102 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Physical-layer Security of Uplink mmWave Transmissions in Cellular V2X Networks

    Get PDF
    In this paper, we investigate physical-layer security of the uplink millimeter wave communications for a cellular vehicle-to-everything (C-V2X) network comprised of a large number of base stations (BSs) and different categories of V2X nodes, including vehicles, pedestrians, and road side units. Considering the dynamic change and randomness of the topology of the C-V2X network, we model the roadways, the V2X nodes on each roadway, and the BSs by a Poisson line process, a 1D Poisson point process (PPP), and a 2D PPP, respectively. We propose two uplink association schemes for a typical vehicle, namely, the smallest-distance association (SDA) scheme and the largest-power association (LPA) scheme, and we establish a tractable analytical framework to comprehensively assess the security performance of the uplink transmission, by leveraging the stochastic geometry theory. Specifically, for each association scheme, we first obtain new expressions for the association probability of the typical vehicle, and then derive the overall connection outage probability and secrecy outage probability by calculating the Laplace transform of the aggregate interference power. Numerical results are presented to validate our theoretical analysis, and we also provide interesting insights into how the security performance is influenced by various system parameters, including the densities of V2X nodes and BSs. Moreover, we show that the LPA scheme outperforms the SDA scheme in terms of secrecy throughput

    An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks

    Get PDF

    Security for 5G Mobile Wireless Networks

    Get PDF
    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    RIS-Aided Cell-Free Massive MIMO Systems for 6G: Fundamentals, System Design, and Applications

    Full text link
    An introduction of intelligent interconnectivity for people and things has posed higher demands and more challenges for sixth-generation (6G) networks, such as high spectral efficiency and energy efficiency, ultra-low latency, and ultra-high reliability. Cell-free (CF) massive multiple-input multiple-output (mMIMO) and reconfigurable intelligent surface (RIS), also called intelligent reflecting surface (IRS), are two promising technologies for coping with these unprecedented demands. Given their distinct capabilities, integrating the two technologies to further enhance wireless network performances has received great research and development attention. In this paper, we provide a comprehensive survey of research on RIS-aided CF mMIMO wireless communication systems. We first introduce system models focusing on system architecture and application scenarios, channel models, and communication protocols. Subsequently, we summarize the relevant studies on system operation and resource allocation, providing in-depth analyses and discussions. Following this, we present practical challenges faced by RIS-aided CF mMIMO systems, particularly those introduced by RIS, such as hardware impairments and electromagnetic interference. We summarize corresponding analyses and solutions to further facilitate the implementation of RIS-aided CF mMIMO systems. Furthermore, we explore an interplay between RIS-aided CF mMIMO and other emerging 6G technologies, such as next-generation multiple-access (NGMA), simultaneous wireless information and power transfer (SWIPT), and millimeter wave (mmWave). Finally, we outline several research directions for future RIS-aided CF mMIMO systems.Comment: 30 pages, 15 figure

