This paper appears in: , Issue Date: , Written by:

© 2016 IEEE

SECTION I

The unprecedented growth in demand for mobile data and the advent of the Internet of Things (IoT) [1]–[2] [3] [4] [5][6] have driven extensive researches and developments on the fifth generation (5G) wireless communication system [7]–[8] [9] [10] [11][12]. 5G wireless network is expected to provide far more gigantic capacity than fourth generation (4G) technology to meet the ever-increasing users’ needs in the future. Massive multiple-input multiple-output (MIMO) [13]–[14] [15][16], which enables very high energy efficiency and spectral efficiency [17], [18] by exploiting a large number of excess service antennas at the base stations (BSs) and the law of large numbers, is one of the most promising and disruptive wireless technologies that can bring 5G into reality [19]–[20] [21][22]. Moreover, massive MIMO helps alleviate the burden of user equipments (UEs) greatly. For instance, only the BSs need to learn the channel state information (CSI) in time-division duplexing (TDD) massive MIMO systems [16]. This distinctive feature of massive MIMO potentially contributes to the promotion of the forthcoming IoT, in which the communication nodes would probably be lightweight, i.e., with limited number of antennas, limited power, low software and hardware complexity and low storage capacity. It is also certainly desirable that the portable UEs in 5G wireless cellular networks can reduce the cost on software and hardware, and have lower power consumption and longer life time while maintaining an acceptable performance by employing massive MIMO at the BSs.

On the other hand, information security is clearly a critical aspect for IoT and 5G network. However, from the perspective of information security, it seems unfavorable that the software and hardware of UEs are overly lightweight. Computational complexity based traditional cryptographic technologies [23] may need large signal processing and computational resource to ensure proper function of encryption, decryption, key management and distribution. Recently, physical layer security [24], [25], which is theoretically based on information theory, offers an alternative and complementary approach to strengthen the secrecy performance of wireless communication from the physical layer. However, although physical layer security circumvents the computational complexity problem of traditional cryptographic technologies, most of the existing physical layer security techniques are still too complex for the lightweight UEs to use directly [26]. Mukherjee [26] investigated the physical layer security techniques in IoT scenario and presented some methods that are suitable for IoT applications. These methods have the advantage of achieving the secrecy goal while being suitable for lightweight UEs. Nonetheless, it dose not take massive MIMO into account. The advantage can be further enhanced by exploiting massive MIMO and physical layer security together, and the combination of these two technologies benefits both the communication performance and secrecy performance [27]–[28][29]. However, adequate attention on the combination of massive MIMO and physical layer security is yet to be received at the time of writing.

Currently, the research pertaining to massive MIMO physical layer security mainly focuses on the downlink transmission. By performing a large-system analysis, [30] and [31] investigate the secrecy performance in downlink multi-cell MIMO scenario with the knowledge of the eavesdroppers’ CSI. Zhu *et al.* [32], [33] comprehensively examined the secrecy performance of matched-filter, zero-forcing, regularized channel inversion, traditional artificial noise (AN) [34] and proposed AN precoders on the downlink transmission in a multi-cell massive MIMO system. The power scaling feature of massive MIMO is exploited in [35]–[36][37] to study the secrecy rates on both uplink and downlink transmissions in a massive MIMO network without the aid of AN or jamming. The corresponding results implicitly present the inherent security nature of massive MIMO, and also demonstrate that the secrecy performance cannot be guaranteed if the number of eavesdropper antennas exceeds a certain limit. Instead of Rayleigh fading, Rician fading channels are studied in [38], and the corresponding downlink AN aided jamming design is investigated in detail. Uplink pilot training phase jamming attack on the massive MIMO downlink transmission is considered in [39], and a $\delta $-conjugate beamforming method is proposed to secure the communication with the help of pilot encryption. In [40], passive and active eavesdroppers are both taken into account, and a simple protocol is proposed to detect the active adverse attack. In [41], downlink secure transmit signal design with AN over correlated fading channels in multi-cell massive MIMO scenario is investigated in the presence of an active multi-antenna eavesdropper, where the number of eavesdropper antennas is limited comparing with that of the BS. Secure transmission in a decode and forward massive MIMO relaying system is studied in [42] with the existence of a single-antenna eavesdropper. Secrecy performance in term of co-located or distributed placement of multi-antenna eavesdroppers is discussed in an uplink massive MIMO system [43], where the number of eavesdropper antennas is optimistically assumed to be fewer than the number of BS antennas. Motivated by the possibility that the eavesdropper may equip with much more powerful large antenna arrays, an original symbol phase rotated (OSPR) secure transmission scheme is recently proposed in [44] to defend against massive MIMO eavesdropper on the downlink transmission. To the best of the authors’ knowledge, no work except [44] has ever considered the security problem in a massive MIMO scenario where the number of eavesdropper antennas is far more than the number of BS antennas, i.e., a much more powerful massive MIMO eavesdropper.

