1,094 research outputs found
Unified Capacity Limit of Non-coherent Wideband Fading Channels
In non-coherent wideband fading channels where energy rather than spectrum is
the limiting resource, peaky and non-peaky signaling schemes have long been
considered species apart, as the first approaches asymptotically the capacity
of a wideband AWGN channel with the same average SNR, whereas the second
reaches a peak rate at some finite critical bandwidth and then falls to zero as
bandwidth grows to infinity. In this paper it is shown that this distinction is
in fact an artifact of the limited attention paid in the past to the product
between the bandwidth and the fraction of time it is in use. This fundamental
quantity, called bandwidth occupancy, measures average bandwidth usage over
time. For all signaling schemes with the same bandwidth occupancy, achievable
rates approach to the wideband AWGN capacity within the same gap as the
bandwidth occupancy approaches its critical value, and decrease to zero as the
occupancy goes to infinity. This unified analysis produces quantitative
closed-form expressions for the ideal bandwidth occupancy, recovers the
existing capacity results for (non-)peaky signaling schemes, and unveils a
trade-off between the accuracy of approximating capacity with a generalized
Taylor polynomial and the accuracy with which the optimal bandwidth occupancy
can be bounded.Comment: Accepted for publication in IEEE Transactions on Wireless
Communications. Copyright may be transferred without notic
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
- …