58 research outputs found

    Secure Communications in Millimeter Wave Ad Hoc Networks

    Get PDF
    Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate. We also characterize the impact of artificial noise in such networks. Our results reveal that in the low transmit powerregime, the use of low mmWave frequency achieves better secrecy performance, and when increasing transmit power, a transition from low mmWave frequency to high mmWave frequency is demanded for obtaining a higher secrecy rate. More antennas at the transmitting nodes are needed to decrease the antenna gain obtained by the eavesdroppers when using ULA. Eavesdroppers can intercept more information by using a wide beam pattern. Furthermore, the use of artificial noise may be ineffective for enhancing the secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication

    Content Placement in Cache-Enabled Sub-6 GHz and Millimeter-Wave Multi-antenna Dense Small Cell Networks

    Get PDF
    This paper studies the performance of cache-enabled dense small cell networks consisting of multi-antenna sub-6 GHz and millimeter-wave base stations. Different from the existing works which only consider a single antenna at each base station, the optimal content placement is unknown when the base stations have multiple antennas. We first derive the successful content delivery probability by accounting for the key channel features at sub-6 GHz and mmWave frequencies. The maximization of the successful content delivery probability is a challenging problem. To tackle it, we first propose a constrained cross-entropy algorithm which achieves the near-optimal solution with moderate complexity. We then develop another simple yet effective heuristic probabilistic content placement scheme, termed two-stair algorithm, which strikes a balance between caching the most popular contents and achieving content diversity. Numerical results demonstrate the superior performance of the constrained cross-entropy method and that the two-stair algorithm yields significantly better performance than only caching the most popular contents. The comparisons between the sub-6 GHz and mmWave systems reveal an interesting tradeoff between caching capacity and density for the mmWave system to achieve similar performance as the sub-6 GHz system.Comment: 14 pages; Accepted to appear in IEEE Transactions on Wireless Communication

    Wireless Power Transfer in Massive MIMO Aided HetNets with User Association

    Get PDF
    This paper explores the potential of wireless power transfer (WPT) in massive multiple input multiple output (MIMO) aided heterogeneous networks (HetNets), where massive MIMO is applied in the macrocells, and users aim to harvest as much energy as possible and reduce the uplink path loss for enhancing their information transfer. By addressing the impact of massive MIMO on the user association, we compare and analyze two user association schemes. We adopt the linear maximal ratio transmission beam-forming for massive MIMO power transfer to recharge users. By deriving new statistical properties, we obtain the exact and asymptotic expressions for the average harvested energy. Then we derive the average uplink achievable rate under the harvested energy constraint.Comment: 36 pages, 11 figures, to appear in IEEE Transactions on Communication

    Efficient resource allocation for 5G hybrid wireless networks

    Get PDF
    This thesis explores three directions of energy-efficiency(EE) and spectral efficiency(SE) under 5G wireless networks. Firstly, we study the optimization of power control for the small (two-user) interference channel in which the terminals are time-switched between the signal-processing and energy-harvesting phases. Both energy harvesting and signal-processing processes are during the downlink. The objective is to maximize the sum-rate, subject to the minimum data and harvested energy constraints at the receivers, assuming a fixed time-switching coefficient. The key contribution is using a geometric approach that analyzes the feasible region governed by the constraints, which gives rise to the optimal power control solution. Another topic focuses on the performance analysis of two user association schemes for wireless power transfer (WPT) in heterogeneous networks (HetNets) massive multiple-input multiple-output (MIMO) antennas, downlink for the WPT in the first phase and uplink for wireless information transfer (WIT) in the second phase. The two user association schemes considered in the analysis are the Downlink received signal power (DRSP) based approach for maximizing the harvested energy; and the uplink received signal power (URSP) based approach for minimizing the uplink path loss. In the downlink, we adopt a low-complexity approach for massive MIMO power transfer to recharge users. Then we derive the average uplink achievable rate with the harvested energy. The last topic analyses a large-scale mmWave ad hoc network in the randomly located eavesdroppers area, where eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This chapter explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of the uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate

    Geometric Power Control for Time-Switching Energy-Harvesting Two-User Interference Channel

    Get PDF
    © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This paper studies the optimization of power control for the two-user interference channel in which the terminals are time-switched between the communication and energy-harvesting phases. The objective is to maximize the sum-rate, subject to the minimum data and harvested energy constraints at the receivers, assuming a fixed time-switching coefficient. Our key contribution is a geometric approach that analyzes the feasible region governed by the constraints, which gives rise to the optimal power control solution. We assume that perfect channel state information (CSI) is available at both transmitters to determine the solution

    Secrecy rate analysis of UAV-enabled mmWave networks using matern hardcore point processes

    Get PDF
    IEEE Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave (mmWave) band and takes into account unique features of air-toground channels and practical constraints of UAV deployment. To be specific, it explores the 3D antenna gain in the air-toground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdroppers. Simulation results verify our analysis and demonstrate the impact of different system parameters on the achievable secrecy rate. It is also revealed that optimizing the density of jamming UAVs will significantly improve security of UAV-enabled networks

    Blockchain-empowered decentralized storage in air-to-ground industrial networks

    Get PDF
    Blockchain has created a revolution in digital networking by using distributed storage, cryptographic algorithms, and smart contracts. Many areas are benefiting from this technology, including data integrity and security, as well as authentication and authorization. Internet of Things (IoTs) networks often suffers from such security issues, which is slowing down wide-scale adoption. In this paper, we describe the employing of blockchain technology to construct a decentralized platform for storing and trading information in the air-to-ground IoT heterogeneous network. To allow both air and ground sensors to participate in the decentralized network, we design a mutual-benefit consensus process to create uneven equilibrium distributions of resources among the participants. We use a Cournot model to optimize the active density factor set in the heterogeneous air network and then employ a Nash equilibrium to balance the number of ground sensors, which is influenced by the achievable average downlink rate between the air sensors and the ground supporters. Finally, we provide numerical results to demonstrate the beneficial properties of the proposed consensus process for air-to-ground networks and show the maximum active sensor's density utilization of air networks to achieve a high quality of service

    Performance analysis of hybrid UAV networks for probabilistic content caching

    Get PDF
    Caching content in small-cell networks can reduce the traffic congestion in backhaul. In this article, we develop a hybrid caching network comprising of unmanned aerial vehicles (UAVs) and ground small-cell base stations (SBSs), where UAVs are preferred because of their flexibility and elevated platform for line of sight. First, we derive the association probability for the ground user affiliated with a UAV and ground SBS. Then, we derive the successful content delivery probability by considering both the intercell and intracell interference. We also analyze the energy efficiency of the hybrid network and compare it with the separate UAV and ground networks. We further propose the caching scheme to improve the successful content delivery by managing the content popularity, where the part of the caching capacity in each UAV and ground SBS is reserved to store the most popular content (MPC), while the remaining stores less popular contents. Numerical results unveil that the proposed caching scheme has an improvement of 26.6% in content delivery performance over the MPC caching, which overlooks the impact of content diversity during caching
    • …
    corecore