487 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels
In this paper we consider the robust secure beamformer design for MISO
wiretap channels. Assume that the eavesdroppers' channels are only partially
available at the transmitter, we seek to maximize the secrecy rate under the
transmit power and secrecy rate outage probability constraint. The outage
probability constraint requires that the secrecy rate exceeds certain threshold
with high probability. Therefore including such constraint in the design
naturally ensures the desired robustness. Unfortunately, the presence of the
probabilistic constraints makes the problem non-convex and hence difficult to
solve. In this paper, we investigate the outage probability constrained secrecy
rate maximization problem using a novel two-step approach. Under a wide range
of uncertainty models, our developed algorithms can obtain high-quality
solutions, sometimes even exact global solutions, for the robust secure
beamformer design problem. Simulation results are presented to verify the
effectiveness and robustness of the proposed algorithms
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
In this paper, we investigate methods for reducing the likelihood that a
message transmitted between two multiantenna nodes is intercepted by an
undetected eavesdropper. In particular, we focus on the judicious transmission
of artificial interference to mask the desired signal at the time it is
broadcast. Unlike previous work that assumes some prior knowledge of the
eavesdropper's channel and focuses on maximizing secrecy capacity, we consider
the case where no information regarding the eavesdropper is available, and we
use signal-to-interference-plus-noise-ratio (SINR) as our performance metric.
Specifically, we focus on the problem of maximizing the amount of power
available to broadcast a jamming signal intended to hide the desired signal
from a potential eavesdropper, while maintaining a prespecified SINR at the
desired receiver. The jamming signal is designed to be orthogonal to the
information signal when it reaches the desired receiver, assuming both the
receiver and the eavesdropper employ optimal beamformers and possess exact
channel state information (CSI). In practice, the assumption of perfect CSI at
the transmitter is often difficult to justify. Therefore, we also study the
resulting performance degradation due to the presence of imperfect CSI, and we
present robust beamforming schemes that recover a large fraction of the
performance in the perfect CSI case. Numerical simulations verify our
analytical performance predictions, and illustrate the benefit of the robust
beamforming schemes.Comment: 10 pages, 5 figures; to appear, IEEE Transactions on Signal
Processing, 201
Location-Based Beamforming for Rician Wiretap Channels
We propose a location-based beamforming scheme for wiretap channels, where a
source communicates with a legitimate receiver in the presence of an
eavesdropper. We assume that the source and the eavesdropper are equipped with
multiple antennas, while the legitimate receiver is equipped with a single
antenna. We also assume that all channels are in a Rician fading environment,
the channel state information from the legitimate receiver is perfectly known
at the source, and that the only information on the eavesdropper available at
the source is her location. We first describe how the beamforming vector that
minimizes the secrecy outage probability of the system is obtained,
illustrating its dependence on the eavesdropper's location. We then derive an
easy-to-compute expression for the secrecy outage probability when our proposed
location-based beamforming is adopted. Finally, we investigate the impact
location uncertainty has on the secrecy outage probability, showing how our
proposed solution can still allow for secrecy even when the source has limited
information on the eavesdropper's location.Comment: 6 pages, 4 figure
Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming
In recent years there has been growing interest in study of multi-antenna
transmit designs for providing secure communication over the physical layer.
This paper considers the scenario of an intended multi-input single-output
channel overheard by multiple multi-antenna eavesdroppers. Specifically, we
address the transmit covariance optimization for secrecy-rate maximization
(SRM) of that scenario. The challenge of this problem is that it is a nonconvex
optimization problem. This paper shows that the SRM problem can actually be
solved in a convex and tractable fashion, by recasting the SRM problem as a
semidefinite program (SDP). The SRM problem we solve is under the premise of
perfect channel state information (CSI). This paper also deals with the
imperfect CSI case. We consider a worst-case robust SRM formulation under
spherical CSI uncertainties, and we develop an optimal solution to it, again
via SDP. Moreover, our analysis reveals that transmit beamforming is generally
the optimal transmit strategy for SRM of the considered scenario, for both the
perfect and imperfect CSI cases. Simulation results are provided to illustrate
the secrecy-rate performance gains of the proposed SDP solutions compared to
some suboptimal transmit designs.Comment: 32 pages, 5 figures; to appear, IEEE Transactions on Signal
Processing, 201
Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels
We propose a new location-based beamforming (LBB) scheme for wiretap
channels, where a multi-antenna source communicates with a single-antenna
legitimate receiver in the presence of a multi-antenna eavesdropper. We assume
that all channels are in a Rician fading environment, the channel state
information from the legitimate receiver is perfectly known at the source, and
that the only information on the eavesdropper available at the source is her
location. We first describe how the optimal beamforming vector that minimizes
the secrecy outage probability of the system is obtained, illustrating its
dependence on the eavesdropper's location. We then derive an easy-to-compute
expression for the secrecy outage probability when our proposed LBB scheme is
adopted. We also consider the positive impact a friendly jammer can have on our
beamforming solution, showing how the path to optimality remains the same.
Finally, we investigate the impact of location uncertainty on the secrecy
outage probability, showing how our solution can still allow for secrecy even
when the source only has a noisy estimate of the eavesdropper's location. Our
work demonstrates how a multi-antenna array, operating in the most general
channel conditions and most likely system set-up, can be configured rapidly in
the field so as to deliver an optimal physical layer security solution.Comment: 11 pages, 8 figures. Accepted for publication in IEEE Transactions on
Wireless Communications. arXiv admin note: substantial text overlap with
arXiv:1510.0856
- …