160 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Efficient and Secure Resource Allocation in Mobile Edge Computing Enabled Wireless Networks

    Get PDF
    To support emerging applications such as autonomous vehicles and smart homes and to build an intelligent society, the next-generation internet of things (IoT) is calling for up to 50 billion devices connected world wide. Massive devices connection, explosive data circulation, and colossal data processing demand are driving both the industry and academia to explore new solutions. Uploading this vast amount of data to the cloud center for processing will significantly increase the load on backbone networks and cause relatively long latency to time-sensitive applications. A practical solution is to deploy the computing resource closer to end-users to process the distributed data. Hence, Mobile Edge Computing (MEC) emerged as a promising solution to providing high-speed data processing service with low latency. However, the implementation of MEC networks is handicapped by various challenges. For one thing, to serve massive IoT devices, dense deployment of edge servers will consume much more energy. For another, uploading sensitive user data through a wireless link intro-duces potential risks, especially for those size-limited IoT devices that cannot implement complicated encryption techniques. This dissertation investigates problems related to Energy Efficiency (EE) and Physical Layer Security (PLS) in MEC-enabled IoT networks and how Non-Orthogonal Multiple Access (NOMA), prediction-based server coordination, and Intelligent Reflecting Surface (IRS) can be used to mitigate them. Employing a new spectrum access method can help achieve greater speed with less power consumption, therefore increasing system EE. We first investigated NOMA-assisted MEC networks and verified that the EE performance could be significantly improved. Idle servers can consume unnecessary power. Proactive server coordination can help relieve the tension of increased energy consumption in MEC systems. Our next step was to employ advanced machine learning algorithms to predict data workload at the server end and adaptively adjust the system configuration over time, thus reducing the accumulated system cost. We then introduced the PLS to our system and investigated the long-term secure EE performance of the MEC-enabled IoT network with NOMA assistance. It has shown that NOMA can improve both EE and PLS for the network. Finally, we switch from the single antenna scenario to a multiple-input single-output (MISO) system to exploit space diversity and beam forming techniques in mmWave communication. IRS can be used simultaneously to help relieve the pathloss and reconfigure multi-path links. In the final part, we first investigated the secure EE performance of IRS-assisted MISO networks and introduced a friendly jammer to block the eavesdroppers and improve the PLS rate. We then combined the IRS with the NOMA in the MEC network and showed that the IRS can further enhance the system EE

    Privacy preservation via beamforming for NOMA

    Get PDF
    Non-orthogonal multiple access (NOMA) has been proposed as a promising multiple access approach for 5G mobile systems because of its superior spectrum efļ¬ciency. However, the privacy between the NOMA users may be compromised due to the transmission of a superposition of all usersā€™ signals to successive interference cancellation (SIC) receivers. In this paper, we propose two schemes based on beamforming optimization for NOMA that can enhance the security of a speciļ¬c private user while guaranteeing the other usersā€™ quality of service (QoS). Speciļ¬cally, in the ļ¬rst scheme, when the transmit antennas are inadequate, we intend to maximize the secrecy rate of the private user, under the constraint that the other usersā€™ QoS is satisļ¬ed. In the second scheme, the private userā€™s signal is zero-forced at the other users when redundant antennas are available. In this case, the transmission rate of the private user is also maximized while satisfying the QoS of the other users. Due to the nonconvexity of optimization in these two schemes, we ļ¬rst convert them into convex forms and then, an iterative algorithm based on the ConCave-Convex Procedure is proposed to obtain their solutions. Extensive simulation results are presented to evaluate the effectiveness of the proposed scheme

    Secure transmission via joint precoding optimization for downlink MISO NOMA

    Get PDF
    Non-orthogonal multiple access (NOMA) is a prospective technology for radio resource constrained future mobile networks. However, NOMA users far from base station (BS) tend to be more susceptible to eavesdropping because they are allocated more transmit power. In this paper, we aim to jointly optimize the precoding vectors at BS to ensure the legitimate security in a downlink multiple-input single-output (MISO) NOMA network. When the eavesdropping channel state information (CSI) is available at BS, we can maximize the sum secrecy rate by joint precoding optimization. Owing to its non-convexity, the problem is converted into a convex one, which is solved by a second-order cone programming based iterative algorithm. When the CSI of the eavesdropping channel is not available, we first consider the case that the secure user is not the farthest from BS, and the transmit power of the farther users is maximized via joint precoding optimization to guarantee its security. Then, we consider the case when the farthest user from BS requires secure transmission, and the modified successive interference cancellation order and joint precoding optimization can be adopted to ensure its security. Similar method can be exploited to solve the two non-convex problems when the CSI is unknown. Simulation results demonstrate that the proposed schemes can improve the security performance for MISO NOMA systems effectively, with and without eavesdropping CSI

    IRS-Aided Uplink Security Enhancement via Energy-Harvesting Jammer

    Get PDF
    In this paper, we investigate the security enhancement by combining intelligent reflecting surface (IRS) and energy harvesting (EH) jammer for the uplink transmission. Specifically, we propose an IRS-aided secure scheme for the uplink transmission via an EH jammer, to fight against the malicious eavesdropper. The proposed scheme can be divided into an energy transfer (ET) phase and an information transmission (IT) phase. In the first phase, the friendly EH jammer harvests energy from the base station (BS) aided by IRS. We maximize the harvested energy of jammer by obtaining the closed-form solution to the phase-shift matrix of IRS. In the second phase, the user transmits confidential information to the BS while the jamming is generated to confuse the eavesdropper without affecting the legitimate transmission. The phase-shift matrix of IRS and time switching factor are jointly optimized to maximize the secrecy rate. To tackle the non-convex problem, we first decompose it into two sub-problems. The one of IRS can be approximated to convex with fixed time switching factor. Then, the time switching factor can be solved by Lagrange duality. Thus, the solution to the original problem can be obtained by alternately optimizing these two sub-problems. Simulation results show that the proposed Jammer-IRS assisted secure transmission scheme can significantly enhance the uplink security
    • ā€¦
    corecore