Printer Friendly

Improved Hybrid Precoder Design for Secure mmWave MIMO Communications.

I. Introduction

The millimeter-waves (mmWaves) aim to provide a wide bandwidth around 200 times more than the present mobile communication systems by utilizing the upper part of the electromagnetic spectrum. These waveforms are realized to accommodate the challenging demands of upcoming fifth-generation (5G) mobile communication systems such as higher data rate, diverse device connectivity, low latency, higher system capacity, and low energy consumption [1]. Still, it is very difficult to develop communication systems using mmWave bands owing to unavoidable degradation problems (e.g., penetration loss, propagation loss, and rain fading) [2]. However, shorter wavelengths of mmWaves support the deployment of large-scale antenna array structure to attain promising beamforming gainsthat allows more efficient utilization of spectrum. Since it is inappropriate to integrate radio frequency (RF) chain for each antenna in mmWave communication systems causing cost and energy consumptionissues, it is practicle to exploit digital and analog hybrid multiple-input multiple-output (MIMO) system with an optimal number of RF chains [3], [4]. In addition, definite number of useful propagation paths are achievable by mmWave channels. To cope with this issue, narrow directional beam is achieved from hybrid precoder by utilizing extensive antenna array structure [5]. Despite the promising features offered by hybrid precoder, efficiency of mmWave communication systems is compromised due to analog precoding, which has certain magnitude and phase limitations. It is logical to utilize the low-resolution phase shifters (PSs) to avoid circuit and energy consumptioncomplications.

Security is also an inevitable issue in addition to the aforementioned in mmWave communication systems. The physical layer security (PLS) is realized as promising solution to guarantee secure transmission for the present and next-generation wireless systems [6]. It is obligatory to prevent information from undesired user (eavesdropper, Eve) since wireless communication systems are vulnerable to all the mobile users located in its vicinity due to the broadcast nature of their wireless links. The multi-antennas in mmWave communication systems provide spatial degree of freedom (DoF) that may be used to enhance main channel to desired users and degrade main channel to Eves. In this way, beam direction may be regulated by the transmitter that can provide best signal-to-noise ratio (SNR) for required users, and confirms least information leakage towards Eves [7]. It is very important to note that Eve with multiple antenna can experience significant information leakage [8]. To enhance the secrecy rate that is considered as the minimal discrepancy between the achievable rate of the required and Eve channel [9], transmitter generates and transmits the artificial noise (AN) in all directions excluding required users. Therefore, it is likely possible that Eve will encounter AN along with desired signals that lessens the SNR at Eve, and makes it tough for it to decode the original signals [10].

An effective directional precodingdesign, known as antenna subset modulation (ASM), is firstly given in [11] for mmWave communication systems. In this scheme, a protected mmWave link is realized by utilizing the specific subset ofantenna array, which helps to develop tightly identified constellation in the aimed angle while randomized constellation in the rest of sides. The ASM approach faces certain computational and side-lobe complications, which are improved by [12]. Authors in [13] developed an effective scheme for secure transmission where Alice (i.e., transmitter) utilizes hybrid massive MIMO schemes with suitable arbitrary approaches to activate a huge number of dumb antennas. This scheme can overcome the eavesdropping capability of Eve and approve itself as a secure scheme against Eves. However, Eve cannot deploy same number of antennas as Alice in this scheme. In [14], authors investigated secure hybrid beamforming scheme for mmWave communication systems. In this scheme, Eve is also deploying the same number of antennas similar to Alice and modeled hybrid-precoding design with high-resolution PSs, and then they presented a hybrid precoder design exploiting low-resolution PSs in [15]. In addition, they obtained secure analog precoder and combiner by utilizing the proposed algorithm, and then found the digital precoder that helped them to further improve the security. However, at higher SNR values, a notable gap is realized between the algorithm reported in [15] and the full-digital benchmark in the study. This fact motivated us to improve the secrecy rate in high SNR regimes.

