4.7 Article

Secure Transmissions in Millimeter Wave Systems

Journal

IEEE TRANSACTIONS ON COMMUNICATIONS
Volume 65, Issue 5, Pages 2114-2127

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2017.2672661

Keywords

Physical layer security; millimeter wave; multipath; secrecy outage; secrecy throughput; artificial noise

Funding

  1. National High-Tech Research and Development Program of China [2015AA01A708]
  2. National Natural Science Foundation of China [61671364, 61172093]
  3. National Excellent Doctoral Dissertation of China [201340]
  4. New Century Excellent Talents Support Fund of China [NCET-13-0458]
  5. Science and Technology of Shaanxi Province [2015KJXX-01]
  6. Specialized Research Fund for the Doctoral Program of Higher Education of China [20130201130003]

Ask authors/readers for more resources

Exploiting millimeter wave is an effective way to meet the data traffic demand in the 5G wireless communication system. In this paper, we study secure transmissions under slow fading channels with multipath propagation in millimeter wave systems. Concerning the new propagation characteristics of millimeter wave, we investigate three transmission schemes, namely, maximum ratio transmitting (MRT) beamforming, artificial noise (AN) beamforming, and partial MRT (PMRT) beamforming. We evaluate the secrecy performance by analyzing both the secrecy outage probability (SOP) and the secrecy throughput for each scheme. Particularly, for the AN scheme, we derive a closed-form expression for the optimal power allocation ratio of the information signal power to the total transmit power that minimizes the SOP, as well as obtain an explicit solution on the optimal transmission parameters that maximize the secrecy throughput. By comparing the secrecy performances achieved by different strategies, we demonstrate that the secrecy performance of the millimeter wave system is significantly influenced by the relationship between the legitimate user's and the eavesdropper's spatially resolvable paths, which is different from the wireless systems with statistically independent channel models. In the absence of the common path between the legitimate user and the eavesdropper, MRT beamforming is the best scheme. In the presence of common paths, AN beamforming and PMRT beamforming show their respective superiorities depending on the transmit power and the number of common paths. Numerical results are provided to verify our theoretical analysis.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available