Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
Abstract—This paper considers the security issue of the fifth- for 5G [3], [4]. On the other hand, since a massive number
generation (5G) wireless networks with massive connections, of heterogeneous user equipments share the same spectrum,
where multiple eavesdroppers aim to intercept the confidential wireless security becomes a critical issue of 5G due to the
messages through active eavesdropping. To realize secure massive
access, non-orthogonal channel estimation (NOCE) and non- broadcast nature of wireless channels [5]. As such, it is desired
orthogonal multiple access (NOMA) techniques are combined to design a secure massive NOMA scheme.
to enhance the signal quality at legitimate users, while the From an information-theoretic viewpoint, in order to im-
inter-user interference is harnessed to deliberately confuse the prove the communication secrecy performance, it is necessary
eavesdroppers even without exploiting artificial noise (AN). We to enhance the received signal quality at the legitimate users
first analyze the secrecy performance of the considered secure
massive access system and derive a closed-form expression for the and to reduce the signal leakage to the unintended users [6],
ergodic secrecy rate. In particular, we reveal the impact of some [7]. Since the principle of NOMA is to separate the users
key system parameters on the ergodic secrecy rate via asymptotic in the power domain, power allocation is naturally applied
analysis with respect to a large number of antennas and a high into NOMA to enhance the wireless security. In [8] and
transmit power at the base station (BS). Then, to fully exploit the [9], power allocation schemes were designed for multiuser
inter-user interference for security enhancement, we propose to
optimize the transmit powers in the stages of channel estimation secure NOMA systems from the perspectives of maximizing
and multiple access. Finally, extensive simulation results validate the secrecy rate and minimizing the total power consump-
the effectiveness of the proposed secure massive access scheme. tion, respectively. For the sake of reducing the computational
Index Terms—Physical layer security, massive connections, complexity, a fixed-proportion power allocation scheme was
NOMA, power allocation, 5G. proposed in [10]. However, performing power allocation only
has a limited capability of security enhancement, since in-
creasing the transmit power may not only improve the signal
I. I NTRODUCTION quality at the legitimate user, but also at the eavesdropper. To
With the increasing development of cellular internet-of- effectively improve the performance of physical layer security
things (IoT), the fifth-generation (5G) wireless networks are (PHY-security), a commonly used approach is to equip with
expected to support massive connections over limited radio multiple antennas at the base station (BS) [11]–[13]. Then, by
spectrum [1], [2]. Thus, it is required for 5G to adopt a performing spatial beamforming at the multiple-antenna BS
novel multiple access technology to realize spectral-efficient based on the available channel state information (CSI), it is
massive access. In this context, non-orthogonal multiple access possible to simultaneously increase the rate of the legitimate
(NOMA), with a great potential of improving the spectral channel and decrease the rate of the eavesdropping channel,
efficiency and admitting a large number of users simultane- and thus improve the secrecy rate [14]–[16]. For instance, if
ously, has been widely recognized as a promising technology the confidential signal is transmitted in the null space of the
eavesdropping channel, the eavesdropper is unable to receive
Manuscript received August 31, 2017; revised January 16, 2017; accepted any signal. Moreover, by making use of the spatial degrees
February 16, 2018. This work was supported by the National Natural Science of freedom offered by the multiple antennas, artificial noise
Foundation of China under Grant 61725104, U1709219, 61671406, the open
research fund of National Mobile Communications Research Laboratory, (AN) can be sent together with the desired signal to confuse
Southeast University (No. 2018D07), the Zhejiang Provincial Natural Science the eavesdropper [17], [18]. Thus, in the adverse case of short-
Foundation of China under Grant LR15F010001, the National Science and distance interception, the eavesdropper would suffer from a
Technology Major Project of China under Grant 2018ZX03001017-002 and
2017ZX03001002-003, the Fundamental Research Funds for the Central strong interference signal. However, in the context of massive
Universities, and the Australian Research Councils Discovery Early Career access, there might be not enough degrees of freedom for
Researcher Award funding scheme under Grant DE170100137. (Correspond- combating the eavesdropping and transmitting the AN. To
ing author: Xiaoming Chen).
X. Chen is with the College of Information Science and Electronic solve this problem, there are two feasible solutions. First,
Engineering, Zhejiang University, Hangzhou 310027, China, and also with the the required spatial degrees of freedom for the transmission
National Mobile Communications Research Laboratory, Southeast University, of the legitimate signals can be effectively reduced via user
Nanjing 210018, China (e-mail: chen xiaoming@zju.edu.cn).
Z. Zhang, C. Zhong, and R. Jia are with the College of Information Science clustering [19]. For example, the users are partitioned into
and Electronic Engineering, Zhejiang University, Hangzhou, China (e-mail: several clusters, and the users in a cluster share a beam [20],
ning ming@zju.edu.cn; caijunzhong@zju.edu.cn; 3130103623@zju.edu.cn). [21]. Second, massive multiple-input multiple-output (MIMO)
D. W. K. Ng is with the school of Electrical Engineering and Telecom-
munications, the University of New South Wales, NSW, Australia (e-mail: can be applied to the NOMA systems to significantly increase
w.k.ng@unsw.edu.au). the available spatial degrees of freedom [22]. Especially, a
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
BS equipped with a massive antenna array can generate high- 2) We analyze the performance of the proposed secure mas-
resolution spatial beams. Thereby, the signal leakage between sive NOMA system, and derive a closed-form expression
the users can be reduced significantly, resulting in a low inter- for the ergodic secrecy rate. Moreover, we reveal the
user interference [23] and a low eavesdropping channel rate relationship between ergodic secrecy rate and various
[24]. Moreover, there are more spatial degrees of freedom to important system parameters via asymptotic analysis.
send the AN to facilitate communication secrecy provisioning 3) We propose two optimization schemes for the design of
[25], [26]. channel estimation and multiple access of secure massive
To exploit the benefits of massive MIMO for secure massive NOMA systems, so as to fully exploit the benefits of
NOMA systems, the BS should obtain accurate CSI of the inter-user interference for security enhancement.
