4.7 Article

Secure Transmissions in Millimeter Wave Systems

期刊

IEEE TRANSACTIONS ON COMMUNICATIONS
卷 65, 期 5, 页码 2114-2127

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2017.2672661

关键词

Physical layer security; millimeter wave; multipath; secrecy outage; secrecy throughput; artificial noise

资金

  1. National High-Tech Research and Development Program of China [2015AA01A708]
  2. National Natural Science Foundation of China [61671364, 61172093]
  3. National Excellent Doctoral Dissertation of China [201340]
  4. New Century Excellent Talents Support Fund of China [NCET-13-0458]
  5. Science and Technology of Shaanxi Province [2015KJXX-01]
  6. Specialized Research Fund for the Doctoral Program of Higher Education of China [20130201130003]

向作者/读者索取更多资源

Exploiting millimeter wave is an effective way to meet the data traffic demand in the 5G wireless communication system. In this paper, we study secure transmissions under slow fading channels with multipath propagation in millimeter wave systems. Concerning the new propagation characteristics of millimeter wave, we investigate three transmission schemes, namely, maximum ratio transmitting (MRT) beamforming, artificial noise (AN) beamforming, and partial MRT (PMRT) beamforming. We evaluate the secrecy performance by analyzing both the secrecy outage probability (SOP) and the secrecy throughput for each scheme. Particularly, for the AN scheme, we derive a closed-form expression for the optimal power allocation ratio of the information signal power to the total transmit power that minimizes the SOP, as well as obtain an explicit solution on the optimal transmission parameters that maximize the secrecy throughput. By comparing the secrecy performances achieved by different strategies, we demonstrate that the secrecy performance of the millimeter wave system is significantly influenced by the relationship between the legitimate user's and the eavesdropper's spatially resolvable paths, which is different from the wireless systems with statistically independent channel models. In the absence of the common path between the legitimate user and the eavesdropper, MRT beamforming is the best scheme. In the presence of common paths, AN beamforming and PMRT beamforming show their respective superiorities depending on the transmit power and the number of common paths. Numerical results are provided to verify our theoretical analysis.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据