Abstract
This paper investigates secure transmission in unmanned aerial vehicle (UAV) relay-assisted millimeter wave (mmWave) networks, where the selected UAV relay performs secure transmission in both the on-off and non-on-off schemes. Meanwhile, there are multiple eavesdroppers randomly distributed on the ground and attempting to wiretap the transmission. Leveraging the air-to-ground channel model and the tools of stochastic geometry, the novel expressions of transmit probability (TP) and secrecy outage probability (SOP) are derived in both the on-off and non-on-off transmission schemes with perfect beam alignment. The secrecy performance improvement is demonstrated in the on-off transmission scheme, and we find that there exists an optimal altitude of UAV relays to achieve the best TP. In addition, due to the limitations of UAV carriers, such as its low computational capacity and high mobility, the perfect beam alignment is difficult to achieve in the mmWave networks aided by UAV relays, and the effect of beam alignment error on the secrecy performance is investigated in the considered networks. Analyzing the numerical and simulation results, we find that the SOP will not have obvious deterioration when the beam alignment error is relatively small, and the SOP can be improved by using the antennas with a large number of elements. However, in high beam alignment error regime, the antenna arrays with a smaller number of elements will provide the better SOP.
1. Introduction
Millimeter wave (mmWave) has attracted considerable research attention due to its plentiful available spectrum resources [1,2,3]. Nevertheless, with the high frequencies, mmWave signals are extremely sensitive to the blockage effect, and their path losses are severe. As such, the mmWave communication links are prone to outage, especially in an environment with dense blockage, e.g., a mountainous area. To this end, deploying the unmanned aerial vehicle (UAV) relays in the air has been investigated for performance improvement and disconnection recovery in the mmWave networks [4,5].
Although the performance improvement can be obtained by employing the UAV relays, it also makes the transmission vulnerable to eavesdroppers due to the inherent broadcast of the wireless networks. As such, it is one of the key concerns to provide a secure communication in UAV relay-assisted mmWave networks. In contrast to the conventional upper-layer security methods mainly based on cryptographic protocols [6], physical-layer security has been emerged as a powerful approach to protect information transmission against wiretapping by exploiting the randomness of wireless medium, e.g., noise and interference [7]. Some potential application scenarios and challenges in terms of physical-layer security are presented in [8,9,10,11]. In this paper, we focus on secure on-off transmission in UAV relay-assisted mmWave networks.
1.1. Related Work and Motivation
Cooperative relay has been identified as an effective technique to improve the system performance of mmWave networks, and has attracted considerable attention recently [12,13,14]. To be specific, in [12], the coverage probability of the mmWave networks aided by relay, in which the base stations and relays are modeled under the stochastic geometry framework, has been investigated in both the best path and best relay selection protocols. Deploying the directional antennas at relays helps improve the reliability in the mmWave networks, the maximum achievable rate of the mmWave relay networks has been examined by considering the beamwidth of directional antennas in [13]. In addition, Lin et al. [14] has demonstrated the effects of co-channel interference on outage performance in the mmWave relay networks. Nevertheless, all above mentioned works focus on the mmWave communication networks on the ground.
At present, due to the flexible deployment and the supply of line-of-sight (LOS) links for UAV, operating the UAVs as relays has emerged as a promising way for performance enhancement in wireless communication networks [15,16,17]. Specifically, considering an UAV relay-assisted network, the authors in [15] have studied the channel model and examined the system performance in terms of average rate, outage probability, and bit error rate. In [16], the authors have investigated the conditions of establishing multi-hop single link or multiple dual-hop links by using UAV relays for the purpose of achieving better outage performance. In addition, Chen et al. [17] has demonstrated the effect of the altitude of UAV relay on the reliability performance in the UAV relay-assisted communication networks, then they has explored the optimal altitude of UAV relay for minimum outage probability. However, these works only investigate the performance of UAV relay-assisted networks without secrecy consideration.