To the best of our knowledge, no significant work has been done so far to improve thereof gap in high SNR value for mmWave massive MIMO systems using secure hybrid precoder designs. Inspired from [14] and [15], we have two aims in this study. First, is to design a secure hybrid precoder that ensures secure transmission for the intended user without significant information leakage towards Eve, and the second is to improve the secrecy rate at high SNR values in mmWave MIMO communication systems. The primary objective of this work is to intensely examine the secure hybrid precoding algorithms over broadly used scatterer-sharing channel model [16]. The most popular zero-forcing scheme [17] is applied on Eve channel in order to suppress it at eavesdropper side and attempts to reduce the information leakage towards Eve. Later on, we attained secure analog precoder and combiner using the algorithm proposed in this study and the recent algorithm reported in [15]. Finally, digital precoder and combiner are obtained using singular value decomposition (SVD) in this study. It is verified via extensive simulation studies that our proposed algorithm dominates the recent algorithm reported in [15] at high SNR values, while provides similar secrecy rates at low SNR values.

Notations: The lower case, boldface lower case, and boldface upper case letters denote scalars, column vectors, and matrices, respectively. The set of complex numbers is indicated by C. The transpose and conjugate-transpose operations are represented by [(*).sup.T] and (-)H, respectively. An identity matrix with [N.sub.s] * [N.sub.s] dimensions is expressed as [mathematical expression not reproducible]. The operations of absolute value, Euclidean norm, and Frobenius norm are shown by [mathematical expression not reproducible], respectively. The expectation (statistical) function and phase of a complex number are denoted by E[*] and angle [*]. The output of the operation [mathematical expression not reproducible] will either provide positive value or zero. The transmitter (Alice), receiver (Bob), and eavesdropper (undesired receiver) are represented by the subscripts a, b, and e, respectively.

II. System Model

A mmWave MIMO system consisting of Alice, Bob, and an undesired user (Eve) is shown in Fig. 1. Alice deploys [N.sub.a] antennas and [Na.sup.RF.sub.a] number of RF chains to transmit [N.sub.s] number of data streams through mmWave MIMO channels in the direction of Bob, which consists of [mathematical expression not reproducible] conditions to enable multi-stream transmission and decrease limitations of cost and energy consumption. A data stream vector s = [N.sub.s] * 1, which justifies E[[ss.sup.H]] condition is first processed by digital precoder [mathematical expression not reproducible]. and then passed through analog RF precoder [mathematical expression not reproducible]. Finally, the precoder is passed through normalized power constraint denoted by [paragraph][F.sub.A][F.sub.D] = [N.sub.s].

It is worth noting that [F.sub.A] is comprises of PSs whose elements are bound to fulfill constantamplitude. Thus, the transmitted signal [mathematical expression not reproducible] from Alice can be represented as

[mathematical expression not reproducible], (1)

where P shows transmitted power while [mathematical expression not reproducible] indicates hybrid precoder. The transmitted signal is then received at Bob through Alice-to-Bob channel [mathematical expression not reproducible]. If there is a noise vector representing independent and identical distribution [C.sub.N] (0, [[sigma].sup.2.sub.b] denoted by [mathematical expression not reproducible]. then thesignal received at Bob side is shown as

[y.sub.b] = [H.sub.b]x + nb, (2)

where [y.sub.b] is handled by hybrid combiner [W.sub.b] = [W.sub.A,b] [W.sub.D,b]. [W.sub.A,b] and [W.sub.D,b] show analog and digital combiner, respectively. The last signal at Bob is defined as follows

[mathematical expression not reproducible]. (3)

Since Eve is also involved in the considered wiretap system that employs Ne antennas and [N.sub.e.sup.RF] RF chains, he will also try to obtain information via combiner [W.sub.e] = [W.sub.A,e] [W.sub.D,e]. Thus, the last signal at Eve side is shown similar to (3) as

[mathematical expression not reproducible], (4)

where the Alice-to-Eve channel is denoted by He.. The Alice exploits angle of departures (AoDs) of the Bob in order to deliver protected information in the direction of Bob. The chances of Eve to leake the information are extremely enhanced due to similar AoDs of Bob and Eve that encouraged to explore the PLS. The Alice-to-Bob channel [H.sub.b] can be represented as