    Ultra-Dense Networks in 5G and Beyond: Challenges and Promising Solutions

    Get PDF
    Ultra-Dense Network (UDN) is one of the promising and leading directions in Fifth Generation and beyond (5GB) networks. In UDNs, Small Cells (SCs) or Small Base Stations (SBSs) such as microcells, picocells, or femtocells are deployed in high densities where inter-site distances are within the range of few or tens of meters. UDNs also require that SCs are typically deployed in relatively large densities compared to the Human-Type Communication Users (HTCUs) such as smartphones, tablets, and/or laptops. Such SCs are characterized by their low transmission powers, small coverage areas, and low cost. Hence, the deployment of the SCs can be done either by the cellular network operators or by the customers themselves within their premises to maintain certain levels of Quality of Service (QoS). However, the randomness of the deployment of the SCs along with the small inter-site distances may degrade the achievable performance due to the uncontrolled Inter-Cell Interference (ICI). Therefore, idle mode capability is an inevitable feature in the high-density regime of SCs. In idle mode, a SC is switched off to prevent ICI when no user is associated to it. In doing so, we can imagine the UDN as a mobile network that keeps following the users to remain as close as possible to them. In 5G, different use cases are required to be supported such as enhanced Mobile Broad-Band (eMBB), Ultra-Reliable and Low-Latency Communication (URLLC), and massive Machine-Type Communication (mMTC). On one hand, the inevitable upcoming era of smart living requires unprecedented advances in enabling technologies to support the main building blocks of this era which are Internet of Things (IoT) devices. Machine-Type Communication (MTC), the cellular version of Machine-to-Machine (M2M) communication, constitutes the main enabling technology to support communications among such devices with minimal or even without human intervention. The massive number of these devices, Machine-Type Communication Devices (MTCDs), and the immense amount of traffic generated by them require a paramount shift in cellular and non-cellular wireless technologies to achieve the required connectivity. On the other hand, the sky-rocketing number of data hungry applications installed on human-held devices, or HTCUs, such as video conferencing and virtual reality applications require their own advances in the wireless infrastructure in terms of high capacity, enhanced reliability, and reduced latency. Throughout this thesis, we exploit the UDN infrastructure integrated with other 5G resources and enabling technologies to explore the possible opportunities in supporting both HTC and MTC, either solely or simultaneously. Given the shorter distances between transmitters and receivers encountered in UDNs, more realistic models of the path loss must be adopted such as the Stretched Exponential Path Loss (SEPL) model. We use tools from stochastic geometry to formulate novel mathematical frameworks that can be used to investigate the achievable performance without having to rely on extensive time-consuming Monte-Carlo simulations. Besides, the derived analytical expressions can be used to tune some system parameters or to propose some approaches/techniques that can be followed to optimize the performance of the system under certain circumstances. Tackling practical scenarios, the complexity, or sometimes in-feasibility, of providing unlimited backhaul capacity for the massive number of SCs must be considered. In this regard, we adopt multiple-association where each HTCU is allowed to associate with multiple SCs. By doing so, we carefully split the targeted traffic among several backhaul links to mitigate the bottleneck forced by limited backhaul capacities. It is noteworthy that for coexisting MTCDs with the HTCUs, activating more SCs would allow more MTCDs to be supported without introducing additional ICI towards the HTCUs. Targeting different application, multiple-association can be also adopted to tackle computation-intensive applications of HTCUs. In particular, for applications such as augmented reality and environment recognition that require heavy computations, a task is split and partially offloaded to multiple SCs with integrated Edge Computing Servers (ECSs). Then, the task partitions are processed in parallel to reduce the end-to-end processing delay. Based on relative densities between HTCUs and SCs, we use tools from stochastic geometry to develop an offline adaptive task division technique that further reduces the average end-to-end processing delay per user. With the frequent serious data breaches experienced in recent years, securing data has become more of a business risk rather than an information technology (IT) issue. Hence, we exploit the dense number of SCs found in UDN along with Physical Layer Security (PLS) protocols to secure data transfer. In particular, we again adopt multiple-association and split the data of HTCUs into multiple streams originating from different SCs to prevent illegitimate receivers from eavesdropping. To support massive number of MTCDs, we deploy the Non-Orthogonal Multiple-Access (NOMA) technique. Using power NOMA, more than one device can be supported over the same frequency/time resource and their signals are distinguished at the receiver using Successive Interference Cancellation (SIC). In the same scope, exploiting the available resources in 5G and beyond networks, we investigate a mMTC scenario in an UDN operating in the Millimeter Wave (mmWave) band and supported by wireless backhauling. In doing so, we shed lights on the possible gains of utilizing the mmWave band where the severe penetration losses of mmWave can be exploited to mitigate the significant ICI in UDNs. Also, the vast bandwidth available in the mmWave band helps to allocate more Resource Blocks (RBs) per SCs which corresponds to supporting more MTCDs
    corecore