It is worth emphasizing that the communication security of uplink transmission is equally important although relatively fewer attention has been given. Especially in IoT and 5G network, more and more lightweight UEs will be used everywhere, and private information is accordingly gathered and transmitted to the BSs or sink nodes through uplink transmission. Adequate attention should be paid to securing the uplink transmission since lightweight UEs are likely with limited number of antennas, limited power, low signal processing and data computing capabilities, which may inherently weaken their security level during the uplink communication stage even with massive MIMO employed at the BS. Moreover, it is also beneficial to take into account the worst case, which has received little attention, that the eavesdropper adopts much more number of antennas to intercept the information sent by the lightweight UEs, which will severely deteriorate the uplink secrecy performance. Overall, simple but effective massive MIMO physical layer security approaches for lightweight UEs on the uplink call for more research, since they are significantly beneficial in protecting the private information in future IoT and 5G systems.

In this paper, we consider the secure communication on the uplink transmission, during which multiple autonomous lightweight single-antenna UEs transmit confidential messages to a massive MIMO BS, in the presence of a much more powerful massive MIMO eavesdropper. It is highly plausible for the adversary to employ many more antennas than legitimate UEs and BSs as indicated in [45], particularly in 5G era in which the massive MIMO technology will be mature and popular. It breaks the optimistic assumption which has been made in most literatures that the eavesdropper always has not enough antennas to intercept. However, it is actually not difficult for the eavesdropper to increase its aperture by equipping more antennas in practical scenario [45]. To the best of our knowledge, no work has specifically involved such uplink scenario before. The basic idea of the OSPR secure transmission scheme proposed in [44] for downlink transmission is borrowed here to defend against the massive MIMO eavesdropper on the uplink transmission. We show that the OSPR scheme can be well extended to the uplink case after proper modifications. Hereafter, it is referred to as uplink OSPR (UOSPR) scheme in this work. We present that in addition to protecting the private information on the uplink, the UOSPR secure transmission scheme is well suitable for lightweight UEs. This is due to its low complexity requirement, which does not need powerful signal and data processing capabilities or extra jamming cost for the UEs to achieve their security goals. Our work show that by the employment of UOSPR scheme, the lightweight single-antenna UEs with limited power and processing capabilities can achieve a good secrecy performance, even while facing the eavesdropper equipped with an infinite number of antennas.

The remainder of this paper is organized as follows. In Section II, we introduce the uplink system model of the considered single-cell multi-user massive MIMO network with the existence of a powerful passive massive MIMO eavesdropper. In Section III, we present the UOSPR secure transmission scheme for the legitimate lightweight UEs and the corresponding secrecy analysis in detail. Simulation results are provided in Section IV, and then Section V concludes the paper.

*Notation:* Vectors and matrices are denoted by lowercase boldface letters and uppercase boldface letters, respectively. ${\mathbf {X}}^{T}$, ${\mathbf {X}}^{H}$ and ${\mathbf {X}}^{-1}$ stand for the transpose, conjugate transpose and inverse of matrix ${\mathbf {X}}$, respectively. ${\mathbf {I}}_{N}$ denotes the $N\times N$ identity matrix. ${\left |{x}\right |}$, ${\left \|{ {\mathbf {x}} }\right \|}$ and ${\left \|{ {\mathbf {X}} }\right \|}$ denote the Euclidean norm of a scalar, a vector and a matrix, respectively. ${\mathrm {tr}}\left ({\mathbf {X}}\right )$ denotes the trace operation of matrix ${\mathbf {X}}$. ${\mathop {\mathrm {E}}}\left ({x}\right )$ and ${\mathop {\mathrm {Var}}}\left ({x}\right )$ are used to denote the expectation and variance of a random variable $x$, respectively. ${\mathbb {C}^{m \times n}}$ denotes the field of all $m \times n$ complex matrices. $\mathbf {x}\sim \mathcal {CN}({\mathbf {0}}_{N},\boldsymbol {\Sigma })$ stands for a circularly symmetric complex Gaussian random vector ${\mathbf {x}} \in {\mathbb {C}^{N \times 1}}$ with zero mean and covariance matrix $\boldsymbol {\Sigma }$.