[mathematical expression not reproducible] (5)

where [N.sub.sc] is the number of scatterers, while [N.sub.ray] denotes propagation paths of each scatterer. [[gamma].sub.kl] indicates complex gain of the Ith propagation path in kth scatterer with Rayleigh distribution. The azimuth AoDs or angle of arrivals (AoAs) of Alice and Bob for the kl th path is represented by [[theta].sup.b.sub.kl] and [[theta].sup.b.sub.kl] [member of] [0,[pi]], respectively. The response vectors of antenna array are respectively given as:

[mathematical expression not reproducible] (6)

[mathematical expression not reproducible] (7)

where [gamma] is the wavelength and d specifies antenna spacing. In addition, a uniform linear array (ULA) structure is utilized by both Alice and Bob. Similarly, Alice-to-Eve channel [H.sub.e] is defined as

[mathematical expression not reproducible]. (8)

III. Secrecy Analysis and Secure Hybrid Precoder

A. Secrecy Analysis

The secrecy rate using full-digital precoder and combiner structure is examined by the authors in [15]. They established that the generalized eigen decomposition (GED) scheme [18] based on PLS displays comprehensive outcomes than generalized SVD (GSVD) approach [19] in the mmWave communication systems.Farther, they showed that significant information leakage can be realizable by adopting conventional precoding design without PLS effort, which approves the importance of PLS. Therefore, GEDbased PLS scheme is adopted as performance criteria all over this paper. The analysis of secrecy rate is usually investigated by exploiting the following PLS performance metric:

[mathematical expression not reproducible] (9)

[mathematical expression not reproducible], (10)

[mathematical expression not reproducible], (11)

[mathematical expression not reproducible] (12)

[mathematical expression not reproducible]. (13)

where the secrecy capacity of Bob and Eve is denoted by [C.sub.b] and [C.sub.e], respectively While noise covariance matrices for Bob and Eve are indicated by [R.sub.n,b] and [R.sub.n,e], respectively.

B. Secure Hybrid Precoder Scheme

The hybrid precoder and combiner design problem based on PLS can be defined as follows:

[mathematical expression not reproducible] (14)

where P and C control the resolution of [F.sub.A] and [W.sub.A,b], respectively, given in (15), where [N.sub.a] = [N.sub.b] = N

[mathematical expression not reproducible]. (15)

It is worth noting that analog precoder and combiner face certain amplitude and phase limitations because of the PSs. However, we presumed that the PSs have constant amplitude and quantized phase that are controlled by B number of quantization bits for simplicity. Although analog precoder and combiner can provide enhanced outcomes using larger value of B, the energy consumption and circuit complexities cannot be overlooked in mmWave MIMO communication systems. Consequently, it is practical to incorporate PSs with low resolution in mmWave MIMO communication systems. However, it may degrade the performance efficiency. In the context of PLS, a secure channel [H.sub.s] is required that can be attained by excluding common AoDs elements of [H.sub.b] and [H.sub.e] from [H.sub.b]. However, before doing that, popular zero-forcing scheme [17, eq. (4.10)] is applied on [H.sub.e], which helps to suppress the Eve channel and tries to minimize the information leakage towards Eve as

[[H.sub.e] = [H.sub.e] ([H.sup.H.sub.e] [H.sub.e]].sup.-1]. (16)

The SVD operation is performed on Eve channel [H.sub.e]

[H.sub.e] = [U.sub.e] [[summation].sub.e] [V.sup.H.sub.e], (17)

where [U.sub.e] and [V.sub.e] represent unitary matrices comprises of singular vectors related to a diagonal matrix [[summation].sub.e]. [H.sub.s] is obtained as

[H.sub.s] = [H.sub.b] (I-[V.sub.e][V.sup.H.sub.e]). (18)

Now, Alice can securely transmit by designing her precoder based on [H.sub.s]. Equation (9) can be reconsidered as:

[mathematical expression not reproducible], (19)

[mathematical expression not reproducible], (20)

[mathematical expression not reproducible] (21)