Physical-layer security can protect information transmission with lower computation complexity in UAV relay networks [18,19,20]. Considering an UAV relay system, where multiple relays and eavesdroppers exist in the air, the secrecy outage probability (SOP) has been examined in [18]. Meantime, in [19], the average secrecy rate of the UAV relay networks has been studied. Involving the mmWave bands, the related literature is small. In our previous work [20], we have considered an UAV-enabled mmWave communication system, in which a source transmits the signals to a destination via a determined UAV relay, physical-layer security has been studied by using the 3D directional antenna pattern. It is worth mentioning that the on-off transmission [21,22], as an effective measure to guarantee the transmission quality and further enhance physical-layer security, still has not been investigated in UAV relay networks.
On the other hand, the existing works of mmWave communication networks mainly considered that the perfect beam alignment occurs at the legitimate nodes. However, due to the practical limitations, e.g., the limited computational capacity and mobility of transmitters and receivers, the beam alignment error is inevitable in practical mmWave communication scenarios. In [23], the average rate and coverage performance has been examined in the mmWave cellular networks with beam alignment errors, which are modeled as independent Gaussian distributions. Later, Cheng et al. [24] has adopted flat-top model to describe the beam alignment error of directional antenna, and the coverage probability of mmWave cellular networks has been studied. Please note that these works have not clarified that how the beam alignment errors affect the secrecy performance in UAV relay-assisted mmWave networks.
In summary, contrasting to the previous works, the secure communication in the UAV relay-assisted mmWave networks is still an open issue. First, with the aid of UAV relay in the mmWave networks, how to design the on-off transmission scheme to further enhance the physical-layer security is a challenging work. In addition, taking into account the practical limitation in terms of imperfect beam alignment at legitimate nodes, the effects of beam alignment errors on the secrecy performance of UAV relay-assisted mmWave networks still needs to be investigated.
1.2. Contribution
In this paper, we investigate the secure on-off transmission in UAV relay-assisted mmWave networks, and the secrecy performance is examined by considering the beam alignment errors. Our main contributions are summarized as follows:
- Considering a ground mmWave communication networks aided by multiple UAV relays, where multiple eavesdroppers randomly distribute on the ground. More specifically, the locations of UAV relays and eavesdroppers are modeled as independent Poisson Point Processes (PPPs), and the opportunistic relay selection scheme is adopted. Then, the on-off transmission scheme is designed to enhance the secrecy performance of the considered networks, and we find that the lower SOP can be obtained by adopting the higher threshold of data transmission.
- With perfect beam alignment, the new closed-form expressions of transmit probability (TP) and SOP are derived in both the on-off and non-on-off transmission schemes by using the tools of stochastic geometry and Gauss–Chebyshev integration. It is revealed that the TP is not a monotonous function versus the altitude of UAV relays, which means that the best TP can be obtained by properly designing the UAV relays’ altitude. In addition, the secrecy performance has remarkable positive correlations with the transmit power and the number of antenna elements.
- Taking into account the beam alignment error, a typical error model is adopted under the 3D antenna pattern, and the tractable expressions of the SOP are derived. Analyzing the numerical and simulation results, we find that the SOP will not have obvious deterioration with small beam alignment error, and we can enhance the secrecy performance by using the antenna array with large number of elements. However, when the beam alignment error is severe, the antenna array with smaller number of elements provides the lower SOP.
The remainder of this article is organized as follows. The system model is presented in Section 2. In Section 3, we examine the TP and SOP in both the on-off and non-on-off transmission schemes, and the SOPs with beam alignment error are analyzed. Then, the simulation results are shown in Section 4. Finally, we summarize the conclusions in Section 5.
2. System Model
2.1. Network Model
Consider a mmWave UAV system consisting of one source (S), one destination (D), multiple UAV relays and multiple eavesdroppers, as shown in Figure 1. We assume that the direct link from S to D is disconnected since mmWave signals are easy to be blockaded on the ground, and the communication occurs via a selected UAV relay (). To be specific, S first sends the messages to , and employs the decode-and-forward protocol to forward its received signals to D. Meanwhile, there are multiple ground eavesdroppers randomly distributed around D and out of the coverage area of S, which means that the eavesdroppers only wiretap the transmission from to D, similar to [25,26,27]. In addition, the distribution of UAV relays follows a homogeneous PPP with density , and we assume that all UAV relays are deployed inside a circular disc with radius Q and at the same altitude H [16,28]. The ground eavesdroppers are modeled as an independent homogeneous PPP with density .