SECTION II

In this section, we introduce the uplink channel model of the considered TDD-based single-cell multi-user massive MIMO system. $K$ autonomous legitimate lightweight single-antenna UEs simultaneously send private information to the massive MIMO BS. We make the worst case assumption that the passive eavesdropper uses unlimited number of antennas to intercept the confidential messages on the uplink transmission. The massive MIMO BS has $N_{b}$ antennas, and $N_{e}$ denotes the number of antennas at the massive MIMO eavesdropper. It is clear that ${N_{e}}\gg {N_{b}}\gg {K}>{0}$, where $N_{e}\rightarrow \infty $, $N_{b}$ and $K$ are finite. The corresponding system model is illustrated in Fig. 1.

The $k$th autonomous lightweight single-antenna UE sends confidential information to the massive MIMO BS through the following uplink channel TeX Source\begin{equation} {{\mathbf {h}}_{k}} = \left [{ {\begin{array}{*{20}{c}} {{h_{k,1}}}\\ {{h_{k,2}}}\\ \vdots \\ {{h_{k,{N_{b}}}}} \end{array}} }\right ]\!, \end{equation} where ${h_{k,i}}$, $k = 1,2, \ldots ,K$ and $i = 1,2, \ldots ,N_{b}$ denotes the CSI from UE $k$ to the $i$th BS antenna.

In the meanwhile, the massive MIMO eavesdropper can intercept the private information transmitted by UE $k$ through the following channel during uplink transmission TeX Source\begin{equation} {{\mathbf {g}}_{k}} = \left [{ {\begin{array}{*{20}{c}} {{g_{k,1}}}\\ {{g_{k,2}}}\\ \vdots \\ {{g_{k,{N_{e}}}}} \end{array}} }\right ]\!, \end{equation} where ${g_{k,j}}$, $k = 1,2, \ldots ,K$ and $j = 1,2, \ldots ,N_{e}$ denotes the CSI from UE $k$ to the $j$th eavesdropper antenna.

It is assumed that all the CSI entries given above are independent and identically distributed (i.i.d.) $\mathcal {CN}(0,1)$ random variables, which implies that all the antenna spacing is no less than half a wavelength. That is the standard independent Rayleigh fading channel model. The CSI entries remain constant within a certain coherence interval length $T$, and vary block by block, i.e., block fading. The downlink channel and uplink channel are reciprocal due to the employment of TDD mode, which is widely known as the concept ‘channel reciprocity’.

Single-antenna UE $k$ radiates the original information bearing symbol $s_{k}$ omnidirectionally, independently and simultaneously on the uplink, where $k = 1,2, \ldots ,K$ and $s_{k}$ submits to the power constraint ${\mathop {\mathrm { E}}}\left ({ {{{\left \|{ {s_{k}} }\right \|}^{2}}} }\right ) \le P_{k}$. Then the received uplink signal of UE $k$ at the massive MIMO BS can be written as TeX Source\begin{equation} {{\mathbf {r}}_{b}} = {{\mathbf {h}}_{k}}{s_{k}} + \sum \limits _{i = 1,i \ne k}^{K} {{{\mathbf {h}}_{i}}{s_{i}}} + {{\mathbf {n}}_{b}}, \end{equation} where ${\mathbf {r}}_{b}\in \mathbb {C}^{N_{b} \times 1}$ is the BS receiving signal vector, and the elements of the receiver noise ${{\mathbf {n}}_{b}}\in \mathbb {C}^{N_{b} \times 1}$ are assumed to be i.i.d. $\mathcal {CN}(0,\sigma _{b}^{2})$ random variables. The first term on the right hand side of (3) represents the signal for UE $k$, and the second term represents the interference which comes from other UEs’ signals.

