Skip to main content
Entropy logoLink to Entropy
. 2019 Apr 22;21(4):427. doi: 10.3390/e21040427

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

Yi Song 1,2, Weiwei Yang 1,*, Zhongwu Xiang 1, Yiliang Liu 3, Yueming Cai 1
PMCID: PMC7514916  PMID: 33267141

Abstract

Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link blockages are taken into account. For the secure transmission in the presence of spatially random eavesdroppers, an adaptive transmission scheme is adopted, for which sector secrecy guard zone and artificial noise (AN) are employed to enhance secrecy performance. When there exists no eavesdroppers within the sector secrecy guard zone, the transmitter only transmits information-bearing signal, and, conversely, AN along with information-bearing signal are transmitted. The closed-form expressions for secrecy outage probability (SOP), connection outage probability (COP) and secrecy throughput are derived under stochastic geometry. Then, we evaluate the effect of the sector secrecy guard zone and AN on the secrecy performance. Our results reveal that the application of the sector secrecy guard zone and AN can significantly improve the security of the system, and blockages also can be utilized to improve secrecy performance. An easy choice of transmit power and power allocation factor is provided for achieving higher secrecy throughput. Furthermore, increasing the density of eavesdroppers not always deteriorates the secrecy performance due to the use of the sector secrecy guard zone and AN.

Keywords: physical layer security, millimeter wave, sector secrecy guard zone, artificial noise

1. Introduction

In recent years, data traffic increases significantly with the rapid popularization of various mobile intelligent devices and the growth of wireless data, and millimeter wave (mmWave) communication is an especially promising approach to meet the data traffic demand in the 5G and beyond wireless communication system because of the abundant available bandwidth of mmWave frequency [1,2]. There have been plenty of works presented in terms of achievable rate and coverage for mmWave communication system [3,4,5]. However, due to the wireless characteristic of electromagnetic wave and the openness of wireless channel, security remains a challenge to the design of mmWave systems. In this vein, there has been a heightened interest for safeguarding complex wireless networks by physical layer security (PLS).

The main idea of PLS is to make use of the normal randomness of wireless communication channel to guarantee that the confidential information is transferred to the legitimate receiver and that the confidential information will not be decoded by illegal users [6,7,8,9,10]. Reference [11] provided a detailed, transparent and accurate information on the latest developments in the use of collaborative techniques to improve PLS. In addition, different cooperation technologies were classified, and their merits and demerits were discussed. It showed that the design of PLS schemes was still an important research field in 5G networks security. Recently, various technologies, like multiple-antenna, wiretap coding and signal processing technologies [12,13,14], especially guard zone and artificial noise (AN) [15,16], have become effective methods to enhance PLS. Using AN to enhance the reliability of legitimate links and interfere with eavesdropping links, so as to enlarge the gap between legitimate links and eavesdropping links to improve security. For different network applications, References [17,18] proposed the secrecy enhancement by using secrecy protected zone and AN, and discussed the relationship among protected zone, the transmission power and AN. In [19], the secrecy guard zone protocol was studied for achieving the secure transmission in an underlay cognitive radio network. However, all the aforementioned works on secrecy guard zone are only considered in the conventional microwave networks; they can not be directly applied and need to be re-evaluated in an mmWave system because of the unique characteristics of the mmWave communication system.

PLS in mmWave systems has attracted interest with enthusiasm [20,21,22,23]. The characteristics of mmWave communication system, such as larger bandwidth, large antenna arrays, directionality and short range transmission, could provide stronger PLS for mmWave system. Using analog beamforming in the mmWave base station, the secrecy throughput was analyzed from the perspectives of delay-tolerant and delay-limited transmissions in [24]. Considering the characteristics of mmWave cellular networks, Referecne [25] studied the secrecy performance of the noise-limited and the AN-assisted mmWave networks under the stochastic geometry framework. Referecne [26] examined the impact of AN on the secrecy rate; it was shown that power allocation between the information signal and AN need to be carefully determined for secrecy performance enhancement. A discrete angular domain channel model considering spatial discernibility path was proposed in [27], and three secure transmission schemes were investigated by depending on whether there was a common path between the destination and the eavesdropper. Although many insightful conclusions have been drawn in [25,27,28], the effects of blockages and the information leakage problem of the side lobe are not considered, but they are assumed to be ignored. In fact, blockages have different effects on communications in different environments, and side lobe may also lead to information leakage. On the other hand, directional beamforming is an important technique for mmWave systems because it provides array gains which overcome the huge path loss and acquire adequate link margins [4]. For mathematical tractability [29], when the simple maximum signal-to-noise ratio (SNR) beam steering is assumed, it is meaningful to approximate the actual array pattern with the sector pattern, where the directional gains of the main lobe and the side lobe are constant. The approximation of the sector mode makes it possible to describe the complex beamforming mode. Nevertheless, the locations of eavesdroppers in mmwave wiretap channels are randomly distributed, thus they may be located in signal beams and then could intercept confidential information. However, for a mmWave wiretap network, comprehensive secrecy performance analysis has not been provided under a sector secrecy guard zone, which motivates our work.

In this paper, we investigated secrecy performance under the Nakagami fading channel in a mmWave wiretap network. In order to improve the secrecy performance of mmWave wiretap network, a secrecy guard zone is introduced around the transmitter, in which eavesdroppers are not allowed to roam. It is assumed that the eavesdroppers can be detected, provided that they enter secrecy guard zone. Considering a more practical mmWave communication scenario, the effects of blockage are taken into account such that links are either line-of-sight (LOS) or non-line-of-sight (NLOS). In our prior conference paper [30], we discussed how to use sector guard zone in mmWave networks. Based on our previous work, assuming the transmitter is capable of detecting the existence of eavesdroppers in the finite guard zone, an adaptive transmission scheme is adopted for secrecy transmission. Our diversified contributions and insights are listed as follows:

  • According to the characteristics of mmWave beam pattern, both the main lobe and side lobe are taken into consideration. Specifically, a sector secrecy guard zone model is considered to achieve theoretical design and analysis. Depending on the locations of eavesdroppers detected by a transmitter, an adaptive transmission scheme is proposed which chooses two types of transmission strategies adaptively. The fist-type is direct transmission when there exists no eavesdroppers in the sector secrecy guard zone and the second-type is the AN assisted transmission when one or more eavesdroppers in the sector secrecy guard zone.

  • Stochastic geometry is adopted in proposed mmWave wiretap network to characterize the random spatial locations of eavesdroppers. The closed-form expressions of secrecy outage probability (SOP),connection outage probability (COP) and secrecy throughput are derived in the proposed scheme. In addition, we provide a further insight of the system parameters, i.e., transmit power, power allocation factor, secrecy guard zone radius and central angle, blockage density, antenna gain, and the intensity of the eavesdroppers into secrecy performance.

