On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks

被引:57
作者
Vuppala, Satyanarayana [1 ]
Tolossa, Yohannes Jote [2 ,3 ]
Kaddoum, Georges [4 ]
Abreu, Giuseppe [5 ,6 ]
机构
[1] Univ Luxembourgh, Interdisciplinary Ctr Secur Reliabil & Trust, L-1855 Esch Sur Alzette, Luxembourg
[2] Jacobs Univ Bremen, Sch Engn, D-28759 Bremen, Germany
[3] Jacobs Univ Bremen, Dept Sci, D-28759 Bremen, Germany
[4] Univ Quebec, Ecole Technol Super, Montreal, PQ H3C 1K3, Canada
[5] Dept Jacobs Univ Bremen, Sch Sci & Engn, D-28759 Bremen, Germany
[6] Ritsumeikan Univ, Dept Elect & Elect Engn, Kusatsu, Shiga 5258577, Japan
关键词
Average secrecy rate; blockages; connection outage; hybrid networks; millimeter wave; secrecy outage; BROADCAST CHANNELS; CELLULAR NETWORKS; SECRECY CAPACITY; TRANSMISSION; COVERAGE; DOWNLINK; OUTAGE; RATES; COMMUNICATION; ASSOCIATION;
D O I
10.1109/TCOMM.2017.2776944
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To cope up with the explosive growth of mobile data demand, the fifth-generation mobile network intents to exploit the available spectrum in millimeter-wave (mmWave) band to boost the communication capacity. However, for a potential mmWave communication to happen, challenges, as propagation losses and blockages, have to be dealt with. Abundant literature illustrating techniques to circumvent these challenges and increase the cellular capacity can be found. Among the approaches used to overcome the challenges in mmWave networks, optimal transmit precoding design, spatial reuse of mmWave base stations (BSs), and mmWave-overlaid microwave (mu Wave) cellular networks are employed. This paper focuses on the performance analysis of mmWave-overlaid microwave cellular networks, from security perspective. We particularly developed a mathematical framework to analyze the connection outage probability, the secrecy outage probability, and the achievable average secrecy rate of the hybrid mmWave network, while taking fading and the impact of blockages into consideration. Moreover, based on the received signal strength, we formulated a scheme for a generic mobile user to be associated with either the mmWave or mu Wave network. The exact average secrecy rate of mmWave networks is also formulated using moment generating and Laplace functions as a tool. The derived analytic expressions are validated via simulation results; for different antenna gain, eavesdropper density, BS, and blockage density.
引用
收藏
页码:1139 / 1152
页数:14
相关论文
共 54 条
[1]  
Akdeniz MR, 2013, IEEE GLOBE WORK, P105, DOI 10.1109/GLOCOMW.2013.6824970
[2]   Millimeter Wave Channel Modeling and Cellular Capacity Evaluation [J].
Akdeniz, Mustafa Riza ;
Liu, Yuanpeng ;
Samimi, Mathew K. ;
Sun, Shu ;
Rangan, Sundeep ;
Rappaport, Theodore S. ;
Erkip, Elza .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1164-1179
[3]  
[Anonymous], 2002, THESIS
[4]  
Baccelli F., 2009, Stochastic Geometry and Wireless Networks: Volume 2: Application, V2
[5]   The Secrecy Outage Probability for the ith Closest Legitimate User in Stochastic Networks [J].
Bai, Juan ;
Tao, Xiaofeng ;
Xu, Jin ;
Cui, Qimei .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (07) :1230-1233
[6]   Coverage and Rate Analysis for Millimeter-Wave Cellular Networks [J].
Bai, Tianyang ;
Heath, Robert W., Jr. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (02) :1100-1114
[7]   Coverage and Capacity of Millimeter-Wave Cellular Networks [J].
Bai, Tianyang ;
Alkhateeb, Ahmed ;
Heath, Robert W., Jr. .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (09) :70-77
[8]   Analysis of Blockage Effects on Urban Cellular Networks [J].
Bai, Tianyang ;
Vaze, Rahul ;
Heath, Robert W., Jr. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (09) :5070-5083
[9]   Cooperative communications with outage-optimal opportunistic relaying [J].
Bletsas, Aggelos ;
Shin, Hyundong ;
Win, Moe Z. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (09) :3450-3460
[10]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534