Skip to main content
Log in

Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition (H0: no active attack present, H1: presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

No data availability.

References

  1. Chataut, R., & Akl, R. (2020). Massive MIMO systems for 5G and beyond networks—Overview, recent trends, challenges, and future research direction. Sensors, 20(10), 2753.

    Article  Google Scholar 

  2. Hao, Y., Ni, Q., Li, H., & Hou, S. (2017). On the energy and spectral efficiency tradeoff in massive MIMO-enabled HetNets with capacity-constrained backhaul links. IEEE Transactions on Communications, 65(11), 4720–4733.

    Article  Google Scholar 

  3. You, L., Xiong, J., Zappone, A., Wang, W., & Gao, X. (2020). Spectral efficiency and energy efficiency tradeoff in massive MIMO downlink transmission with statistical CSIT. IEEE Transactions on Signal Processing, 68, 2645–2659.

    Article  MathSciNet  MATH  Google Scholar 

  4. Liu, Z., Du, W., & Sun, D. (2016). Energy and spectral efficiency tradeoff for massive MIMO systems with transmit antenna selection. IEEE Transactions on Vehicular Technology, 66(5), 4453–4457.

    Google Scholar 

  5. Gupta, A., Jha, R. K., & Jain, S. (2017). Attack modeling and intrusion detection system for 5G wireless communication network. International Journal of Communication Systems, 30(10), e3237.

    Article  Google Scholar 

  6. Gupta, A., Jha, R. K., & Devi, R. (2018). Security architecture of 5g wireless communication network. International Journal of Sensors Wireless Communications and Control, 8(2), 92–99.

    Article  Google Scholar 

  7. Kapetanovic, D., Al-Nahari, A., Stojanovic, A., & Rusek, F. (2014). Detection of active eavesdroppers in massive MIMO. In 2014 IEEE 25th Annual international symposium on personal, indoor, and mobile radio communication (PIMRC) (pp. 585–589) IEEE.

  8. Benzid, D., Kadoch, M., & Cheriet, M. (2019). Raptor Code based on punctured LDPC for Secrecy in Massive MiMo. In 2019 15th International wireless communications & mobile computing conference (IWCMC) (pp. 1884–1889). IEEE.

  9. Liu, T. Y., Lin, P. H., Lin, S. C., Hong, Y. W. P., & Jorswieck, E. A. (2015). To avoid or not to avoid CSI leakage in physical layer secret communication systems. IEEE Communications Magazine, 53(12), 19–25.

    Article  Google Scholar 

  10. Chen, X., Lei, L., Zhang, H., & Yuen, C. (2015). Large-scale MIMO relaying techniques for physical layer security: AF or DF? IEEE Transactions on Wireless Communications, 14(9), 5135–5146.

    Article  Google Scholar 

  11. Rawat, D. B., White, T., Parwez, M. S., Bajracharya, C., & Song, M. (2017). Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems. IEEE Internet of Things Journal, 4(6), 1987–1993.

    Article  Google Scholar 

  12. Al-Hraishawi, H., AmarasuriyaArumaBaduge, G., & Schaefer, R. F. (2017). Artificial noise-aided physical layer security in underlay cognitive massive MIMO systems with pilot contamination. Entropy, 19(7), 349.

    Article  Google Scholar 

  13. Zhu, J., Schober, R., & Bhargava, V. K. (2016). Physical layer security for massive MIMO systems impaired by phase noise. In 2016 IEEE 17th international workshop on signal processing advances in wireless communications (SPAWC) (pp. 1–5). IEEE.

  14. Zhang, Z., Guo, D., Zhang, B., & Yuan, J. (2017). Research on physical layer security technology of multi-antenna system. In 2017 First international conference on electronics instrumentation & information systems (EIIS) (pp. 1–4). IEEE.

  15. Yang, M., Guo, D., Huang, Y., Duong, T. Q., & Zhang, B. (2016). Physical layer security with threshold-based multi-user scheduling in multi-antenna wireless networks. IEEE Transactions on Communications, 64(12), 5189–5202.

