Hyppää sisältöön
    • Suomeksi
    • In English
Trepo
  • Suomeksi
  • In English
  • Kirjaudu
Näytä viite 
  •   Etusivu
  • Trepo
  • TUNICRIS-julkaisut
  • Näytä viite
  •   Etusivu
  • Trepo
  • TUNICRIS-julkaisut
  • Näytä viite
JavaScript is disabled for your browser. Some features of this site may not work without it.

Enhancing Secrecy in Hardware-Impaired Cell-Free Massive MIMO by RSMA

Zhang, Yao; Zhao, Haitao; Xia, Wenchao; Zhu, Yongxu; Ngo, Hien Quoc; Tan, Bo (2024-10-16)

 
Avaa tiedosto
Enhancing_Secrecy.pdf (1.537Mt)
Lataukset: 



Zhang, Yao
Zhao, Haitao
Xia, Wenchao
Zhu, Yongxu
Ngo, Hien Quoc
Tan, Bo
16.10.2024

IEEE Transactions on Wireless Communications
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
doi:10.1109/TWC.2024.3476485
Näytä kaikki kuvailutiedot
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tuni-2024110710022

Kuvaus

Peer reviewed
Tiivistelmä
In this paper, we investigate the secure transmission in the downlink of a cell-free massive multiple-input multiple-output (mMIMO) system that relies on rate-splitting multiple access (RSMA). We specifically evaluate the impact of hardware impairments (HWIs) originating from non-ideal access points (APs), user equipments (UEs), and Eavesdroppers (Eves) on the system's secrecy performance. The investigation encompasses scenarios with both colluding and non-colluding Eves orchestrating pilot spoofing attacks against a designated UE, subsequently intercepting transmissions from both common and private streams. By taking into account a spatially correlated Ricean fading channel model and imperfect channel state information, we derive closed-form expressions for both legitimate and secrecy rates. The secrecy performance is scrutinized across different system configurations, including varying HWI levels, power splitting ratios, AP/Eve transmission powers, spatial correlations, line-of-sight components, and the presence of colluding versus non-colluding Eves. To enhance the secrecy rate for the compromised UE, we propose a secure power control strategy for adjusting the downlink transmission powers of the common and private streams. A sequential convex approximation-based algorithm is introduced to iteratively address this non-convex problem. Through comprehensive simulations, we validate our theoretical propositions and extract pivotal insights for system design.
Kokoelmat
  • TUNICRIS-julkaisut [20683]
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste
 

 

Selaa kokoelmaa

TekijätNimekkeetTiedekunta (2019 -)Tiedekunta (- 2018)Tutkinto-ohjelmat ja opintosuunnatAvainsanatJulkaisuajatKokoelmat

Omat tiedot

Kirjaudu sisäänRekisteröidy
Kalevantie 5
PL 617
33014 Tampereen yliopisto
oa[@]tuni.fi | Tietosuoja | Saavutettavuusseloste