6 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Resource Allocation for Interference Management in Wireless Networks
Interference in wireless networks is a major problem that impacts system performance quite substantially. Combined with the fact that the spectrum is limited and scarce, the performance and reliability of wireless systems significantly deteriorates and, hence, communication sessions are put at the risk of failure. In an attempt to make transmissions resilient to interference and, accordingly, design robust wireless systems, a diverse set of interference mitigation techniques are investigated in this dissertation.
Depending on the rationale motivating the interfering node, interference can be divided into two categories, communication and jamming. For communication interference such as the interference created by legacy users(e.g., primary user transmitters in a cognitive radio network) at non-legacy or unlicensed users(e.g.,secondary user receivers), two mitigation techniques are presented in this dissertation. One exploits permutation trellis codes combined with M-ary frequency shift keying in order to make SU transmissions resilient to PUs’ interference, while the other utilizes frequency allocation as a mitigation technique against SU interference using Matching theory. For jamming interference, two mitigation techniques are also investigated here. One technique exploits time and structures a jammer mitigation framework through an automatic repeat request protocol. The other one utilizes power and, following a game-theoretic framework, employs a defense strategy against jamming based on a strategic power allocation. Superior performance of all of the proposed mitigation techniques is shown via numerical results