115 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Perfect Output Feedback in the Two-User Decentralized Interference Channel

    Get PDF
    In this paper, the η\eta-Nash equilibrium (η\eta-NE) region of the two-user Gaussian interference channel (IC) with perfect output feedback is approximated to within 11 bit/s/Hz and η\eta arbitrarily close to 11 bit/s/Hz. The relevance of the η\eta-NE region is that it provides the set of rate-pairs that are achievable and stable in the IC when both transmitter-receiver pairs autonomously tune their own transmit-receive configurations seeking an η\eta-optimal individual transmission rate. Therefore, any rate tuple outside the η\eta-NE region is not stable as there always exists one link able to increase by at least η\eta bits/s/Hz its own transmission rate by updating its own transmit-receive configuration. The main insights that arise from this work are: (i)(i) The η\eta-NE region achieved with feedback is larger than or equal to the η\eta-NE region without feedback. More importantly, for each rate pair achievable at an η\eta-NE without feedback, there exists at least one rate pair achievable at an η\eta-NE with feedback that is weakly Pareto superior. (ii)(ii) There always exists an η\eta-NE transmit-receive configuration that achieves a rate pair that is at most 11 bit/s/Hz per user away from the outer bound of the capacity region.Comment: Revised version (Aug. 2015

    Physical layer security in wireless networks: intelligent jamming and eavesdropping

    Get PDF
    This work aims at addressing two critical security issues residing in the physical layer of wireless networks, namely intelligent jamming and eavesdropping. In the first two chapters we study the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no knowledge about either the codebook used by the legitimate communication terminals, or the source’s output. Both transmitter and jammer are subject to power constraints which can be enforced over each codeword (peak) or over all codewords (average). All our jamming problems are formulated as zero-sum games, having the probability of outage as pay-off function and power control functions as strategies. We provide a comprehensive coverage of these problems, under fast and slow fading, peak and average power constraints, pure and mixed strategies, with and without channel state information (CSI) feedback. Contributions to the eavesdropping problem include a novel feedback scheme for transmitting secret messages between two legitimate parties, over an eavesdropped communication link, presented in Chapter 4. Relative to Wyner’s traditional encoding scheme, our feedback-based encoding often yields larger rate-equivocation regions and achievable secrecy rates. More importantly, by exploiting the channel randomness inherent in the feedback channels, our scheme achieves a strictly positive secrecy rate even when the eavesdropper’s channel is less noisy than the legitimate receiver’s channel. In Chapter 5 we study the problem of active eavesdropping in fast fading channels. The active eavesdropper is a more powerful adversary than the classical eavesdropper. It can choose between two functional modes: eavesdropping the transmission between the legitimate parties (Ex mode), and jamming it (Jx mode) – the active eavesdropper cannot function in full duplex mode. We consider two scenarios: the best-case scenario, when the transmitter knows the eavesdropper’s strategy in advance – and hence can adaptively choose an encoding strategy – and the worst-case scenario, when the active eavesdropper can choose its strategy based on the legitimate transmitter-receiver pair’s strategy. For the second scenario, we introduce a novel encoding scheme, based on very limited and unprotected feedback – the Block-Markov Wyner (BMW) encoding scheme – which outperforms any schemes currently available