downlink channels [27]. However, it is not a trivial task for The rest of this paper is outlined as follows. Section II
the BS to acquire accurate CSI in massive MIMO systems designs a non-orthogonal transmission framework for secure
operated in frequency division duplex (FDD) mode or time di- massive NOMA systems. Section III focuses on the analysis of
vision duplex (TDD) mode. First, in FDD mode, the amount of the secrecy performance of the secure massive NOMA system,
CSI feedback in massive MIMO systems is unbearable, since and reveals the relationship between ergodic secrecy rate and
the number of required feedback bits should increase linearly system parameters. Section IV proposes two power allocation
proportionally to the number of BS antennas for guaranteeing schemes at the user and the BS to fully exploit the inter-user
a given CSI accuracy [28]. Thus, massive MIMO systems are interference. Section V presents extensive simulation results
usually suggested to operate in TDD mode. Specifically, by to validate the effectiveness of the proposed schemes, finally
exploiting channel reciprocity, the BS obtains CSI through Section VI concludes the whole paper.
channel estimation based on the training sequences sent by Notations: We use bold upper (lower) letters to denote
the users over the uplink channels. However, in secure massive matrices (column vectors), (·)H to denote conjugate transpose,
NOMA systems based on TDD mode, there also exists several E[·] to denote expectation, var(·) to denote the variance, ∥ · ∥
challenging issues in CSI acquisition. On the one hand, the to denote the L2 -norm of a vector, ⊗ to denote the Kronecker
length of training sequence should be larger than the number product, vec(·) to denote the vectorization of a matrix, | · | to
of users [29]. In the case of massive access, the required denote the absolute value, χ2 (N ) to denote the χ2 distribution
training sequence might be longer than the duration of a with N degrees of freedom, and CN (x, y) to denote the
channel coherence time, such that the estimated CSI has been complex Gaussian distribution with mean x and variance y.
already outdated. To effectively reduce the length of training
sequence, multiple users, e.g., the users in a cluster for NOMA,
II. S YSTEM M ODEL
should share the same training sequence. In other words,
such a non-orthogonal channel estimation method reduces the
length of pilot sequence at the expense of sacrificing the CSI
accuracy. On the other hand, in secure communications, the
Eve4
eavesdroppers may actively attack the channel estimation by
Eve1
transmitting the same training sequence as the legitimate users
[30], [31]. As a result, the CSI accuracy is further deteriorated.
With inaccurate CSI, the conventional secure communication Eve2 BS
Eve3
schemes based on the AN are inapplicable, since the AN may
severely interfere with the legitimate users.
In the context of massive access, especially in the presence
of active attacking from the eavesdroppers, there are many
challenging issues in the design of secure NOMA scheme. Fig. 1. A secure massive NOMA system with four clusters.
This is mainly because there is severe inter-user interference
during the stages of CSI acquisition and multiple access. The
Consider a single-cell multiuser downlink communication
inter-user interference decreases the CSI accuracy and the
system1 , where a base station (BS) equipped with Nt antennas
quality of the legitimate signal, resulting in a high probability
broadcasts messages to K single-antenna user equipments
of interception. However, the inter-user interference also has
(UEs), cf. Fig. 1. Note that both the number of BS antennas
a great impact on the quality of the eavesdropping signal.
Nt and the number of UEs K might be very large in
Specifically, the inter-user interference can be harnessed and
future 5G wireless networks. In other words, we consider a
served as AN signal to confuse the eavesdroppers. Inspired by
massive access cellular system by making use of the massive
that, this paper proposes to exploit the inter-user interference
multiple-input multiple-output (MIMO) technique. To reduce
to enhance the secrecy performance of secure massive NOMA
the computational complexity, the K UEs are grouped into M
systems. The contributions of this paper are three-fold:
clusters. In particular, the UEs in the same direction but with
1) We design a secure non-orthogonal transmission frame-
distinct propagation distances based on their spatial directions
work for 5G wireless networks with massive connections,
are partitioned into a cluster for exploiting the spatial degrees
where the originally harmful inter-user interference is
exploited to enhance the communication secrecy perfor- 1 The proposed schemes can be extended to the case of multiple-cell directly.
mance. We will discuss the multi-cell case in Section III.
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
of freedom offered by the multiple-antenna BS2 . Without loss the UEj,i to the BS. Variables βj and gj are the path loss
of generality, it is assumed that there are Nm UEs in the mth and the Nt -dimensional small-scale fading vector from the
cluster. In each cluster, we assume that there is an eavesdrop- Evej to the BS, respectively. It is assumed that αj,i and
per (Eve) intercepting the messages sent to the UEs in that βj remain constant during a relatively long time, while hj,i
cluster. In particular, the Eve is or pretends to be a UE, thus we and gj independently fade over time slots according to the
assume that it is also equipped with a single antenna. For ease distribution CN (0, INt ). Moreover, Qj,i and Uj represent the
of notation, we use UEm,n and Evem to denote the nth UE and transmit power of the UEj,i and the Evej , and N is an Nt × τ
the associated eavesdropper in the mth cluster, respectively. additive white Gaussian noise (AWGN) matrix with zero mean
To guarantee secure communication, PHY-security technique and unit variance elements. Since the UEs in a cluster share
is applied to the massive access system. To fully exploiting the same pilot sequence, we only need to estimate the effective
the benefits of multiple-antenna BS for enhancing the secrecy CSI hj for the jth cluster, where j = 1, · · · , M . Let us focus
performance, the BS should have partial CSI of the downlink on the estimation of hm as an example. First, right-multiplying
channels. Thus, we first design a CSI acquisition method Y by Φm , we have
which is suitable for massive access.