  • The results show that enlarging the radius of sector secrecy guard zone improves secrecy performance. In addition, recruiting AN also enhances secrecy performance especially when the density of eavesdroppers is dense. In addition, blockage plays an important role in the transmission of mmWave, which can be utilized to improve secrecy performance. Furthermore, in our adaptive transmission scheme, increasing the density of eavesdroppers not always deteriorates the secrecy performance. Ultimately, simulations provide an easy choice of transmit power and power allocation factor for achieving higher secrecy throughput.

The remainder of this paper is organized as follows. Section 2 presents the system model and the performance metric. Section 3 introduces the secure transmission strategies. Section 4 derives the expressions of secrecy performance for adaptive transmission scheme. Numerical and simulation results verified our theoretical analysis are presented in Section 5. Finally, we conclude this paper in Section 6.

2. System Description and Performance Metrics

2.1. System Description

Let’s consider a mmWave wiretap network, which consists of a transmitter, a legitimate receiver and multiple random distributed eavesdroppers, as shown in Figure 1. The transmitter equipped with M multiple antennas uses directional beamforming for transmitting the confidential information. Both the legitimate receiver and the eavesdroppers equip a single antenna [31]. Furthermore, the locations of eavesdroppers, denoted by ΦE, are modeled as an independent homogeneous Poisson point process (HPPP) with density λE. Without loss of generality, similar to [32], a sector model is used to analyze the beam pattern in this paper, particularly

GSθ=MS,ifθθS,mS,otherwise, (1)

where MS represents the main lobe gain with the beam width θS, and mS represents the array gain of side lobe. We assume that the transmitter can get the perfect channel state information (CSI) of the legitimate receiver; then, they can trim their antenna steering orientation array to their legitimate receiver and maximize the directivity gains. In practical terms, estimating the CSI may be a nontrivial task, so our work actually provides an upper bound on achievable secrecy performance. In this model, the eavesdroppers have been in the attempt to intercept the confidential information of the system, the CSIs of eavesdroppers are assumed to be unknown at the transmitter. The nearest eavesdropper is not necessarily the most detrimental one, but the one possessing the best channel to the transmitter. In addition, we consider non-colluding eavesdroppers in this work.

Figure 1.

Figure 1

Network topology for the considered mmWave wiretap network. A sector secrecy guard zone is employed to approximate the beamforming pattern. Φ1, Φ2, Φ3 indicate the different areas where the eavesdroppers are located.

The secrecy performance of the system is further improved by using the sector secrecy guard zone and AN. It is assumed that the eavesdroppers can be detected by scanning nearby eavesdropping devices before transmission [17,18], provided that they are close enough to the transmitter. Therefore, a sector secrecy guard zone having a radius of r is introduced, and the eavesdroppers may be in or out of the sector secrecy guard zone. Therefore, a sector secrecy guard zone having a radius of r is introduced, and the eavesdroppers may be in or out of the sector secrecy guard zone. Similar to the secrecy guard zone mechanism in Referecne [17], considering the characteristics of mmWave beam pattern, we model the finite range around the transmitter as a sector secrecy guard zone with radius r and central angle θS. Considering the generalized fading environment, mmWave communication channel is modeled as a Nakagami fading model. It is different from [33], which studied the secrecy performance of random multiple-input multiple- output (MIMO) wireless networks based on homogeneous Poisson point process (HPPP) over the α-μ fading channel. It is worth pointing out that the estimation of mmWave channel is more consistent with the actual communication system, but it is beyond the scope of this paper.

According to the characteristics of mmWave in an outdoor scenario, the confidential information reaches to the legitimate receiver may be via LOS or NLOS [26]. According to 3GPP standards and the blockage model with random shape theory [34], the probability of a LOS with distance rd is represented by PLrd, while the NLOS probability is PNrd. The probability PLrd and PNrd are given as PLrd=eβrd or PNrd=1eβrd, which can be acquired from stochastic blockage models or field measurements, where β is the blockage density.

In light of the pass-loss model and small-scale fading presented in [35], the channel gain received by the legitimate receiver can be expressed as MShD2LrD and the eavesdroppers can be expressed as MShE2LrE or mshE2LrE, where both hD2 and hE2 are normalized Gamma random variable with following ΓNL,11NLNL or ΓNN,11NNNN, rD and rE denote the distance from the transmitter to the legitimate receiver and the distance from the transmitter to the eavesdropper, NL,NN are the Nakagami fading parameter of LOS and NLOS, respectively. LrD and LrE denote the path loss function which are modeled as Lrj=CLrjαL or CNrjαN, jD,E, rj is the distance in meters, CL and αL are the constant and path loss exponent depending on the LOS, CN and αN depend on the NLOS.

Based on the aforementioned adaptive transmission scheme, there are serious security threats when there exist one or more eavesdroppers in the sector secrecy guard zone. In order to enhance the secure transmission performance, using the superposition coding [18], the transmitter transmits information-bearing signals and sends AN, namely AN assisted transmission. If there exists no eavesdroppers in the sector secrecy guard zone, the transmitter still transmits useful information signals, namely direct transmission. As previously assumed, the locations of eavesdroppers are randomly distributed, the probability of no eavesdropper existed within the sector secrecy guard zone is given by pe1=expθSλEr2/2, and the probability of eavesdropper existed within the sector secrecy guard zone is given by pe2=1expθSλEr2/2 [36].

2.2. Performance Metrics

In the following, we use the SOP, the COP and the secrecy throughput to measure secrecy performance [37].

2.2.1. Secrecy Outage Probability and Connection Outage Probability

If the perfect security of confidential information can not be guaranteed, that is, a portion of the confidential information sent from the transmitter is decoded by at least one eavesdropper, the secrecy outage event takes place, the SOP is written as

pso=PrγE>2RBRS1, (2)

where γE denotes signal-to-interference-plus-noise received by the eavesdropper. Adopting Wyner code, RS and RB are the confidential information rate and codeword transmission rate, respectively, where RBRS [15,38].

If the confidential information cannot be decoded without error at the legitimate receiver, the connection outage event occurs, then the COP can be expressed as

pco=PrγD<2RB1, (3)

where γD denotes signal-to-interference-plus-noise received by the legitimate receiver.

2.2.2. Secrecy Throughput

The secrecy throughput represents the average secrecy rate when information is both secure and reliably transmitted. When pco and pso are independent of each other, the secrecy throughput is given by [19]

η=1pco1psoRS. (4)

3. Secure Transmission Strategies

In this section, we focus on the SNR received by the receiver and eavesdroppers in the mmWave wiretap network. We assume that the transmitter is able to detect the existence of eavesdroppers within the sector secrecy guard zone. We first analyze that the eavesdroppers are not in the sector secrecy guard zone, and then consider the eavesdroppers in the sector secrecy guard zone. It is worth mentioning that whether there are eavesdroppers in the sector secrecy guard zone or not, the transmitter transmits useful information signals. When the eavesdroppers are in the sector secrecy guard zone, we further exploit AN and produce positive effects through power adjustment control.

