Journal of Electrical and Electronic Engineering
Volume 7, Issue 6, December 2019, Pages: 134-142
Received: Sep. 3, 2019;
Accepted: Oct. 4, 2019;
Published: Nov. 27, 2019
Views 328 Downloads 112
Djedjiga Benzid, Department of Electrical Engineering, École de Technologie Supérieure, Montreal, Canada
Michel Kadoch, Department of Electrical Engineering, École de Technologie Supérieure, Montreal, Canada
Based on broadcast transmission, the future Fifth-Generation networks, 5G, suffer from a critical threat, which is the eavesdropping. This issue can be fixed with the cryptographic protocols. Nevertheless, this method is complex and challenging because of the active topology of wireless networks, which does not permit effective management of security keys. Recently, Physical Layer Security (PLS) method is applied as an alternative solution to mitigate the privacy problem, where the characteristic of the physical layer schemes, namely the modulation, Massive Multi-Input Multi-Output (m-MiMo) and channel coding are exploited to ensure privacy. The fountain code is one of these methods where the legitimate receiver must recover the message before eavesdropper did. However, this feature cannot be exploited in 5G networks in the presence of an intruder using the m-MiMo. Furthermore, the design of Artificial Noise (AN) needed in m-MiMo involves a computational complexity and excessive consumption of energy that complicate the secrecy management for fountain code. In this article, we propose a new method to avoid this problem by judiciously exploiting the features of both technologies. The new approach uses the Raptor code feature, as considerably as the m-MiMo parameters aided by AN signal while reducing the transmission power of the AN. The numerical results indicate that the new approach ensures the protection of legitimate users on the channel and minimizes energy expenditure, which potentially gets to this proposed method a greener and secure transmission.
Invited Paper: Raptor Code and Massive MiMo for Secure Wireless Delivery in 5G, Journal of Electrical and Electronic Engineering.
Vol. 7, No. 6,
2019, pp. 134-142.
D. Benzid, M. Kadoch, and M. Cheriet, "Raptor Codes based on punctured LDPC for Secrecy in Massive MiMo," in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019, pp. 1884-1889: IEEE.
D. Benzid and M. Kadoch, "Fountain Codes and Linear Filtering to Mitigate Pilot Contamination Issue in Massive MiMo," Network and Communication Technologies, vol. 4, p. 1, 01/10 2019.
Y. Zhou, L. Liu, H. Du, L. Tian, X. Wang, and J. Shi, "An overview on intercell interference management in mobile cellular networks: From 2G to 5G," in 2014 IEEE International Conference on Communication Systems, 2014, pp. 217-221: IEEE.
Y. Zhu, Y. Zhou, S. Patel, X. Chen, L. Pang, and Z. Xue, "Artificial noise generated in MIMO scenario: Optimal power design," IEEE Signal Processing Letters, vol. 20, no. 10, pp. 964-967, 2013.
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey," IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550-1573, 2014.
E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next-generation wireless systems," IEEE communications magazine, vol. 52, no. 2, pp. 186-195, 2014.
J. Zhu and W. Xu, "Securing massive MIMO via power scaling," IEEE Communications Letters, vol. 20, no. 5, pp. 1014-1017, 2016.
D. J. MacKay, "Fountain codes," 2004.
H. Niu, M. Iwai, K. Sezaki, L. Sun, and Q. Du, "Exploiting Fountain codes for secure wireless delivery," IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, 2014.
L. Sun and H. Xu, "Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback," IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, 2019.
P. Farrell and B. Honary, "Capacity approaching codes design and implementation," IEE Proceedings-Communications, vol. 152, no. 6, pp. 1060-1061, 2005.
P. G. F. Jorge Castiñeira Moreira, ESSENTIALS OF ERROR-CONTROL CODING. John Wiley & Sons Ltd, 2006.
X. Yuan and L. Ping, "On systematic LT codes," IEEE Communications letters, vol. 12, no. 9, pp. 681-683, 2008.
A. Shokrollahi and M. Luby, "Raptor codes," Foundations and trends® in communications and information theory, vol. 6, no. 3–4, pp. 213-322, 2011.
T. Stockhammer, A. Shokrollahi, M. Watson, M. Luby, and T. Gasiba, "Application layer forward error correction for mobile multimedia broadcasting," Handbook of mobile broadcasting: DVB-H, DMB, ISDB-T and media flo, pp. 239-280, 2008.
W. Ryan and S. Lin, Channel codes: classical and modern. Cambridge university press, 2009.
H. Wei, D. Wang, X. Hou, Y. Zhu, and J. Zhu, "Secrecy analysis for massive MIMO systems with internal eavesdroppers," in 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015, pp. 1-5: IEEE.
J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Transactions on Wireless Communications, vol. 13, no. 9, pp. 4766-4781, 2014.
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010.
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE transactions on wireless communications, vol. 7, no. 6, 2008.
T. R. Dean and A. J. Goldsmith, "Physical-layer cryptography through massive MIMO," IEEE Transactions on Information Theory, vol. 63, no. 8, pp. 5419-5436, 2017.
B. Chen et al., "Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper," IEEE Access, vol. 4, pp. 5374-5384, 2016.
B. Chen, C. Zhu, W. Li, J. Wei, V. C. Leung, and L. T. Yang, "Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper," IEEE Access, vol. 4, pp. 3016-3025, 2016.
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 532-540, 2011.
A. Kacewicz and S. B. Wicker, "Secrecy and reliability using Raptor codes in the presence of a wiretapper in a multiple path wireless network," in 2009 International Conference on Wireless Communications & Signal Processing, 2009, pp. 1-5.
O. Etesami and A. Shokrollahi, "Raptor codes on binary memoryless symmetric channels," IEEE Transactions on Information Theory, vol. 52, no. 5, pp. 2033-2051, 2006.