2020
DOI: 10.1002/ett.4016
|View full text |Cite
|
Sign up to set email alerts
|

Secure mm‐Wave communications with imperfect hardware and uncertain eavesdropper location

Abstract: This article examines the secrecy performance of millimeter-wave (mm-Wave) communications with imperfect hardware and uncertain eavesdropper (Eve) location. We consider a multiple-antenna source communicating with a single-antenna destination using masked beamforming to transmit the information signals with artificial noise (AN) in the presence of a passive Eve. For this system, we derive new expressions for the secrecy outage probability (SOP) and secrecy throughput with mm-Wave multipath propagation under sl… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…The principle of PLS is to opportunistically exploit the random characteristics of fading channels, where the legitimate link is expected to experience a better condition than that of the eavesdroppers (Eve) [4]- [10]. Among different multi-antenna techniques, beamforming and jamming have been extensively utilized as the most effective techniques for guaranteeing secure communication 1 [6]- [8]. While jamming is capable of intentionally injecting specifically designed Artificial Noise (AN) for confusing the Eves.…”
Section: Introductionmentioning
confidence: 99%
“…The principle of PLS is to opportunistically exploit the random characteristics of fading channels, where the legitimate link is expected to experience a better condition than that of the eavesdroppers (Eve) [4]- [10]. Among different multi-antenna techniques, beamforming and jamming have been extensively utilized as the most effective techniques for guaranteeing secure communication 1 [6]- [8]. While jamming is capable of intentionally injecting specifically designed Artificial Noise (AN) for confusing the Eves.…”
Section: Introductionmentioning
confidence: 99%
“…decade as a promising technique of enhancing the secrecy of wireless communications [1]- [10]. A pair of proposed PLS solutions, namely beamforming and jamming techniques have been particularly extensively exploited [3], [4], [6]- [9]. However, the performance of these PLS schemes critically relies on the availability of near-perfect Channel State Information at the Tx (CSIT), particularly in multi-user systems 1 [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…Reference 16 maximizes the SR in a device‐to‐device communication link through optimal power allocation. Last but not the least, Reference 17 utilizes artificial noise along with optimal power allocation to maximize the SR in a millimeter‐wave communication link.…”
Section: Introductionmentioning
confidence: 99%