65 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
QoS Aware Transmit Beamforming for Secure Backscattering in Symbiotic Radio Systems
This paper focuses on secure backscatter transmission in the presence of a
passive multi-antenna eavesdropper through a symbiotic radio (SR) network.
Specifically, a single-antenna backscatter device (BD) aims to transmit
confidential information to a primary receiver (PR) by using a multi-antenna
primary transmitter's (PT) signal, where the received symbols are jointly
decoded at the PR. Our objective is to achieve confidential communications for
BD while ensuring that the primary system's quality of service (QoS)
requirements are met. We propose an alternating optimisation algorithm that
maximises the achievable secrecy rate of BD by jointly optimising primary
transmit beamforming and power sharing between information and artificial noise
(AN) signals. Numerical results verify our analytical claims on the optimality
of the proposed solution and the proposed methodology's underlying low
complexity. Additionally, our simulations provide nontrivial design insights
into the critical system parameters and quantify the achievable gains over the
relevant benchmark schemes
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
A Critical Review of Physical Layer Security in Wireless Networking
Wireless networking has kept evolving with additional features and increasing capacity. Meanwhile, inherent characteristics of wireless networking make it more vulnerable than wired networks. In this thesis we present an extensive and comprehensive review of physical layer security in wireless networking. Different from cryptography, physical layer security, emerging from the information theoretic assessment of secrecy, could leverage the properties of wireless channel for security purpose, by either enabling secret communication without the need of keys, or facilitating the key agreement process. Hence we categorize existing literature into two main branches, namely keyless security and key-based security. We elaborate the evolution of this area from the early theoretic works on the wiretap channel, to its generalizations to more complicated scenarios including multiple-user, multiple-access and multiple-antenna systems, and introduce not only theoretical results but practical implementations. We critically and systematically examine the existing knowledge by analyzing the fundamental mechanics for each approach. Hence we are able to highlight advantages and limitations of proposed techniques, as well their interrelations, and bring insights into future developments of this area
On the Design and Analysis of Secure Inference Networks
Parallel-topology inference networks consist of spatially-distributed sensing agents that collect and transmit observations to a central node called the fusion center (FC), so that a global inference is made regarding the phenomenon-of-interest (PoI). In this dissertation, we address two types of statistical inference, namely binary-hypothesis testing and scalar parameter estimation in parallel-topology inference networks. We address three different types of security threats in parallel-topology inference networks, namely Eavesdropping (Data-Confidentiality), Byzantine (Data-Integrity) or Jamming (Data-Availability) attacks. In an attempt to alleviate information leakage to the eavesdropper, we present optimal/near-optimal binary quantizers under two different frameworks, namely differential secrecy where the difference in performances between the FC and Eve is maximized, and constrained secrecy where FC’s performance is maximized in the presence of tolerable secrecy constraints. We also propose near-optimal transmit diversity mechanisms at the sensing agents in detection networks in the presence of tolerable secrecy constraints. In the context of distributed inference networks with M-ary quantized sensing data, we propose a novel Byzantine attack model and find optimal attack strategies that minimize KL Divergence at the FC in the presence of both ideal and non-ideal channels. Furthermore, we also propose a novel deviation-based reputation scheme to detect Byzantine nodes in a distributed inference network. Finally, we investigate optimal jamming attacks in detection networks where the jammer distributes its power across the sensing and the communication channels. We also model the interaction between the jammer and a centralized detection network as a complete information zero-sum game. We find closed-form expressions for pure-strategy Nash equilibria and show that both the players converge to these equilibria in a repeated game. Finally, we show that the jammer finds no incentive to employ pure-strategy equilibria, and causes greater impact on the network performance by employing mixed strategies
Beamforming optimization for two-way relay channel
In this thesis, we focus on the optimization of the two-way relay channel (TWRC), which can double the data rate of communications comparing to the traditional one-way relay channel (OWRC). Because of the broadcasting nature of wireless transmissions, secure transmission is an appealing research topic. We take secrecy rate consideration into the optimization of the TWRC. Overall we provide near-optimal solutions for the secrecy rate maximization problems of the TWRC with imperfect channel state information (ICSI). A much lower complexity optimal SOCP solution is provided for SNR balancing of the TWRC without secrecy consideration. We first look at a flat fading TWRC network model with a multiple-input multiple-output (MIMO) relay where perfect channel state information (CSI) is assumed available. We then formulate an optimization problem, with the objective to minimize the relay’s power usage under the constraints that the signal-to-noise ratio (SNR) of the two transceivers should exceed a preset threshold. A low-complexity optimal beamforming solution is provided to this optimization problem by reformulating it in the form of second-order cone programming (SOCP). Later in the thesis, we consider the presence of an eavesdropper and address the beamforming optimization for minimizing the relay’s power with the constraints of the secrecy rates of the two transceivers. A semi-definite programming (SDP) based searching algorithm is proposed to find a near-optimal solution. For each search of the proposed approach, the previous non-convex optimization problem is transferred into an SDP problem, which can guarantee the optimality of the beamforming matrix. Afterwards, more realistic imperfect CSI (ICSI) situations are considered for the TWRC network models. As ICSI completely changes the structure and the property of the optimization problems, we reformulate the optimization problems into two scenarios. For the first case, we consider that the relay is an untrusted eavesdropper and in this case an SDP solution is provided to maximize the joint-decoding sum-secrecy rate. For the second case, we investigate the robust beamforming problems where the relay is trusted but there is an external eavesdropper, another SDP solution is provided to maximize the sum-secrecy rate
- …