11 research outputs found
Secrecy Energy Efficiency of MIMOME Wiretap Channels with Full-Duplex Jamming
Full-duplex (FD) jamming transceivers are recently shown to enhance the
information security of wireless communication systems by simultaneously
transmitting artificial noise (AN) while receiving information. In this work,
we investigate if FD jamming can also improve the systems secrecy energy
efficiency (SEE) in terms of securely communicated bits-per- Joule, when
considering the additional power used for jamming and self-interference (SI)
cancellation. Moreover, the degrading effect of the residual SI is also taken
into account. In this regard, we formulate a set of SEE maximization problems
for a FD multiple-input-multiple-output multiple-antenna eavesdropper (MIMOME)
wiretap channel, considering both cases where exact or statistical channel
state information (CSI) is available. Due to the intractable problem structure,
we propose iterative solutions in each case with a proven convergence to a
stationary point. Numerical simulations indicate only a marginal SEE gain,
through the utilization of FD jamming, for a wide range of system conditions.
However, when SI can efficiently be mitigated, the observed gain is
considerable for scenarios with a small distance between the FD node and the
eavesdropper, a high Signal-to-noise ratio (SNR), or for a bidirectional FD
communication setup.Comment: IEEE Transactions on Communication
Optimising multiple antenna techniques for physical layer security
Wireless communications offer data transmission services anywhere and anytime, but with the inevitable cost of introducing major security vulnerabilities. Indeed, an eavesdropper can overhear a message conveyed over the open insecure wireless media putting at risk the confidentiality of the wireless users. Currently, the way to partially prevent eavesdropping attacks is by ciphering the information between the authorised parties through complex cryptographic algorithms. Cryptography operates in the upper layers of the communication model, bit it does not address the security problem where the attack is suffered: at the transmission level.
In this context, physical layer security has emerged as a promising framework to prevent eavesdropping attacks at the transmission level. Physical layer security is based on information-theoretic concepts and exploits the randomness and the uniqueness of the wireless channel. In this context, this thesis presents signal processing techniques to secure wireless networks at the physical layer by optimising the use of multiple-antennas. A masked transmission strategy is used to steer the confidential information towards the intended receiver, and, at the same time, broadcast an interfering signal to confuse unknown eavesdroppers. This thesis considers practical issues in multiple-antenna networks such as limited transmission resources and the lack of accurate information between the authorised transmission parties. The worst-case for the security, that occurs when a powerful eavesdropper takes advantage of any opportunity to put at risk the transmission confidentiality, is addressed. The techniques introduced improve the security by offering efficient and innovative transmission solutions to lock the communication at the physical layer. Notably, these transmission mechanisms strike a balance between confidentiality and quality to satisfy the practical requirements of modern wireless networks
Recommended from our members
MIMO-based Friendly Jamming and Interference Management Techniques for Secure Wireless Communications
The ever-increasing growth of wireless systems has made them an essential part of our daily life. People rely heavily on wireless networks for communications and to conduct critical transactions from their mobile devices, including financial transactions, access to health records, etc. The proliferation of wireless communication devices opens the door for many security breaches, ranging from eavesdropping to jamming attacks. Such a disadvantage stems from the broadcast nature of wireless transmissions, which creates an exposed environment.
In this dissertation, we focus on eavesdropping attacks. While cryptographic techniques can be used to thwart eavesdropping attacks and enable secure wireless communications, they are not sufficient to protect the lower-layer headers of a packet (i.e., PHY and MAC headers). Hence, even though the secret message is encrypted, these unencrypted headers can be exploited by an adversary to extract invaluable information and initiate malicious attacks (e.g., traffic classification). Physical-layer (PHY-layer) security has been introduced as a promising candidate to prevent attacks that exploit unencrypted lower layer headers.
PHY-layer security techniques typically rely on injecting an intentional interference into the medium so as to confuse nearby eavesdroppers (Eve). Specifically, a legitimate transmit-receive (Alice-Bob) pair generates a bogus signal, namely friendly jamming (FJ), along with the information signal, to increase interference at Eve(s) but without affecting the legitimate receiver (Bob). Depending on which end of a legitimate link is responsible for generating the FJ signal, two types of FJ techniques exist: transmitter-based (TxFJ) and receiver-based (RxFJ).