3.1. Eavesdroppers Are Detected Beyond the Sector Secrecy Guard Zone

If there do not exist eavesdroppers within the sector secrecy guard zone, the transmitter keeps sending the confidential information to the legitimate receiver. In this case, eavesdroppers distribute beyond the sector secrecy guard zone to intercept confidential information. Therefore, the SNR at the receiver is defined as

γDA=PMShD2LrDσD2, (5)

and the instantaneous SNR of detecting the information of the legitimate receiver at the most detrimental eavesdropper is given by

γEA=maxEΦ1PMShE2LrEAσE2, (6)

or

γEA1=maxEΦ2PmShE2LrEA1σE2. (7)

where EΦ1 denotes that eavesdroppers reside in the signal beam out of the sector secrecy guard zone, and then the SNR at the eavesdropper is γEA. EΦ2 denotes that eavesdroppers may reside anywhere except in the signal beam where the sector secrecy guard zone is located, and then the SNR at the eavesdropper is γEA1. The distance rEA from the eavesdropper to the transmitter is larger than the radius r of the sector secrecy guard zone. rEA1 is the distance from the eavesdropper to the transmitter in the side lobes, and σν2,νD,E denotes the additive white Gaussian power.

3.2. Eavesdropper Is Detected in the Sector Secrecy Guard Zone

If there exist eavesdroppers within the sector secrecy guard zone, the transmitter emits AN with power PA while transmitting the signal with power PS. The total transmit power is denoted as P, PS=μP,PA=1μP, where μ is the power allocation factor of the confidential information power to the total transmit power P with 0μ1 [36]. Then, the SNR at the receiver is given by

γDB=PSMShD2LrDσD2, (8)

and the instantaneous SNR at the most detrimental eavesdropper is written as

γEB=maxEΦ3PSMShE2LrEBPAMshE2LrEB+σE2, (9)

or

γEB1=maxEΦ2PmShE2LrEB1σE2, (10)

where EΦ3 denotes that eavesdroppers may reside in the sector secrecy guard zone, and then the SNR at the eavesdropper is γEB. γEB1 is the SNR of the eavesdropper at EΦ2. The distance rEB from the eavesdropper to the transmitter is smaller than the radius r of the sector secrecy guard zone. rEB1 is the distance from the eavesdropper to the transmitter in the side lobes. Note that, in our paper, to prevent eavesdroppers from eavesdropping, the transmitter adds AN to the transmit signals. AN is generated so as to be canceled out at the legitimate receiver; thus, only eavesdroppers are affected by AN. Similar methods are presented in [39,40,41]. However, it is beyond the scope of our paper and could be our future research.

4. Performance Analysis

Hereinafter, we first analyze secrecy performance of the direct transmission in term of the COP, the SOP and the secrecy throughput. Then, according to the same performance metrics, AN assisted transmission is investigated. Actually, direct transmission and AN assisted transmission are two special cases of adaptive transmission. Finally, considering the probabilities aforementioned that eavesdroppers may be beyond the sector secrecy guard zone and within the sector secrecy guard zone, we study the secrecy performance of the adaptive transmission scheme.

4.1. Direct Transmission

For the direct transmission, there does not exist an eavesdropper within the sector secrecy guard zone, the transmitter keeps sending the confidential information to the legitimate receiver.

Substituting Equation (5) into Equation (3), the COP is derived as

pcoa=PrγDA<2RB1=PrPMShD2LrDσD2<2RB1=PrhD2<2RB1σD2PMSLrD=iL,NΥNi,2RB1σD2PMSLrDNiΓNiPirD, (11)

where Υ·,· is the lower incomplete gamma function [42] (Equation (8.350)).

In the case of EΦ1, substituting Equation (6) into Equation (2), the SOP is calculated as follows:

psoa=PrγEA>2RBRS1=2RBRS1fγEAxdx, (12)

where fγEA· stands for the probability density function of γEA. By using the thinning theorem [26,43,44], the eavesdroppers are divided into two independent PPPs, namely LOS point process Φ1LOS with density function λEPLrd, and NLOS point process Φ1NOS with density function λE1PLrd. Then, the cumulative distribution function of γEA is derived as

FγEAx=PrγEA<x=PrmaxEΦ1PMShE2LrEAσE2<x=PrmaxEΦ1LPMShE2LrEAσE2<xZ1×PrmaxEΦ1NPMShE2LrEAσE2<xZ2, (13)

where Φ1L and Φ1N are the set of LOS and NLOS eaversdroppers, respectively. Z1 and Z2 are calculated by Equations (14) and (15). In Z1, step (a) follows the probability generating functional of the PPP, and step (b) is based on [42] (Equation (8.354.1)). In Z2, step (c) follows the probability generating functional of the PPP, step (d) is based on [42] (Equation (3.381.9)):

Z1=PrmaxEΦ1LPMShE2LrEσE2<x=aexpθSλErPrhE2>xσE2rEαLPMSCLeβrErEdrE=bexpθSλEΓ2,βrβ2NLxσE2PMSCLNLΓNLn=01nNLxσE2PMSCLnn!NL+nΓαLNL+n+2,βrβαLNL+n+2, (14)
Z2=PrmaxEΦ1NPMShE2LrEAσE2<x=EEΦ1NPrhE2<xσE2PMSLrEA|Φ1N=cexpθSλErPrhE2>xσE2rEAαNPMSCN1eβrEArEAdrEA=dexpθSλENN1!ΓNNm=0NN1xσE2NNPMSCNmm!×ΓmαN+2αN,xσE2NNPMSCNrαNαNxσE2NNPMSCNmαN+2αNΓ2,βrβ2NNxσE2PMSCNNNΓNNn=01nNNxσE2PMSCNnn!NN+nΓαNNN+n+2,βrβαNNN+n+2. (15)

For the sake of simplicity, FγEAx can be simplified as

FγEAx=expθSλEB+ANAL, (16)

where B=NN1!ΓNNm=0NN1qmm!×ΓmαN+2αN,qrαNαNqmαN+2αN; here, Γ·,· is the upper incomplete gamma function [42] (Equation (8.350)), AN=qNNΓNNn=01nqnn!NN+nΓαNNN+n+2,βrβαNNN+n+2, AL=pNLΓNLn=01npnn!NL+nΓαLNL+n+2,βrβαLNL+n+2, q=xσE2NNPMSCN, p=NLxσE2PMSCL.