∑
Nm
√ √
YΦm = αm,i Qm,i τ hm,i + βm Um τ gm + NΦm
A. Non-Orthogonal Channel Estimation i=1
v
Similar to most related works about massive MIMO sys- u Nm
u∑
tems, the considered system operates in TDD mode for ease = t αm,i Qm,i τ hm + NΦm , (2)
of CSI acquisition. To be specific, the UEs first send training i=0
sequences over the uplink channels, and then the BS obtains
∑
N m √
the CSI of the uplink channels through channel estimation. αm,n Qm,n τ hm,n
Due to the property of channel reciprocity in TDD mode, where hm = n=0
√ is the effective CSI for the
∑
N m
the CSI of the uplink channels can be used as the CSI of αm,i Qm,i τ
i=0
the corresponding downlink channels. For the traditional CSI mth cluster in presence of the active attacking signal from
acquisition methods, in order to guarantee accurate CSI, the the Evem . Note that we let βm = αm,0 , Um = Qm,0 , and
training sequences are designed with pairwise orthogonality. gm = hm,0 for clarity of notation. Then, by using minimum
However, in the context of massive access, the length of the mean square error (MMSE) channel estimation, the estimated
training sequence might be longer than the channel coherence CSI ĥm at the BS is given by
time for guaranteeing pairwise orthogonality, resulting in √
outdated CSI. On the other hand, for eavesdropping more in- N∑m
αm,n Qm,n τ
formation, the Eves may interfere with the channel estimation n=0
by transmitting the same training sequence as the legitimate ĥm = ŷm , (3)
∑
Nm
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
o
|hH
m,n wm | αm,n Pm,n
2
γm,n = . (11)
∑
n−1 ∑
M ∑
Nj
|hH
m,n wm | αm,n
2 Pm,i + |hH
m,n wj | αm,n Pj,i + 1
2
i=1 j=1,j̸=m i=1
e |gm
H
wm |2 βm Pm,n
γm,n = . (13)
∑
Nm ∑
M ∑
Nj
|gm
H w |2 β
m m Pm,i + |gm
H w |2 β P
j m j,i + 1
i=1,i̸=n j=1,j̸=m i=1
to make the eavesdropping channel rate less than a given SINR of the UEm,n in (11), the ergodic rate of the legitimate
threshold, which is not larger than the transmit rate of the channel can be expressed as
confidential signals. In this case, if the Eves try to perform o o
SIC, the decoding error will also occur since the eavesdropping R̄m,n = E[log2 (1 + γm,n )]. (16)
channel rate is less than the transmit rate. In fact, if the Eves
However, it is a nontrivial task to compute the expectation
are capable of decoding the weak signals for SIC, secure o
with respect to a complicated random variable γm,n . To solve
communication can not be realized for a ceratin UEs at least.
this challenge, we resort to an approximation of the ergodic
Remark 2: Due to non-orthogonal multiple access, inter- rate of the legitimate channel. To be more specific, we rewrite
user interference exists inevitably, resulting in a potential the after-SIC signal at the UEm,n as
performance degradation. However, the originally harmful
′
inter-user interference can be used to confuse the Eves, and o
ym,n = Im,n,0 + nm,n , (17)
thus enhances the communication security. In this paper, we
1/2 √
aim to exploit the inter-user interference for balancing the where Im,n,0 = E[αm,n hH m,n wm Pm,n sm,n ] is the mean of
′
interference to the UEs and to the Eves, so as to improve the desired signal, and nm,n is the effective noise, which is
the secrecy performance of secure massive NOMA systems. given by
′ ∑ 3
number of antennas, the ergodic secrecy rate is lower bounded ϕm,n,0 = |Im,n,0 |2 , (20)
by [25]
sec
R̄m,n o
= (R̄m,n − R̄m,n
e
)+ , (15) and
ϕm,n,t = E[|Im,n,t |2 ], t = 1, . . . , 3, (21)
o o e e
where R̄m,n = E[Rm,n ] and R̄m,n = E[Rm,n ] are the ergodic
rates of the legitimate channel and the eavesdropping channel, being the powers of the desired signal, the signal leakage,
respectively. In other words, one can obtain a lower bound the intra-cluster interference, and the inter-cluster interference,
on the ergodic secrecy rate by computing the achievable rate respectively. Thus, the derivation of the ergodic rate of the
of the legitimate channel and the eavesdropping channel. In legitimate channel is equivalent to the computation of expec-
what follows, we analyze the two ergodic rates in detail, tations in (20) and (21). In what follows, we compute these
respectively. Firstly, according to the definition of the received expectations in detail, respectively.
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
We first consider the term Im,n,0 for the computation of Intuitively, the signal leakage is caused by channel fading.
ĥm √ However, the downlink channels becomes deterministic due to
ϕm,n,0 . Substituting wm = ∥ĥ and hm,n = ρm,n ĥm +
√ m∥
channel hardening as Nt tends to infinity, and thus the power
1 − ρm,n em,n into Im,n,0 , we have
of the signal leakage asymptotically approaches zero.
