Browse > Article
http://dx.doi.org/10.3837/tiis.2019.01.007

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI  

XU, Yunjia (National Digital Switching System Engineering & Technological Research Center)
HUANG, Kaizhi (National Digital Switching System Engineering & Technological Research Center)
HU, Xin (National Digital Switching System Engineering & Technological Research Center)
ZOU, Yi (National Digital Switching System Engineering & Technological Research Center)
CHEN, Yajun (National Digital Switching System Engineering & Technological Research Center)
JIANG, Wenyu (National Digital Switching System Engineering & Technological Research Center)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.1, 2019 , pp. 110-132 More about this Journal
Abstract
To ensure reliable and secure communication in heterogeneous cellular network (HCN) with imperfect channel state information (CSI), we proposed a coordinated multipoint (CoMP) transmission scheme based on dual-threshold optimization, in which only base stations (BSs) with good channel conditions are selected for transmission. First, we present a candidate BSs formation policy to increase access efficiency, which provides a candidate region of serving BSs. Then, we design a CoMP networking strategy to select serving BSs from the set of candidate BSs, which degrades the influence of channel estimation errors and guarantees qualities of communication links. Finally, we analyze the performance of the proposed scheme, and present a dual-threshold optimization model to further support the performance. Numerical results are presented to verify our theoretical analysis, which draw a conclusion that the CoMP transmission scheme can ensure reliable and secure communication in dense HCNs with imperfect CSI.
Keywords
Dense heterogeneous cellular networks; imperfect CSI; physical layer security; CoMP transmission;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Saeed Sheikhzadeh, Mohammad R. Javan and Nader Mokari, "Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary," in Proc. of Communication and Information Theory (IWCIT), 2017 IEEE, pp. 1-5, 2017.
2 Huang J, Yin Y, Zhao Y, et al. "A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks," IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 4, pp. 475-486, 2016.   DOI
3 Huang J, Hang S, Xing C, et al, "Game-Theoretic Power Control Mechanisms for Device-to-Device Communications Underlaying Cellular System," IEEE Transactions on Vehicular Technology, 2018, in print.
4 Huang J, Xing C C, Qian Y, et al. "Resource Allocation for Multi-cell Device-to-Device Communications Underlaying 5G Networks: A Game-Theoretic Mechanism with Incomplete Information," IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2557-2570, 2018.   DOI
5 Wang HM, Wang C, Zheng TX, et al, "Impact of artificial noise on cellular networks: a stochastic geometry approach," IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7390-7404, 2016.   DOI
6 Zheng TX and Wang HM, "Optimal power allocation for artificial noise under imperfect csi against spatially random eavesdroppers," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8812-8817, 2016.   DOI
7 Mu P, Li Z and Wang B, "Secure on-off transmission in slow fading wiretap channel with imperfect CSI," IEEE Transactions on Vehicular Technology, vol. 66, no. 10, pp. 9582-9586, 2017.   DOI
8 Al-Hraishawi H, Baduge G and Schaefer R, "Artificial noise-aided physical layer security in underlay cognitive massive MIMO systems with pilot contamination," Entropy, vol. 19, no. 7, pp. 349-370, 2017.   DOI
9 He B, Zhou X, "Secure on-off transmission design with channel estimation errors," IEEE Transactions on Information Forensics Security, vol. 8, no. 12, pp. 1923-1936, 2013.   DOI
10 Mukherjee A and Swindlehurst A L, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Transactions on Signal Processing, vol. 59, no. 1, pp. 351-361, 2010.   DOI
11 Tourki K, Hasna M O, "Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI," IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 6273-6283, 2016.   DOI
12 Chen X, Chen HH, "Physical layer security in multi-cell miso downlinks with incomplete CSI-a unified secrecy performance analysis," IEEE Transactions on Signal Processing, vol. 62, no. 23, pp. 6286-6297, 2014.   DOI
13 Wang W, Lv T and Gao H, "Robust beamforming and power allocation for secrecy in DF relay networks with imperfect channel state information," IEEE Access, vol. 1, no. 1, pp. 9520-9527, 2017.