Figure 1.
System Model.
For facilitating the analysis, a 3D polar coordinate system is adopted, in which S and D locate at and respectively. Then, for the UAV relay at , the distance from S to and to D are represented as , and .
2.2. Antenna and Beam Alignment Error Model
To compensate high path loss of mmWave signals, we assume that the directional antenna arrays are deployed at all nodes. A 3D sectorized antenna model is adopted to approximate the antenna gain pattern [28,29], and the diagram is given as Figure 2. More specifically, the antenna gain between node i and j is expressed as with probability , where denote the source, the selected UAV relay, the destination or the eavesdropper at location e, represents the array gain of the main lobe (side lobe) at node i, and is the probability that the array gain occurs. In the scenario without beam alignment error, we assume that the legitimate nodes can adjust their antenna orientations and align to each other. Then, for the selected UAV relay , the maximum of beam depression angle is calculated as , and the probability that the ground eavesdroppers fall in the main lobe of UAV relay can be expressed as , where and are the azimuth angle and depression angle of the UAV relay, respectively. Moreover, the probability that the eavesdropper aligns to the selected UAV relay can be written as , where and are the azimuth and elevation angles of the eavesdropper. Accordingly, we can obtain and .
Figure 2.
Illation of 3D antenna gain.
We consider that the legitimate nodes S, and D will estimate the angles of arrival and departure, and adjust the antenna steering orientations to obtain the maximum directive gains. However, due to the errors in angles estimations, the beam alignment error is inevitable in practical applications. In this paper, the 3D antenna gain is adopted in which the beam alignment occurs when the main lobe of the antenna array aligns the target in both azimuth and elevation. We denote the beam alignment error in the azimuth (elevation) at node as , and the errors are modeled as independent Gaussian-distributed variables with zero mean [23,30]. For simplicity, we assume that the variances of the beam alignment errors in the azimuth and elevation at node k are same, denoting as . Thus, the cumulative distribution functions (CDFs) of and are expressed as , where is the error function.
2.3. Channel Model
Due to the blockage effects, the air-to-ground links can be LOS or non-line-of-sight (NLOS). Similar to [31], the occurrence probabilities of LOS and NLOS are given as , and , where r is the horizontal distance from UAV to the ground node, and a and b are the environment dependent constant values. Moreover, the propagation characteristics for LOS and NLOS links are different in mmWave bands [32,33]. Giving the link of length d, the path loss can be given as for , where is the intercept of the link with parameter , is the path loss exponent, and L and N denote that the link is LOS or NLOS. In addition, the small-scale fading for each link is modeled as independent Nakagami-m fading [34]. More specifically, the small-fading channel gain between two nodes follows normalized Gamma random variable, and for a LOS link, it is expressed as ; for a NLOS link, , where .
Based on the above assumptions on antenna and channel models, the signal to noise (SNR) at the legitimate receiver is written as
where is the transmit power, is the available UAV relay at position x, is the distance from node i to j and denotes the noise power. In addition, we focus on the non-colluding eavesdropping case, where all eavesdroppers process the received signals independently. As such, the secrecy performance is dominated by the largest SNR at the most malicious eavesdropper, which is written as
2.4. Relay Selection and Transmission Scheme
Under the decode-and-forward relaying strategy, we adopt an opportunistic relay selection scheme with two phases. First, we select a set of UAV relays, which can successfully decode the messages received from S. Specifically, for a potential UAV relay , if the channel capacity between S and is greater than a threshold , the relay can decode the S’s messages correctly [35,36], and the decoding set is defined as . After that, the UAV relay , which provides the lowest path loss to D, is selected from to forward the S’s messages to D. To this end, the selected relay offers the minimum length of LOS or NLOS link to D.
Based on the above system model, there are multiple ground eavesdroppers monitoring the transmission of link and attempting to interpret the confidential messages. In order to enhance physical-layer security, the on-off transmission scheme is adopted at , as done in [21,22]. More specifically, based on the pilot signals from D, can obtain the channel capacity of the link. Then performs data transmission only when is above the threshold . In order to highlight the effect of secrecy performance in the on-off transmission scheme, the conventional non-on-off transmission scheme is analyzed in this paper as well, in which the selected UAV relay always transmits the signals after decoding the messages from S.