√ √
Im,n,0 = αm,n Pm,n E[ ρm,n ĥH m wm
Similarly, it is easy to derive the powers of the residual
√ intra-cluster interference and the inter-cluster interference as
+ 1 − ρm,n em,n wm ]
H
(22a)
√ [ ]
H
= αm,n Pm,n ρm,n E[ĥm wm ] (22b) ϕm,n,2 = E |Im,n,2 |2 (27a)
√
= αm,n Pm,n ρm,n E[∥ĥm ∥] (22c) [ ∑
] n−1
= αm,n E |hH
m,n wm |
2
Pm,i (27b)
√ 1
Γ(Nt + 2 )
= αm,n Pm,n ρm,n , (22d) ( [ ]
i=1
Γ(Nt ) √
m wm |
= αm,n E | ρm,n ĥH 2
where Γ(·) denotes the Gamma function. Eq. (22b) follows the
) n−1
∑
fact of E[eH H
m,n wm ] = E[em,n ]E[wm ] = 0, and Eq. (22d) holds [√ ]
+ E | 1 − ρm,n eH
m,n wm |
2
Pm,i (27c)
true since ∥ĥm ∥ has a scaled χ2 (2Nt ) distribution by a factor
Γ(Nt + 12 ) i=1
2 . Equivalently, we have E[∥hm ∥] = Γ(Nt ) . According to
1
∑
n−1
(22d), it is easy to obtain the power of the desired signal as = αm,n (ρm,n Nt + 1 − ρm,n ) Pm,i (27d)
2 1 i=1
Γ (Nt + 2)
ϕm,n,0 = αm,n Pm,n ρm,n . (23) ∑
n−1
Γ2 (Nt ) ≈ αm,n ρm,n Nt Pm,i , (27e)
Furthermore, if the number of BS antennas Nt is large, the i=1
power of the desired signal can be approximated as and
[ ]
ϕm,n,0 ≈ αm,n Pm,n ρm,n Nt , (24) ϕm,n,3 = E |Im,n,3 |2 (28a)
∑ ∑Nj
2
Γ (Nt + 12 )
where Eq. (24) follows the fact of → Nt when Nt
M
[ ]
Γ2 (Nt ) = αm,n Pj,i E |hH
m,n wj |
2
(28b)
is large. It is seen that the CSI accuracy ρm,n has a direct
j=1,j̸=m i=1
impact on the power of the desired signal.
Then, we analyze the power of the signal leakage, which ∑
M ∑
Nj
= αm,n Pj,i , (28c)
can be computed as
j=1,j̸=m i=1
[ ]
ϕm,n,1 = E |Im,n,1 |2 (25a) respectively, where Eq. (27b) and (28b) hold true since the
[ √ ]
1/2 H signals sj,i are independent of each other, Eq. (27c) follows
= var αm,n hm,n wm Pm,n sm,n (25b)
[( ) ] the fact that ĥm and em,n are independent of each other,
√ 2
= E αm,n 1/2 H
hm,n wm Pm,n Eq. (27e) neglects the term 1 − ρm,n , and Eq. (28c) is
[ ] obtained because |hH m,n wj | has a scaled χ (2) distribution by
2 2
√ 1
− E2 αm,n1/2 H
hm,n wm Pm,n (25c) a factor 2 . Substituting (24), (25f), (27e), and (28c) into (19),
( [ H ] [ H ]) the ergodic rate of the legitimate channel in secure massive
= αm,n Pm,n E |hm,n wm | − E hm,n wm
2 2
NOMA systems can be expressed as (29) at the top of the
(25d) next page.
( [ ]
√ Now, we analyze the ergodic rate of the eavesdropping
= αm,n Pm,n E | ρm,n ĥH m wm |
2
e
channel, R̄m,n . It is noticed that the Eve can be regarded as
)
[√ ] [ H ] a special UE without performing SIC. Thus, similar to the
+ E | 1 − ρm,n eH w
m,n m | 2
− E 2
h w
m,n m derivation of R̄m,no e
, R̄m,n can be expressed as (30) at the
(25e) top of the next page. Note that if the Eves do not actively
( attack the channel estimation by transmitting the same training
= αm,n Pm,n ρm,n Nt + 1 − ρm,n sequence, they cannot receive any of the desired signal due
) to the fact ρm,0 = 0. Moreover, if the Eves only send the
Γ2 (Nt + 12 ) interference signal independent of the training sequence, they
− ρm,n , (25f)
Γ2 (Nt ) are also unable to intercept the message. This is because
the massive antenna array can generate high-resolution spatial
where Eq. (25e) holds true since ĥm and em,n are independent
[ ] beams to avoid the signal leakage to the unintended users.
of each other and Eq. (25f) follows the facts of E ∥ĥm ∥2 = However, massive MIMO systems operating in TDD mode is
[ ]
Nt and E |eH m,n wm |
2
= 1. Also, if the number of BS preferable, therefore it is vulnerable to active eavesdropping
antennas is sufficiently large, the term 1 − ρm,n in (25f) is during channel estimation.
negligible, such that the power of the signal leakage can be Substituting (29) and (30) into (15), we can obtain a closed-
approximated as form expression for a lower bound on the ergodic secrecy rate
ϕm,n,1 ≈ 0. (26) sec
R̄m,n sec
. It is found that R̄m,n is a function of the CSI accuracy
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
αm,n Pm,n ρm,n Nt
o
R̄m,n ≈ log2 1 + . (29)
∑
n−1 ∑
M ∑
Nj
αm,n ρm,n Nt Pm,i + αm,n Pj,i + 1
i=1 j=1,j̸=m i=1
βm Pm,n ρm,0 Nt
e
R̄m,n e
= E[1 + γm,n ] ≈ log2 1 + . (30)
∑
Nm ∑M ∑
Nj
βm ρm,0 Nt Pm,i + βm Pj,i + 1
i=1,i̸=n j=1,j̸=m i=1
ρm,n and the transmit power Pm,n . The derived lower bound B. Asymptotic Characteristics
can be regarded as the case of channel hardening. Thus, when To provide clear insights into the impacts of the three key
the number of BS antennas is sufficiently large, the lower parameters of secure massive NOMA systems, namely Nt ,
bound is tight. In fact, as seen in Fig. 2, even with a finite ρm,n , and Pm,n , we carry out asymptotic analysis on the
number of BS antennas, e.g., Nt = 64, the lower bound is ergodic secrecy rate in two important scenarios.
accurate. Notice that ρm,n is determined by non-orthogonal
1) A Massive Number of BS Antennas: We first reveal the
channel estimation, and Pm,n is an important parameter for
impact of the number of BS antennas Nt on the ergodic
controlling the interference caused by non-orthogonal mul- sec
secrecy rate R̄m,n . As mentioned earlier, the BS in 5G wireless
tiple access. As such, it is possible to improve the secrecy
networks is usually equipped with a large-scale antenna array,
performance by optimizing these system parameters, which
and thus the number of BS antennas might be very large. As
is equivalent to coordinating the inter-user interference to
Nt approaches infinity, the inter-cluster interference and the
enhance the communication secrecy. Moreover, it is seen that
received noise are negligible compared to the intra-cluster in-
the number of BS antennas Nt also plays an important role
terference. Thereby, the ergodic rates of the legitimate channel
in the secrecy performance, since it simultaneously affects the
and the eavesdropping channel can be approximated as
rates of the legitimate channel and the eavesdropping channel.