The corresponding intercepted signal of UE $k$ at the massive MIMO eavesdropper is given by TeX Source\begin{equation} {{\mathbf {r}}_{e}} = {{\mathbf {g}}_{k}}{s_{k}} + \sum \limits _{i = 1,i \ne k}^{K} {{{\mathbf {g}}_{i}}{s_{i}}} + {{\mathbf {n}}_{e}}, \end{equation} where ${\mathbf {r}}_{e}\in \mathbb {C}^{N_{e} \times 1}$ is the eavesdropping signal vector, and the elements of the receiver noise ${{\mathbf {n}}_{e}}\in \mathbb {C}^{N_{e} \times 1}$ are assumed to be i.i.d. $\mathcal {CN}(0,\sigma _{e}^{2})$ random variables. The first term on the right hand side of (4) represents the signal intercepted of UE $k$, and the second term represents the interference from other UEs. We consider the worst case that the massive MIMO eavesdropper is able to cancel all the interference and noise, and can extract the radiated signal of UE $k$ from the first term perfectly.

SECTION III

As described in Section II, we consider the uplink communication security problem of defending against a passive eavesdropper equipped with infinite number of antennas. The UOSPR scheme is adopted to help achieve a good secrecy performance for the lightweight single-antenna UEs, which are probably with limited power and weak signal and data processing capabilities. The basic idea of the employed UOSPR approach is to replace the original information bearing symbols transmitted by UE $k$ with randomly rotated symbols. After the massive MIMO BS receives the uplink signals, the UOSPR scheme will assure that the BS is able to recover the original symbols by acquiring the accurate phase rotation, while the massive MIMO eavesdropper can learn little about the rotated phase even with unlimited number of antennas. Therefore, the powerful massive MIMO eavesdropper will be badly confused by the randomly rotated symbols, and the original information is kept secret successfully. The complexity associated with implementing the UOSPR secure transmission scheme is low, which makes it suitable for lightweight UEs on the uplink transmission and a potential security scheme candidate for future IoT applications and 5G networks. In the following, the three stages and the uplink coherence interval structure of the UOSPR secure transmission scheme are discussed in detail, along with the corresponding secrecy analysis.

In the uplink training and BS channel estimation phase, the $K$ lightweight single-antenna UEs each transmits a length $\tau $ uplink pilot sequence to assist the massive MIMO BS in acquiring the corresponding CSI ${\mathbf {h}}_{k}$, where $K\leq \tau <T$ and $k = 1,2, \ldots ,K$. The acquired CSI elements are stored at the BS for further use. The pilot sequences sent by different UEs are mutually orthogonal. We assume that the massive MIMO BS are able to perfectly estimate the uplink CSI based on the received pilot sequences, and then obtain the corresponding downlink CSI by exploiting TDD channel reciprocity.

*Secrecy Analysis:* We consider the worst case scenario that the massive MIMO eavesdropper has full knowledge of the pilot sequences, and it can perfectly estimate the corresponding CSI ${\mathbf {g}}_{k}$, $k = 1,2, \ldots ,K$, between itself and the $K$ UEs. Notwithstanding, it is unable to acquire any useful information about the main CSI ${\mathbf {h}}_{k}$ between the massive BS and the legitimate UEs at this stage. This is because all the channels are independent as stated in Section II, and no information of the main CSI ${\mathbf {h}}_{k}$ is involved during the uplink pilot training process from the massive MIMO eavesdropper’s point of view. Hence the only information that the massive MIMO eavesdropper can obtain at this stage is the CSI between itself and the $K$ lightweight UEs.

After channel estimation, the massive MIMO BS randomly chooses one antenna from among the large number of antennas it has. We assume that the $i$th antenna is uniformly and randomly selected from the $N_{b}$ antennas. It is noteworthy that the random antenna selection process is all done locally and quietly at the BS, no other nodes in the network can predict which antenna will be selected.

Then the massive MIMO BS transmits a common reference signal to the $K$ single-antenna UEs through the uniformly and randomly chosen $i$th antenna. The $K$ UEs have perfect knowledge of the reference signal. The length of the reference signal is $\lambda $, which satisfies the constraint $1\leq \lambda < T-\tau $. The reference signal is used as a phase rotation indicator, which informs the $K$ UEs the symbol phase they should change before they send messages to the massive MIMO BS on the uplink transmission. Note that the length of this reference signal is not long, since it is only used for assisting the lightweight UEs in acquiring the corresponding rotation phase. Thus the cost of this step is small.