Based on Equations (12) and (16), the SOP is derived as

psoa=PrγEA>2RBRS1=2RBRS1fγEAxdx=1expθSλEB+ANAL. (17)

Substituting Equations (11) and (17) into Equation (4), the secrecy throughput ηa is derived as

ηa=1pcoa1psoaRS=1iL,NΥNi,2RB1σD2PMSLrDNiΓNiPirD×expθSλEB+ANALRS. (18)

Remark 1.

It can be deduced from Equation (11) that the COP is a decreasing function of P, this implies that the reliability performance of system is strengthened as P increases. For the case of EΦ1, Equation (17) shows that the SOP increases with P when the sector secrecy guard zone is invariant. Correspondingly, when P is fixed, the secrecy performance becomes better with the increase of the sector secrecy guard zone. It means that, in this case, increasing power makes it possible to leak confidential information to eavesdroppers, and, at the same time, using the sector guard zone to keep eavesdroppers away from legitimate user. In addition, from Equation (18), it can be deduced that, in addition to P and λE, the secrecy throughput has a close relationship with radius r and central angle θS of the secrecy guard zone.

In the case of EΦ2, i.e., eavesdroppers may reside anywhere except in the signal beam where the sector secrecy guard zone is located. Substituting Equation (7) into Equation (2), the SOP is derived as

psoa1=PrγEA1>2RBRS1=2RBRS1fγEA1xdx. (19)

The cumulative distribution function of γEA1 is derived as

FγEA1x=PrγEA1<x=PrmaxEΦ2PmShE2LrEA1σE2<x=PrmaxEΦ2LPmShE2LrEA1σE2<xZ3×PrmaxEΦ2NPmShE2LrEA1σE2<xZ4, (20)

where Φ2L and Φ2N are the set of LOS and NLOS eaversdroppers, respectively. Z3 and Z4 are calculated by (14) and (15). In Z3, step (e) is based on [42] (Equation (3.351.2)). In Z4, step (f) is based on [42] (Equation (3.381.9)):

Z3=PrmaxEΦ2LPmShE2LrEA1σE2<x=EEΦ2LPrhE2<xσE2PmSLrEA1|Φ2L=eexp2πθSλEΓ2β2NLxσE2PmSCLNLΓNLn=01nNLxσE2PmSCLnn!NL+nΓαLNL+n+2βαLNL+n+2, (21)
Z4=PrmaxEΦ2NPmShE2LrEA1σE2<x=EEΦ2NPrhE2<xσE2PmSLrEA1|Φ2N=fexp2πθSλENN1!ΓNNm=0NN1xσE2NNPmSCNmm!×ΓmαN+2αNαNxσE2NNPmSCNmαN+2αNΓ2β2NNxσE2PmSCNNNΓNNn=01nNNxσE2PmSCNnn!NN+nΓαNNN+n+2βαNNN+n+2. (22)

Upon further simplification, FγEA1x can be simplified as

FγEA1x=exp2πθSλED+CNCL, (23)

where D=NN1!ΓNNm=0NN1umm!×ΓmαN+2αNαNumαN+2αN, u=xσE2NNPmSCN, CN=uNNΓNNn=01nunn!NN+nΓαNNN+n+2βαNNN+n+2, CL=kNLΓNLn=01nknn!NL+nΓαLNL+n+2βαLNL+n+2, k=NLxσE2PmSCL.

Based on Equations (19) and (23), the SOP is derived as

psoa1=PrγEA1>2RBRS1=2RBRS1fγEA1xdx=1exp2πθSλED+CNCL. (24)

Substituting Equations (11) and (24) into Equation (4), the secrecy throughput is derived as

ηsoa1=1pcoa1psoa1RS=1iL,NΥNi,2RB1σD2PMSLrDNiΓNiPirD×exp2πθSλED+CNCLRS. (25)

Remark 2.

In the case of EΦ2, the eavesdroppers are not in the beam where the sector secrecy guard zone is located; security threats come mainly from sidelobe. Referecne Equation (24) shows that the SOP is an increasing function of P and mS, which indicates that the secrecy performance becomes better as P and mS decreases. It means that, when the eavesdroppers are in the sidelobe, increasing power P and mS may lead to a leakage of confidential information. At the same time, increasing the central angle θS of the sector guard zone can reduce the risk of eavesdropping. In addition, from Equation (25), it can be deduced that, in addition to P and eavesdropper density λE, the secrecy throughput has a close relationship with radius r and central angle θS of the secrecy guard zone as well.

On the basis of the locations for the eavesdroppers, both EΦ1 and EΦ2 are considered together, i.e., eavesdroppers may reside anywhere except the sector secrecy guard zone. The SOP is derived as

psot=PrmaxγEA,γEA1>2RBRS1=1PrγEA<2RBRS1×PrγEA1<2RBRS1=1expθSλEB+ANAL2πθSλED+CNCL. (26)

The total secrecy throughput of eavesdroppers in EΦ1 and EΦ2 is derived as

ηt=1pcoa1psotRS=1iL,NΥNi,2RB1σD2PMSLrDNiΓNiPirD×expθSλEB+ANAL2πθSλED+CNCLRS. (27)

4.2. AN Assisted Transmission

For AN assisted transmission, once the eavesdroppers locate in the sector secrecy guard zone, the transmitter emits information-bearing signal along with AN.

Thus, substituting Equation (8) into Equation (3), the COP is derived as

pcob=PγDB<2RB1=PrPSMShD2LrDσD2<2RB1=iL,NPrhD2<2RB1σD2PSMSLrDiPirD=iL,NΥNi,2RB1σD2PSMSLrDNiΓNiPirD. (28)

In the case of EΦ3, i.e., eavesdroppers reside in the sector secrecy guard zone. Substituting Equation (9) into Equation (2), the SOP is derived as

psob=PrγEB>2RBRS1=2RBRS1fγEBxdx, (29)

where fγEB· stands for the probability density function of γEB; then, the cumulative distribution function of γEB is derived as

FγEBx=PrγEB<x=PrmaxEΦ3PSMShE2LrEBPAMshE2LrE+σE2<x=PrmaxEΦ3LPSMShE2LrEBPAMshE2LrEB+σE2<xZ5×PrmaxEΦ3NPSMShE2LrEBPAMshE2LrEB+σE2<xZ6, (30)

where Φ3L and Φ3N are the set of LOS and NLOS eavesdroppers, respectively. Z5 and Z6 are calculated by Equations (31) and (32). In Z5, step (g) follows the probability generating functional of the PPP, step (h) is based on [42] (Equation(3.351.2)). In Z6, step (p) follows the probability generating functional of the PPP, step (q) is based on [42] (Equation (3.381.9)):