However, still it is a complex hybrid precoder design problem that is resolved into two stages. In first stage, analog precoder and combiner are calculated using proposed algorithm. Then, calculating [F.sub.D] and [W.sub.D,b] using SVD process based on an effective digital channel [mathematical expression not reproducible]

[mathematical expression not reproducible], (22)

[mathematical expression not reproducible], (23)

[mathematical expression not reproducible], (24)

where [mathematical expression not reproducible], define unitary matrices and [mathematical expression not reproducible], indicates the diagonal matrix containing singular values. Lastly, normalization of the digital precoder is performed as

[mathematical expression not reproducible] (25)

[W.sub.e] is calculated for Eve based on effective channel [H.sub.eff] = [H.sub.e][F.sub.A][F.sub.d] by using the minimum mean square error (MMSE) filter as follows

[mathematical expression not reproducible] (26)

IV. Performance Analysis

This section presents the outcomes of our secure hybrid precoder design in the mmWave MIMO communication systems. We assumed [N.sub.a] = [N.sub.b] = [N.sub.e] = 192, B = 2, and exactly the same number of scatterers for bringing fairness in the results with [15]. In addition, it is more likely that Bob and Eve will share a few joint scatterers. The AoAs and AoDs are uniformly distributed in [0,2[pi]]. The values of noise variances are set equal to unity for simplicity. The ULA structure with antenna spacing of d = 1/[lambda] is implemented for Alice, Bob, and Eve. In the following simulation studies, the secrecy rate of our hybrid precoder is examined through the mentioned algorithms in low and high SNR regimes. Typically, we considered 20 dB as threshold value for defining the low and high SNR regimes for ease. The full-digital precoder based on GED scheme with PLS effort will serve as upper bound while hybrid precoder using the spatially sparse precoding (SSP) [20] without PLS will act as lower bound. [R.sub.b] and [R.sub.e] indicate the secrecy rate of Bob and Eve, respectively.

The secrecy rate comparison of proposed algorithm and algorithm reported in [15] is shown in Fig. 2, where we considered the worst scenario by assuming [N.sup.s] = [N.sup.RF] = 2 conditions. The outcomes of Fig. 2 clearly demonstrate that the our algorithm achieves performance gain of almost 9 bps/Hz than the SSP. On the other hand, approximately 5.5 bps/Hz of performance gain is obtained by algorithm reported in [15] as compared to SSP. The use of the proposed algorithm provides better results than its counterpart in worst scenario, i.e., around 3.5 bps/Hz enhancement in secrecy.

Figure 3 shows spectral efficiency of the hybrid precoders by considering [N.sub.s] = 4, [N.sup.RF.sub.a] = [N.sup.RF.sub.b]. In this [N.sup.RF.sub.e] case, about 17.5 bps/Hz performance gain isrealized by the proposed algorithm, while 11.5 bps/Hz gain is attained by the algorithm reported in [15] as compared to SSP SSP. The use of proposed algorithm ensures nearly 6 bps/Hz secrecy rate enhancement thanits counterpart. It is also worth noting that significant improvement in secrecy rate is realized when [N.sub.s] and [N.sub.RF] are increased. Almost 20 bps/Hz secrecy performance gain is realized by the proposed algorithm when [N.sub.s] = 4, [N.sup.RF.sub.a] = [N.sup.RF.sub.b] = [N.sup.RF.sub.e] conditions are considered, whereas more than 39 bps/Hz secrecy performance gain is noticed in the Fig. 3.

The last results are shown in Fig. 4, which explains the secrecy rate performance for SNR = 30 dB and [N.sup.RF.sub.a] = [N.sup.RF.sub.b] = [N.sup.RF.sub.e] 8.

About 38.6 bps/Hz secrecy performance gain is presented by the proposed algorithm as compared to SSP. In contrast, almost 30.7 bps/Hz gain is obtained by the algorithm reported in [15] than SSP that also approves that use of proposed algorithm presents better secrecy rate performance of approximately 8 bps/Hz than the algorithm reported in [15]. It is also noticed that the proposed algorithm achieves nearly 64.5 bps/Hz secrecy performance gain while algorithm reported in [15] attains performance gains of almost 56.5 bps/Hz, which further confirms that the proposed algorithm provides superior secrecy rate performance than its counterpart at high SNR values.