By receiving the short reference signal radiated from the randomly chosen $i$th antenna at the BS, the $k$th UE is now able to estimate the corresponding CSI ${{h_{k,i}}}$ between itself and the $i$th antenna at the BS, where $k = 1,2, \ldots ,K$ and $i = 1,2, \ldots ,N_{b}$. We assume that the $K$ lightweight UEs can perfectly estimate the CSI ${{h_{k,i}}}$, and then obtain the phase information of the complex value ${{h_{k,i}}}$, i.e., ${\angle {h_{k,i}}}$, which will be used at the next stage.

*Secrecy Analysis:* We assume that the massive MIMO eavesdropper has perfect knowledge of the radiated reference signal, and it is able to perfectly estimate the CSI between itself and the $i$th antenna which is randomly selected at the BS based on the intercepted reference signal. However, the massive MIMO eavesdropper is still unable to learn which antenna is randomly selected, since the random antenna selection is done locally at the BS. More importantly, the number of BS antennas $N_{b}$ is large enough to prevent the eavesdropper from exhaustively testing out any useful information about the overall channel matrix between itself and the BS through the reference signal during one coherence interval, which in turn further ensures that the randomly selected antenna is kept strictly confidential. Moreover, even with unlimited antennas, the massive MIMO eavesdropper can not learn any knowledge about the CSI ${{h_{k,i}}}$, $k = 1,2, \ldots ,K$, at this stage due to the independence of different wireless channels. Therefore, the random rotation phase ${\angle {h_{k,i}}}$ is unknown to the massive MIMO eavesdropper and is kept strictly confidential as a secret key for the $K$ UEs only. The random antenna selection and phase rotation indication at this stage are somehow similar with the key generation and distribution operations in traditional cryptographic methods, respectively.

Now the $K$ UEs have secretly acquired the corresponding random rotation phase information after the operations presented above. The acquired ${\angle {h_{k,i}}}$, $k = 1,2, \ldots ,K$, at each UE is used to rotate the original information bearing symbol, as given by TeX Source\begin{equation} {s_{uospr,k}} = {s_{k}} \cdot {e^{j\angle {h_{k,i}}}}, \end{equation} where ${s_{uospr,k}}$ represents the random phase rotated symbol, $k = 1,2, \ldots ,K$ and $i = 1,2, \ldots ,N_{b}$. Then the randomly rotated symbol ${s_{uospr,k}}$ will be sent by UE $k$ instead of the original symbol ${s_{k}}$ on the uplink transmission. Therefore, the original information bearing symbol ${s_{k}}$ can be hidden from the overall uplink transmission as long as ${\angle {h_{k,i}}}$ is successfully kept secret from the massive MIMO eavesdropper.

We assume that the massive MIMO BS employs maximum ratio combining (MRC) receiver to detect the corresponding uplink signal from UE $k$, as given by TeX Source\begin{align} {y_{k}}=&\frac {{{{\left ({ {{{\mathbf {h}}_{k}}} }\right )}^{H}}}}{N_{b}}{{\mathbf {r}}_{uospr,b}}= \frac {{{{\left ({ {{{\mathbf {h}}_{k}}} }\right )}^{H}}{{\mathbf {h}}_{k}}}}{N_{b}}{s_{uospr,k}}\notag \\&+ \frac {{{{\left ({ {{{\mathbf {h}}_{k}}} }\right )}^{H}}}}{N_{b}}\sum \limits _{i = 1,i \ne k}^{K} {{{\mathbf {h}}_{i}}{s_{uospr,i}}} + \frac {{{{\left ({ {{{\mathbf {h}}_{k}}} }\right )}^{H}}}}{N_{b}}{{\mathbf {n}}_{b}}, \end{align} where ${{\mathbf {r}}_{uospr,b}}$ is obtained by replacing ${s_{k}}$ with ${s_{uospr,k}}$ and ${s_{i}}$ with ${s_{uospr,i}}$ in (3), and it denotes the *de facto* received signal at the massive MIMO BS; ${y_{k}}$ represents the output of the MRC receiver for UE $k$’s uplink information. Then the massive MIMO BS can acquire ${\hat s_{uospr,k}}$, which denotes the symbol estimation result of the randomly rotated symbol ${s_{uospr,k}}$, based on the receiver output ${y_{k}}$.

