Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback


Physical layer (PHY) security is recently proved to enable improving the security of wireless communication networks. In downlink frequency division duplex (FDD) cloud radio access network (C-RAN), the performance of PHY security highly relies on the channel state information (CSI) which is usually acquired through the codebook-quantization-based technique at the transceiver. However, the conventional quantization method aggravates the leakage of privacy information in C-RAN under the eavesdropping environment. In this paper, a novel channel quantization method is investigated to improve the secrecy-rate performance of C-RAN by exploiting the high-dimension space geometry. Based on this method, it is proved that when the statistical distribution of the channel matrices of both the legitimate user and the eavesdropper is exploited, a win-win situation can be created where secrecy-rate gains are improved without sacrificing beamforming gains from the point of view of ergodic rate. Particularly, a secrecy-oriented criterion is devised to implement the proposed method for generating codebooks. Then a weighted Voronoi diagram (WVD) is formulated on the complex Grassmann manifold and finally, a vector quantization based algorithm is proposed to build up novel quantization codebooks iteratively. Simulation results further validate the superiority of our proposed codebooks over conventional codebooks in C-RAN systems.

This is a preview of subscription content, log in to check access.


  1. 1

    Blenk A, Basta A, Reisslein M, et al. Virtualization: survey on network virtualization hypervisors for software defined networking. IEEE Commun Surv Tut, 2016, 18: 655–685

  2. 2

    Liang C C, Yu F R. Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun Surv Tut, 2015, 17: 358–380

  3. 3

    Arslan M Y, Sundaresan K, Rangarajan S. Software-defined networking in cellular radio access networks: potential and challenges. IEEE Commun Mag, 2015, 53: 150–156

  4. 4

    Xu D Y, Ren P Y, Du Q H, et al. Hybrid secure beamforming and vehicle selection using hierarchical agglomerative clustering for C-RAN-based vehicle-to-infrastructure communications in vehicular cyber-physical systems. Int J Distrib Sens Netw, 2016, 12, doi: 10.1177/1550147716662783

  5. 5

    Checko A, Christiansen H L, Yan Y, et al. Cloud RAN for mobile networks—a technology overview. IEEE Commun Surv Tut, 2015, 17: 405–426

  6. 6

    Peng M G, Wang C G, Lau, V, et al. Fronthaul-constrained cloud radio access networks: insights and challenges. IEEE Wirel Commun, 2015, 22: 152–160

  7. 7

    Chen M, Qian Y F, Mao S W, et al. Software-defined mobile networks security. Mob Netw Appl, 2016, 21: 729–743

  8. 8

    Mukherjee A, Fakoorian S A A, Huang J, et al. Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surv Tut, 2014, 16: 1550–1573

  9. 9

    You J, Zhong Z D, Wang G P, et al. Security and reliability performance analysis for cloud radio access networks with channel estimation errors. IEEE Access, 2014, 2: 1348–1358

  10. 10

    Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inform Theory, 1976, 22: 644–654

  11. 11

    Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355–1387

  12. 12

    Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theory, 2010, 56: 3088–3104

  13. 13

    Bashar S, Ding Z, Li G Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback. IEEE Trans Wirel Commun, 2011, 10: 1212–1223

  14. 14

    Lin C H, Tsai S H, Lin Y P. On quantization for masked beamforming secrecy systems. IEEE Trans Wirel Commun, 2015, 14: 5618–5628

  15. 15

    Xu D Y, Ren P Y, Du Q H, et al. Joint dynamic clustering and user scheduling for downlink cloud radio access network with limited feedback. China Commun, 2015, 12: 147–159

  16. 16

    Xu D Y, Du Q H, Ren P Y, et al. AF-based CSI feedback for user selection in multi-user MIMO systems. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), San Diego, 2015. 1–6

  17. 17

    Yoo T, Jindal N, Goldsmith A. Multi-antenna downlink channels with limited feedback and user selection. IEEE J Sel Areas Commun, 2007, 25: 1478–1491

  18. 18

    Aurenhammer F. Voronoi diagrams—a survey of a fundamental geometric data structure. ACM Comput Surv, 1991, 23: 345–405

  19. 19

    Krikidis I, Ottersten B. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling. IEEE Signal Process Lett, 2013, 20: 141–144

  20. 20

    Zhou X Y, Ganti R K, Andrews J G. Secure wireless network connectivity with multi-antenna transmission. IEEE Trans Wirel Commun, 2011, 10: 425–430

  21. 21

    Geraci G, Singh S, Andrews J G, et al. Secrecy rates in broadcast channels with confidential messages and external eavesdroppers. IEEE Trans Wirel Commun, 2014, 13: 2931–2943

  22. 22

    Love D J, Heath R W, Strohmer T. Grassmannian beamforming for multiple-input multiple-output wireless systems. IEEE Trans Inform Theory, 2003, 49: 2735–2747

  23. 23

    Cohen J E, Friedland S, Kato T, et al. Eigenvalue inequalities for products of matrix exponentials. Linear Algebra Appl, 1982, 45: 55–95

  24. 24

    Johnson C R, Bru R. The spectral radius of a product of nonnegative matrices. Linear Algebra Appl, 1990, 141: 227–240

  25. 25

    Roh J C, Rao B D. Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach. IEEE Trans Inform Theory, 2006, 52: 1101–1112

  26. 26

    Moon T K. The expectation-maximlization algorithm. IEEE Signal Process Mag, 1996, 13: 47–60

Download references


This work was supported by National Natural Science Foundation of China (Grant No. 61431011), National High-Tech R&D Program of China (863) (Grant No. 2014AA01A707), National Science and Technology Major Project (Grant No. 2016ZX03001016-005), and Fundamental Research Funds for the Central Universities.

Author information

Correspondence to Pinyi Ren.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Xu, D., Ren, P., Du, Q. et al. Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback. Sci. China Inf. Sci. 60, 040303 (2017).

Download citation


  • C-RAN
  • virtualization
  • physical layer security
  • Grassmann manifold
  • channel quantization