In this dissertation, we propose to advance the state-of-art in PHY-layer security by considering multi-link scenarios, including multi-user multiple-input multiple-output (MU-MIMO) and peer-to-peer (P2P) networks. Specifically, we consider a scenario where one or more external Eve(s) attempt to snoop on communications of various links. In such networks, transmission of one link may be interfered with neighboring links' transmissions. Thus, special care must be dedicated to handling interference.
In our first contribution in this dissertation, we consider a P2P network tapped by external Eve(s) in which each Alice-Bob pair conceals its communications using TxFJ. TxFJ is realized at Alice side using MIMO precoding. The goal is to design the precoders for both information and TxFJ signals at all Alices so as to maximize a given utility (e.g., sum of communication rates) while preventing eavesdropping elsewhere. Because legitimate links do not cooperate with each other and there is no centralized authority to perform optimization, every link selfishly aims at maximizing its secrecy rate. Using non-cooperative game theory, we design a distributed method for maximizing the sum of secrecy rates. Under the exact knowledge of eavesdropping channels, we show that our distributed method has a comparable secrecy sum-rate to a centralized approach.
In our next contribution, we focus on employing practical precoders in our design for a P2P network. Specifically, we employed a zero-forcing-based (ZF-based) precoder for the TxFJ of each Alice-Bob pair in a P2P network. We also assume that each link has a certain rate demand to be satisfied. In such a scenario, even though the non-cooperative game designed for this P2P network is shown to be convergent to its unique Nash Equilibrium (NE), there is still no guarantee that the resulting NE is Pareto-optimal. Hence, we propose a modified price-based game, in which each link is penalized for generating interference on other legitimate links. We show that the price-based game converges to the Pareto-optimal point of secrecy rate region. We then leverage mixed-strategy games to provide solutions that are robust to uncertainties in knowledge of eavesdropping channels. The proposed ZF-based design of precoders is also implemented on software-defined radios to assess its performance on a single link in real-world scenarios.
In another contribution of this dissertation, we consider to further enhance the secrecy of each link in a P2P network by equipping each receiver with RxFJ. Hence, in addition to the power allocation between TxFJ and information signals, we optimize RxFJ power as well. We show that by using RxFJ at each Bob, we could leverage the well-established concept of concave games, which compared to non-convex games enjoy more simplified game-theoretic analysis. We derive sufficient conditions under which the game admits a unique NE. We also propose another version of our power control algorithm that can be implemented asynchronously, making it robust to transmission delays in the network.
In our last contribution, we consider the downlink of a MU-MIMO network in the presence of an external Eve. No knowledge of Eve's location is assumed at the access point. The network is studied in underloaded and overloaded conditions. In an underloaded (overloaded) network, the number of antennas at the access point is larger (smaller) than the total number of downlink users' antennas. In the overloaded setting, traditional methods of creating TxFJ, such as ZF-based methods, are infeasible. We propose a linear precoding scheme that relaxes such infeasibility in overloaded MU-MIMO networks. In the worst-case scenario where Eve has knowledge of the channels between access point and downlink users, we show that our method imposes the most stringent condition on the number of antennas required at Eve to cancel out TxFJ signals. We also show that choosing the number of independent streams to be sent to downlink users has an important role in achieving a tradeoff between security, reliability, and the achievable rate
Visible Light Communication Cyber Security Vulnerabilities For Indoor And Outdoor Vehicle-To-Vehicle Communication
Light fidelity (Li-Fi), developed from the approach of Visible Light Communication (VLC), is a great replacement or complement to existing radio frequency-based (RF) networks. Li-Fi is expected to be deployed in various environments were, due to Wi-Fi congestion and health limitations, RF should not be used. Moreover, VLC can provide the future fifth generation (5G) wireless technology with higher data rates for device connectivity which will alleviate the traffic demand. 