Skip to main content
SearchLoginLogin or Signup

Physical Layer Security Analysis of Hybrid MIMO Technology

In this work, authors analyze and quantify the security performance of Hybrid MIMO, which was originally proposed by the preceding work titled “Hybrid MIMO: A New Transmission Method For Simultaneously Achieving Spatial Multiplexing and Diversity Gains in MIMO Systems”.

Published onAug 23, 2021
Physical Layer Security Analysis of Hybrid MIMO Technology
·

ABSTRACT

MIMO is a key enabling technology in the currently emerging 5G systems and future 6G-plus paradigms, such as heterogeneous networks, millimeter-wave networks, vehicular sensor networks, among others. The highly desired properties of MIMO such as its ability to supporting high data rates, improving energy and spectral efficiency, as well as overcoming the effects of shadowing and fading have made it increasingly attractive to the wireless communications industry. Nevertheless, a practical secure MIMO model with the required security levels to guarantee user information protection has still not been realized by the industry. In this work, we analyze and quantify the security performance of hybrid MIMO, which was originally proposed by the preceding work titled “Hybrid MIMO: A New Transmission Method For Simultaneously Achieving Spatial Multiplexing and Diversity Gains in MIMO Systems”. In the proposed method, special signal interference-canceling matrices, which are calculated based on the channel’s variations and randomness between the user and receiver, are superimposed with user data at the physical layer level before being transmitted to the receiver. The conducted performance analysis in this study indicates that the signal interference-canceling matrices provide absolute security (zero information leakage) against both internal and external eavesdroppers. Moreover, the new MIMO technique eliminates the need for any processing at the receiver, where users directly receive their intended signals, consequently lowering complexity and power consumption at the receiver. These are highly desirable properties for the future internet of things (IoT) devices as well as 6G and beyond technologies.

INDEX TERMS: Multiple input multiple outputs, MIMO, wireless communications, physical layer security, 6G, internet of things, IoT.

DOWNLOAD ARTICLE PDF

References

[1] 3GPP TR 36.859. "study on downlink multiuser superposition transmission (must) for LTE (release 13). (3rd generation partnership project (3gpp))" 2015. [Online]. Available: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2912

[2] J. P. Lemayian and J. M. Hamamreh, “Massive MIMO channel prediction using recurrent neural networks,” RS Open Journal on Innovative Communication Technologies, vol. 1, no. 1, Aug. 2020. [Online]. Available: https://doi.org/10.46470%2F03d8ffbd.80623473

[3] ——, “Recurrent neural network-based channel prediction in mMIMO for enhanced performance in future wireless communication,” in 2020 International Conference on UK-China Emerging Technologies (UCET). IEEE, Aug 2020. [Online]. Available: https://doi.org/10.1109%2Fucet51115.2020.9205452

[4] ——, “Hybrid MIMO: A new transmission method for simultaneously achieving spatial multiplexing and diversity gains in MIMO systems,” RS Open Journal on Innovative Communication Technologies, vol. 2, no. 4, May 2021. [Online]. Available: https://doi.org/10.46470%2F03d8ffbd.549d270b

[5] H. M. Furqan, J. M. Hamamreh, and H. Arslan, “New physical layer key generation dimensions: Subcarrier indices/positions-based key generation,” IEEE Communications Letters, vol. 25, no. 1, pp. 59–63, Jan 2021. [Online]. Available: https://doi.org/10.1109%2Flcomm.2020.3025262

[6] ——, “Adaptive OFDM-IM for enhancing physical layer security and spectral efficiency of future wireless networks,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–16, Aug 2018. [Online]. Available: https://doi.org/10.1155%2F2018%2F3178303

[7] E. Güvenkaya, J. M. Hamamreh, and H. Arslan, “On physical-layer concepts and metrics in secure signal transmission,” PhysicalCommunication, vol. 25, pp. 14–25, Dec 2017. [Online]. Available: https://doi.org/10.1016%2Fj.phycom.2017.08.011

[8] R. Melki, H. N. Noura, M. M. Mansour, and A. Chehab, “Physical layer security schemes for MIMO systems: an overview,” Wireless Networks, vol. 26, no. 3, pp. 2089–2111, Jun 2019. [Online]. Available: https://doi.org/10.1007%2Fs11276-019-02060-0

[9] S. B. Wankhede, “Study of network-based dos attacks,” in Nanoelectronics, circuits and communication systems. Springer, 2019, pp. 611–616.

