Cell-Free Massive MIMO With Multiple Active Eavesdroppers

IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Yasseen Sadoon Atiya;Zahra Mobini;Hien Quoc Ngo;Michail Matthaiou
{"title":"Cell-Free Massive MIMO With Multiple Active Eavesdroppers","authors":"Yasseen Sadoon Atiya;Zahra Mobini;Hien Quoc Ngo;Michail Matthaiou","doi":"10.1109/OJCOMS.2025.3534640","DOIUrl":null,"url":null,"abstract":"This paper investigates the secrecy performance of cell-free massive MIMO (CF-mMIMO) systems in the presence of active spoofing attacks by multiple eavesdroppers (Eves). Each Eve conducts a spoofing attack on a different legitimate user during the uplink training phase, aiming to intercept the information intended for that user during the downlink transmission phase. To counter these attacks, we propose a joint access point (AP) selection and power optimization strategy to enhance the security performance of the CF-mMIMO system. Specifically, we formulate an optimization problem that seeks to maximize the sum-spectral efficiency (SE) of the legitimate users while ensuring a positive secrecy spectral efficiency (SSE) for all the attacked users. A sub-optimal solution to this mixed-integer non-convex problem is obtained using an efficient, low-complexity accelerated projected gradient (APG)-based algorithm. Moreover, for system design purposes, we introduce two simple and efficient methods: <italic>i)</i> detecting the presence of multiple active Eves within the system and identifying which users are under attack, and <italic>ii)</i> estimating the large-scale fading coefficients between the APs and the Eves. Our findings show that the proposed approach achieves a median sum-SE performance that is 62% better than that of equal power allocation without AP selection scheme. Furthermore, the results demonstrate that the proposed strategy significantly improves the sum-SE while ensuring a positive secrecy rate, thereby safeguarding the confidentiality of all transmitted information signals to all users, even in the presence of a relatively large number of Eves.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1859-1872"},"PeriodicalIF":6.3000,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10854516","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10854516/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

This paper investigates the secrecy performance of cell-free massive MIMO (CF-mMIMO) systems in the presence of active spoofing attacks by multiple eavesdroppers (Eves). Each Eve conducts a spoofing attack on a different legitimate user during the uplink training phase, aiming to intercept the information intended for that user during the downlink transmission phase. To counter these attacks, we propose a joint access point (AP) selection and power optimization strategy to enhance the security performance of the CF-mMIMO system. Specifically, we formulate an optimization problem that seeks to maximize the sum-spectral efficiency (SE) of the legitimate users while ensuring a positive secrecy spectral efficiency (SSE) for all the attacked users. A sub-optimal solution to this mixed-integer non-convex problem is obtained using an efficient, low-complexity accelerated projected gradient (APG)-based algorithm. Moreover, for system design purposes, we introduce two simple and efficient methods: i) detecting the presence of multiple active Eves within the system and identifying which users are under attack, and ii) estimating the large-scale fading coefficients between the APs and the Eves. Our findings show that the proposed approach achieves a median sum-SE performance that is 62% better than that of equal power allocation without AP selection scheme. Furthermore, the results demonstrate that the proposed strategy significantly improves the sum-SE while ensuring a positive secrecy rate, thereby safeguarding the confidentiality of all transmitted information signals to all users, even in the presence of a relatively large number of Eves.
本文研究了无小区大规模多输入多输出(CF-mMIMO)系统在受到多个窃听者(Eves)主动欺骗攻击时的保密性能。每个 "夏娃 "都会在上行链路训练阶段对不同的合法用户进行欺骗攻击,目的是在下行链路传输阶段截获该用户的信息。为了应对这些攻击,我们提出了一种联合接入点(AP)选择和功率优化策略,以提高 CF-mMIMO 系统的安全性能。具体来说,我们提出了一个优化问题,旨在最大化合法用户的总谱效率(SE),同时确保所有受攻击用户的正保密谱效率(SSE)。利用基于加速投影梯度 (APG) 的高效、低复杂度算法,我们得到了这个混合整数非凸问题的次优解。此外,出于系统设计目的,我们引入了两种简单高效的方法:i) 检测系统内是否存在多个活跃的 Eves,并确定哪些用户受到攻击;ii) 估算接入点和 Eves 之间的大规模衰减系数。我们的研究结果表明,与没有 AP 选择方案的等功率分配相比,所提出的方法实现了 62% 的中值总和-SE 性能。此外,研究结果表明,所提出的策略在确保正保密率的同时显著提高了总和-SE,从而保障了所有用户的所有传输信息信号的保密性,即使在存在相对较多的 Eves 的情况下也是如此。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
13.70
自引率
3.80%
发文量
94
审稿时长
10 weeks
期刊介绍: The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023. The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include: Systems and network architecture, control and management Protocols, software, and middleware Quality of service, reliability, and security Modulation, detection, coding, and signaling Switching and routing Mobile and portable communications Terminals and other end-user devices Networks for content distribution and distributed computing Communications-based distributed resources control.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信