To further clarify the relay selection and on-off transmission scheme, we also depict the detailed scheduling period of these two processes as Figure 3. The relay selection process contains three parts:
Figure 3.
Scheduling period of the relay selection and on-off transmission processes.
: S sends the pilot symbols to all UAV relays, and the UAV relays calculate the channel capacities of their links from S, then can be obtained.
: The UAV relays in transmit the pilot signals to D, then D can find .
: D responds the selection results to the UAV relays, and the selection process is completed.
After that, the selected UAV relay performs on-off transmission, which is divided into four time slots:
: D sends the pilot signals to , and calculated the channel capacity .
: If the , sends the indicator signals to S. But when , keeps silent and waits the next pilot signals from D.
: After S receives the indicator signals, it transmits the date symbols to .
: forwards the messages to D by using decode-and-forward strategy.
It should be mentioned that there are beam training phases before S and transmit the data symbols [37,38,39], which is not our focus.
3. Secrecy Evaluation
In this section, we first present the probability distribution function (PDF) of the horizontal distance from the selected UAV relay to the destination D. Then, we derive the closed-form expressions of the TP and SOP with and without the on-off transmission strategy. Furthermore, the effect of beam alignment error on the secrecy performance is analyzed.
3.1. Preliminary Analysis
For an UAV relay , the probability of including in the decoding set depends on the distance from S to . To be specific, the UAV relay is more likely to be contained in when it is closed to S. Meantime, the channels between S and with different x are independent, then can be regarded as an inhomogeneous PPP. The density of the point process is derived as
where r is the horizontal distance from S to .
The opportunistic relay selection assumes the selected UAV relay , which offer the lowest path loss to D, is selected to forward S’s messages. It is easy to know that is the nearest relay in () from D, where () is the LOS (NLOS) decoding UAV relay set with density ().
Lemma 1.
Denoting the horizontal distance from D to the nearest LOS (NLOS) UAV relay as (), the PDF of , is presented as
where T is the abscissas of the quadrature by using Gauss–Chebyshev integration, , , and is written as
where , .
Proof.
See Appendix A. □
Lemma 2.
Giving that the selected UAV relay is LOS, the conditional PDF of is written as
where is the probability that is LOS, and its expression is given as
Proof.
See Appendix B. □
Similar to (6), giving that the selected UAV relay is NLOS, the conditional PDF of is written as
where is the probability that is NLOS.
3.2. Performance Analysis with Perfect Beam Alignment
In this subsection, considering the perfect beam alignment between the legitimate transmitter and receiver, the new closed-form expressions for the TP and SOP are derived in the on-off transmission scheme. For comparison, we then consider the conventional non-on-off transmission scheme and present the SOP.
3.2.1. On-Off Transmission Scheme
In this scheme, with the pilot signals from the destination D, the selected UAV relay sends the messages only when the channel capacity is above a threshold . Then, the TP is derived as
where step (a) is due to the Gauss–Chebyshev integration, , and is written as
The SOP is the probability that the secrecy outage occurs when performs data transmission. As such, the SOP in on-off scheme is derived as
where is the CDF of , is the PDF of with LOS or NLOS link, , step (b) is due to the fact that the maximal can be approximated as , and and are the parameters by using Gauss–Chebyshev integration.
We note that (11) is calculated by using the CDF of and the PDF of when link is LOS or NLOS. Without loss of generality, we only take into account the eavesdroppers inside a circular area, and the radius is set as Q for simplicity. Then, the CDF of is derived as
where step (c) is due to the void probability of PPP, is given as
where is the set of LOS or NLOS eavesdroppers seen from .
Then, the PDF of is derived as
where step (d) is due to ([40], Equation (0.410)) and ([40], Equation (8.350.1)).
Finally, we can calculate the SOP in the on-off transmission scheme by substituting (12) and (14) into (11).
Remark 1.
We clarify that the TP in the on-off transmission scheme is affected by the threshold μ, the transmit power , the antenna gains of the legitimate links and the altitude of UAV relays H, as indicated by (9). It is worth mentioning that the TP is not a monotonous function of H. Specifically, when H starts to increase, the TP increases due to the larger LOS probability of the link. But if H is large enough, the path loss is severe, which will cause the decrease of TP. Moreover, when , the TP according to (9), and the SOP approaches a constant due to the fact that the secrecy capacity is mainly affected by the channel states of legitimate and eavesdropping links if is large enough.
3.2.2. Non-On-Off Transmission Scheme
For comparison, we also give the TP and SOP for conventional non-on-off scheme, in which the selected UAV relay always transmits the signals after receiving the messages from S. It is obvious that the TP in non-on-off transmission scheme is . And the SOP is derived as
where and are given as (12) and (14), step (e) is obtained by using integration by parts, step (f) is due to the maximum is approximated as , , , and .
3.3. Performance Analysis with Beam Alignment Error
Based on the antenna model mentioned in Section 2.2, the beam alignment occurs when the orientation of the target node falls in the main lobe of the transmitter’s antenna gain. For the 3D antenna, if the additive beam alignment error is not larger than half of the main-lobe beamwidth in both of the azimuth and elevation, i.e., , , , the beam alignment is deemed to be achieved. Then the probability that node k align its target node is calculated by
Since the existence of beam alignment error, the antenna gain between the legitimate nodes i and j, , which is denoted as , can be described as a discrete random variable. As such, the PDF of can be given by
where (), and is the Kronecker delta function.
Let the and be the SOP in the on-off and non-on-off transmission schemes when and . The SOP in the on-off transmission scheme is formulated as
where belongs to with probability for . The SOP in the non-on-off scheme is similar to (18), but replacing and with and , respectively.
Remark 2.
It can be clarified that the beam alignment probability of node k is affected by the main-lobe beamwidth in both the azimuth and elevation , and the beam alignment error , as indicated by (16). Obviously, the SOPs in both the on-off and non-on-off transmission schemes increase as becomes large. This is because that the larger degrades the channel qualities of legitimate links. Nevertheless, when the error is relatively small, the SOP would not have a decided change because the main lobe of the transmitter’s antenna still can cover the target nodes. In addition, when is severe, the SOP is worse by using the antenna array with larger number of elements due to its lower side-lobe gain and narrow beamwidth.
4. Simulation Results
In this section, some simulation results are provided to show the secrecy performance of UAV relay-assisted mmWave networks under both the on-off and non-on-off transmission schemes, and the impact of beam alignment error is discussed. Monte Carlo simulations are conducted in each figure to verify our numerical results. We consider that the uniform planar square antenna is adopted at each node, the antenna element number of the S, UAV relays, D and eavesdroppers are denoted as , , and the main-lobe beamwidth, the antenna gain of the main lobe and side lobe of an N element antenna are given in Table 1. In addition, the mmWave communication operates at carrier frequency 28 GHz, and the simulation parameters are shown in Table 2.
Table 1.
3D Antenna Pattern [29].
Table 2.
Simulation Parameters.
Figure 4 shows the TP versus the UAV relays’ altitude H with different and in both the on-off and non-on-off transmission schemes. First, under the on-off transmission scheme, we find that the TP first increases and then decreases as H becomes large. It can be explained that larger H causes higher LOS probability, but if the LOS probability is large enough, the TP is mainly affected by the path loss, which increases as H becomes large. Secondly, the TP increases by decreasing the transmission threshold . It demonstrates that we can adjust the TP by changing under on-off transmission scheme. In addition, as increases, no matter equals to 4, 4.5, or 5, the TP decreases. The reason is that the selected UAV relay would be closer to S for achieving the decoding process when increases, which causes that the path loss of second hop increases.
Figure 4.
The TP versus the altitude of UAV relay when dBm, , and .
In Figure 5, we plot the SOP versus the transmit power for different and in both the on-off and non-on-off schemes. Observing from Figure 5, the SOP with outperforms the SOP with since the received SNR can be enhanced by adopting the antennas array with large amount of elements. Furthermore, the SOP can be improved in the on-off transmission scheme especially with large . This is because that the selected relay performs data transmission only when the channel quality of link beyond in the on-off transmission scheme, and larger means better channel from to D when transmission occurs. It is worth mentioning that the SOP is not a monotonous function of when is large. It can be explained that the improvement of SOP is obvious with large in the low region due to the large gap between legitimate and eavesdropping channel capacities, but the eavesdroppers also benefit from larger , as such, the channel capacity gap becomes narrow and then approach a constant as continue increasing.
Figure 5.
The SOP versus the transmit power when 120 m, , , , and .
Figure 6 illustrates the effect of the eavesdropper density on the SOP with different beam alignment error and in both the on-off and non-on-off transmission schemes. Obviously, with the increasing of , no matter equals to 0°, 8° or 10°, the SOP increases in both two transmission schemes. Besides, the SOP becomes large as deteriorates. The reason is that the channel capacities of legitimate links decrease due to the lower channel gain when increases. Nevertheless, the SOP in on-off transmission scheme outperforms the SOP in non-on-off transmission scheme. It demonstrates that the secrecy performance in the considered networks can be improved by using the on-off transmission scheme.
Figure 6.
The SOP versus the density of eavesdroppers when 30 dBm, , , , , and .
Figure 7 shows the SOP versus the beam alignment error with different in both the on-off and non-on-off transmission schemes. It can be observed that the SOP increases as becomes large. However, we can find that the increase of SOP is not remarkable when is relatively small. This is because the target nodes still can fall in the main lobe of the transmit antenna when is small. Moreover, it is noteworthy that the SOP can be improved by adopting the on-off transmission scheme, but the improvement is slighter when . It can be explained that the channel capacity of link always exceeds due to the high antenna gain with . In addition, when is not too large, the better SOP can be obtained by adopting more antenna elements due to the high antenna gain. However, in the high regime, the antenna array with lesser elements will provide better SOP due to its larger beamwidth of the main lobe.
Figure 7.
The SOP versus the eavesdropper density when 30 dBm, 120 m, , , , and .
5. Conclusions
In this paper, we investigate secure transmission in UAV relay-assisted mmWave networks where the beam alignment is achieved or not. The closed-form expressions for TP and SOP in both the on-off and non-on-off transmission schemes are derived by considering the beam alignment error or not. Analyzing the numerical and simulation results, we find that the SOP indeed can be improved by using the on-off transmission scheme, and the SOP can be further decreased by increasing the threshold of data transmission. In addition, the TP is not a monotonous function of the UAV relays’ altitude in the on-off transmission scheme, and there exist an optimal altitude of UAV relay to obtain the best TP. Moreover, the SOP will not deteriorate when the beam alignment error is relatively small, and we can improve the SOP by adopting the antenna with more elements. Nevertheless, in the high alignment error regime, the antenna array with smaller number of elements provides the better SOP.
Author Contributions
R.M. and Y.Z. conceived the model; R.M. performed the performance analysis and simulation results; W.Y. and S.W. analyzed the numerical and simulation; R.M. wrote the paper; and W.Y., S.W. provided some suggestions and revised the paper.
Funding
This work was supported by the National Natural Science Foundation of China (No. 61771487 and No. 61471393).
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A
Proof of Lemma 1.
To obtain the PDF of , , we first derived the complementary cumulative distribution function (CCDF) of as
where step (g) is due to the PPP’s void probability.
Then, the PDF of can be calculated by
where step (h) is derived by using Gauss–Chebyshev integration [23], T is the abscissas of integration, , , and is given by
where , and by using Gauss–Chebyshev integration. □
Appendix B
Proof of Lemma 2.
First, the probability that the selected UAV relay is LOS is derived as
Accordingly, we can easily obtain the , which is the probability that the nearest NLOS UAV relay is selected.
Giving that the selected UAV relay is LOS, we then derive the CCDF of the horizontal distance from D to the nearest LOS UAV relay, and its derivations are written as
Finally, we can obtain the PDF as (6) by using the derivation . □
References
- Jung, H.; Lee, I.-H. Performance Analysis of Millimeter-Wave Multi-hop Machine-to-Machine Networks Based on Hop Distance Statistics. Sensors 2018, 18, 204. [Google Scholar] [CrossRef] [PubMed]
- Ojaroudi Parchin, N.; Alibakhshikenari, M.; Jahanbakhsh Basherlou, H.; A Abd-Alhameed, R.; Rodriguez, J.; Limiti, E. MM-Wave Phased Array Quasi-Yagi Antenna for the Upcoming 5G Cellular Communications. Appl. Sci. 2019, 9, 978. [Google Scholar] [CrossRef]
- Hefnawi, M. Hybrid Beamforming for Millimeter-Wave Heterogeneous Networks. Electronics 2019, 8, 133. [Google Scholar] [CrossRef]
- Zhou, Y.; Cheng, N.; Lu, N.; Shen, X.S. Multi-UAV-Aided Networks: Aerial-Ground Cooperative Vehicular Networking Architecture. IEEE Veh. Technol. Mag. 2015, 10, 36–44. [Google Scholar] [CrossRef]
- Zeng, Y.; Zhang, R.; Lim, T.J. Throughput Maximization for UAV-Enabled Mobile Relaying Systems. IEEE Trans. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
- Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
- Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Song, Y. Physical Layer Security in Cognitive Radio Inspired NOMA Network. IEEE J. Sel. Top. Signal Process. 2019, 13, 700–714. [Google Scholar] [CrossRef]
- Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
- Pan, G.; Ye, J.; Ding, Z. Secure Hybrid VLC-RF Systems with Light Energy Harvesting. IEEE Trans. Commun. 2017, 65, 4348–4359. [Google Scholar] [CrossRef]
- Pan, G.; Ye, J.; Ding, Z. On Secure VLC Systems With Spatially Random Terminals. IEEE Commun. Lett. 2017, 21, 492–495. [Google Scholar] [CrossRef]
- Song, Y.; Yang, W.; Xiang, Z.; Liu, Y.; Cai, Y. Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages. Entropy 2019, 21, 427. [Google Scholar] [CrossRef]
- Biswas, S.; Vuppala, S.; Xue, J.; Ratnarajah, T. On the Performance of Relay Aided Millimeter Wave Networks. IEEE J. Sel. Top. Signal Process. 2016, 10, 576–588. [Google Scholar] [CrossRef]
- Yang, G.; Xiao, M. Performance Analysis of Millimeter-Wave Relaying: Impacts of Beamwidth and Self-Interference. IEEE Trans. Commun. 2018, 66, 589–600. [Google Scholar] [CrossRef]
- Lin, Z.; Peng, X.; Chin, F.; Feng, W. Outage Performance of Relaying with Directional Antennas in the Presence of Co-Channel Interferences at Relays. IEEE Wirel. Commun. Lett. 2012, 1, 288–291. [Google Scholar] [CrossRef]
- Chen, X.; Hu, X.; Zhu, Q.; Zhong, W.; Chen, B. Channel Modeling and Performance Analysis for UAV Relay Systems. China Commun. 2018, 15, 89–97. [Google Scholar]
- Chen, Y.; Zhao, N.; Ding, Z.; Alouini, M.-S. Multiple UAVs as Relays: Multi-Hop Single Link Versus Multiple Dual-Hop Links. IEEE Trans. Wirel. Commun. 2018, 17, 6348–6359. [Google Scholar] [CrossRef]
- Chen, Y.; Feng, W.; Zheng, G. Optimum Placement of UAV as Relays. IEEE Commun. Lett. 2018, 22, 248–251. [Google Scholar] [CrossRef]
- Liu, H.; Yoo, S.-J.; Kwak, K.S. Opportunistic relaying for low-altitude UAV swarm secure communications with multiple eavesdroppers. J. Commun. Netw. 2018, 20, 496–508. [Google Scholar] [CrossRef]
- Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying. IEEE Wirel. Commun. Lett. 2017, 6, 310–313. [Google Scholar] [CrossRef]
- Sun, X.; Yang, W.; Cai, Y.; Ma, R.; Tao, L. Physical Layer Security in Millimeter Wave SWIPT UAV-Based Relay Networks. IEEE Access 2019, 7, 35851–35862. [Google Scholar] [CrossRef]
- Hu, J.; Yang, W.; Yang, N.; Zhou, X.; Cai, Y. On-Off-Based Secure Transmission Design with Outdated Channel State Information. IEEE Trans. Veh. Technol. 2016, 65, 6075–6088. [Google Scholar] [CrossRef]
- Yang, W.; Tao, L.; Sun, X.; Ma, R.; Cai, Y.; Zhang, T. Secure On-off Transmission in mmWave Systems with Randomly Distributed Eavesdroppers. IEEE Access 2019, 7, 32681–32692. [Google Scholar] [CrossRef]
- Di Renzo, M. Stochastic Geometry Modeling and Analysis of Multi-Tier Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2015, 14, 5038–5057. [Google Scholar] [CrossRef]
- Cheng, M.; Wang, J.-B.; Wu, Y.; Xia, X.-G.; Wong, K.-K.; Lin, M. Coverage Analysis for Millimeter Wave Cellular Networks With Imperfect Beam Alignment. IEEE Trans. Veh. Technol. 2018, 67, 8302–8314. [Google Scholar] [CrossRef]
- Jia, S.; Zhang, J.; Zhao, H.; Lou, Y.; Xu, Y. Relay Selection for Improved Physical Layer Security in Cognitive Relay Networks Using Artificial Noise. IEEE Access 2018, 6, 64836–64846. [Google Scholar] [CrossRef]
- Zou, Y.; Wang, X.; Shen, W. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef]
- Krikidis, I.; Thompson, J.; Mclaughlin, S. Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8, 5003–5011. [Google Scholar] [CrossRef]
- Zhu, Y.; Zheng, G.; Fitch, M. Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes. IEEE J. Sel. Areas Commun. 2018, 36, 1397–1409. [Google Scholar] [CrossRef]
- Venugopal, K.; Valenti, M.C.; Heath, R.W. Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies. IEEE Trans. Wirel. Commun. 2016, 15, 6175–6188. [Google Scholar] [CrossRef]
- Thornburg, A.; Heath, R.W. Ergodic Rate of Millimeter Wave Ad Hoc Networks. IEEE Trans. Wirel. Commun. 2018, 17, 914–926. [Google Scholar] [CrossRef]
- Al-Hourani, A.; Kandeepan, S.; Lardner, S. Optimal LAP altitude for maximum coverage. IEEE Wirel. Commun. Lett. 2014, 3, 569–572. [Google Scholar] [CrossRef]
- Bai, T.; Heath, R.W. Coverage and Rate Analysis for Millimeter-Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2015, 14, 1100–1114. [Google Scholar] [CrossRef]
- Sun, X.; Yang, W.; Cai, Y.; Tao, L.; Liu, Y.; Huang, Y. Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1817–1829. [Google Scholar] [CrossRef]
- Wang, C.; Wang, H.-M. Physical Layer Security in Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2016, 15, 5569–5585. [Google Scholar] [CrossRef]
- Belbase, K.; Zhang, Z.; Jiang, H.; Tellambura, C. Coverage Analysis of Millimeter Wave Decode-and-Forward Networks with Best Relay Selection. IEEE Access 2018, 6, 22670–22683. [Google Scholar] [CrossRef]
- Zhao, R.; Yuan, Y.; Fan, L.; He, Y.C. Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami-m Fading Channels. IEEE Trans. Commun. 2017, 65, 549–563. [Google Scholar] [CrossRef]
- Alkhateeb, A.; Ayach, O.E.; Leus, G.; Heath, R.W. Channel Estimation and Hybrid Precoding for Millimeter Wave Cellular Systems. IEEE J. Sel. Top. Signal Process. 2014, 8, 831–846. [Google Scholar] [CrossRef]
- Heath, R.W.; González-Prelcic, N.; Rangan, S.; Roh, W.; Sayeed, A.M. An Overview of Signal Processing Techniques for Millimeter Wave MIMO Systems. IEEE J. Sel. Top. Signal Process. 2016, 10, 436–453. [Google Scholar] [CrossRef]
- Gao, Z.; Hu, C.; Dai, L.; Wang, Z. Channel Estimation for Millimeter-Wave Massive MIMO With Hybrid Precoding Over Frequency-Selective Fading Channels. IEEE Commun. Lett. 2016, 20, 1259–1262. [Google Scholar] [CrossRef]
- Gradshteyn, I.; Ryzhik, I. Table of Integrals Series and Product, 7th ed.; Academic: New York, NY, USA, 2007. [Google Scholar]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).