4.7 Article

Physical Layer Security in Millimeter Wave Cellular Networks

Journal

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 15, Issue 8, Pages 5569-5585

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2016.2562010

Keywords

Millimeter wave network; physical layer security; stochastic geometry; poisson point process; artificial noise

Funding

  1. Foundation for the Author of National Excellent Doctoral Dissertation of China [201340]
  2. National High-Tech Research and Development Program of China [2015AA01A708]
  3. New Century Excellent Talents Support Fund of China [NCET-13-0458]
  4. Fok Ying Tong Education Fund [141063]
  5. Young Talent Support Fund of Science and Technology of Shaanxi Province [2015KJXX-01]

Ask authors/readers for more resources

Recent studies show that millimeter wave (mmWave) communications can offer orders of magnitude, which increases in the cellular capacity. However, the secrecy performance of an mmWave cellular network has not been investigated so far. Leveraging the new path-loss and blockage models for mmWave channels, which are significantly different from the conventional microwave channel, this paper comprehensively studies the network-wide physical layer security performance of the downlink transmission in an mmWave cellular network under a stochastic geometry framework. We first study the secure connectivity probability and the average number of perfect communication links per unit area in a noise-limited mmWave network for both non-colluding and colluding eavesdroppers scenarios, respectively. Then, we evaluate the effect of the artificial noise (AN) on the secrecy performance, and derive the analysis result of average number of perfect communication links per unit area in an interference-limited mmWave network. Numerical results demonstrate the network-wide secrecy performance, and provide interesting insights into how the secrecy performance is influenced by various network parameters: antenna array pattern, base station intensity, and AN power allocation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

Active Reconfigurable Intelligent Surface Aided Secure Transmission

Limeng Dong, Hui-Ming Wang, Jiale Bat

Summary: This study proposes a novel active RIS design to enhance secure wireless transmission. By adjusting the phase shift and amplifying the amplitude of signals, the impact of double fading effect can be effectively relieved, resulting in a significantly higher secrecy performance gain.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Grouping-Based Joint Active User Detection and Channel Estimation With Massive MIMO

Jia-Cheng Jiang, Hui-Ming Wang

Summary: This paper investigates an uplink massive machine-type communication scenario with a massive number of antennas. It proposes a novel hybrid message passing algorithm for joint active detection and channel estimation. Simultaneous user grouping and JADCE significantly reduce the computational overhead for downlink training and feedback of channel state information. The effectiveness of the proposed method is validated through thorough analysis of the detection error probabilities and channel estimation error.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Engineering, Electrical & Electronic

Reliable and Secure Short-Packet Communications

Chen Feng, Hui-Ming Wang, H. Vincent Poor

Summary: In this paper, we investigate the reliability and security guarantees in short-packet communications. We define the outage probability and effective throughput as performance metrics and propose a general analytical framework for approximation. Closed-form expressions for these quantities are derived in the high-SNR regime. Numerical results validate the accuracy and feasibility of the proposed framework and illustrate the impact of system parameters on performance under the outage-probability constraint.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Channel-Prediction-Based One-Class Mobile IoT Device Authentication

Hui-Ming Wang, Qing-Yi Fu

Summary: Physical layer authentication is a promising complement to cryptographic-based authentication schemes, particularly in IoT scenarios. We propose a PLA scheme based on Gaussian process channel prediction to track and predict channel characteristics. We also introduce a one-class authentication scheme that does not require attacker's channel information and verify the performance through simulation tests.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks

Shao-Di Wang, Hui-Ming Wang, Zhetao Li, Victor C. M. Leung

Summary: For mission-critical massive machine-type communications, a novel UAJ detection method based on JSTS is proposed to address the serious threat of active jamming attack in uplink access. The proposed method detects UAJ in a sequential manner by processing received signals one by one, and does not rely on prior knowledge of the attackers. Numerical results validate the effectiveness of the method.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

Sequential Anomaly Detection Against Demodulation Reference Signal Spoofing in 5G NR

Shao-Di Wang, Hui-Ming Wang, Chen Feng, Victor C. M. Leung

Summary: In this paper, we propose to detect DMRS spoofing in 5G NR by exploiting the spatial sparsity structure of the channel. We first extract the spatial sparsity structure of the channel using a sparse feature retrieval method, and then propose a sequential sparsity structure anomaly detection method to detect DMRS spoofing. Simulation results show that our method outperforms other existing methods.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Does D2D Communication Always Benefit Physical-Layer Security?