αm,n Pm,n ρm,n Nt
Remark 3: The derived ergodic secrecy rate can be extended o
R̄m,n ≈ log2
1 +
to the multi-cell case directly. In the scenario of multi-cell, ∑
n−1
αm,n ρm,n Nt Pm,i
both the UEs and the Eves would suffer from the inter-cell
i=1
interference [33], [34]. Consequently, there exists the term of
inter-cell interference in the denominators of (29) and (30). Nt →∞ Pm,n
Similar to the inter-cluster interference, the power of the inter- = log2
1 +
,
(31)
∑
n−1
cell interference is regardless of Nt , since the transmit beam Pm,i
i=1
is independent of the inter-cell interfering channels.
and
Remark 4: As aforementioned, SIC at the UEs might be
performed imperfectly, resulting in residual interference from βm Pm,n ρm,0 Nt
the weaker UEs. In general, the residual interference can be e
R̄m,n ≈ log2 1 +
∑
N m
modeled as a linear function of the power of the interfering βm ρm,0 Nt Pm,i
signal, and the coefficient of imperfect SIC can be obtained by i=1
long-term measuring [35], [36]. Thus, the ergodic secrecy rate
in the presence of imperfect SIC can be directly derived by
Nt →∞ Pm,n
adding the term of residual interference in the denominators = log2 1 + . (32)
∑
N m
of (29). Pm,i
i=1,i̸=n
Remark 5: In this paper, we consider that the Eve is or In this scenario, the asymptotic ergodic secrecy rate can be
pretends to be a UE. Thus, the BS is able to obtain full expressed as
information of the Eve, and derive the ergodic rate of the
eavesdropping channel in (30). However, if the BS has inexact
Pm,n
information of channel parameters, e.g., βm and ρm,0 , there sec
R̄m,n = log2 1 + − log2
1 +
Pm,n
.
exist uncertainty about the ergodic rate of the eavesdropping ∑
n−1 ∑
Nm
Pm,i Pm,i
channel. Consequently, the BS only has a possible range of i=1 i=1,i̸=n
the ergodic secrecy rate, but not an exact value. (33)
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
It is found that there is a fixed gap between the rates of the Furthermore, if the number of BS antennas is also very
legitimate channel and the eavesdropping channel, which is large, the inter-cluster interference is negligible. As a result,
caused by the intra-cluster interference from the UEs with the asymptotic ergodic secrecy rate is only determined by
weaker channel gains. In other words, the intra-cluster inter- the power allocation in a cluster. Hence, it makes sense to
ference can be exploited to confuse the eavesdropper, and thus optimize the power allocation within a cluster for security
improve the secrecy performance. As an illustrative example, enhancement. In what follows, we study the optimization of
one can increase the power of the weak user so as to increase secrecy performance by exploiting the inter-user interference.
the interference to the Eve, but does not affect the received
signal quality at the legitimate user. IV. S ECRECY P ERFORMANCE O PTIMIZATION OF M ASSIVE
Remark 6: A massive number of BS antennas hardens the NOMA
communication channels and both the inter-cluster interfer-
An advantage of the proposed secure massive NOMA
ence and noise become negligible, resulting in the following
scheme is that the inter-user interference can be leveraged to
phenomenons:
confuse the Eves, and thus enhance the secrecy performance.
• The asymptotic ergodic secrecy rate is independent of
To fully exploit the benefits of inter-user interference for
the number of BS antennas, thus the ergodic secrecy rate security provisioning, it is desired to optimize the system
will be saturated when the number of BS antennas is parameters according to channel conditions. In particular,
sufficiently large. the inter-user interference is determined by non-orthogonal
• The asymptotic ergodic secrecy rate is independent of
channel estimation and non-orthogonal multiple access, it is
path loss and CSI accuracy, since the signals in the same likely to optimize these two important stages of secure massive
cluster experience the same channel gain. NOMA systems. Inspired by that, we propose to optimize
• The asymptotic ergodic secrecy rate is independent of
these two stages from the perspectives of the maximization of
the BS transmit powers for the other clusters’ signals, s- the secrecy rate and the minimization of the transmit power,
ince the inter-cluster interference becomes asymptotically respectively.
negligible.
2) A High Transmit Power: Then, we investigate the im-
pact of BS transmit power on the ergodic secrecy rate. For A. Exploiting Inter-User Interference in Non-Orthogonal
convenience of analysis, we let Pm,n = νm,n Ptot , where Ptot Channel Estimation
is the total transmit power at the BS and νm,n is a nonnegative As analyzed above, the Eves send the same training se-
power allocation factor related to the UEm,n with a constraint quences as the legitimate users to interfere with the channel
∑
M N ∑ m estimation, resulting in the information leakage during the
νm,n = 1. As Ptot approaches infinity, the noise stage of information transmission. According to (30), the
m=1 n=1
power at the receiver is negligible. Then, the ergodic rates amount of information leakage is directly determined by the
of the legitimate channel and the eavesdropping channel can CSI accuracy of the eavesdropper channel. Since the CSI
be simplified as (34) and (35) at the top of the next page, accuracy of the eavesdropper channel is also affected by the
respectively. Thus, the asymptotic ergodic secrecy rate in the training sequences of the UEs, it is possible to coordinate the
scenario of a sufficiently high BS transmit power is given by transmit powers of the UEs to combat the interception of the
(36) at the top of the next page. It is seen from (36) that the Eves.
