the maximum secrecy sum rate of a target MU and a target LU robustly. We employ convex optimization techniques to find feasible solutions to these highly non-convex problems. The numerical results demonstrate that the proposed algorithms are highly effective in improving the secrecy performance of a two-Tier HetNet.

Original languageEnglish
Article number8701562
Pages (from-to)3265-3280
Number of pages16
JournalIEEE Transactions on Wireless Communications
Volume18
Issue number6
DOIs
StatePublished - Jun 2019
Externally publishedYes

Keywords

  • Heterogeneous networks
  • collusive eavesdropping
  • cooperative jamming
  • imperfect channel state information
  • massive MIMO
  • non-orthogonal multiple access
  • physical-layer security
  • secrecy rate

Fingerprint

Dive into the research topics of 'Secure Communications in Tiered 5G Wireless Networks with Cooperative Jamming'. Together they form a unique fingerprint.

Cite this