Finally, the massive MIMO BS can recover the original information bearing symbol by taking the following inverse operation TeX Source\begin{equation} {\hat s_{k}} = {\hat s_{uospr,k}} \cdot {e^{j\left ({ { - \angle {h_{k,i}}} }\right )}}, \end{equation} where $\angle {h_{k,i}}$ is obtained and stored at the BS channel estimation stage, and ${\hat s_{k}}$ is the final recovered result of the original information bearing symbol $s_{k}$ that UE $k$ intends to send on the uplink transmission.

Note that we use ‘UOSPR processing’ to denote and highlight the phase rotation operation at the lightweight UEs at this stage, since it is the critical part of the overall UOSPR secure transmission scheme.

*Secrecy Analysis:* At this stage, we consider the worst case scenario that the massive MIMO eavesdropper with infinite number of antennas is able to cancel all the interference and noise and perfectly intercept the *de facto* symbols transmitted by the $K$ UEs. This means that the massive MIMO eavesdropper can perfectly obtain the *de facto* symbols ${s_{uospr,k}}$, $k = 1,2, \ldots ,K$ transmitted by the $K$ UEs on the uplink. Nonetheless, the eavesdropper is still unable to recover the original information bearing symbol ${s_{k}}$, since it can not obtain any useful information about the corresponding random rotation phase ${\angle {h_{k,i}}}$ which is used to ‘encrypt’ the original symbols, according to the secrecy analysis above. Therefore, the original messages from the lightweight UEs are successfully secured on the uplink transmission.

These three stages of the UOSPR secure transmission scheme are specifically illustrated in Fig. 2, which actually presents the corresponding structure of the coherence interval. Moreover, as shown in Fig. 2, the stage B with red fill color is an optional choice to further enhance the secrecy performance if the coherence interval is long enough. In this case, the massive MIMO BS and the legitimate UEs can collaborate together to increase the frequency of random phase rotation during one coherence interval, which can more effectively confuse the massive MIMO eavesdropper. It is similar with increasing the secret key generation rate in traditional complexity based cryptographic methods. However, it is worth emphasizing that if the number of BS antennas is not large enough, the massive MIMO eavesdropper may benefit from the increase of the red ‘B’ operation, since it will also have more chance to learn the random selection process and exhaustively test out the original information. Therefore, we should make sure that there are enough number of antennas at the BS to perform the random antenna selection process, in which the level of ‘enough number’ is mainly determined by the frame parameters and wireless channel characteristics. This presents the key role of the massive MIMO BS in the UOSPR secure transmission scheme.

Furthermore, we can see that the process of the UOSPR scheme is not complex from the perspective of the lightweight single-antenna UEs. The lightweight UEs only need to perform two extra simple steps, i.e., short reference signal estimation and random phase rotation, comparing with general uplink protocols. Moreover, these two extra operations do not need the support of powerful signal processing and data computing capabilities. The corresponding complexity and cost are low while the uplink secrecy performance is well improved. This advantage makes the UOSPR scheme potentially suitable for network full of lightweight UEs on the uplink, e.g., IoT scenarios. Note that it is the massive MIMO BS who offers enough number of antennas to generate a good randomicity for encrypting the original information bearing symbols. This means that the large antenna array employed at the BS greatly alleviates the burden of the lightweight UEs on achieving favorable secrecy performance. It presents another pivotal role of the massive MIMO BS in the UOSPR scheme.

SECTION IV

The secrecy performance of the employed UOSPR secure transmission scheme is evaluated in this section. We assume that the $K$ UEs modulate the radiated uplink symbols with practical quadrature phase-shift-keying (QPSK) constellation, which is given by TeX Source\begin{align} \left [{ {\begin{array}{*{20}{c}} {\dfrac {\sqrt {2}}{2}\left ({ { - 1 + j} }\right )}& {\dfrac {\sqrt {2}}{2}\left ({ {1 + j} }\right )}\\[0.6pc] {\dfrac {\sqrt {2}}{2}\left ({ { - 1 - j} }\right )}& {\dfrac {\sqrt {2}}{2}\left ({ {1 - j} }\right )} \end{array}} }\right ]\!, \end{align} where these four complex points belong to the corresponding quadrants and the constellation values are normalized. The number of BS antennas is $N_{b} = 32, 64, 128, 256$, and the number of UEs is $K =16$. We assume that $N_{b} = 32$ is large enough to properly implement the random antenna selection process of the UOSPR scheme for the convenience of performance evaluation here. The transmit power $P_{k}$ of UE $k$ is normalized, then the transmit signal-to-noise ratio (SNR) of UE $k$ is defined as ${\mathrm {SNR}}_{b} = \frac {1}{\sigma _{b}^{2}}$ at the BS, and similarly ${\mathrm {SNR}}_{e} = \frac {1}{\sigma _{e}^{2}}$ at the eavesdropper. The MRC receiver is employed at the massive MIMO BS and the eavesdropper to detect the receiving signals.