[10] J. P. Lemayian and J. M. Hamamreh, “Novel smallscale NOMA communication technique using auxiliary signal superposition,” in 2020 International Conference on UK-China Emerging Technologies (UCET). IEEE, Aug 2020. [Online]. Available: https://doi.org/10.1109%2Fucet51115.2020.9205475

[11] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani et al., “Advances in quantum cryptography,” Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020.

[12] J. P. Lemayian and J. M. Hamamreh, “A novel small-scale nonorthogonal communication technique using auxiliary signal superposition with enhanced security for future wireless networks,” RS Open Journal on Innovative Communication Technologies, Oct 2020. [Online]. Available: https://doi.org/10.46470%2F03d8ffbd.86b0d106

[13] J. M. Hamamreh, H. M. Furqan, and H. Arslan, “Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1773–1828, 2019. [Online]. Available: https://doi.org/10.1109%2Fcomst.2018.2878035

[14] X. Chen, L. Lei, H. Zhang, and C. Yuen, “Large-scale MIMO relaying techniques for physical layer security: AF or DF?” IEEE Transactions on Wireless Communications, vol. 14, no. 9, pp. 5135–5146, Sep 2015. [Online]. Available: https://doi.org/10.1109%2Ftwc.2015.2433291

[15] Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han, “Physical layer security in MIMO backscatter wireless systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7547–7560, Nov 2016. [Online]. Available: https://doi.org/10.1109%2Ftwc.2016.2604800

[16] J. Xu, W. Xu, J. Zhu, D. W. K. Ng, and A. L. Swindlehurst, “Secure massive MIMO communication with low-resolution DACs,” IEEE Transactions on Communications, vol. 67, no. 5, pp. 3265–3278, May 2019. [Online]. Available: https://doi.org/10.1109%2Ftcomm.2019.2895023

[17] S. Hong, C. Pan, H. Ren, K. Wang, and A. Nallanathan, “Artificial-noise aided secure MIMO wireless communications via intelligent reflecting surface,” IEEE Transactions on Communications, vol. 68, no. 12, pp. 7851–7866, Dec 2020. [Online]. Available: https://doi.org/10.1109% 2Ftcomm.2020.3024621

[18] J. Choi, J. Joung, and B. C. Jung, “Space–time line code for enhancing physical layer security of multiuser MIMO uplink transmission,” IEEE Systems Journal, pp. 1–12, 2020. [Online]. Available: https://doi.org/10.1109%2Fjsyst.2020.3001068

[19] N. Su, E. Panayirci, M. Koca, A. Yesilkaya, H. V. Poor, and H. Haas, “Physical layer security for multi-user MIMO visible light communication systems with generalized space shift keying,” IEEE Transactions on Communications, vol. 69, no. 4, pp. 2585–2598, Apr 2021. [Online]. Available: https://doi.org/10.1109%2Ftcomm.2021.3050100

[20] M. G. Schraml, R. T. Schwarz, and A. Knopp, “Multiuser MIMO concept for physical layer security in multibeam satellite systems,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1670–1680, 2021. [Online]. Available: https://doi.org/10.1109%2Ftifs.2020.3040884

[21] P. Singh and A. Trivedi, “NOMA and massive MIMO assisted physical layer security using artificial noise precoding,” Physical Communication, vol. 39, p. 100977, Apr 2020. [Online]. Available: https://doi.org/10.1016%2Fj.phycom.2019.100977

[22] F. Al-Turjman and J. P. Lemayian, “Intelligence, security, and vehicular sensor networks in the internet of things (IoT)-enabled smart-cities: An overview,” Computers & Electrical Engineering, vol. 87, p. 106776, Oct 2020. [Online]. Available: https://doi.org/10.1016%2Fj.compeleceng.2020.106776

[23] L. J. Poncha, S. Abdelhamid, S. Alturjman, E. Ever, and F. Al-Turjman, “5G in a convergent internet of things era: An overview,” in 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, May 2018. [Online]. Available: https://doi.org/10.1109%2Ficcw.2018.8403748

[24] J. M. Hamamreh, M. Abewa, and J. P. Lemayian, “New nonorthogonal transmission schemes for achieving highly efficient, reliable, and secure multi-user communications,” RS Open Journal on Innovative Communication Technologies, vol. 1, no. 2, Dec 2020. [Online]. Available: https://doi.org/10.46470%2F03d8ffbd.324cc0fb

[25] X. Li, H.-N. Dai, Q. Wang, M. Imran, D. Li, and M. A. Imran, “Securing Internet of medical things with friendly-jamming schemes,” Computer Communications, vol. 160, pp. 431–442, Jul 2020. [Online]. Available: https://doi.org/10.1016%2Fj.comcom.2020.06.026

Comments
0
comment
No comments here
Why not start the discussion?