As a final remark, it can be confirmed through the results presented from Fig. 2 to Fig. 4, the proposed algorithm demonstrates remarkable performance improvement in terms of protecting legitimate information from the eavesdropping than that of its counterparts.

V. CONCLUSIONS

Although the use of larger quantization bits guarantees a better analog precoder, it is impractical in mmWave communication systems owing to circuit complexity and high-energy consumptionissues. This paper presented the secrecy rate analysis of various approaches exploiting secure hybrid precoder and combiner in mmWave MIMO communication systems using low-resolution PSs. The extensive simulation studies clearly showed that the proposed algorithm offers approximately 8 bps/Hz better secrecy rate performance at high SNR values than the recently proposed algorithm, and it also exhibits same results with the compared algorithm at low SNR values. Furthermore, the proposed algorithm assures the minimum information leakage towards the Eve when compared to its counterparts, and it is able to provide more protected communication even in worse scenario.

http://dx.doi.Org/10.5755/j01.eie.26.4.25857

CONFLICTS OF INTEREST

The authors declare that they have no conflicts of interest.

REFERENCES

[1] Y. Kabalci, "5G mobile communication systems: Fundamentals, challenges, and key technologies", in Smart Grids and Their Communication Systems. Springer, Singapore, 2019, pp. 329-359. DOI: 10.1007/978-981-13-1768-2_10.

[2] Z. Pi and F. Khan, "An introduction to millimeter-wave mobile broadband systems", IEEE Commun. Mag., vol. 49, no. 6, pp. 101 107, 2011. DOI: 10.1109/MCOM.2011.5783993.

[3] Y. Kabalci and H. Arslan, "Hybrid precoding for mmWave massive

MIMO systems with generalized triangular decomposition", in Proc. of 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON), Florida, USA, 2018, pp. 1-6. DOI: 10.1109/WAMICON.2018.8363891.

[4] W. Zhang, X. Xia, Y. Fu, and X. Bao, "Hybrid and full-digital beamforming in mmWave Massive MIMO systems: A comparison considering low-resolution ADCs", China Commun., vol. 16, no. 6, pp. 91-102, 2019. DOI: 10.23919/JCC.2019.06.008.

[5] J. Zhang, Y. Huang, Q. Shi, J. Wang, and L. Yang, "Codebook design for beam alignment in millimeter wave communication systems", IEEE Trans. Commun., vol. 65, no. 11, pp. 4980-4995, 2017. DOI: 10.1109/TCOMM.2017.2730878.

[6] Y. Wu, A. Khisti, C. Xiao et al., "A survey of physical layer security techniques for 5G wireless networks and challenges ahead", IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679-695, 2018. DOI: 10.1109/JSAC.2018.2825560.

[7] L. Fan, X. Lei, T. Q. Duong et al., "Secure multiuser communications in multiple amplify-and-forward relay networks", IEEE Trans. Commun., vol. 62, no. 9, pp. 3299-3310, 2014. DOI: 10.1109/TCOMM.2014.2345763.

[8] G. Amarasuriya, R. F. Schaefer, and H. V. Poor, "Secure communication in massive MIMO relay networks", in Proc. of 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK, 2016, pp. 15. DOI: 10.1109/SPAWC.2016.7536731.

[9] Z. Li, R. Yates, and W. Trappe, "Secret Communication with a fading eavesdropper channel", in Proc. of 2007 IEEE International Symposium on Information Theory, Nice, France, 2007, pp. 12961300. DOI: 10.1109/ISIT.2007.4557402.

[10] L. Dong, Z. Han, A. P. Petropulu et al., "Improving wireless physical layer security via cooperative relays", IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, 2010. DOI: 10.1109/TSP.2009.2038412.

