2020 28th Iranian Conference on Electrical Engineering (ICEE) 2020
DOI: 10.1109/icee50131.2020.9260703
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication for Millimeter-Wave Systems with Randomly Located Non-Colluding Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…During the broadcasting phase, S transmits its message at a power of λP and concurrently radiates AN to confuse the Eves at a power of (1−λ)P , where λ∈ (0, 1]. Simultaneously, the destination radiates another type of AN at power ηP , where η ∈ [0, 1] is the power allocation factor of D. The AN generated by the source is transmitted in the null space of the selected relay's channel to avoid contaminating the desired channel [1], [17], [25], and [26]. This method is particularly beneficial, when the Eve's instantaneous CSI is unknown.…”
Section: Destination and Source Based Cooperative Jamming (Ds-bcj)mentioning
confidence: 99%
See 1 more Smart Citation
“…During the broadcasting phase, S transmits its message at a power of λP and concurrently radiates AN to confuse the Eves at a power of (1−λ)P , where λ∈ (0, 1]. Simultaneously, the destination radiates another type of AN at power ηP , where η ∈ [0, 1] is the power allocation factor of D. The AN generated by the source is transmitted in the null space of the selected relay's channel to avoid contaminating the desired channel [1], [17], [25], and [26]. This method is particularly beneficial, when the Eve's instantaneous CSI is unknown.…”
Section: Destination and Source Based Cooperative Jamming (Ds-bcj)mentioning
confidence: 99%
“…Additionally, in [25] an OPA scheme was designed for mmWave untrusted relaying networks by only considering the LoS component. Furthermore, Ragheb et al [1] optimized the power allocation for increasing the ESR in the presence of shadow fading in a mmWave network, when a BS transmits confidential messages to a mobile user with the aid of an untrusted relay in the presence of NCEs and obstacles. However, the impact of OPA on a mmWave cellular network relying on multiple untrusted relays and considering both LoS/NLoS effects has not been reported in the open literature.…”
Section: Introductionmentioning
confidence: 99%
“…In [50], [51], the authors analyzed the secrecy performance with an assumption of non-colluding eavesdroppers. To compare the detrimental effect caused by colluding and non-colluding eavesdroppers on the secure wireless network, the authors of [52]- [54] considered both eavesdropping scenarios and concluded that the increasing number of eavesdroppers degrades the security of the system whereas colluding eavesdroppers have the most harmful effects.…”
Section: A Backgroundmentioning
confidence: 99%
“…1 Directivity 2 Intelligent Reflecting Surface 3 Half Duplex (HD) 4 Full Duplex (FD) 5 Physical Layer Security 6 Unmanned Aerial Vehicle 7 Ergodic Secrecy Rate 8 Artificial Noise 9 Optimal power allocation 10 Cumulative Distribution Function 11 Large scale antennas 12 Uniform linear array 13 Signal-to-interference-plus-noise ratio 14 Joint optimal power allocation and beamforming design 15 Semi-convex 16 Azimuth angle of arrival (AoA) 17 Azimuth angle of departure (AoD)…”
Section: ‫زیر‬ ‫نویس‬ ‫ها‬mentioning
confidence: 99%