{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:39Z","timestamp":1774367379622,"version":"3.50.1"},"reference-count":20,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In this paper, a secure communication model for cognitive multi-user massive multiple-input multiple-output (MIMO) systems with underlay spectrum sharing is investigated. A secondary (cognitive) multi-user massive MIMO system is operated by using underlay spectrum sharing within a primary (licensed) multi-user massive MIMO system. A passive multi-antenna eavesdropper is assumed to be eavesdropping upon either the primary or secondary confidential transmissions. To this end, a physical layer security strategy is provisioned for the primary and secondary transmissions via artificial noise (AN) generation at the primary base-station (PBS) and zero-forcing precoders. Specifically, the precoders are constructed by using the channel estimates with pilot contamination. In order to degrade the interception of confidential transmissions at the eavesdropper, the AN sequences are transmitted at the PBS by exploiting the excess degrees-of-freedom offered by its massive antenna array and by using random AN shaping matrices. The channel estimates at the PBS and secondary base-station (SBS) are obtained by using non-orthogonal pilot sequences transmitted by the primary user nodes (PUs) and secondary user nodes (SUs), respectively. Hence, these channel estimates are affected by intra-cell pilot contamination. In this context, the detrimental effects of intra-cell pilot contamination and channel estimation errors for physical layer secure communication are investigated. For this system set-up, the average and asymptotic achievable secrecy rate expressions are derived in closed-form. Specifically, these performance metrics are studied for imperfect channel state information (CSI) and for perfect CSI, and thereby, the secrecy rate degradation due to inaccurate channel knowledge and intra-cell pilot contamination is quantified. Our analysis reveals that a physical layer secure communication can be provisioned for both primary and secondary massive MIMO systems even with the channel estimation errors and pilot contamination.<\/jats:p>","DOI":"10.3390\/e19070349","type":"journal-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T11:05:31Z","timestamp":1499684731000},"page":"349","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination"],"prefix":"10.3390","volume":"19","author":[{"given":"Hayder","family":"Al-Hraishawi","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL 62901, USA"}]},{"given":"Gayan","family":"Baduge","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL 62901, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1702-9075","authenticated-orcid":false,"given":"Rafael","family":"Schaefer","sequence":"additional","affiliation":[{"name":"Information Theory and Applications Chair, Technische Universit\u00e4t Berlin, Berlin 10587, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2014.6736746","article-title":"Five disruptive technology directions for 5G","volume":"52","author":"Boccardi","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3590","DOI":"10.1109\/TWC.2010.092810.091092","article-title":"Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas","volume":"9","author":"Marzetta","year":"2010","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TCOMM.2013.020413.110848","article-title":"Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems","volume":"61","author":"Ngo","year":"2013","journal-title":"IEEE Trans. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","article-title":"Safeguarding 5G wireless communication networks using physical layer security","volume":"53","author":"Yang","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information Theoretic Security","volume":"5","author":"Liang","year":"2009","journal-title":"Found. Trends Commun. Inf. Theor."},{"key":"ref_6","unstructured":"Bloch, M., and Barros, J. (2001). Physical-Layer Security: From Information Theory to Security Engineering, Cambridge University Press."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCOM.2015.7120012","article-title":"Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks","volume":"53","author":"Kapetanovic","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Schaefer, R.F., Boche, H., Khisti, A., and Poor, H.V. (2017). Information Theoretic Security and Privacy of Information Systems, Cambridge University Press.","DOI":"10.1017\/9781316450840"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1073\/pnas.1618130114","article-title":"Wireless physical layer security","volume":"114","author":"Poor","year":"2016","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1109\/JPROC.2009.2015717","article-title":"Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective","volume":"97","author":"Goldsmith","year":"2009","journal-title":"Proc. IEEE"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1109\/TIT.2008.2009584","article-title":"Capacity of cognitive interference channels with and without secrecy","volume":"55","author":"Liang","year":"2009","journal-title":"IEEE Trans. Inf. Theor."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/LWC.2015.2432802","article-title":"Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks with Secrecy Constraints","volume":"4","author":"Gabry","year":"2015","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4766","DOI":"10.1109\/TWC.2014.2337308","article-title":"Secure Transmission in Multicell Massive MIMO Systems","volume":"13","author":"Zhu","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1109\/TWC.2015.2500578","article-title":"Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems","volume":"15","author":"Zhu","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"8139","DOI":"10.1109\/TWC.2016.2612636","article-title":"Security-Constrained Power Allocation in MU-Massive-MIMO with Distributed Antennas","volume":"15","author":"Guo","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/JSTSP.2016.2600520","article-title":"Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference","volume":"10","author":"Wang","year":"2016","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/JSAC.2013.130206","article-title":"Performance of Conjugate and Zero-Forcing Beamforming in Large-Scale Antenna Systems","volume":"31","author":"Yang","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/TIT.2003.809594","article-title":"How much training is needed in multiple-antenna wireless links?","volume":"49","author":"Hassibi","year":"2003","journal-title":"IEEE Trans. Inf. Theor."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0100000001","article-title":"Random matrix theory and wireless communications","volume":"1","author":"Tulino","year":"2004","journal-title":"Found. Trends Commun. Inf. Theor."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Cramer, H. (1970). Random Variables and Probability Distributions, Cambridge University Press.","DOI":"10.1017\/CBO9780511470936"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/19\/7\/349\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:42:11Z","timestamp":1760208131000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/19\/7\/349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":20,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2017,7]]}},"alternative-id":["e19070349"],"URL":"https:\/\/doi.org\/10.3390\/e19070349","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,10]]}}}