Z5=PrmaxEΦ3LPSMShE2LrEBPAMshE2LrEB+σE2<x=gUxPSPA+UPSPAxexpθSλE0rPrhE2>xσE2LrEBPSMSPAMSxeβrEBrEBdrEB=hUxPSPA+UPSPAxexpθSλEΥ2,βrβ2vNLΓNLn=01nvnn!NL+nΥαLNL+n+2,βrβαLNL+n+2, (31)
Z6=PrmaxEΦ3NPSMShE2LrEBPAMshE2LrEB+σE2<x=pUxPSPA+UPSPAxexpθSλE0rPrhE2>xσE2LrEBPSMSPAMSx1eβrEBrEBdrEB=qUxPSPA+UPSPAxexpθSλENN1!ΓNNm=0NN1wmm!×ΥmαN+2αN,wrαNαNwmαN+2αNΥ2,βrβ2wNNΓNNn=0wΥαNNN+n+2,βrβαNNN+n+2. (32)

Upon further simplification, FγEBx can be simplified as

FγEBx=expθSλEF+ENEL, (33)

where F=NN1!ΓNNm=0NN1wmm!×ΥmαN+2αN,wrαNαNwmαN+2αN, EN=wNNΓNNn=01nwnn!NN+n×ΥαNNN+n+2,βrβαNNN+n+2, and w=xσE2NNPSMSPAMSxCN, v=NLxσE2PSMSPAMSxCL, and EL=vNLΓNLn=01nvnn!NL+nΥαLNL+n+2,βrβαLNL+n+2.

Based on Equations (29) and (33), the SOP is derived as

psob=PrγEB>2RBRS1=2RBRS1fγEBxdx=1expθSλEF+ENEL. (34)

Substituting Equations (28) and (34) into Equation (4), the secrecy throughput is derived as

ηb=1pcob1psobRS=1iL,NΥNi,2RB1σD2PSMSLrDNiΓNiPirD×expθSλEF+ENELRS. (35)

Remark 3.

From Equation (28), it is explicitly shown that the COP is a decreasing function about transmitting power. Adding more transmitting power could help the improvement of reliability performance. In the case of EΦ3, the eavesdroppers are located in the sector secrecy guard zone, and the transmitter allocates a portion of the power to transmit the AN to confuse the eavesdroppers. From Equation (34), we see that the SOP has a close relationship with central angle θS, eavesdropper density λE and AN power. Additionally, Equation (35) shows that, in addition to central angle θS and eavesdropper density λE, the transmit power allocation factor μ is of vital importance.

In addition, the eavesdroppers may be in the case of EΦ1 and EΦ2, the derivation process and results are similar to those in Section 4.1.

4.3. Adaptive Transmission

In order to adapt to the actual scenario, both EΦ1, EΦ2 and EΦ3 are considered together, and the adaptive transmission scheme is adopted. That is, when the eavesdroppers are beyond the sector secrecy guard zone, the system adopts direct transmission, and when the eavesdroppers are in the sector secrecy guard zone, AN assisted transmission is used. Considering the probabilities aforementioned that eavesdroppers may be beyond the sector secrecy guard zone and within the sector secrecy guard zone, we study the secrecy performance of an adaptive transmission scheme.

Combined with the probability pe1 that the eavesdroppers may not be in sector secrecy guard zone, we deduce the SOP, which is derived as

psoc1=pe1×PrmaxγEA,γEA1>2RBRS1=pe1×1expθSλEB+ANAL2πθSλED+CNCL. (36)

Correspondingly, considering the probability pe2 of eavesdroppers in sector secrecy guard zone, we deduce SOP, which is expressed as

psoc2=pe2×PrmaxγEA1,γEB>2RBRS1=pe2×1expθSλEF+ENEL2πθSλED+CNCL. (37)

Finally, we derive the SOP of the whole system under the random distribution of eavesdroppers, which is written as

psoc=psoc1+psoc2=pe1×1expθSλEB+ANAL2πθSλED+CNCL+pe2×1expθSλEF+ENEL2πθSλED+CNCL. (38)

As a result, the total secrecy throughput of the whole system is derived as

η=1pcob1psocRS=1iL,NΥNi,2RB1σD2PMSLrDNiΓNiPirD×1pe1×1expθSλEB+ANAL2πθSλED+CNCLpe2×1expθSλEF+ENEL2πθSλED+CNCLRS. (39)

5. Numerical Results

In this section, some representative simulation results are presented to verify our theoretical analysis, and characterize the secrecy performance of the mmWave wiretap network. A set of closed-form expressions are derived in an adaptive transmission scheme to analyze the effects for different system parameters. We assume that the noise power is σD2=σE2=70 dBm, and the LOS probability function is PLr=eβr with 1β=141.4. According to [45], we focus on the carrier frequenciey of 28 GHz and 73 GHz. The Nakagami fading parameters of the LOS (NLOS) link are NL=3 (NN=2), the parameters of path-loss model are βL=61.4dB,αL=2,βN=72dB,αN=2.92 and βL=69.8dB,αL=2,βN=82.7dB,αN=2.69, CL=10βL10 and CN=10βN10 can be regarded as path-loss intercepts on the reference distance of LOS and NLOS links.

Figure 2 presents the effects of the pco and pso versus the transmit power in different frequency bands, namely 28 GHz and 73 GHz. Obviously, with the increasing of P, the reliability performance of the legitimate receiver increases due to the decrease of the COP for a given power allocation factor, while the secrecy performance would decline. When the power increases to a certain value, the SNR received by the eavesdropper is close to a fixed value from Equation (6), the SOP remains unchanged and the COP of the legitimate receiver is close to zero. This can be explained as follows: on the one hand, although the eavesdropper is in the sector guard zone, the system can still guarantee a secure link to a legitimate receiver by transmitting AN to confuse the eavesdropper. On the other hand, it is because P has different effects on the COP and SOP in the case of LOS and NLOS. In addition, when P is large, the difference of SNR between legitimate link and eavesdropping link tends to be constant. It means that the reliability of the system can be improved effectively by increasing the power of the system. Again, we obtain an important observation that secrecy transmission at 28 GHz is better than that at 73 GHz in a low transmit power region.

Figure 2.

Figure 2

The pco and pso versus P with RB=1.5 bps/Hz, RS=0.5 bps/Hz, λE=0.0002 nodes/m2, r=20 m, θS=π3, μ = 0.6, mS=0.1 and MS=200.

Figure 3 presents the effects of the SOP, pso, and the COP, pco, versus the eavesdropper density λE with the different frequency. As λE increases, we see that the pso keeps increasing and the pco remains constant for given a power P. In particular, compared with the 73 GHz band, the 28 GHz band reduces the pco and improves the reliability of the system, but at the same time increases the pso and reduces the secrecy performance of the system. These observations can help the system designer to select different frequency bands according to the actual performance requirements. For example, when the actual system requires high reliability, it is suitable to select the 28 GHz band.

Figure 3.

Figure 3

The pco and pso versus λ with RB=1.5 bps/Hz, RS=0.5 bps/Hz, P=30 dBm, r=50 m, θS=π3, μ = 0.6, mS=0.1 and MS=200.

