Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
156 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure mm-Wave Communications with Imperfect Hardware and Uncertain Eavesdropper Location (2005.05439v1)

Published 11 May 2020 in cs.IT and math.IT

Abstract: This paper examines the secrecy performance of millimeter-wave (mm-Wave) communications with imperfect hardware and uncertain eavesdropper location. We consider a multiple-antenna source communicating with a single-antenna destination using masked beamforming to transmit the information signals with artificial noise (AN) in the presence of a passive eavesdropper (Eve). For this system, we derive new expressions for the secrecy outage probability (SOP) and secrecy throughput with mm-Wave multipath propagation under slow-fading channel conditions and hardware imperfections. Based on this, optimal power allocation (OPA) solutions are derived for the information and AN signals aimed at minimizing the SOP and maximizing the secrecy throughput. Our results reveal that it is non-trivial to achieve an OPA solution for the general scenario of imperfect hardware. We also highlight that our proposed masked beamforming with OPA scheme significantly enhances the secrecy throughput compared with the benchmark schemes of maximal-ratio transmission and equal power allocation.

Citations (8)

Summary

We haven't generated a summary for this paper yet.