Bing-Qing Zhao, Hui-Ming Wang, Hao Deng

Summary: Device-to-device (D2D) communication can improve spectrum efficiency and coverage of wireless networks, but its transmission secrecy is vulnerable due to resource and power constraints. This article challenges the assumption that D2D transmissions always improve secrecy performance and investigates the performance of a cellular transmission mode assisted by the base station. The results show that neither the D2D mode nor the cellular mode is always superior, and the choice depends on system parameters. An adaptive switching transmission mode is suggested to achieve enhanced secrecy performance.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Telecommunications

Joint Noise Model Learning and Source Localization With Unknown Transmit Power

Qingli Yan, Zhe Luo, Hui-Ming Wang

Summary: This article addresses the problem of signal strength localization under the assumption of unavailable noise model and transmit power. A universal mixture of Gaussian distribution is proposed to model the unknown noise, and a novel variational inference framework is proposed for joint automatic noise model learning and target localization. Numerical experiments demonstrate the robustness and effectiveness of the proposed algorithm.

IEEE COMMUNICATIONS LETTERS (2023)

Article Engineering, Electrical & Electronic

Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications

Shao-Di Wang, Hui-Ming Wang, Peng Liu

Summary: In this paper, a burst jamming detection method for delay-sensitive Internet-of-Things (IoT) applications is investigated. An online principal direction anomaly detection (OPDAD) method is proposed to obtain a timely detection. The OPDAD method adopts an online iterative processing mode, which can quickly detect the exact attack time block instance.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

Intelligent Reflecting Surface-Aided Full-Duplex Covert Communications: Information Freshness Optimization

Chao Wang, Zan Li, Tong-Xing Zheng, Derrick Wing Kwan Ng, Naofal Al-Dhahir

Summary: This work investigates covert information freshness in IRS-aided communications, where a public user and a private user exchange information under the watchful eye of a warden. By exploiting the channel statistics, the joint design of active and passive beamforming and packet length minimizes the age of information at one user while ensuring covert communication and quality of service at the other user. Alternating optimization algorithms are proposed to overcome the non-convexity of the design problem.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing

Haolin Liu, Xiaoling Long, Zhetao Li, Saiqin Long, Rong Ran, Hui-Ming Wang

Summary: With the development of multi-access edge computing (MEC), the cloudlet at the edge of the network can reduce the computational consumption of user equipments (UEs) by providing nearby high-performance computing services. This paper studies the problem of minimizing the total latency in the MEC network by optimizing request assignment and computing resource allocation. To solve the problem, the paper decomposes it into two subproblems and proposes a Lagrangian multiplier method and a primal-dual based approximation algorithm. Experimental results show that the proposed algorithm outperforms baseline algorithms in terms of total latency, loading balancing, and computational speed.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

RIS-Assisted Green Secure Communications: Active RIS or Passive RIS?

Weigang Lv, Jiale Bai, Qingli Yan, Hui Ming Wang

Summary: This study proposes an active RIS-aided multi-antenna physical layer secrecy transmission scheme, which can effectively resist the double fading effect and is more energy efficient than passive RIS.

IEEE WIRELESS COMMUNICATIONS LETTERS (2023)

Article Engineering, Electrical & Electronic

A Fully Bayesian Approach for Massive MIMO Unsourced Random Access

Jia-Cheng Jiang, Hui-Ming Wang

Summary: In this paper, a novel fully Bayesian approach for massive multiple-input multiple-output (MIMO) massive unsourced random access (URA) is proposed. The proposed method uses sparse regression codes (SPARCs) to code the payload of each user device without redundant parity bits. A Bayesian model is established to capture the probabilistic characteristics of the system. A three-layer message passing (TLMP) algorithm is proposed to jointly decode all the information blocks and acquire the massive MIMO channel, which significantly enhances the spectral efficiency compared with state-of-the-art baselines and is more robust to codeword collisions.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

A Cooperative Deception Strategy for Covert Communication in Presence of a Multi-Antenna Adversary

Jiangbo Si, Zizhen Liu, Zan Li, Hang Hu, Lei Guan, Chao Wang, Naofal Al-Dhahir

Summary: This study investigates covert transmission in a cooperative deception strategy, aiming to degrade the reception ability of a multi-antenna adversary by attracting and jamming them. An optimization problem is formulated to maximize the covert rate, considering three types of channel state information (CSI). The power allocation between the transmitter and the jammer is optimized subject to the Kullback-Leibler (KL) divergence constraint, which serves as a measure of covertness. Unlike existing literature, the optimal transmission power of the jammer when the transmitter is silent is also determined. Simulation results demonstrate that the proposed strategy achieves an increased covert rate with more antennas at the adversary and exhibits better robustness against imperfect CSI compared to the benchmark method.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

Performance Analysis of Joint Active User Detection and Channel Estimation for Massive Connectivity

Jia-Cheng Jiang, Hui-Ming Wang, H. Vincent Poor

Summary: This paper proposes a new theoretical framework for analyzing the performance of joint active user detection and channel estimation. By adopting the replica method under the Bayes-optimal condition, the optimality and phase transition of the joint AUD and CE based on approximate message passing can be measured, and the corresponding performance metrics can be predicted. By analyzing two typical scenarios, the performance analysis in this paper provides novel results for various channel cases.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2022)

No Data Available