UEm,n and the Evem suffer the same inter-cluster interference, 1) The Maximization of Secrecy Rate: First, we optimize
but the desired signal and the intra-cluster interference are the non-orthogonal channel estimation from the perspective
different. In particular, the desired signal and the intra-cluster of maximizing the secrecy rate. However, the secrecy rate,
interference are functions of CSI accuracy and power alloca- defined as the difference of the legitimate channel rate and
tion factors. Therefore, one can improve the ergodic secrecy the eavesdropping channel rate, is in general non-convex. To
rate by optimizing these two parameters, namely exploiting improve tractability of this problem, we transform it as the
the inter-user interference during the stages of non-orthogonal maximization of the minimum legitimate channel rate subject
channel estimation and non-orthogonal multiple access. to a constraint on the maximum eavesdropping channel rate.
Remark 7: In the high BS transmit power regime, we have This problem formulation ensures a rate gap to facilitate secure
the following observations: communication. Furthermore, one can adjust the rate gap for
• The asymptotic ergodic secrecy rate is independent of meeting the requirements of various secure communication-
the BS transmit power, thus the ergodic secrecy rate will s. In this case, the optimization of non-orthogonal channel
be saturated when the BS transmit power is sufficiently estimation can be described as the following optimization
large. problem:
• The asymptotic ergodic secrecy rate is independent of o
OP1 : max min R̄m,n
path loss, since both the signal and the inter-user inter- Q m,n
ference experience the same channel gain. s.t. C1 : e
R̄m,n ≤ re ,
• The asymptotic ergodic secrecy rate is independent of the
C2 : Qm,n ≤ Qmax
m,n , ∀m, n, (37)
BS power allocation for the other clusters’ signals, since
the inter-cluster interference is directly determined by the where Q is a collection of the transmit powers of the UEs for
sum of the signal powers of the other clusters. channel estimation, and Qmax
m,n is the maximum transmit power
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
αm,n Ptot νm,n ρm,n Nt
o
R̄m,n ≈ log2 1 +
∑
n−1 ∑ ∑
M Nj
αm,n ρm,n Nt Ptot νm,i + αm,n Ptot νj,i
i=1 j=1,j̸=m i=1
Ptot →∞ νm,n ρm,n Nt
= log2 1 + (34)
∑
n−1 ∑
M ∑
Nj
ρm,n Nt νm,i + νj,i
i=1 j=1,j̸=m i=1
βm Ptot νm,n ρm,0 Nt
e
R̄m,n ≈ log2 1 +
∑
Nm ∑
M ∑
Nj
βm ρm,0 Nt Ptot νm,i + βm Ptot νj,i
i=1,i̸=n j=1,j̸=m i=1
Ptot →∞ νm,n ρm,0 Nt
= log2 1 + , (35)
∑
Nm ∑
M ∑
Nj
ρm,0 Nt νm,i + νj,i
i=1,i̸=n j=1,j̸=m i=1
νm,n ρm,n Nt νm,n ρm,0 Nt
sec
R̄m,n = log2 1 + − log2 1 + . (36)
∑
n−1 ∑
M ∑
Nj ∑
Nm ∑
M ∑
Nj
ρm,n Nt νm,i + νj,i ρm,0 Nt νm,i + νj,i
i=1 j=1,j̸=m i=1 i=1,i̸=n j=1,j̸=m i=1
of the UEm,n . Constant re is the maximum tolerable ergodic some existing optimization softwares. Then, through a one-
rate achieved at the Eves, which is also used to ensure the rate dimensional search on ro , it is possible to obtain the optimal
of the eavesdropping channel less than the transmit rate such power control scheme about Q. The algorithm for maximizing
that the Eves cannot perform SIC perfectly. To solve such a the secrecy rate by exploiting the inter-user interference in
maxmin problem, OP1 is first transformed as the following non-orthogonal channel estimation is summarized as
equivalent optimization problem
Algorithm 1 : Power control for maximizing the secrecy rate
OP2 : maxo ro Step 1: Initialize the parameters by letting ro = re ;
Q,r
s.t. C1, C2, Step 2: Solve the optimization problem OP2, and obtain
o
C3 : R̄m,n ≥ ro , ∀m, n, (38) Qm,n , ∀m, n;
Step 3: Update ro by letting ro = ro + ∆o , where ∆o is
where ro is a minimum ergodic rate of the UEs. According to a small positive real number. If OP2 is solvable, then go to
the expression of R̄e in (30), C1 can be rewritten as Step 2.
Step 4: Output Qm,n , ∀m, n with the largest ro .
∑
Nm
2
βm Pm,n Nt τ Qm,0 ≤ (2 re
− 2
1) βm Pm,i Nt τ Qm,0
i=1,i̸=n 2) The Minimization of Total Power Consumption: Since
the energy at the UE is limited, it is desired to find the
∑
Nm ∑
Nj
+ (2re − 1) βm Pj,i + 1 minimum power to achieve a given objective of ergodic
j=1,j̸=m i=1 secrecy rate. In the case, the optimization problem can be
( ) formulated as
∑
Nm
× 1+ αm,k Qm,k τ . (39) ∑
M ∑
Nj
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
10
also a linear programming problem, and can be solved directly be described as the following optimization problem:
by using some optimization softwares, e.g. CVX [38].