14 Li B, Fei Z, and Chen H, "Robust artificial noise-aided secure beamforming in wireless-powered non-regenerative relay networks," IEEE Access, vol. 4, pp. 7921-7929, 2016.   DOI
15 Li B and Fei Z, "Robust beamforming and cooperative jamming for secure transmission in DF relay systems," EURASIP Journal on Wireless Communications and Networking, vol. 68, no. 1, pp. 1-11, 2016.
16 Wang Y, Liang B and Xu Y, "A two-stage rank selection scheme in downlink CoMP transmission networks," in Proc. of IEEE International Conference on Communications (ICC), 2016 IEEE, pp.1-6, 2016.
17 Wang L, Cai YM, Zou YL, et al, "Joint relay and jammer selection improves the physical layer security in the face of csi feedback delays," IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6259-6274, 2016.   DOI
18 D. Lee, H. Seo, B. Clerckx, et al, "Coordinated multipoint transmission and reception in LTE-Advanced: deployment scenarios and operational challenges," IEEE Communications Magazine, vol. 50, no. 2, pp. 148-155, 2012.   DOI
19 Nigam G, Minero P and Haenggi M, "Coordinated multipoint joint transmission in heterogeneous networks," IEEE Transactions on Communications, vol. 62, no. 11, pp. 4134-4146, 2014.   DOI
20 Xu M, Tao X, Yang F, et al, "Enhancing secured coverage with comp transmission in heterogeneous cellular networks," IEEE Communications Letters, vol. 20, no. 11, pp. 2272-2275, 2016.   DOI
21 B. Hassibi and B. Hochwald, "How much training is needed in multipleantenna wireless links?" IEEE Transactions on Information Theory, vol. 49, no. 4, pp.951-963, 2003.   DOI
22 Jo HS, Sang YJ, Xia P, et al, "Heterogeneous cellular networks with flexible cell association: a comprehensive downlink SINR analysis," IEEE Transactions on Wireless Communications, vol. 11, no. 10, pp. 3484-3495, 2011.   DOI
23 Lv T, Gao H, Yang S, "Secrecy transmit beamforming for heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 33, no. 6, pp. 1154-1170, 2015.   DOI
24 Wang CX, Haider F, Gao X, et al, "Cellular architecture and key technologies for 5G wireless communication networks," IEEE Communications Magazine, vol. 52, no. 2, pp. 122-130, 2014.   DOI
25 Yang X and Fapojuwo AO, "Coverage probability analysis of heterogeneous cellular networks in rician/rayleigh fading environments," IEEE Communications Letters, vol. 19, no. 7, pp. 1197-1200, 2015.   DOI
26 Wang HM, Zheng TX, Yuan J, et al, "Physical layer security in heterogeneous cellular networks," IEEE Transactions on Communications, vol. 64, no. 3, pp. 1204-1219, 2016.   DOI
27 Wu H, Tao X, Li N, et al, "Secrecy outage probability in multi-rat heterogeneous networks," IEEE Communications Letters, vol. 20, no. 1, pp. 53-56, 2016.   DOI
28 Zheng TX, Wang HM, Lee MH, "Multi-antenna transmission in downlink heterogeneous cellular networks under a threshold-based mobile association policy," IEEE Transactions on Communications, vol. 65, no. 1, pp. 244-256, 2017.   DOI
29 Yan S, Shang Y, Zhang X, et al, "An artificial noise scheme for secure communication in heterogeneous D2D and cellular networks," in Proc. of Vehicular Technology Conference (VTC-Fall), 2017 IEEE.
30 Zhong Z, Luo W, Peng J, et al, "Secrecy performance analysis of cooperative transmission and co-operative jamming for multi-tier heterogeneous cellular networks," Science China Information sciences, vol. 46, no. 1, pp. 33-48, 2016.
31 Zheng TX, Yang Q, Zhang Y, et al, "Physical layer security in distributed wireless networks using full-duplex receiver jamming," in Proc. of Globecom Workshops, 2017 IEEE.