Figure 4 presents the effects of the η versus the transmit power with the different sector secrecy guard zone radius r and frequency. We see that there exists an optimal P for maximizing the secrecy throughput at the considered mmWave frequencies. At a low transmission power region, the secrecy throughput of 28 GHz is better, and the same result can be achieved at 73 GHz when the transmission power becomes sufficiently large. The reason is that, in the case of low transmission power regime, mmWave link at lower mmWave frequencies experiences lower path loss and has stronger signal strength, thus achieving better performance. However, in the high transmission power regime, due to the high path loss at higher mmWave frequencies, the interference received by the legitimate user becomes lower, and the signal strength of the eavesdropper is also reduced at higher mmWave frequencies. In addition, we observe that the secrecy throughput of r=50 m is always superior to that of r=20 m. The reason is that there does not exist an eavesdropper within the sector secrecy guard zone when transmitting, and the secrecy performance becomes better with r increasing. Again, for achieving the same secrecy throughput, the transmit power required at 28 GHz is lower than 73 GHz.

Figure 4.

Figure 4

The η versus P with RB=1.5 bps/Hz, RS=0.5 bps/Hz, θS=π3, λE=0.0002 nodes/m2, mS=0.1 and MS=200.

Figure 5 presents the central angle θS of sector secrecy guard zone on the secrecy throughput. It is obvious that the secrecy throughput of the system decreases with the central angle θS of the sector secrecy guard zone when the transmit power and the power allocation factor are sufficiently large. Specifically, under the same conditions, the performance of 73 GHz is superior to that of 28 GHz, which is mainly due to the difference path loss [45]. In addition, in the larger central angle region, the smaller radius is better than the larger radius due to fact that the larger sector secrecy guard zone may contain more eavesdroppers, which is detrimental to the secrecy performance.

Figure 5.

Figure 5

The η versus θS with RB=1.5 bps/Hz, RS=0.5 bps/Hz, P=30 dBm, μ=0.6, λE=0.0002 nodes/m2, mS=0.1.

Figure 6 presents the effects of transmit power allocation factor on the secrecy throughput with the different frequency. We note that there exists an optimal transmit power allocation factor μ to maximize the secrecy throughput. When the μ is very small, it means that almost all power is allocated to AN, and the secrecy throughput is very small. With the increase of the power allocated to the information signal, that is, the increase of the power allocation factor, the secrecy throughput increases gradually. However, when the power allocation factor increases to a certain value, the secrecy throughput starts to accelerate drop, the reason is that when the power allocation factor is increased to a certain value, the power used to AN decreases, which increases the possibility that an eavesdropper can intercept information, and the security cannot be guaranteed. Therefore, more power should be allocated to the AN to interfere with the eavesdropper, which demonstrates that it is very important to set the power allocation of the AN and the information signal properly. In addition, when the power allocated to AN is reduced to a certain value, the attenuation of η in the wider main lobe is faster, which is because more eavesdroppers may be located in the wider sector secrecy guard zone. Again, for the same circumstance, when the power allocation factor is increased to a certain value, the secrecy throughput reaches the maximum value, and the performance of 73 GHz is better than that of 28 GHz with the further increase of power allocation factor for a given r.

Figure 6.

Figure 6

The η versus μ with RB=1.5 bps/Hz, RS=0.5 bps/Hz, P=30 dBm, λE=0.0002 nodes/m2, r=50 m, mS=0.1 and MS=200.

Figure 7 presents the effects of the η versus the eavesdropper density λE with the different central angle θS. We see that, when increasing of λE, the secrecy throughput declines. This can be explained by when λE is low, the eavesdroppers located in EΦ1 and EΦ2 are indeed harmful for secrecy. However, as λE grows large, the secrecy throughput increases. This is because, in this case, the eavesdropper will be in the sector secrecy guard zone, the transmitter emits AN to interfere with the eavesdropper, and the secrecy performance will be improved, which shows that AN can improve the secrecy throughput of the system. If λE further increases, the secrecy throughput starts to decrease; the reason is that, as the number of eavesdroppers in the sector secrecy guard zone increases, the wiretapping capability of eavesdroppers increases, which deteriorates the secrecy performance. Obviously, when eavesdroppers exist in the sector secure region, transmitting AN is effective, but there is an appropriate λE, which makes the secrecy throughput reach the maximum. This shows that increasing the density of eavesdroppers not always deteriorates the secrecy performance. In this case, the large sector secrecy guard zone is superior to the small one.

Figure 7.

Figure 7

The η versus λE with RB=1.5 bps/Hz, RS=0.5 bps/Hz, P = 35 dBm, r = 50 m, μ = 0.4, mS=0.1 and MS=200.

Figure 8 presents the effects of transmit power allocation factor μ and the eavesdropper density λE on the secrecy throughput. From the simulation results, it shows that there exists an optimal transmit power allocation factor μ for maximizing the secrecy throughput with the changing λE. On the other hand, when the power allocation factor is smaller, no matter how high λE is, the connection is interrupted, and the reliability of the system is not guaranteed. As both μ and λE are sufficiently high, the secrecy outage occurs and the security is not guaranteed. It reveals that the power allocation of the information signal and AN need to be properly set depending on different system parameters for increasing the secrecy throughput.

Figure 8.

Figure 8

The η versus μ, λE with RB=1.5 bps/Hz, RS=0.5 bps/Hz, P = 30 dBm, F = 28 GHz, r = 50 m, θS=π6, mS=0.1 and MS=200.

Figure 9 presents the effects of the η versus the blockage density β with different rD. We observe that the secrecy throughput of r=80 m is always superior to that of r=60 m under the same system parameter settings. The reason is that, with the increase of r, if eavesdroppers exist in the sector secrecy guard zone and there is an appropriate λE, the transmitter will transmit AN interference to eavesdroppers, so the secrecy performance will be enhanced. In addition, increasing blocking intensity β does not always result in a strict decline in the secrecy throughput of mmwave wiretap networks. This shows that blockage plays an important role in the transmission of mmWave, which can be utilized to improve secrecy performance. From Figure 9, there exists an optimal β for maximizing the secrecy throughput at the different r. It is a meaningful conclusion that choosing sector secrecy guard zone according to the density of physical barriers and the distance of receiver can improve the secrecy throughput. As we improve β to the optimal point, the secrecy throughput attenuates, as NLOS communication dominates mmwave wiretap networks, using the multipath signals at the receiver. However, when the environment is full of physical obstacles, it is highly difficult for the message to reach the receiver, thus the secrecy throughput is gradually declining.

Figure 9.

Figure 9

The η versus β, with RB=1.5 bps/Hz, RS=0.5 bps/Hz, P = 35 dBm, F = 28 GHz, λE = 0.0002 nodes/m2, θS=π6, μ = 0.6, mS=0.1 and MS=200.