∑
M ∑
Nj
OP5 : min Pj,i
P
j=1 i=1
B. Exploiting Inter-User Interference in Non-Orthogonal Mul- s.t. C1, C3, C4, C5. (42)
tiple Access
Note that C1 and C3 can be transformed as linear inequalities
It is noted that the inter-user interference in non-orthogonal related to Pj,i , and C4 and C5 are linear constraints. Thus,
channel estimation can only be used to confuse the Eve OP5 is a linear programming problem, which can be easily
in the same cluster, but the inter-user interference in non- solved by some optimization softwares.
orthogonal multiple access affects all the Eves. Therefore, The proposed algorithms are also applicable in the case of
the optimization of non-orthogonal multiple access is more multiple-cell and imperfect SIC. This is because the inter-cell
beneficial to the enhancement of the secrecy performance. interference in the multiple-cell scenario is equivalent to the
Similarly, we also exploit the benefits of inter-user interference inter-cluster interference, and the residual interference caused
from the perspectives of maximizing the secrecy rate and by imperfect SIC is similar to the intra-cluster interference.
minimizing the total power consumption, respectively. Moreover, in the presence of uncertainty about ergodic secrecy
1) The Maximization of Secrecy Rate: To design a rate, the proposed algorithms can be redesigned as robust ones
computation-efficient solution, we transform the maximization by through a one-dimensional searching over the uncertain
of secrecy rate as the maximization of the legitimate channel region of the ergodic secrecy rate.
rate subject to a constraint on the eavesdropping channel rate.
V. N UMERICAL R ESULTS
Thus, the optimization problem for maximizing the secrecy
rate by exploiting the inter-user interference in non-orthogonal To evaluate the performance of the proposed secure massive
multiple access can be formulated as NOMA scheme, we present several simulation results in dif-
ferent scenarios. Without extra specification, we set Nt = 64,
OP4 : max ro M = 12, and Nm = 4, ∀m. It is assumed that all the UEs have
o P,r the same maximum transmit power for channel estimation. For
s.t. C1, C3 convenience, we use PSNR to denote the ratio of the total
∑
M ∑
Nj BS transmit power and the noise power (in dB), QSNR to
C4 : Pj,i ≤ Ptot denote the ratio of the maximum UE transmit power and the
j=1 i=1 noise power (in dB), and USNR to denote the ratio of the Eve
C5 : Pm,n ≤ Pm,n+1 , ∀m, n, (41) transmit power and the noise power (in dB), respectively.
6
a one-dimension search on ro , it is possible to derive the
optimal power allocation scheme at the BS. In specific, the 5
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
11
9
3
8
2 PSNR=20 dB
PSNR=10 dB 7
Ergodic Secrecy Rate (b/s/Hz)
1 PSNR=0 dB
6
0
50 100 150 200 250 300
5
Nt
4
Fig. 3. The effect of the number of BS antennas on the ergodic secrecy rate. 3
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
12
n Ptot
80
proposed in [10] allocates ∑
N m M to the UEm,n , and the
k
Equal Power Control Algorithm k=1
70
Power Minimization Algorithm equal power allocation algorithm distributes the BS transmit
60
power to all UEs equally. It is found in Fig. 7 that the
proposed algorithm performs the best in the whole PSNR
50 region. Especially, as PSNR increases, the performance gain
QSNR (dB)
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
13
[14] A. Khisti and G. W. Wornell, “Secure transmission with multiple [38] M. Grant and S. Boyd, CVX: Matlab Software for Disciplined Convex
antennas I: the MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. Programming. [Online]: http://cvxr.com/cvx.
56, no. 7, pp. 3088-4104, Jul. 2010.
[15] Y. Wu, C. Xiao, Z. Ding, X. Gao, and S. Jin, “Linear precoding for
finite-alphabet signaling over MIMOME wiretap channels,” IEEE Trans.
Veh. Technol., vol. 61, no. 6, pp. 2599-2612, Jul. 2012.
[16] X. Chen, D. W. K. Ng, W. Gerstacker, and H-H. Chen, “A survey on
multiple-antenna techniques for physical layer security,” IEEE Commun. Xiaoming Chen (M’10-SM’14) received the B.Sc.
Surv. Tuts., vol. 19, no. 2, pp. 1027-1053, Jun. 2017. degree from Hohai University in 2005, the M.Sc.
[17] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the degree from Nanjing University of Science and
physical layer security of non-orthogonal multiple access in large-scale Technology in 2007 and the Ph. D. degree from
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656-1672, Zhejiang University in 2011, all in electronic en-
Mar. 2017. gineering. He is currently a Young Professor with
[18] X. Jiang, C. Zhong, X. Chen, T. Q. Duong, T. Tsiftsis, and Z. Zhang, the College of Information Science and Electronic
“Secrecy performance of wireless powered wiretap channels,” IEEE Engineering, Zhejiang University, Hangzhou, China.
Trans. Commun., vol. 64, no. 9, pp. 3858-3871, Sept. 2016. From March 2011 to October 2016, He was with
[19] H. Sun, Y. Xu, and R. Q. Hu, “A NOMA and MU-MIMO supported Nanjing University of Aeronautics and Astronautics,
cellular network with underlaid D2D communications,” in Proc. 2016 Nanjing, China. From February 2015 to June 2016,
IEEE 83rd Vehicular Technology Conference (VTC-Spring), May 2016, he was a Humboldt Research Fellow at the Institute for Digital Communi-
pp. 1-5. cations, Friedrich-Alexander-University Erlangen-Nürnberg (FAU), Germany.
[20] X. Chen, Z. Zhang, C. Zhong, and D. W. K. Ng, “Exploiting multiple- His research interests mainly focus on massive access, non-orthogonal multi-
antenna techniques for non-orthogonal multiple access,” IEEE J. Sel. ple access, physical layer security, and wireless power transfer.
Areas Commun., vol. 35, no. 10, pp. 2207-2220, Oct. 2017. Dr. Chen is currently serving as an Associate Editor for the IEEE ACCESS
[21] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, “Fairness of and an Editor for the IEEE C OMMUNICATIONS L ETTERS. He was an
user clustering in MIMO non-orthogonal multiple access systems,” IEEE Exemplary Reviewer for IEEE C OMMUNICATIONS L ETTERS in 2014, and
Commun. Lett., vol. 20, no. 7, pp. 1464-1468, Jul. 2016. IEEE T RANSACTIONS ON C OMMUNICATIONS in 2015, and 2016.
