{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:48:36Z","timestamp":1740149316945,"version":"3.37.3"},"reference-count":37,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471393","61771487"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"This paper investigates the secrecy performance of a cognitive millimeter wave (mmWave) wiretap sensor network, where the secondary transmitter (SU-Tx) intends to communicate with a secondary sensor node under the interference temperature constraint of the primary sensor node. We consider that the random-location eavesdroppers may reside in the signal beam of the secondary network, so that confidential information can still be intercepted. Also, the interference to the primary network is one of the critical issues when the signal beam of the secondary network is aligned with the primary sensor node. Key features of mmWave networks, such as large number of antennas, variable propagation law and sensitivity to blockages, are taken into consideration. Moreover, an eavesdropper-exclusion sector guard zone around SU-Tx is introduced to improve the secrecy performance of the secondary network. By using stochastic geometry, closed-form expression for secrecy throughput (ST) achieved by the secondary sensor node is obtained to investigate secrecy performance. We also carry out the asymptotic analysis to facilitate the performance evaluation in the high transmit power region. Numerical results demonstrate that the interference temperature constraint of the primary sensor node enables us to balance secrecy performance of the secondary network, and provides interesting insights into how the system performance of the secondary network that is influenced by various system parameters: eavesdropper density, antenna gain and sector guard zone radius. Furthermore, blockages are beneficial to improve ST of the secondary sensor node under certain conditions.<\/jats:p>","DOI":"10.3390\/s19143184","type":"journal-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T06:55:37Z","timestamp":1563778537000},"page":"3184","source":"Crossref","is-referenced-by-count":2,"title":["On the Performance of Random Cognitive mmWave Sensor Networks"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1999-627X","authenticated-orcid":false,"given":"Yi","family":"Song","sequence":"first","affiliation":[{"name":"School of Physics and Electronic Electrical Engineering, Huaiyin Normal University, Huai\u2019an 223300, China"},{"name":"College of Communications Engineering, Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"},{"name":"Jiangsu Province Key Construction Laboratory of Modern Measurement Technology and Intelligent System, Huai\u2019an 223300, China"}]},{"given":"Weiwei","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Zhongwu","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Biao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information, Jiangsu University of Science and Technology, Zhenjiang 212003, China"}]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1049\/iet-com.2016.0976","article-title":"Wavelet-Based Cognitive SCMA System for mmWave 5G Communication Networks","volume":"11","author":"Hosseini","year":"2017","journal-title":"IET Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1049\/iet-com.2016.0128","article-title":"Joint Wavelet-Based Spectrum Sensing and FBMC Modulation for Cognitive mmWave Small Cell Networks","volume":"10","author":"Hosseini","year":"2016","journal-title":"IET Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TCCN.2018.2815615","article-title":"Inter-Operator Base Station Coordination in Spectrum-Shared Millimeter Wave Cellular Networks","volume":"4","author":"Park","year":"2018","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/JSAC.2016.2605901","article-title":"On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks","volume":"34","author":"Xu","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/SURV.2011.122211.00162","article-title":"A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks","volume":"15","author":"Fragkiadakis","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless Information-Theoretic Security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Shi, H., Yang, W., Chen, D., Luo, Y., and Cai, Y. (2018). Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks. Sensors, 19.","DOI":"10.3390\/s19010076"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Tang, X., Cai, Y., Yang, W., Yang, W., Chen, D., and Hu, J. (2018). Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18020331"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/LWC.2019.2899309","article-title":"Secure Transmission in Non-Orthogonal Multiple Access Networks with an Untrusted Relay","volume":"8","author":"Xiang","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1109\/JSTSP.2019.2902103","article-title":"Physical Layer Security in Cognitive Radio Inspired NOMA Network","volume":"13","author":"Xiang","year":"2019","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_12","first-page":"2035","article-title":"Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems","volume":"67","author":"Tang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/TCOMM.2018.2873690","article-title":"Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks","volume":"67","author":"Li","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"7225","DOI":"10.1109\/TVT.2019.2913934","article-title":"Secrecy Analysis in Wireless Network with Passive Eavesdroppers by Using Partial Cooperation","volume":"68","author":"Atallah","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Jameel, F., Wyne, S., Kaddoum, G., and Duong, T.Q. (2019). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Commun. Surv. Tutor.","DOI":"10.1109\/COMST.2018.2865607"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/TIFS.2015.2500178","article-title":"Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers","volume":"11","author":"Xu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1049\/iet-com.2016.0117","article-title":"Secure Transmission in the Random Cognitive Radio Networks with Secrecy Guard Zone and Artificial Noise","volume":"10","author":"Cai","year":"2017","journal-title":"IET Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1109\/JSAC.2014.141121","article-title":"Secrecy Outage and Diversity Analysis of Cognitive Radio Systems","volume":"32","author":"Zou","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Atallah, M., and Kaddoum, G. (2019). Design and Performance Analysis of Secure Multicasting Cooperative Protocol for Wireless Sensor Network Applications. IEEE Wirel. Commun. Lett.","DOI":"10.1109\/LWC.2019.2922610"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3231","DOI":"10.1109\/TCOMM.2013.061013.120459","article-title":"Antenna Subset Modulation for Secure Millimeter-Wave Wireless Communication","volume":"61","author":"Valliappan","year":"2013","journal-title":"IEEE Trans. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","article-title":"Safeguarding 5G Wireless Communication Networks Using Physical Layer Security","volume":"53","author":"Yang","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"32681","DOI":"10.1109\/ACCESS.2019.2898180","article-title":"Secure on-off transmission in mmWave systems with randomly distributed eavesdroppers","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3507","DOI":"10.1109\/TCOMM.2016.2587287","article-title":"An Analysis on Secure Communication in Millimeter\/Micro-Wave Hybrid Networks","volume":"64","author":"Vuppala","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wang, L., Elkashlan, M., Duong, T.Q., and Heath, R.W. (2014, January 22\u201325). Secure Communication in Cellular Networks: The Benefits of Millimeter Wave Mobile Broadband. Proceedings of the 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Toronto, ON, Canada.","DOI":"10.1109\/SPAWC.2014.6941328"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"5569","DOI":"10.1109\/TWC.2016.2562010","article-title":"Physical Layer Security in Millimeter Wave Cellular Networks","volume":"15","author":"Wang","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3205","DOI":"10.1109\/TWC.2017.2676087","article-title":"Secure Communications in Millimeter Wave Ad Hoc Networks","volume":"16","author":"Zhu","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/LWC.2019.2892771","article-title":"Secure Transmissions in Millimeter Wave SWIPT UAV-Based Relay Networks","volume":"8","author":"Sun","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/JSAC.2018.2825158","article-title":"Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Mat\u00e9rn Hardcore Point Processes","volume":"36","author":"Zhu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Rangan, S., Rappaport, T.S., and Erkip, E. (2014). Millimeter-Wave Cellular Wireless Networks: Potentials and Challenges. arXiv.","DOI":"10.1109\/JPROC.2014.2299397"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1109\/TCOMM.2017.2776944","article-title":"On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks","volume":"66","author":"Vuppala","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Tao, L., Yang, W., Yang, W., and Cai, Y. (2018, January 18\u201320). Capacity Threshold-based On-off Transmission in mmWave Systems with Randomly Distributed Eavesdroppers. Proceedings of the 10th International Conference on Wireless Communications and Signal Processing (WCSP 2018), Hangzhou, China.","DOI":"10.1109\/WCSP.2018.8555692"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"76104","DOI":"10.1109\/ACCESS.2019.2920963","article-title":"Secure Transmission in mmWave NOMA Networks With Cognitive Power Allocation","volume":"7","author":"Song","year":"2019","journal-title":"IEEE Access."},{"key":"ref_33","first-page":"4463","article-title":"Coverage in Heterogeneous Downlink Millimeter Wave Cellular Networks","volume":"65","author":"Turgut","year":"2017","journal-title":"IEEE Trans. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"7030","DOI":"10.1109\/TWC.2015.2463818","article-title":"Achieving Secrecy Without Knowing the Number of Eavesdropper Antennas","volume":"14","author":"He","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1109\/TCCN.2017.2763619","article-title":"On the Performance of Cognitive Satellite-Terrestrial Networks","volume":"3","author":"Kolawole","year":"2017","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2388","DOI":"10.1109\/ACCESS.2015.2486778","article-title":"Indoor Office Wideband Millimeter-wave Propagation Measurements and Channel Models at 28 and 73 GHz for Ultra-Dense 5G Wireless Networks","volume":"3","author":"MacCartney","year":"2015","journal-title":"IEEE Access."},{"key":"ref_37","unstructured":"Gradshteyn, I.S., and Ryzhik, I.M. (2007). Table of Integrals, Series, and Products, Academic Press. [7th ed.]."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/14\/3184\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T06:02:10Z","timestamp":1718776930000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/14\/3184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":37,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2019,7]]}},"alternative-id":["s19143184"],"URL":"https:\/\/doi.org\/10.3390\/s19143184","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,7,19]]}}}