6. Conclusions

In this paper, we investigated secrecy performance under the Nakagami fading channel in an mmWave wiretap network. Then, an adaptive transmission scheme according to the locations of exavesdroppers is adopted for secrecy transmission, and we derived the SOP, COP and secrecy throughput under stochastic geometry. Specifically, there exists an optimal transmission power for the direct transmission and an optimal power allocation factor for the AN-assisted transmission by maximizing secrecy throughput. When the system parameters are set properly, AN can improve the secrecy throughput of the system. We got a meaningful conclusion that choosing sector secrecy guard zone with a larger radius according to the density of physical barriers and the distance of receiver can improve the secrecy throughput. In addition, it provides an important perception into the interaction among the transmitting power, main-lobe gain and the mmWave frequency. In future works, complex scenarios such as imperfect CSI, base-station (BS) cooperation and nonorthogonal multiple access (NOMA) will be considered. Furthermore, the results presented here can be combined with unmanned aerial vehicle (UAV) to analyze secrecy transmission capability.

Author Contributions

Y.S., W.Y., Z.X., Y.L., and Y.C. conceived of the main proposal of the secure transmission schemes, conducted system modeling, and derived analysis and numerical simulation of the proposed schemes. Y.S. and W.Y. wrote the manuscript. Z.X. and Y.L. provided considerable comments and technique review of the proposed scheme and contributed to the revision of the paper. Y.C. read and approved the final manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant Nos. 61471393 and 61771487.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Pi Z., Khan F. An Introduction to Millimeter-Wave Mobile Broadband Systems. IEEE Commun. Mag. 2011;49:101–107. doi: 10.1109/MCOM.2011.5783993. [DOI] [Google Scholar]
  • 2.Rangan S., Rappaport T.S., Erkip E. Millimeter Wave Cellular Wireless Networks: Potentials and Challenges. Proc. IEEE. 2014;102:366–385. doi: 10.1109/JPROC.2014.2299397. [DOI] [Google Scholar]
  • 3.Gong S., Xing C., Fei Z., Ma S. Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks. IEEE Trans. Veh. Technol. 2017;66:2059–2071. doi: 10.1109/TVT.2016.2578943. [DOI] [Google Scholar]
  • 4.Bai T., Alkhateeb A., Heath R. Coverage and Capacity of Millimeter-Wave Cellular Networks. IEEE Commun. Mag. 2014;52:70–77. [Google Scholar]
  • 5.Bai T., Heath R.W. Coverage Analysis for Millimeter Wave Cellular Networks with Blockage Effects; Proceedings of the 2013 IEEE Global Conference on Signal and Information Processing; Austin, TX, USA. 3–5 December 2013; pp. 727–730. [Google Scholar]
  • 6.Yang W., Tao L., Sun X., Ma R., Cai Y., Zhang T. Secure On-Off Transmission in MmWave Systems with Randomly Distributed Eavesdroppers. IEEE Access. 2019;7:32681–32692. doi: 10.1109/ACCESS.2019.2898180. [DOI] [Google Scholar]
  • 7.Liu Y., Chen H., Wang L. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEECommun. Surv. Tutor. 2017;19:347–376. doi: 10.1109/COMST.2016.2598968. [DOI] [Google Scholar]
  • 8.Xiang Z., Yang W., Pan G., Cai Y., Song Y. Physical Layer Security in Cognitive Radio Inspired NOMA Network. IEEE J. Sel. Top. Signal Process. 2019:1–14. doi: 10.1109/JSTSP.2019.2902103. [DOI] [Google Scholar]
  • 9.Tang X., Cai Y., Huang Y., Duong T., Yang W. Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems. IEEE Trans. Veh. Technol. 2018;67:2035–2048. doi: 10.1109/TVT.2017.2695500. [DOI] [Google Scholar]
  • 10.Tang X., Cai Y., Deng Y., Huang Y., Yang W. Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming. IEEE Trans. Inf. Forensics Secur. 2019;14:212–222. doi: 10.1109/TIFS.2018.2848630. [DOI] [Google Scholar]
  • 11.Jameel F., Wyne S., Kaddoum G., Duong T.Q. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Commun. Surv. Tuts. 2018 doi: 10.1109/COMST.2018.2865607. [DOI] [Google Scholar]
  • 12.Khisti A., Wornell G. Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel. IEEE Trans. Inf. Theory. 2010;56:3088–3104. doi: 10.1109/TIT.2010.2048445. [DOI] [Google Scholar]
  • 13.Sun X., Yang W., Cai Y., Tao L., Liu Y., Huang Y. Secure Transmissions in Wireless Information and Power Transfer Millimeter Wave Ultra-dense Networks. IEEE Trans. Inf. Forensics Secur. 2019;14:1817–1829. doi: 10.1109/TIFS.2018.2885286. [DOI] [Google Scholar]
  • 14.Xiang Z., Yang W., Pan G., Cai Y., Sun X. Secure Transmission in Non-Orthogonal Multiple Access Networks with an Untrusted Relay. IEEE Commun. Lett. (Early Access) 2019 doi: 10.1109/LWC.2019.2899309. [DOI] [Google Scholar]
  • 15.Yang N., Yan S., Member S., Yuan J., Member S., Malaney R., Subramanian R., Land I., Member S. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels. IEEE Trans. Commun. 2015;63:1771–1783. doi: 10.1109/TCOMM.2015.2419634. [DOI] [Google Scholar]
  • 16.Li W., Ghogho M., Member S., Chen B., Xiong C. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis. IEEE Commun. Lett. 2012;16:1628–1631. doi: 10.1109/LCOMM.2012.081612.121344. [DOI] [Google Scholar]
  • 17.Romero-zurita N., Mclernon D., Ghogho M., Swami A. PHY Layer Security Based on Protected Zone and Artificial Noise. IEEE Signal Process. Lett. 2013;20:487–490. doi: 10.1109/LSP.2013.2252898. [DOI] [Google Scholar]
  • 18.Chae S.H., Member S., Choi W., Member S., Lee J.H., Quek T.Q.S., Member S. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone. IEEE Trans. Inf. Forensics Secur. 2014;9:1617–1628. doi: 10.1109/TIFS.2014.2341453. [DOI] [Google Scholar]
  • 19.Xu X., He B., Yang W., Zhou X., Cai Y. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2016;11:373–387. doi: 10.1109/TIFS.2015.2500178. [DOI] [Google Scholar]