    Resource Allocation for Multiple-Input and Multiple-Output Interference Networks

    Get PDF
    To meet the exponentially increasing traffic data driven by the rapidly growing mobile subscriptions, both industry and academia are exploring the potential of a new genera- tion (5G) of wireless technologies. An important 5G goal is to achieve high data rate. Small cells with spectrum sharing and multiple-input multiple-output (MIMO) techniques are one of the most promising 5G technologies, since it enables to increase the aggregate data rate by improving the spectral efficiency, nodes density and transmission bandwidth, respectively. However, the increased interference in the densified networks will in return limit the achievable rate performance if not properly managed. The considered setup can be modeled as MIMO interference networks, which can be classified into the K-user MIMO interference channel (IC) and the K-cell MIMO interfering broadcast channel/multiple access channel (MIMO-IBC/IMAC) according to the number of mobile stations (MSs) simultaneously served by each base station (BS). The thesis considers two physical layer (PHY) resource allocation problems that deal with the interference for both models: 1) Pareto boundary computation for the achiev- able rate region in a K-user single-stream MIMO IC and 2) grouping-based interference alignment (GIA) with optimized IA-Cell assignment in a MIMO-IMAC under limited feedback. In each problem, the thesis seeks to provide a deeper understanding of the system and novel mathematical results, along with supporting numerical examples. Some of the main contributions can be summarized as follows. It is an open problem to compute the Pareto boundary of the achievable rate region for a K-user single-stream MIMO IC. The K-user single-stream MIMO IC models multiple transmitter-receiver pairs which operate over the same spectrum simultaneously. Each transmitter and each receiver is equipped with multiple antennas, and a single desired data stream is communicated in each transmitter-receiver link. The individual achievable rates of the K users form a K-dimensional achievable rate region. To find efficient operating points in the achievable rate region, the Pareto boundary computation problem, which can be formulated as a multi-objective optimization problem, needs to be solved. The thesis transforms the multi-objective optimization problem to two single-objective optimization problems–single constraint rate maximization problem and alternating rate profile optimization problem, based on the formulations of the ε-constraint optimization and the weighted Chebyshev optimization, respectively. The thesis proposes two alternating optimization algorithms to solve both single-objective optimization problems. The convergence of both algorithms is guaranteed. Also, a heuristic initialization scheme is provided for each algorithm to achieve a high-quality solution. By varying the weights in each single-objective optimization problem, numerical results show that both algorithms provide an inner bound very close to the Pareto boundary. Furthermore, the thesis also computes some key points exactly on the Pareto boundary in closed-form. A framework for interference alignment (IA) under limited feedback is proposed for a MIMO-IMAC. The MIMO-IMAC well matches the uplink scenario in cellular system, where multiple cells share their spectrum and operate simultaneously. In each cell, a BS receives the desired signals from multiple MSs within its own cell and each BS and each MS is equipped with multi-antenna. By allowing the inter-cell coordination, the thesis develops a distributed IA framework under limited feedback from three aspects: the GIA, the IA-Cell assignment and dynamic feedback bit allocation (DBA), respec- tively. Firstly, the thesis provides a complete study along with some new improvements of the GIA, which enables to compute the exact IA precoders in closed-form, based on local channel state information at the receiver (CSIR). Secondly, the concept of IA-Cell assignment is introduced and its effect on the achievable rate and degrees of freedom (DoF) performance is analyzed. Two distributed matching approaches and one centralized assignment approach are proposed to find a good IA-Cell assignment in three scenrios with different backhaul overhead. Thirdly, under limited feedback, the thesis derives an upper bound of the residual interference to noise ratio (RINR), formulates and solves a corresponding DBA problem. Finally, numerical results show that the proposed GIA with optimized IA-Cell assignment and the DBA greatly outperforms the traditional GIA algorithm

    Cognitive Radio Systems

    Get PDF
    Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems

    Degrees of freedom of wireless interference network

    Get PDF
    Wireless communication systems are different from the wired systems mainly in three aspects: fading, broadcast, and superposition. Wireless communication networks, and multi-user communication networks in general, have not been well understood from the information-theoretic perspective: the capacity limits of many multi-user networks are not known. For example, the capacity region of a two-user single-antenna interference channel is still not known, though recent result can bound the region up to a constant value. Characterizing the capacity limits of multi-user multiple-input multiple-output (MIMO) interference network is usually even more difficult than the single antenna setup. To alleviate the difficulty in studying such networks, the concept of degrees of freedom (DoF) has been adopted, which captures the first order behavior of the capacities or capacity regions. One important technique developed recently for quantifying the DoF of multi-user networks is the so-called interference alignment. The purpose of interference alignment is to design the transmit signals structurally so that the interference signals from multiple interferers are aligned to reduce the signal dimensions occupied by interference. In this thesis, we mainly study two problems related to DoF and interference alignment: 1) DoF region of MIMO full interference channel (FIC) and Z interference channel (ZIC) with reconfigurable antennas, and 2) the DoF region of an interference network with general message demands. For the first problem, we derive the outer bound on the DoF region and show that it is achievable via time-sharing or beamforming except for one special case. As to this particular special case, we develop a systematic way of constructing the DoF-achieving nulling and beamforming matrices. Our results reveal the potential benefit of using the reconfigurable antenna in MIMO FIC and ZIC. In addition, the achievability scheme has an interesting space-frequency interpretation. For the second problem, we derive the DoF region of a single antenna interference network with general message demands, which includes the multiple unicasts and multiple multicasts as special cases. We perform interference alignment using multiple base vectors and align the interference at each receiver to its largest interferer. Furthermore, we show that the DoF region is determined by a subset of receivers, and the DoF region can be achieved by considering a smaller number of interference alignment constraints so as to reduce the number of time expansion. Finally, as a related research topic, we also include a result on the average throughput of a MIMO interference channel with single-user detector at receivers and without channel state information at transmitters. We present a piecewise linear approximation of the channel throughput under weak, moderate and strong interference regimes. Based on that we determine the optimal number of streams that a transmitter should use for different interference levels

    D13.2 Techniques and performance analysis on energy- and bandwidth-efficient communications and networking

    Get PDF
    Deliverable D13.2 del projecte europeu NEWCOM#The report presents the status of the research work of the various Joint Research Activities (JRA) in WP1.3 and the results that were developed up to the second year of the project. For each activity there is a description, an illustration of the adherence to and relevance with the identified fundamental open issues, a short presentation of the main results, and a roadmap for the future joint research. In the Annex, for each JRA, the main technical details on specific scientific activities are described in detail.Peer ReviewedPostprint (published version
    • …
    corecore