5G is playing a vital role in encouraging the modern applications. In 2023, the deployment of all the cellular networks will reach more than 5 billion users globally. As a result, the security and privacy of 5G wireless networks is an essential problem as those modern applications are in people\u27s life everywhere. VLC security is as one of the core physical-layer security (PLS) solutions for 5G networks. Due to the fact that light does not penetrate through solid objects or walls, VLC naturally has higher security and privacy for indoor wireless networks compared to RF networks. However, the broadcasting nature of VLC caused concerns, e.g., eavesdropping, have created serious attention as it is a crucial step to validate the success of VLC in wild. The aim of this thesis is to properly address the security issues of VLC and further enhance the VLC nature security. We analyzed the secrecy performance of a VLC model by studying the characteristics of the transmitter, receiver and the visible light channel. Moreover, we mitigated the security threats in the VLC model for the legitimate user, by 1) implementing more access points (APs) in a multiuser VLC network that are cooperated, 2) reducing the semi-angle of LED to help improve the directivity and secrecy and, 3) using the protected zone strategy around the AP where eavesdroppers are restricted. According to the model\u27s parameters, the results showed that the secrecy performance in the proposed indoor VLC model and the vehicle-to-vehicle (V2V) VLC outdoor model using a combination of multiple PLS techniques as beamforming, secure communication zones, and friendly jamming is enhanced. The proposed model security performance was measured with respect to the signal to noise ratio (SNR), received optical power, and bit error rate (BER) Matlab simulation results
Interference as an Issue and a Resource in Wireless Networks
This dissertation will be focused on the phenomenon of interference in wireless net- works. On one hand, interference will be viewed as a negative factor that one should mitigate in order to improve the performance of a wireless network in terms of achiev- able rate, and on the other hand as an asset to increase the performance of a network in terms of security. The problems that will be investigated are, first, the character- isation of the performance of a communication network modelled as an interference channel (IC) when interference alignment (IA) is used to mitigate the interference with imperfect knowledge of the channel state, second, the characterisation of the secrecy in the Internet-of-Things (IoT) framework where some devices may use artificial noise to generate interference to potential eavesdroppers. Different scenarios will be studied in the case where interference is unwanted; the first one is when the channel error is bounded. A lower bound on the capacity achievable in this case is provided and a new performance metric namely the saturating SNR is derived. The derived lower bound is studied with respect to some parameters of the estimation strategy when using Least-Square estimation to estimate the channel ma- trices. The second scenario deals with unbounded Gaussian estimation errors, here the statistical distribution of the achievable rate is given along with a new performance metric called outage probability that simplifies the study of the IC with IA under im- perfect CSI. The results are used to optimise the network parameters and extend the analysis further to the case of cellular networks. In the wanted interference situation, the secrecy of the worst-case communication is studied and the conditions for secrecy are provided. Furthermore the average number of secure links achievable in the network is studied according to a theoretical model that is developed for the IoT case
Enhancing physical layer security in wireless networks with cooperative approaches
Motivated by recent developments in wireless communication, this thesis aims to
characterize the secrecy performance in several types of typical wireless networks.
Advanced techniques are designed and evaluated to enhance physical layer security in
these networks with realistic assumptions, such as signal propagation loss, random node
distribution and non-instantaneous channel state information (CSI).
The first part of the thesis investigates secret communication through relay-assisted
cognitive interference channel. The primary and secondary base stations (PBS and SBS)
communicate with the primary and secondary receivers (PR and SR) respectively in the
presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with
the PBS over the same spectrum instead of waiting for an idle channel. To improve
security, cognitive relays transmit cooperative jamming (CJ) signals to create additional
interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to
improve the secrecy rate of cognitive interference channels depending on the structure of
cooperative relays. In the scheme where the multiple-antenna relay transmits weighted
jamming signals, the combined approach of CJ and beamforming is investigated. In
the scheme with multiple relays transmitting weighted jamming signals, the combined
approach of CJ and relay selection is analyzed. Numerical results show that both these
two schemes are effective in improving physical layer security of cognitive interference
channel.