Note that if the random rotation phase $\angle {h_{k,i}} \leq \frac {\pi }{4}$ or ${\angle {h_{k,i}} \ge \frac {7\pi }{4}}$, $k = 1,2, \ldots ,K$ and $i = 1,2, \ldots ,N_{b}$, the original information bearing symbol $s_{k}$ will not be rotated due to the employed QPSK modulation. Otherwise, $s_{k}$ will be rotated to the corresponding quadrant according to (5), and replaced by the constellation point in that quadrant. All the channel estimations are perfect as assumed before in this work. The analytical result in term of the symbol error rate (SER) at the massive MIMO eavesdropper is similar with the downlink case in [44]. In the worst case scenario that the eavesdropper has infinite number of antennas and can intercept the *de facto* transmitted symbol ${s_{uospr,k}}$, $k = 1,2, \ldots ,K$ perfectly by cancelling all the interference and noise on the uplink transmission, the SER of the eavesdropper is 0.75. Please refer to [44] for SER analysis in detail.

The symbols transmitted by the 1st UE on the uplink is chosen for simulation purpose. The SER simulation results as a function of the number of antennas at the massive MIMO BS and the massive MIMO eavesdropper when the UOSPR scheme is employed are presented in Fig. 3 and Fig. 4. 1000000 symbols are simulated for the case of 32, 64, 128 and 256 BS antennas. 5000000 symbols are simulated for the case of 1024, 2048, 4096 and 8192 eavesdropper antennas, which is far more than that at the BS. We assume that ${\mathrm {SNR}}_{b} = 5dB$ at the BS and ${\mathrm {SNR}}_{e} = 50dB$ at the eavesdropper, since the latter is much more powerful. The blue bars in Fig. 3 represent the SER results at the BS, and the red bar denotes the massive MIMO eavesdropper’s SER with 1024 antennas. It shows that the SER of the massive MIMO BS quickly decreases as the number of BS antennas grows. The reason is that the ability on cancelling the interference and noise is proportional to the number of BS antennas. However, we can see that the SER of the massive MIMO eavesdropper is very high and approximately 0.75, and the increase of eavesdropping antennas does not improve the SER performance at all as shown in Fig. 4. The data tip ‘X’ and ‘Y’ in Fig. 3 and Fig. 4 denote the result sequence and SER values, respectively. Note that in the simulation the number of eavesdropper antennas is set to several thousands in order to demonstrate that the eavesdropper can not recover the original symbols even with much more powerful massive MIMO. These simulations prove the corresponding analytical results. It demonstrates that even with many more antennas and much higher SNR than the BS, the eavesdropper is unable to break the UOSPR secure transmission scheme. The massive MIMO BS’s SER is much lower than that of the massive MIMO eavesdropper, which means the uplink information is successfully protected to a large extent.

Moreover, we present the signal constellation scatter results of the symbols before and after phase recover operation at the massive MIMO BS in Fig. 5 and Fig. 7 with original information bearing symbols ${\frac {\sqrt {2}}{2}\left ({ { - 1 + j} }\right )}$ in quadrant two, and Fig. 6 and Fig. 8 with original information bearing symbols ${\frac {\sqrt {2}}{2}\left ({ { 1 - j} }\right )}$ in quadrant four, respectively. The number of BS antennas for simulation is 64, and ${\mathrm {SNR}}_{b} = 5dB$. We can see that the initial output symbols of the MRC receiver at the BS are chaotically distributed in all the quadrants under the effects of random phase rotation, interference and noise as shown in Fig. 5 and Fig. 6. The chaotic symbols are then successfully rotated back to the second and fourth quadrant in Fig. 7 and Fig. 8 by taking the inverse operation according to (7), since the BS can acquire the phase rotation information.

