TY - GEN
T1 - Secrecy throughput maximization for millimeter wave systems with artificial noise
AU - Ju, Ying
AU - Wang, Hui Ming
AU - Zheng, Tong Xing
AU - Zhang, Yi
AU - Yang, Qian
AU - Yin, Qinye
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/12/21
Y1 - 2016/12/21
N2 - In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy outage probability (SOP) constraint through a dynamic parameter transmission scheme, and provide the optimal solution to transmission parameters, including the codeword rate and the power allocation ratio of the information signal power to the total transmit power. We find that the secrecy performance of the millimeter wave system under investigation is significantly influenced by the relationship between spatially resolvable paths of the legitimate user and those of the eavesdropper, which differs from those wireless systems with statistically independent channel. Numerical results are provided to verify our theoretical analysis.
AB - In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy outage probability (SOP) constraint through a dynamic parameter transmission scheme, and provide the optimal solution to transmission parameters, including the codeword rate and the power allocation ratio of the information signal power to the total transmit power. We find that the secrecy performance of the millimeter wave system under investigation is significantly influenced by the relationship between spatially resolvable paths of the legitimate user and those of the eavesdropper, which differs from those wireless systems with statistically independent channel. Numerical results are provided to verify our theoretical analysis.
UR - https://www.scopus.com/pages/publications/85010031176
U2 - 10.1109/PIMRC.2016.7794721
DO - 10.1109/PIMRC.2016.7794721
M3 - 会议稿件
AN - SCOPUS:85010031176
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
BT - 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 27th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2016
Y2 - 4 September 2016 through 8 September 2016
ER -