  • 20.Valliappan N., Heath R.W., Lozano A. Antenna Subset Modulation for Secure Millimeter-wave Wireless Communication. IEEE Trans. Commun. 2013;61:3231–3245. doi: 10.1109/TCOMM.2013.061013.120459. [DOI] [Google Scholar]
  • 21.Yang N., Wang L., Geraci G., Elkashlan M., Yuan J., Renzo M.D. Safeguarding 5G Wireless Communication Networks Using Physical Layer Security. IEEE Commun. Mag. 2015;53:20–27. doi: 10.1109/MCOM.2015.7081071. [DOI] [Google Scholar]
  • 22.Barati C.N., Hosseini S.A., Rangan S., Liu P., Korakis T., Panwar S.S., Rappaport T.S. Directional Cell Discovery in Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2015;14:6664–6678. doi: 10.1109/TWC.2015.2457921. [DOI] [Google Scholar]
  • 23.Vuppala S., Biswas S., Ratnarajah T. An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks. IEEE Trans. Commun. 2016;64:3507–3519. doi: 10.1109/TCOMM.2016.2587287. [DOI] [Google Scholar]
  • 24.Wang L., Elkashlan M., Duong T.Q., Heath R.W. Secure Communication in Cellular Networks: The Benefits of Millimeter Wave Mobile Bbroadband; Proceedings of the 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC); Toronto, ON, Canada. 22–25 June 2014. [Google Scholar]
  • 25.Wang C., Wang H.-M. Physical Layer Security in Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2016;15:5569–5585. doi: 10.1109/TWC.2016.2562010. [DOI] [Google Scholar]
  • 26.Zhu Y., Wang L., Wong K.-K., Heath R.W. Secure Communications in Millimeter Wave Ad Hoc Networks. IEEE Trans. Wirel. Commun. 2017;16:3205–3217. doi: 10.1109/TWC.2017.2676087. [DOI] [Google Scholar]
  • 27.Ju Y., Wang H.M., Zheng T.X., Yin Q. Secure Transmissions in Millimeter Wave Systems. IEEE Trans. Commun. 2017;65:2114–2127. doi: 10.1109/TCOMM.2017.2672661. [DOI] [Google Scholar]
  • 28.Zhang X., Zhou X., McKay M.R. Enhancing Secrecywith Multi-Antenna Transmission in Wireless Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2013;8:1802–1814. doi: 10.1109/TIFS.2013.2279842. [DOI] [Google Scholar]
  • 29.Andrews J.G., Bai T., Kulkarni M., Alkhateeb A., Gupta A., Heath R.W. Modeling and Analyzing Millimeter Wave Cellular Systems. IEEE Trans. Commun. 2017;65:403–430. doi: 10.1109/TCOMM.2016.2618794. [DOI] [Google Scholar]
  • 30.Song Y., Yang W., Xiang Z., Cai Y. Secure Transmission Design of Millimeter-Wave Wiretap Channel with Guard Zone and Artificial Noise; Proceedings of the 2018 International Conference on Wireless Communications and Signal Processing (WCSP 2018); Hangzhou, China. 18–20 October 2018; pp. 1–6. [Google Scholar]
  • 31.Adhikary A., Safadi E.A., Member S., Samimi M.K., Wang R., Caire G., Rappaport T.S., Molisch A.F. Joint Spatial Division and Multiplexing for mm-Wave Channels. IEEE J. Sel. Areas Commun. 2014;32:1239–1255. doi: 10.1109/JSAC.2014.2328173. [DOI] [Google Scholar]
  • 32.Bai T., Heath R.W. Coverage and Rate Analysis for Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2015;14:1100–1114. doi: 10.1109/TWC.2014.2364267. [DOI] [Google Scholar]
  • 33.Kong L., Vuppala S., Kaddoum G. Secrecy Analysis of Random MIMO Wireless Networks Over α-μ Fading Channels. IEEE Trans. Veh. Technol. 2018;67:11654–11666. doi: 10.1109/TVT.2018.2872884. [DOI] [Google Scholar]
  • 34.Vuppala S., Tolossa Y.J., Kaddoum G., Abreu G. On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks. IEEE Trans. Commun. 2018;66:1139–1152. doi: 10.1109/TCOMM.2017.2776944. [DOI] [Google Scholar]
  • 35.Turgut E., Gursoy M.C. Coverage in Heterogeneous Downlink Millimeter Wave Cellular Networks. IEEE Trans. Commun. 2017;65:4463–4477. doi: 10.1109/TCOMM.2017.2705692. [DOI] [Google Scholar]
  • 36.Xu X., Yang W., Cai Y., Jin S. On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks. IEEE J. Sel. Areas Commun. 2016;34:2706–2722. doi: 10.1109/JSAC.2016.2605901. [DOI] [Google Scholar]
  • 37.Tang X., Liu R., Spasojevíc P., Poor V.H. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-fading Channels. IEEE Trans. Inf. Theory. 2009;55:1575–1591. doi: 10.1109/TIT.2009.2013043. [DOI] [Google Scholar]
  • 38.He B., Zhou X., Swindlehurst A.L. On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels. IEEE Trans. Wirel. Commun. 2016;15:6913–6924. doi: 10.1109/TWC.2016.2593445. [DOI] [Google Scholar]
  • 39.He B., She Y., Lau V.K.N. Artificial noise injection for securing single-antenna systems. IEEE Trans. Veh. Technol. 2017;66:9577–9581. doi: 10.1109/TVT.2017.2703159. [DOI] [Google Scholar]
  • 40.Qin H., Sun Y., Chang T.-H., Chen X., Chi C.-Y., Zhao M., Wang J. Power allocation and time-domain artificial noise design for wiretap OFDM with discrete inputs. IEEE Trans. Wirel. Commun. 2013;12:2717–2729. doi: 10.1109/TCOMM.2013.050713.120730. [DOI] [Google Scholar]
  • 41.Akitaya T., Asano S., Saba T. Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems; Proceedings of the 2014 IEEE International Conference on Communications Workshops (ICC); Sydney, NSW, Australia. 10–14 June 2014; pp. 807–812. [Google Scholar]
  • 42.Gradshteyn I.S., Ryzhik I.M. Table of Integrals, Series, and Products. 7th ed. Academic Press; New York, NY, USA: 2007. [Google Scholar]
  • 43.Baccelli F., Baszczyszyn B. Stochastic Geometry and Wireless Networks, Volume II: Applications. Now Publishers Inc.; Hanover, MA, USA: 2009. [Google Scholar]
  • 44.Haenggi M., Andrews J.G., Baccelli F., Dousse O., Franceschetti M. Stochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks. IEEE J. Sel. Areas Commun. 2009;27:1029–1046. doi: 10.1109/JSAC.2009.090902. [DOI] [Google Scholar]
  • 45.MacCartney G.R., Rappaport T.S., Sun S., Deng S. Indoor Office Wideband Millimeter-wave Propagation Measurements and Channel Models at 28 and 73 GHz for Ultra-Dense 5G Wireless Networks. IEEE Access. 2015;3:2388–2424. doi: 10.1109/ACCESS.2015.2486778. [DOI] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES