SCIENCE CHINA Information Sciences, Volume 60, Issue 4: 040303(2017) https://doi.org/10.1007/s11432-016-9013-0

Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback

More info
  • ReceivedDec 17, 2016
  • AcceptedJan 22, 2017
  • PublishedMar 17, 2017


Physical layer (PHY) security is recently proved to enable improving the security of wireless communication networks. In downlink frequency division duplex (FDD) cloud radio access network (C-RAN), the performance of PHY security highly relies on the channel state information (CSI) which is usually acquired through the codebook-quantization-based technique at the transceiver. However, the conventional quantization method aggravates the leakage of privacy information in C-RAN under the eavesdropping environment. In this paper, a novel channel quantization method is investigated to improve the secrecy-rate performance of C-RAN by exploiting the high-dimension space geometry. Based on this method, it is proved that when the statistical distribution of the channel matrices of {both} the legitimate user {and} the eavesdropper is exploited, a win-win situation can be created where secrecy-rate gains are improved without sacrificing beamforming gains from the point of view of ergodic rate. Particularly, a secrecy-oriented criterion is devised to implement the proposed method for generating codebooks. Then a weighted Voronoi diagram (WVD) is formulated on the complex Grassmann manifold and finally, a vector quantization based algorithm is proposed to build up novel quantization codebooks iteratively. Simulation results further validate the superiority of our proposed codebooks over conventional codebooks in C-RAN systems.

Funded by

National Science and Technology Major Project(2016ZX03001016-005)

"source" : null , "contract" : "2014AA01A707"

National High-Tech R&D Program of China(863)

National Natural Science Foundation of China(61431011)



This work was supported by National Natural Science Foundation of China (Grant No. 61431011), National High-Tech R&D Program of China (863) (Grant No. 2014AA01A707), National Science and Technology Major Project (Grant No. 2016ZX03001016-005), and Fundamental Research Funds for the Central Universities.


[1] Blenk A, Basta A, Reisslein M, et al. Virtualization: survey on network virtualization hypervisors for software defined networking. IEEE Commun Surv Tut, 2016, 18: 655-685 CrossRef Google Scholar

[2] Liang C C, Yu F R. Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun Surv Tut, 2015, 17: 358-380 CrossRef Google Scholar

[3] Arslan M Y, Sundaresan K, Rangarajan S. Software-defined networking in cellular radio access networks: potential and challenges. IEEE Commun Mag, 2015, 53: 150-156 Google Scholar

[4] Xu D Y, Ren P Y, Du Q H, et al. Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int J Distrib Sens Netw, 2016, 12, doi: 10-156 Google Scholar

[5] Checko A, Christiansen H L, Yan Y, et al. Cloud RAN for mobile networks---a technology overview. IEEE Commun Surv Tut, 2015, 17: 405-426 CrossRef Google Scholar

[6] Peng M G, Wang C G, Lau , V , et al. Fronthaul-constrained cloud radio access networks: insights and challenges. IEEE Wirel Commun, 2015, 22: 152-160 CrossRef Google Scholar

[7] Chen M, Qian Y F, Mao S W, et al. Software-defined mobile networks security. Mob Netw Appl, 2016, 21: 729-743 CrossRef Google Scholar

[8] Mukherjee A, Fakoorian S A A, Huang J, et al. Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tut, 2014, 16: 1550-1573 CrossRef Google Scholar

[9] You J, Zhong Z D, Wang G P, et al. Security and reliability performance analysis for cloud radio access networks with channel estimation errors. IEEE Access, 2014, 2: 1348-1358 CrossRef Google Scholar

[10] Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644-654 CrossRef Google Scholar

[11] Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355-1387 CrossRef Google Scholar

[12] Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theory, 2010, 56: 3088-3104 CrossRef Google Scholar

[13] Bashar S, Ding Z, Li G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback. IEEE Trans Wirel Commun, 2011, 10: 1212-1223 CrossRef Google Scholar

[14] Lin C H, Tsai S H, Lin Y P. On quantization for masked beamforming secrecy systems. IEEE Trans Wirel Commun, 2015, 14: 5618-5628 Google Scholar

[15] Xu D Y, Ren P Y, Du Q H, et al. Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback. China Commun, 2015, 12: 147-159 Google Scholar

[16] Xu D Y, Du Q H, Ren P Y, et al. AF-based CSI feedback for user selection in multi-user MIMO systems. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), San Diego, 2015. 1--6. Google Scholar

[17] Yoo T, Jindal N, Goldsmith A. Multi-antenna downlink channels with limited feedback and user selection. IEEE J Sel Areas Commun, 2007, 25: 1478-1491 CrossRef Google Scholar

[18] Aurenhammer F. Voronoi diagrams---a survey of a fundamental geometric data structure. ACM Comput Surv, 1991, 23: 345-405 CrossRef Google Scholar

[19] Krikidis I, Ottersten B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling. IEEE Signal Process Lett, 2013, 20: 141-144 CrossRef Google Scholar

[20] Zhou X Y, Ganti R K, Andrews J G. Secure wireless network connectivity with multi-antenna transmission. IEEE Trans Wirel Commun, 2011, 10: 425-430 CrossRef Google Scholar

[21] Geraci G, Singh S, Andrews J G, et al. Secrecy rates in broadcast channels with confidential messages and external eavesdroppers. IEEE Trans Wirel Commun, 2014, 13: 2931-2943 CrossRef Google Scholar

[22] Love D J, Heath R W, Strohmer T. Grassmannian beamforming for multiple-input multiple-output wireless systems. IEEE Trans Inform Theory, 2003, 49: 2735-2747 CrossRef Google Scholar

[23] Cohen J E, Friedland S, Kato T, et al. Eigenvalue inequalities for products of matrix exponentials. Linear Algebra Appl, 1982, 45: 55-95 CrossRef Google Scholar

[24] Johnson C R, Bru R. The spectral radius of a product of nonnegative matrices. Linear Algebra Appl, 1990, 141: 227-240 CrossRef Google Scholar

[25] Roh J C, Rao B D. Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach. IEEE Trans Inform Theory, 2006, 52: 1101-1112 CrossRef Google Scholar

[26] Moon T K. The expectation-maximlization algorithm. IEEE Signal Process Mag, 1996, 13: 47-60 CrossRef Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号