Abstract
Physical layer (PHY) security is recently proved to enable improving the security of wireless communication networks. In downlink frequency division duplex (FDD) cloud radio access network (C-RAN), the performance of PHY security highly relies on the channel state information (CSI) which is usually acquired through the codebook-quantization-based technique at the transceiver. However, the conventional quantization method aggravates the leakage of privacy information in C-RAN under the eavesdropping environment. In this paper, a novel channel quantization method is investigated to improve the secrecy-rate performance of C-RAN by exploiting the high-dimension space geometry. Based on this method, it is proved that when the statistical distribution of the channel matrices of both the legitimate user and the eavesdropper is exploited, a win-win situation can be created where secrecy-rate gains are improved without sacrificing beamforming gains from the point of view of ergodic rate. Particularly, a secrecy-oriented criterion is devised to implement the proposed method for generating codebooks. Then a weighted Voronoi diagram (WVD) is formulated on the complex Grassmann manifold and finally, a vector quantization based algorithm is proposed to build up novel quantization codebooks iteratively. Simulation results further validate the superiority of our proposed codebooks over conventional codebooks in C-RAN systems.
Similar content being viewed by others
References
Blenk A, Basta A, Reisslein M, et al. Virtualization: survey on network virtualization hypervisors for software defined networking. IEEE Commun Surv Tut, 2016, 18: 655–685
Liang C C, Yu F R. Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun Surv Tut, 2015, 17: 358–380
Arslan M Y, Sundaresan K, Rangarajan S. Software-defined networking in cellular radio access networks: potential and challenges. IEEE Commun Mag, 2015, 53: 150–156
Xu D Y, Ren P Y, Du Q H, et al. Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int J Distrib Sens Netw, 2016, 12, doi: 10.1177/1550147716662783
Checko A, Christiansen H L, Yan Y, et al. Cloud RAN for mobile networks—a technology overview. IEEE Commun Surv Tut, 2015, 17: 405–426
Peng M G, Wang C G, Lau, V, et al. Fronthaul-constrained cloud radio access networks: insights and challenges. IEEE Wirel Commun, 2015, 22: 152–160
Chen M, Qian Y F, Mao S W, et al. Software-defined mobile networks security. Mob Netw Appl, 2016, 21: 729–743
Mukherjee A, Fakoorian S A A, Huang J, et al. Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tut, 2014, 16: 1550–1573
You J, Zhong Z D, Wang G P, et al. Security and reliability performance analysis for cloud radio access networks with channel estimation errors. IEEE Access, 2014, 2: 1348–1358
Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644–654
Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355–1387
Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theory, 2010, 56: 3088–3104
Bashar S, Ding Z, Li G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback. IEEE Trans Wirel Commun, 2011, 10: 1212–1223
Lin C H, Tsai S H, Lin Y P. On quantization for masked beamforming secrecy systems. IEEE Trans Wirel Commun, 2015, 14: 5618–5628
Xu D Y, Ren P Y, Du Q H, et al. Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback. China Commun, 2015, 12: 147–159
Xu D Y, Du Q H, Ren P Y, et al. AF-based CSI feedback for user selection in multi-user MIMO systems. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), San Diego, 2015. 1–6
Yoo T, Jindal N, Goldsmith A. Multi-antenna downlink channels with limited feedback and user selection. IEEE J Sel Areas Commun, 2007, 25: 1478–1491
Aurenhammer F. Voronoi diagrams—a survey of a fundamental geometric data structure. ACM Comput Surv, 1991, 23: 345–405
Krikidis I, Ottersten B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling. IEEE Signal Process Lett, 2013, 20: 141–144
Zhou X Y, Ganti R K, Andrews J G. Secure wireless network connectivity with multi-antenna transmission. IEEE Trans Wirel Commun, 2011, 10: 425–430
Geraci G, Singh S, Andrews J G, et al. Secrecy rates in broadcast channels with confidential messages and external eavesdroppers. IEEE Trans Wirel Commun, 2014, 13: 2931–2943
Love D J, Heath R W, Strohmer T. Grassmannian beamforming for multiple-input multiple-output wireless systems. IEEE Trans Inform Theory, 2003, 49: 2735–2747
Cohen J E, Friedland S, Kato T, et al. Eigenvalue inequalities for products of matrix exponentials. Linear Algebra Appl, 1982, 45: 55–95
Johnson C R, Bru R. The spectral radius of a product of nonnegative matrices. Linear Algebra Appl, 1990, 141: 227–240
Roh J C, Rao B D. Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach. IEEE Trans Inform Theory, 2006, 52: 1101–1112
Moon T K. The expectation-maximlization algorithm. IEEE Signal Process Mag, 1996, 13: 47–60
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 61431011), National High-Tech R&D Program of China (863) (Grant No. 2014AA01A707), National Science and Technology Major Project (Grant No. 2016ZX03001016-005), and Fundamental Research Funds for the Central Universities.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xu, D., Ren, P., Du, Q. et al. Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci. China Inf. Sci. 60, 040303 (2017). https://doi.org/10.1007/s11432-016-9013-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-9013-0