Secure downlink transmission in the internet of things: How many antennas are needed?

Jianwei Hu, Nan Yang, Yueming Cai*

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    22 Citations (Scopus)

    Abstract

    Physical layer security is a promising way to secure the wireless communications in the Internet of Things (IoT). Motivated by the fact that the limited feedback resources in the IoT network would degrade the secrecy advantage of the multiple-antenna technique, we attempt to investigate the problem of how many transmit antennas should be utilized to perform secure communications. In particular, we consider the heterogeneous IoT downlink network and design a multiuser secure transmission scheme. In this scheme, the zero-forcing beamforming technique is adopted to serve the IoT legitimate users, and the remaining spatial freedoms are utilized to send artificial noise (AN) for confusing the passive eavesdroppers. Given the secrecy outage constraints, we derive the closed-form expression for the network secrecy throughput and formulate a non-convex optimization problem with multiple parameters, e.g., the number of transmit antennas, the wiretap codes, the feedback bits allocation strategy, and the power allocation ratio between the information bearing signal and the AN. To effectively tackle this problem, we develop an optimization framework involving the block coordinate descent algorithm and the 1-D search method. Simulation results validate the effectiveness of our proposed optimization framework and show that the optimal number of transmit antennas increases as the secrecy outage constraints become stricter, or the feedback resources become scarcer.

    Original languageEnglish
    Article number8335348
    Pages (from-to)1622-1634
    Number of pages13
    JournalIEEE Journal on Selected Areas in Communications
    Volume36
    Issue number7
    DOIs
    Publication statusPublished - Jul 2018

    Fingerprint

    Dive into the research topics of 'Secure downlink transmission in the internet of things: How many antennas are needed?'. Together they form a unique fingerprint.

    Cite this