446 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels
In this paper we consider the robust secure beamformer design for MISO
wiretap channels. Assume that the eavesdroppers' channels are only partially
available at the transmitter, we seek to maximize the secrecy rate under the
transmit power and secrecy rate outage probability constraint. The outage
probability constraint requires that the secrecy rate exceeds certain threshold
with high probability. Therefore including such constraint in the design
naturally ensures the desired robustness. Unfortunately, the presence of the
probabilistic constraints makes the problem non-convex and hence difficult to
solve. In this paper, we investigate the outage probability constrained secrecy
rate maximization problem using a novel two-step approach. Under a wide range
of uncertainty models, our developed algorithms can obtain high-quality
solutions, sometimes even exact global solutions, for the robust secure
beamformer design problem. Simulation results are presented to verify the
effectiveness and robustness of the proposed algorithms
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints
In this paper, we study multibeam satellite secure communication through
physical (PHY) layer security techniques, i.e., joint power control and
beamforming. By first assuming that the Channel State Information (CSI) is
available and the beamforming weights are fixed, a novel secure satellite
system design is investigated to minimize the transmit power with individual
secrecy rate constraints. An iterative algorithm is proposed to obtain an
optimized power allocation strategy. Moreover, sub-optimal beamforming weights
are obtained by completely eliminating the co-channel interference and nulling
the eavesdroppers' signal simultaneously. In order to obtain jointly optimized
power allocation and beamforming strategy in some practical cases, e.g., with
certain estimation errors of the CSI, we further evaluate the impact of the
eavesdropper's CSI on the secure multibeam satellite system design. The
convergence of the iterative algorithm is proven under justifiable assumptions.
The performance is evaluated by taking into account the impact of the number of
antenna elements, number of beams, individual secrecy rate requirement, and
CSI. The proposed novel secure multibeam satellite system design can achieve
optimized power allocation to ensure the minimum individual secrecy rate
requirement. The results show that the joint beamforming scheme is more
favorable than fixed beamforming scheme, especially in the cases of a larger
number of satellite antenna elements and higher secrecy rate requirement.
Finally, we compare the results under the current satellite air-interface in
DVB-S2 and the results under Gaussian inputs.Comment: 34 pages, 10 figures, 1 table, submitted to "Transactions on
Information Forensics and Security
Secrecy Sum-Rates with Regularized Channel Inversion Precoding under Imperfect CSI at the Transmitter
In this paper, we study the performance of regularized channel inversion
precoding in MISO broadcast channels with confidential messages under imperfect
channel state information at the transmitter (CSIT). We obtain an approximation
for the achievable secrecy sum-rate which is almost surely exact as the number
of transmit antennas and the number of users grow to infinity in a fixed ratio.
Simulations prove this anaylsis accurate even for finite-size systems. For FDD
systems, we determine how the CSIT error must scale with the SNR, and we derive
the number of feedback bits required to ensure a constant high-SNR rate gap to
the case with perfect CSIT. For TDD systems, we study the optimum amount of
channel training that maximizes the high-SNR secrecy sum-rate.Comment: IEEE International Conference on Acoustics, Speech, and Signal
Processing (ICASSP), May 2013. arXiv admin note: text overlap with
arXiv:1304.585
Exploiting Amplitude Control in Intelligent Reflecting Surface Aided Wireless Communication with Imperfect CSI
Intelligent reflecting surface (IRS) is a promising new paradigm to achieve
high spectral and energy efficiency for future wireless networks by
reconfiguring the wireless signal propagation via passive reflection. To reap
the potential gains of IRS, channel state information (CSI) is essential,
whereas channel estimation errors are inevitable in practice due to limited
channel training resources. In this paper, in order to optimize the performance
of IRS-aided multiuser systems with imperfect CSI, we propose to jointly design
the active transmit precoding at the access point (AP) and passive reflection
coefficients of IRS, each consisting of not only the conventional phase shift
and also the newly exploited amplitude variation. First, the achievable rate of
each user is derived assuming a practical IRS channel estimation method, which
shows that the interference due to CSI errors is intricately related to the AP
transmit precoders, the channel training power and the IRS reflection
coefficients during both channel training and data transmission. Then, for the
single-user case, by combining the benefits of the penalty method, Dinkelbach
method and block successive upper-bound minimization (BSUM) method, a new
penalized Dinkelbach-BSUM algorithm is proposed to optimize the IRS reflection
coefficients for maximizing the achievable data transmission rate subjected to
CSI errors; while for the multiuser case, a new penalty dual decomposition
(PDD)-based algorithm is proposed to maximize the users' weighted sum-rate.
Simulation results are presented to validate the effectiveness of our proposed
algorithms as compared to benchmark schemes. In particular, useful insights are
drawn to characterize the effect of IRS reflection amplitude control
(with/without the conventional phase shift) on the system performance under
imperfect CSI.Comment: 15 pages, 10 figures, accepted by IEEE Transactions on Communication
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
- …