Skip to main content

Advertisement

Log in

Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback

  • Research Paper
  • Special Focus on Mobile Network Virtualization
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Physical layer (PHY) security is recently proved to enable improving the security of wireless communication networks. In downlink frequency division duplex (FDD) cloud radio access network (C-RAN), the performance of PHY security highly relies on the channel state information (CSI) which is usually acquired through the codebook-quantization-based technique at the transceiver. However, the conventional quantization method aggravates the leakage of privacy information in C-RAN under the eavesdropping environment. In this paper, a novel channel quantization method is investigated to improve the secrecy-rate performance of C-RAN by exploiting the high-dimension space geometry. Based on this method, it is proved that when the statistical distribution of the channel matrices of both the legitimate user and the eavesdropper is exploited, a win-win situation can be created where secrecy-rate gains are improved without sacrificing beamforming gains from the point of view of ergodic rate. Particularly, a secrecy-oriented criterion is devised to implement the proposed method for generating codebooks. Then a weighted Voronoi diagram (WVD) is formulated on the complex Grassmann manifold and finally, a vector quantization based algorithm is proposed to build up novel quantization codebooks iteratively. Simulation results further validate the superiority of our proposed codebooks over conventional codebooks in C-RAN systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blenk A, Basta A, Reisslein M, et al. Virtualization: survey on network virtualization hypervisors for software defined networking. IEEE Commun Surv Tut, 2016, 18: 655–685

    Article  Google Scholar 

  2. Liang C C, Yu F R. Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun Surv Tut, 2015, 17: 358–380

    Article  Google Scholar 

  3. Arslan M Y, Sundaresan K, Rangarajan S. Software-defined networking in cellular radio access networks: potential and challenges. IEEE Commun Mag, 2015, 53: 150–156

    Article  Google Scholar 

  4. Xu D Y, Ren P Y, Du Q H, et al. Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int J Distrib Sens Netw, 2016, 12, doi: 10.1177/1550147716662783

    Google Scholar 

  5. Checko A, Christiansen H L, Yan Y, et al. Cloud RAN for mobile networks—a technology overview. IEEE Commun Surv Tut, 2015, 17: 405–426

    Article  Google Scholar 

  6. Peng M G, Wang C G, Lau, V, et al. Fronthaul-constrained cloud radio access networks: insights and challenges. IEEE Wirel Commun, 2015, 22: 152–160

    Article  Google Scholar 

  7. Chen M, Qian Y F, Mao S W, et al. Software-defined mobile networks security. Mob Netw Appl, 2016, 21: 729–743

    Article  Google Scholar 

  8. Mukherjee A, Fakoorian S A A, Huang J, et al. Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tut, 2014, 16: 1550–1573

    Article  Google Scholar 

  9. You J, Zhong Z D, Wang G P, et al. Security and reliability performance analysis for cloud radio access networks with channel estimation errors. IEEE Access, 2014, 2: 1348–1358

    Article  Google Scholar 

  10. Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644–654

    Article  MathSciNet  MATH  Google Scholar 

  11. Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355–1387

    Article  MathSciNet  MATH  Google Scholar 

  12. Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theory, 2010, 56: 3088–3104

    Article  MathSciNet  Google Scholar 

  13. Bashar S, Ding Z, Li G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback. IEEE Trans Wirel Commun, 2011, 10: 1212–1223

    Article  Google Scholar 

  14. Lin C H, Tsai S H, Lin Y P. On quantization for masked beamforming secrecy systems. IEEE Trans Wirel Commun, 2015, 14: 5618–5628

    Google Scholar 

  15. Xu D Y, Ren P Y, Du Q H, et al. Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback. China Commun, 2015, 12: 147–159

    Article  Google Scholar 

  16. Xu D Y, Du Q H, Ren P Y, et al. AF-based CSI feedback for user selection in multi-user MIMO systems. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), San Diego, 2015. 1–6

    Google Scholar 

  17. Yoo T, Jindal N, Goldsmith A. Multi-antenna downlink channels with limited feedback and user selection. IEEE J Sel Areas Commun, 2007, 25: 1478–1491

    Article  Google Scholar 

  18. Aurenhammer F. Voronoi diagrams—a survey of a fundamental geometric data structure. ACM Comput Surv, 1991, 23: 345–405

    Article  Google Scholar 

  19. Krikidis I, Ottersten B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling. IEEE Signal Process Lett, 2013, 20: 141–144

    Article  Google Scholar 

  20. Zhou X Y, Ganti R K, Andrews J G. Secure wireless network connectivity with multi-antenna transmission. IEEE Trans Wirel Commun, 2011, 10: 425–430

    Article  Google Scholar 

  21. Geraci G, Singh S, Andrews J G, et al. Secrecy rates in broadcast channels with confidential messages and external eavesdroppers. IEEE Trans Wirel Commun, 2014, 13: 2931–2943

    Article  Google Scholar 

  22. Love D J, Heath R W, Strohmer T. Grassmannian beamforming for multiple-input multiple-output wireless systems. IEEE Trans Inform Theory, 2003, 49: 2735–2747

    Article  MathSciNet  MATH  Google Scholar 

  23. Cohen J E, Friedland S, Kato T, et al. Eigenvalue inequalities for products of matrix exponentials. Linear Algebra Appl, 1982, 45: 55–95

    Article  MathSciNet  MATH  Google Scholar 

  24. Johnson C R, Bru R. The spectral radius of a product of nonnegative matrices. Linear Algebra Appl, 1990, 141: 227–240

    Article  MathSciNet  MATH  Google Scholar 

  25. Roh J C, Rao B D. Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach. IEEE Trans Inform Theory, 2006, 52: 1101–1112

    Article  MathSciNet  MATH  Google Scholar 

  26. Moon T K. The expectation-maximlization algorithm. IEEE Signal Process Mag, 1996, 13: 47–60

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61431011), National High-Tech R&D Program of China (863) (Grant No. 2014AA01A707), National Science and Technology Major Project (Grant No. 2016ZX03001016-005), and Fundamental Research Funds for the Central Universities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pinyi Ren.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, D., Ren, P., Du, Q. et al. Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci. China Inf. Sci. 60, 040303 (2017). https://doi.org/10.1007/s11432-016-9013-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-9013-0

Keywords