In the second part, the focus is shifted to physical layer security in a random wireless
network where both legitimate and eavesdropping nodes are randomly distributed. Three
scenarios are analyzed to investigate the impact of various factors on security. In
scenario one, the basic scheme is studied without a protected zone and interference. The
probability distribution function (PDF) of channel gain with both fading and path loss
has been derived and further applied to derive secrecy connectivity and ergodic secrecy
capacity. In the second scenario, we studied using a protected zone surrounding the source
node to enhance security where interference is absent. Both the cases that eavesdroppers
are aware and unaware of the protected zone boundary are investigated. Based on the
above scenarios, further deployment of the protected zones at legitimate receivers is
designed to convert detrimental interference into a beneficial factor. Numerical results
are investigated to check the reliability of the PDF for reciprocal of channel gain and to
analyze the impact of protected zones on secrecy performance.
In the third part, physical layer security in the downlink transmission of cellular network
is studied. To model the repulsive property of the cellular network planning, we assume
that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while
the eavesdroppers are deployed as an independent Poisson point process (PPP). The
distribution function of the distances from a typical point to the nodes of the HCPP is
derived. The noise-limited and interference-limited cellular networks are investigated
by applying the fractional frequency reuse (FFR) in the system. For the noise-limited
network, we derive the secrecy outage probability with two different strategies, i.e. the
best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For
the interference-limited network with the nearest BS serve, two transmission schemes are
analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both
the schemes of transmitting with the best BS and the application of the FFR are beneficial
for physical layer security in the downlink cellular networks, while the improvement du
Performance analysis of multi-antenna wireless systems
In this thesis we apply results from multivariate probability, random matrix theory (RMT) and free probability theory (FPT) to analyse the theoretical performance limits of future-generation wireless communication systems which implement multiple-antenna technologies. Motivated by the capacity targets for fifth generation wireless communications, our work focuses on quantifying the performance of these systems in terms of several relevant metrics, including ergodic rate and capacity, secrecy rate and capacity, asymptotic capacity, outage probability, secrecy outage probability and diversity order. Initially, we investigate the secrecy performance of a wirelessly powered, wiretap channel which incorporates a relatively small number of transmit antennas in a multiple-input single-output scenario. We consider two different transmission protocols which utilise physical layer security. Using traditional multivariate probability techniques we compute closed-form expressions for the outage probability and secrecy outage probability of the system under both protocols, based on the statistical properties of the channel. We use these expressions to compute approximations of the connection outage probability, secrecy outage probability and diversity orders in the high signal-to-noise ratio (SNR) regime which enables us to find candidates for the optimal time-switching ratio and power allocation coefficients. We show that it is possible to achieve a positive secrecy throughput, even in the case where the destination is further away from the source than the eavesdropper, for both protocols and compare their relative merits. We then progress to considering small-scale multiple-input multiple-output (MIMO) channels, which can be modelled as random matrices. We consider a relay system that enables communication between a remote source and destination in the presence of an eavesdropper and describe a decode-and-forward (DF) protocol which uses physical layer security techniques. A new result on the joint probability density function of the largest eigenvalues of the channel matrix is derived using results from RMT. The result enables us to compute the legitimate outage probability and diversity order of the proposed protocol and to quantify the effect of increasing the number of relays and antennas of the system. Next, we consider much larger-scale massive MIMO arrays, for which analysis using finite results becomes impractical. First we investigate the ergodic capacity of a massive MIMO, non-orthogonal multiple access system with unlimited numbers of antennas. Employing asymptotic results from RMT, we provide closed-form solutions for the asymptotic capacities of this scenario. This enables us to derive the optimal power allocation coefficients for the system. We demonstrate that our approach has low computational complexity and provides results much closer to optimality when compared with existing, suboptimal methods, particularly for the case where nodes are equipped with very large antenna arrays. Finally, we analyse the ergodic capacity of a single-hop, massive MIMO, multi-relay system having more complex properties, by applying results in FPT. Our method allows for an arbitrary number of relays, arbitrarily large antenna arrays and also asymmetric characteristics between channels, which is a situation that cannot typically be analysed using traditional RMT methods. We compute the asymptotic capacity across the system for the case when the relays employ a DF protocol and no direct link exists between the endpoints. We are able to calculate the overall capacity, to a high degree of accuracy, for systems incorporating channels greater than in dimension for which existing methods fail due to excessive computational demands. Finally, the comparative computational complexities of the methods are analysed and we see the advantages of applying the FPT method