2019
DOI: 10.1109/access.2019.2902394
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication in Millimeter Wave Relaying Networks

Abstract: The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay. In this paper, we consider a secure communication in the mmWave randomize-and-forward relaying system with multiple spatially random eavesdroppers. By leveraging the tools from stochastic geometry, we investigate the reliability/rate performance with security consideration. The closed-form expressions of secure connectivity probab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 42 publications
0
16
0
Order By: Relevance
“…Apart from the above works, there also exist some other stochastic geometry-based works focusing on multiple-input multiple-output transmissions [23], [26], SWIPT transmissions [24], relaying transmissions [27] and cognitive radio networks [28]. However, different from the above ones, these works considered only one or two source-destination pairs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from the above works, there also exist some other stochastic geometry-based works focusing on multiple-input multiple-output transmissions [23], [26], SWIPT transmissions [24], relaying transmissions [27] and cognitive radio networks [28]. However, different from the above ones, these works considered only one or two source-destination pairs.…”
Section: Related Workmentioning
confidence: 99%
“…To simplify the calculation, we ignore the overlaps of the sub-non-associated regions and calculate the area of the non-associated region as the sum of the areas of the sub-non-associated regions. Assuming y 0 = o, the area of the sub-non-associated region formed by a D2D receiver y ∈ Ξ is A( y ), where A(•) is given by (27). Thus, the area of the non-associated region in A 2 is y∈ΦR∩Ξ A( y ).…”
Section: Appendix D Proof Of Lemmamentioning
confidence: 99%
“…Based on an iterative fast Fourier transform (FFT), the authors in [29] designed an optimized antenna subset selection that provided low computational complexity and improved secrecy per-formance. In [30], the PLS of mmWave relaying networks in the presence of multiple eavesdroppers was studied. The first order integral expressions of average achievable secrecy rate of secure connectivity probability and secrecy outage probability have been derived.…”
Section: Related Workmentioning
confidence: 99%
“…where F u (ε 1 ) is derived as (15), shown at the top of the next page. Substituting (10) and (15) into (14), the Z 2 is derived as…”
Section: A Complete Transmission Scheme 1) Connection Outage Probabimentioning
confidence: 99%