    Article  Google Scholar 

  16. Salem, M. A., Aziz, A. B. A., & Alias, M. Y. (2020). Cooperative relay transmission under physical layer security for non-orthogonal networks. The Journal of Communication, 15(8), 633–638.

    Article  Google Scholar 

  17. Pandey, A., & Yadav, S. (2020). Physical layer security in cooperative amplify-and-forward relay networks over mixed Nakagami-m and double Nakagami-m fading channels: Performance evaluation and optimization. IET Communications, 14(1), 95–104.

    Article  Google Scholar 

  18. IsmayilSiyad, C., & Tamilselvan, S. (2021). Chaotic deep neural network based physical layer key generation for massive MIMO. International Journal of Information Technology, 13, 1–12.

    Google Scholar 

  19. Maeng, S. J., Yapıcı, Y., Güvenç, İ., Bhuyan, A., & Dai, H. (2021). Precoder design for physical-layer security and authentication in massive MIMO UAV communications. arXiv preprint arXiv:2107.00799.

  20. Singh, K. R., & Trivedi, A. (2020). Physical layer security for wireless powered massive MIMO decode and forward relay systems with hardware impairments: performance analysis. Wireless Personal Communications, 112(3), 1537–1547.

    Article  Google Scholar 

  21. Singh, P., & Trivedi, A. (2020). NOMA and massive MIMO assisted physical layer security using artificial noise pre-coding. Physical Communication, 39, 100977.

    Article  Google Scholar 

  22. Lu, X., Yang, W., Guan, X., & Cai, Y. (2020). DCE-based secure transmission for massive MIMO relay system against active eavesdropper. IEEE Transactions on Vehicular Technology, 69(11), 13045–13059.

    Article  Google Scholar 

  23. Shen, Z., Xu, K., Xia, X., Xie, W., & Zhang, D. (2020). Spatial sparsity based secure transmission strategy for massive MIMO systems against simultaneous jamming and eavesdropping. IEEE Transactions on Information Forensics and Security, 15, 3760–3774.

    Article  Google Scholar 

  24. Schaefer, R. F., Amarasuriya, G., & Poor, H. V. (2017). Physical layer security in massive MIMO systems. In 2017 51st Asilomar conference on signals, systems, and computers (pp. 3–8). IEEE.

  25. Dehghani, M., Montazeri, Z., Saremi, S., Dehghani, A., Malik, O. P., Al-Haddad, K., & Guerrero, J. M. (2020). HOGO: Hide objects game optimization. International Journal of Intelligent Systems, 13, 10.

    Google Scholar 

  26. Xiong, Q., Liang, Y. C., Li, K. H., & Gong, Y. (2015). An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems. IEEE Transactions on Information Forensics and Security, 10(5), 932–940.

    Article  Google Scholar 

  27. Abumarshoud, H., Chen, C., Islim, M. S., & Haas, H. (2020). Optical wireless communications for cyber-secure ubiquitous wireless networks. Proceedings of the Royal Society A, 476(2242), 20200162.

    Article  Google Scholar 

  28. Choi, J., Joung, J., & Jung, B. C. (2020). Space–time line code for enhancing physical layer security of multi-user MIMO uplink transmission. IEEE Systems Journal, 15, 3336–3347.

    Article  Google Scholar 

  29. Yang, T., Zhang, R., Cheng, X., & Yang, L. (2018). Secure massive MIMO under imperfect CSI: Performance analysis and channel prediction. IEEE Transactions on Information Forensics and Security, 14(6), 1610–1623.

    Article  Google Scholar 

Download references

Funding

No funding is provided for the preparation of manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Chanchal Soni.

Ethics declarations

Conflict of interest

Authors Chanchal Soni, Namit Gupta declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to Participate

All the authors involved have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Soni, C., Gupta, N. Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy. Wireless Pers Commun 129, 1143–1159 (2023). https://doi.org/10.1007/s11277-023-10180-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10180-2

Keywords

Navigation