[22] Z. Ding and H. V. Poor, “Design of massive-MIMO-NOMA with limited
feedback,” IEEE Signal Process. Lett., vol. 23, no. 5, pp. 629-633, May
2016.
[23] T. L. Marzetta, “Noncooperative cellular wireless with unlimited num-
bers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9,
no. 11, pp. 3590-3600, Nov. 2010. Zhaoyang Zhang (M’00) received his Ph.D. degree
[24] D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security for in communication and information systems from
massive MIMO: an overview on passive eavesdropping and active attcive Zhejiang University, China, in 1998. He is currently
attacks,” IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015. a full professor with the College of Information
[25] J. Zhu, R. Schober, and V. K. Bhargava, “Secure transmission in Science and Electronic Engineering, Zhejiang U-
multicell massive MIMO systems,” IEEE Trans. Wireless Commun., vol. niversity. His current research interests are mainly
13, no. 9, pp. 4766-4781, Sept. 2014. focused on some fundamental and interdisciplinary
[26] J. Zhu, D. W. K. Ng, N. Wang, R. Schober, and V. K. Bhargava, aspects of communication and compuation, such
“Analysis and design of secure massive MIMO systems in the presence as communication-computation convergnce and net-
of hardware impairments,” IEEE Trans. Wireless Commun., vol. 16, no. work intelligence, theoretic and algorithmic founda-
3, pp. 2001-2016, Mar. 2017. tions for Internet-of-Things (IoT) and Internet-of-
[27] A. Liu and V. K. N. Lau, “Impact of CSI knowledge on the codebook- Data (IoD), etc. He has co-authored more than 200 refereed international
based hybrid beamforming in massive MIMO,” IEEE Trans. Signal journal and conference papers as well as two books. He was awarded
Process., vol. 64, no. 24, pp. 6545-6556, Dec. 2016. the National Natural Science Fund for Distinguished Young Scholars from
[28] J-C. Shen, J. Zhang, E. Alsuda, and K. B. Letaief, “Compressed CSI NSFC in 2017, and was a co-recipient of five international conference best
acqusition in FDD massive MIMO: how much training is needed?” IEEE paper awards. He is currently serving as Editor for IEEE Transactions on
Trans. Wireless Commun., vol. 15, no. 6, pp. 4145-4156, Jun. 2016. Communications, IET Communications and some other international journals.
[29] J. Hoydis, S. T. Brink, and M. Debbah, “Massive MIMO in the UL/DL He served as General Chair, TPC Co-Chair or Symposium Co-Chair for many
of cellular networks: how many antennas do we need?” IEEE J. Sel. Areas international conferences like VTC-Spring 2017 HMWC Workshop, WCSP
Commun., vol. 31, no. 2, pp. 160-171, Feb. 2013. 2018/2013 and Globecom 2014 Wireless Communications Symposium, etc.
[30] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure
massive MIMO transmission with an active eavesdropper,” IEEE Trans.
Inf. Theory, vol. 62, no. 7, pp. 3880-3900, Jul. 2016.
[31] X. Zhou, B. Maham, A. Hjorungnes, “Pilot contamination for active
eavesdropping,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 903- Caijun Zhong (S’07-M’10-SM’14) received the
907, Mar. 2012. B.S. degree in Information Engineering from the
[32] H. Tabassum, E. Hossain, and J. Hossain, “Modeling and analysis of Xi’an Jiaotong University, Xi’an, China, in 2004,
uplink non-orthogonal multiple access in large-scale cellular networks and the M.S. degree in Information Security in 2006,
using poisson cluster processes,” IEEE Trans. Commun., vol. 65, no. 8, Ph.D. degree in Telecommunications in 2010, both
pp. 3555-3570, Aug. 2017. from University College London, London, United
[33] Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal Kingdom. From September 2009 to September 2011,
multiple access in a dense wireless network,” IEEE J. Sel. Areas Com- he was a research fellow at the Institute for Electron-
mun., vol. 35, no. 12, pp. 2771-2784, Dec. 2017. ics, Communications and Information Technologies
[34] X. Chen and H-H. Chen, “Physical layer security in multi-cell MISO (ECIT), Queens University Belfast, Belfast, UK.
downlink with incomplete CSI-A unified secrecy performance analysis,” Since September 2011, he has been with Zhejiang
IEEE Trans. Signal Process., vol. 62, no, 23, pp. 6286-6297, Dec. 2014. University, Hangzhou, China, where he is currently an associate professor.
[35] H. Sun, B. Xie, R. Q. Hu, and G. Wu, “Non-orthogonal multiple His research interests include massive MIMO, wireless power transfer and
access with SIC error propagation in downlink wireless MIMO networks,” backscatter communications.
in Proc. 2016 IEEE Vehicular Technology Conference (VTC-Fall), Sep. Dr. Zhong is an Editor of the IEEE T RANSACTIONS ON W IRELESS C OM -
2016, pp. 1-5. MUNICATIONS , IEEE C OMMUNICATIONS L ETTERS , EURASIP J OURNAL
[36] X. Chen, Z. Zhang, C. Zhong, R. Jia, and D. W. K. Ng, “Fully non- ON W IRELESS C OMMUNICATIONS AND N ETWORKING , and J OURNAL OF
orthogonal communication for massive access,” IEEE Trans. Commun., C OMMUNICATIONS AND N ETWORKS. He is the recipient of the 2013 IEEE
vol. PP, no. 99, pp. 1-1, 2017. ComSoc Asia-Pacific Outstanding Young Researcher Award. He and his
[37] J. Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, “Pilot coauthors received the Best Paper Award at the WCSP 2013 and SigTelCom
contamination and precoding in multi-cell TDD systems,” IEEE Trans. 2017.
Wireless Commun., vol. 10, no. 8, pp. 2640-2651, Aug. 2011.
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JSAC.2018.2825058, IEEE Journal
on Selected Areas in Communications
14
0733-8716 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.