Fig. 9 with original information bearing symbols in quadrant two and Fig. 10 with original information bearing symbols in quadrant four show the corresponding signal constellation scatter plots at the massive MIMO eavesdropper. The number of eavesdropper antennas for simulation is 1024, and ${\mathrm {SNR}}_{e} = 50dB$. It is obvious that the constellation results are much better than that at the BS. Nonetheless, it is unable to rotate the symbols back to the second and fourth quadrant which contain the original information bearing symbols, since the eavesdropper can not learn any useful information about the random phase rotation even with much more number of antennas. On the other hand, the massive MIMO BS is able to normally recover most of the original symbols although its constellation scatter plots are not so good as presented in Fig. 7 and Fig. 8. The scatter plots also indicate that the eavesdropper’s SER is approximately 0.75, since the points are almost uniformly distributed in the four quadrants, no matter which quadrant the original information bearing symbols are in. The eavesdropper can not distinguish the symbols due to the random phase rotation process. Furthermore, the massive MIMO eavesdropper may be deceived by the good constellation scatter plots in that it thinks it has received the correct confidential messages. The evaluation results above corroborate the secrecy analysis of the employed UOSPR scheme.

It is noteworthy that the secrecy performance simulation for the case of QPSK modulation above can be similarly applied to other practical finite constellation case.

SECTION V

More and more lightweight UEs appear in our life due to the coming of IoT and 5G era, and the security of uplink communication becomes more important. In this work, we present an alternative secure transmission scheme to protect the private information for lightweight UEs on the uplink. The UOSPR secure transmission scheme is employed to defend against the massive MIMO eavesdropper equipped with unlimited number of antennas on the uplink transmission for the lightweight single-antenna UEs in a single-cell scenario. We present the three stages and the corresponding coherence interval structure of the UOSPR scheme, and the secrecy analysis is provided in detail. The SER performance at the massive MIMO BS and the massive MIMO eavesdropper are investigated separately under certain assumptions. The simulation results corroborate the corresponding secrecy analysis of the UOSPR scheme. We show that the massive MIMO eavesdropper is unable to recover the major original information bearing symbols due to its high SER, while the massive BS with much fewer antennas can normally receive the information on the uplink. We present that the complexity of the UOSPR scheme is low from the perspective of the lightweight UEs, since only two extra simple operations are needed to implement the scheme comparing with traditional uplink protocols. This potentially makes it a candidate security approach for IoT like network which is full of lightweight UEs on the uplink transmission.

Note that optimistic assumptions are made in this paper, and more detailed theoretical analysis and the effects of imperfect CSI parameters are left for future work.

This work was supported in part by the National Natural Science Foundation of China under Grant 91338105 and Grant 61502518, the China Scholarship Council under Grant 201306110074, the Four-Year Doctoral Fellowship through The University of British Columbia, the Natural Sciences and Engineering Research Council of Canada, the Institute for Computing, Information, and Cognitive Systems/TELUS People and Planet Friendly Home Initiative at The University of British Columbia, TELUS, and other industry partners. The work of L. Shu was supported in part by the 2013 Special Fund of Guangdong Higher School Talent Recruitment, Educational Commission of Guangdong Province, China, under Project 2013KJCX0131, the Guangdong High-Tech Development Fund under Grant 2013B010401035, the 2013 top Level Talents Project in Sailing Plan of Guangdong Province, the National Natural Science Foundation of China under Grant 61401107, and the 2014 Guangdong Province Outstanding Young Professor Project. The work of J. J. P. C. Rodrigues has been partially supported by *Instituto de Telecomunicações*, Next Generation Networks and Applications Group (NetGNA), by National Funding from the FCT - *Fundação para a Ciência e Tecnologia* through the Pest-OE/EEI/LA0008/2013 Project, by Government of Russian Federation, Grant 074-U01, and by Finep, with resources from Funttel, Grant No. 01.14.0231.00, under the Radiocommunication Reference Center (CRR) project of the National Institute of Telecommunications (Inatel), Brazil.

Corresponding author: B. Chen

No Data Available

No Data Available

None

No Data Available

- This paper appears in:
- No Data Available
- Issue Date:
- No Data Available
- On page(s):
- No Data Available
- ISSN:
- None
- INSPEC Accession Number:
- None
- Digital Object Identifier:
- None
- Date of Current Version:
- No Data Available
- Date of Original Publication:
- No Data Available

Normal | Large

- Bookmark This Article
- Email to a Colleague
- Share
- Download Citation
- Download References
- Rights and Permissions

Comment Policy
comments powered by Disqus