scispace - formally typeset
Open AccessJournal ArticleDOI

On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach

- 01 Jan 2022 - 
- Vol. 17, pp 53-68
Reads0
Chats0
TLDR
In this article , a joint relay selection and power allocation (JRP) method is developed where the destination and source aim for jamming the reception of both the untrusted relays and passive Eves.
Abstract
The physical layer security (PLS) of millimeter wave (mmWave) communication systems is investigated, where the secure source-to-destination communication is assisted by an untrusted relay selected from a group of them and there are also several passive eavesdroppers (Eves) in the network. In the considered system model, while the distributions of the untrusted relays and Eves follow a homogeneous Poisson Point Process (PPP). To maximize the instantaneous secrecy rate, a novel joint relay selection and power allocation (JRP) method is developed where the destination and source aim for jamming the reception of both the untrusted relays and passive Eves. New expressions of the optimal power allocation (OPA) are derived for both non-colluding Eves (NCE) and colluding Eves (CE). Subsequently, by considering the impact of potential blockages, new closed-form equations are derived for analyzing the system’s ergodic secrecy rate (ESR) and secrecy outage probability (SOP) for transmission over fading mmWave channels. Finally, numerical examples are provided for demonstrating the superiority of our proposed JRP method over the relevant benchmarks found in the literature. Interestingly, the ESR increases with the density of untrusted relays for both the NCE and CE scenarios, which is a benefit of the improved probability of selecting a relay with a stronger second-hop channel. Furthermore, in the low transmit power regime, employing relatively low mmWave frequencies achieves better ESR, while in the high transmit power regime, high mmWave frequencies provide higher ESR.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Physical Layer Security in Untrusted Diamond Relay Networks With Imperfect Source-Relay Links

TL;DR: A two-untrusted-relay transmission scheme is proposed with lossy-forward (LF) relaying being utilized, which realizes the reliable and secure transmission of decoder-and-forward based relay networks with untrusted relays.
Journal ArticleDOI

Cooperative encryption over backscatter: Secure green communication for two-way energy harvesting relay networks

TL;DR: In this article , a backscatter jamming strategy was proposed by leveraging the information signals as the carrier, which can degrade the eavesdropping link without extra energy consumption, delay and strict synchronization requirement.
Journal ArticleDOI

Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions

TL;DR: In this paper , the authors investigate the security of a simple but practical IoT-based point-to-point communication which is facing with the above mentioned two attacks under some realistic assumptions.
Journal ArticleDOI

Does D2D Communication Always Benefit Physical-Layer Security?

TL;DR: In this paper , the authors investigated a cellular transmission mode assisted by the base station (cellular mode) and compared its secrecy performance with that of the D2D direct transmission (D2D mode).
Journal ArticleDOI

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

TL;DR: In this article , the authors investigated the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untransmitted relay.
References
More filters
Journal ArticleDOI

Millimeter-Wave Cellular Wireless Networks: Potentials and Challenges

TL;DR: Measurements and capacity studies are surveyed to assess mmW technology with a focus on small cell deployments in urban environments and it is shown that mmW systems can offer more than an order of magnitude increase in capacity over current state-of-the-art 4G cellular networks at current cell densities.
Journal ArticleDOI

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI

Millimeter-Wave Enhanced Local Area Systems: A High-Data-Rate Approach for Future Wireless Networks

TL;DR: A case is made for using mmWave for a fifth generation (5G) wireless system for ultradense networks by presenting an overview of enhanced local area (eLA) technology at mmWave with emphasis on 5G requirements, spectrum considerations, propagation and channel modeling, air-interface and multiantenna design, and network architecture solutions.
Journal ArticleDOI

Tractable Model for Rate in Self-Backhauled Millimeter Wave Cellular Networks

TL;DR: A general and tractable mmWave cellular model capturing these key trends and characterize the associated rate distribution is proposed and shows that, in sharp contrast to the interference-limited nature of UHF cellular networks, the spectral efficiency of mmWave networks also increases with the BS density, particularly at the cell edge.
Journal ArticleDOI

Relay selection for secure cooperative networks with jamming

TL;DR: The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers and jointly protects the primary destination against interference and eavesdropping and jams the reception of the eavesdropper.
Related Papers (5)