On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach
Reads0
Chats0
TLDR
In this article , a joint relay selection and power allocation (JRP) method is developed where the destination and source aim for jamming the reception of both the untrusted relays and passive Eves.Abstract:
The physical layer security (PLS) of millimeter wave (mmWave) communication systems is investigated, where the secure source-to-destination communication is assisted by an untrusted relay selected from a group of them and there are also several passive eavesdroppers (Eves) in the network. In the considered system model, while the distributions of the untrusted relays and Eves follow a homogeneous Poisson Point Process (PPP). To maximize the instantaneous secrecy rate, a novel joint relay selection and power allocation (JRP) method is developed where the destination and source aim for jamming the reception of both the untrusted relays and passive Eves. New expressions of the optimal power allocation (OPA) are derived for both non-colluding Eves (NCE) and colluding Eves (CE). Subsequently, by considering the impact of potential blockages, new closed-form equations are derived for analyzing the system’s ergodic secrecy rate (ESR) and secrecy outage probability (SOP) for transmission over fading mmWave channels. Finally, numerical examples are provided for demonstrating the superiority of our proposed JRP method over the relevant benchmarks found in the literature. Interestingly, the ESR increases with the density of untrusted relays for both the NCE and CE scenarios, which is a benefit of the improved probability of selecting a relay with a stronger second-hop channel. Furthermore, in the low transmit power regime, employing relatively low mmWave frequencies achieves better ESR, while in the high transmit power regime, high mmWave frequencies provide higher ESR. read more
Citations
More filters
Proceedings ArticleDOI
Physical Layer Security in Untrusted Diamond Relay Networks With Imperfect Source-Relay Links
Shen Qian,Xin-Zhe He,Xiaobo Zhou +2 more
TL;DR: A two-untrusted-relay transmission scheme is proposed with lossy-forward (LF) relaying being utilized, which realizes the reliable and secure transmission of decoder-and-forward based relay networks with untrusted relays.
Journal ArticleDOI
Cooperative encryption over backscatter: Secure green communication for two-way energy harvesting relay networks
TL;DR: In this article , a backscatter jamming strategy was proposed by leveraging the information signals as the carrier, which can degrade the eavesdropping link without extra energy consumption, delay and strict synchronization requirement.
Journal ArticleDOI
Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions
TL;DR: In this paper , the authors investigate the security of a simple but practical IoT-based point-to-point communication which is facing with the above mentioned two attacks under some realistic assumptions.
Journal ArticleDOI
Does D2D Communication Always Benefit Physical-Layer Security?
TL;DR: In this paper , the authors investigated a cellular transmission mode assisted by the base station (cellular mode) and compared its secrecy performance with that of the D2D direct transmission (D2D mode).
Journal ArticleDOI
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks
TL;DR: In this article , the authors investigated the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untransmitted relay.
References
More filters
Journal ArticleDOI
Millimeter-Wave Cellular Wireless Networks: Potentials and Challenges
TL;DR: Measurements and capacity studies are surveyed to assess mmW technology with a focus on small cell deployments in urban environments and it is shown that mmW systems can offer more than an order of magnitude increase in capacity over current state-of-the-art 4G cellular networks at current cell densities.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI
Millimeter-Wave Enhanced Local Area Systems: A High-Data-Rate Approach for Future Wireless Networks
Amitava Ghosh,Timothy A. Thomas,Mark C. Cudak,Rapeepat Ratasuk,Prakash Moorut,Frederick W. Vook,Theodore S. Rappaport,George R. MacCartney,Shu Sun,Shuai Nie +9 more
TL;DR: A case is made for using mmWave for a fifth generation (5G) wireless system for ultradense networks by presenting an overview of enhanced local area (eLA) technology at mmWave with emphasis on 5G requirements, spectrum considerations, propagation and channel modeling, air-interface and multiantenna design, and network architecture solutions.
Journal ArticleDOI
Tractable Model for Rate in Self-Backhauled Millimeter Wave Cellular Networks
TL;DR: A general and tractable mmWave cellular model capturing these key trends and characterize the associated rate distribution is proposed and shows that, in sharp contrast to the interference-limited nature of UHF cellular networks, the spectral efficiency of mmWave networks also increases with the BS density, particularly at the cell edge.
Journal ArticleDOI
Relay selection for secure cooperative networks with jamming
TL;DR: The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers and jointly protects the primary destination against interference and eavesdropping and jams the reception of the eavesdropper.
Related Papers (5)
Relay selection and scaling law in destination assisted physical layer secrecy systems
Yupeng Liu,Athina P. Petropulu +1 more