[11] N. Valliappan, A. Lozano, and R. W. Heath, "Antenna subset modulation for secure millimeter-wave wireless communication", IEEE Trans. Commun., vol. 61, no. 8, pp. 3231-3245, 2013. DOI: 10.1109/TCOMM.2013.061013.120459.

[12] C. Chen, Y. Dong, X. Cheng et al., "An iterative FFT-based antenna subset modulation for secure millimeter wave communications", in Proc. of 2017 International Conference on Computing, Networking and Communications (ICNC), USA, 2017, pp. 454-459. DOI: 10.1109/ICCNC.2017.7876171.

[13] X. Li, Y. Zhang, and W. Cadeau, "Hybrid massive MIMO for secure transmissions against stealthy eavesdroppers", IEEE Commun. Lett., vol. 22, no. 1, pp. 81-84, 2018. DOI: 10.1109/LCOMM.2017.2762319.

[14] X. Tian, M. Li, Z. Wang et al., "Hybrid precoder and combiner design for secure transmission in mmWave MIMO systems", in Proc. of 2017 IEEE Global Communications Conference, Singapore, 2017, pp. 1-6. DOI: 10.1109/GLOCOM.2017.8254019.

[15] X. Tian, Q. Liu, Z. Wang et al., "Secure hybrid beamformers design in mmWave MIMO wiretap systems", IEEE Syst. J., vol. 14, no. 1, pp. 548-559, 2020. DOI: 10.1109/JSYST.2019.2923819.

[16] S. Rappapport, G. R. MacCartney, M. K. Samimi et al., "Wide-band millimeter-wave propagation measurements and channel models for future wireless communication system design", IEEE Trans. Commun., vol. 63, no. 9, pp. 3029-3056, 2015. DOI: 10.1109/TCOMM.2015.2434384.

[17] E. Bjornson, J. Hoydis, and L. Sanguinetti, Massive MIMO networks: Spectral, energy, and hardware efficiency. Now, 2017. DOI: 10.1561/2000000093.

[18] A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel", IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, 2010. DOI: 10.1109/TIT.2010.2048445.

[19] A. Khisti, and G. W. Wornell, "Secure transmission with multiple antennas--Part II: The MIMOME wiretap channel", IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010. DOI: 10.1109/TIT.2010.2068852.

[20] O. E. Ayach, S. Rajagopal, S. Abu-Surra et al., "Spatially sparse precoding in millimeter wave MIMO systems", IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1499-1513, 2014. DOI: 10.1109/TWC.2014.011714.130846.

Yasin Kabalci (1), *, Muhammad Ali (1), (2)

(1) Faculty of Engineering, Electrical and Electronics Engineering, Nigde Omer Halisdemir University, Nigde, Turkey

(2) Department of Electrical Engineering, Faculty of Engineering, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan yasinkabalci@ohu.edu.tr

Manuscript received 18 November, 2019; accepted 10 April, 2020.

Caption: Fig. 1. Block diagram of hybrid precoder and combiner design for mmWave MIMO wiretap systems.

Caption: Fig. 2. Secrecy rate analysis results for [N.sup.RF.sub.a] = [N.sup.RF.sub.b] = [N.sup.RF.sub.e] = 2.

Caption: Fig. 3. Spectral efficiency results for Ns = 4, [N.sup.RF.sub.a] = [N.sup.RF.sub.b] = [N.sup.RF.sub.e] 8

Caption: Fig. 4. Secrecy rate performance for [N.sup.RF.sub.a] = [N.sup.RF.sub.b] = [N.sup.RF.sub.e] = 8 and SNR = 30 dB.
COPYRIGHT 2020 Kaunas University of Technology, Faculty of Telecommunications and Electronics
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2020 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Kabalci, Yasin; Ali, Muhammad
Publication:Elektronika ir Elektrotechnika
Date:Aug 1, 2020
Words:3866
Previous Article:A Packet Delivery Cost Analysis of a Flow-Enabled Proxy NEMO Scheme in a Distributed Mobility Anchoring Environment.
Next Article:A Lossy Capacitance Measurement Circuit Based on Analog Lock-in Detection.
Topics:

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |