Abstract
In this paper, we focus on the problem of energy-efficient power allocation for secure transmission in massive multiple-input multiple-output (MIMO) systems, where an active multi-antennas eavesdropper sends pilot signals as that of destination receiver to transmitter simultaneously in the uplink training phase. Our aim is to maximize the energy efficiency (EE) of the system by considering the power allocation strategy, while guaranteeing the secrecy rate and the transmit power constraints. We first analyze the impact of pilot attack on the secrecy rate and then prove that the secrecy EE is a concave function with respect to transmit power. The optimization problem formulated can be efficiently solved by using Lagrange multiplier method. Finally, numerical results are provided to validate the proposed energy-efficient scheme outperforms the fixed transmit power scheme.
| Original language | English |
|---|---|
| Title of host publication | 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781509028603 |
| DOIs | |
| Publication status | Published - 21 Nov 2016 |
| Event | 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016 - Yangzhou, China Duration: 13 Oct 2016 → 15 Oct 2016 |
Publication series
| Name | 2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016 |
|---|
Conference
| Conference | 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016 |
|---|---|
| Country/Territory | China |
| City | Yangzhou |
| Period | 13/10/16 → 15/10/16 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Keywords
- Secure communication
- energy-efficiency
- massive MIMO
- pilot attack
Fingerprint
Dive into the research topics of 'Energy-efficient secure transmission in massive MIMO systems with pilot attack'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver