Abstract

Due to the densifying of users and the reflections caused by small-scale objects, secure communication is an important research problem in dense millimeter-wave (mmWave) networks. In this paper, we investigate the resource management problem of joint transmission reception point (TRP) selection, power control and beamwidth selection for maximizing the secure sum rate in the dense mmWave network, while considering beamforming training overheads, blockage effect in mmWave communications, and imperfect channel state information (CSI) from a legitimate user equipment (LUE) to the corresponding malicious user equipment (MUE). To handle the problem with low complexity, we first break it down into two subproblems (i.e., TRP selection and joint power control and beamwidth allocation), and propose a two-stage game based decentralized resource management approach to solve them iteratively, where in the first stage we propose a matching game based distributed TRP selection algorithm to solve the first subproblem in which novel utilities for both LUEs and TRPs are designed to handle the high directivity transmission problem, and in the second stage we propose a weekly acyclic game based two-dimensional-strategy concurrent better response algorithm for the second subproblem to deal with the huge strategy space, which has been proved to converge to an invariant two-dimensional-strategy Nash equilibrium (NE). Moreover, to adapt to the three-dimensional optimization variables and the huge strategy space of the considered problem, we also propose a new three-dimensional-strategy iterative weekly acyclic game to solve it, where the three-dimensional optimization variables are optimized alternately during the decision-making process. Finally, extensive simulations are conducted to verify the effectiveness of the proposed schemes.

Highlights

  • With the popularity of various intelligent devices, conventional communication technologies are hard to meet the demand for the explosive growth of mobile traffic [1]–[5]

  • The eavesdroppers in a dense mmWave network are more likely to reside in the signal beams of legitimate user equipments (LUEs), and eavesdroppers can still intercept the confidential messages of LUEs [9]

  • We investigate the joint transmission reception point (TRP) selection, power control and beamwidth selection problem to maximize the secure sum rate in dense mmWave networks with consideration of the beamforming training overheads, the blockage effect of mmWave communications, and the imperfect channel state information (CSI) of each LUE to its corresponding malicious user equipment (MUE), which is the first work to maximize the secure sum rate for dense mmWave networks with consideration of various factors

Read more

Summary

INTRODUCTION

With the popularity of various intelligent devices, conventional communication technologies are hard to meet the demand for the explosive growth of mobile traffic [1]–[5]. In [28] and [29], the secrecy performance enhancement schemes for secure unmanned aerial vehicle (UAV) networks with reconfigurable intelligent surface and for multi-antenna broadcast channels were studied by joint trajectory and passive beamforming design and by cooperative rate-splitting, respectively These works focus mainly on the performance analysis of secure mmWave communications rather than radio resource management. The huge action spaces of LUEs in dense mmWave networks along with the constraints imposed on the limited number of beams for each HF TRP pose a great challenge on the complexity and signaling overheads of finding the solution for centralized schemes, and efficiently decentralized schemes with lower complexity are urgent desired Motivated by these challenges, in this work, we focus on designing efficiently decentralized solutions to the joint TRP selection and resource allocation problem for maximizing the secrecy sum rate in the dense mmWave network. Replacing φut ,n with φur,n, we can get the reception gain gru,n(φur,n) of receiver n associated with transmitter u

PROBLEM FORMULATION
COMPLEXITY ANALYSIS
SIMULATION RESULTS AND ANALYSIS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.