116 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks
We study physical-layer security in wireless ad hoc networks and investigate
two types of multi-antenna transmission schemes for providing secrecy
enhancements. To establish secure transmission against malicious eavesdroppers,
we consider the generation of artificial noise with either sectoring or
beamforming. For both approaches, we provide a statistical characterization and
tradeoff analysis of the outage performance of the legitimate communication and
the eavesdropping links. We then investigate the networkwide secrecy throughput
performance of both schemes in terms of the secrecy transmission capacity, and
study the optimal power allocation between the information signal and the
artificial noise. Our analysis indicates that, under transmit power
optimization, the beamforming scheme outperforms the sectoring scheme, except
for the case where the number of transmit antennas are sufficiently large. Our
study also reveals some interesting differences between the optimal power
allocation for the sectoring and beamforming schemes.Comment: to appear in IEEE Transactions on Information Forensics and Securit
Secrecy transmission capacity of decentralized wireless networks
Secure communication over large-scale decentralized wireless networks is an extremely challenging task due to the cost and difficulty in establishing secret keys among all the nodes in a distributed manner. For this reason, the notion of physical layer security has recently drawn significant attention, which may assist with key exchange and provide an additional layer of protection in such networks. In this paper, we investigate how the physical layer security constraints affect the network throughput. We consider a random network in which the legitimate and eavesdropper nodes are located according to independent Poisson point processes. We introduce a new metric "secrecy transmission capacity" to characterize the network throughput in terms of the area spectral efficiency of secure transmissions, subject to constraints on both the quality of service and the level of security. This capacity framework allows us to quantitatively study the throughput cost of physical layer security constraints. We observe that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network.This work was supported by the Australian Research Council's Discovery Projects funding scheme (project no. DP110102548), the DARPA IT-MANET project, and the Research Council of Norway through the project 197565/V30
UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique
for enabling physical layer keyless security in scenarios where the exact
eavesdropper location is unknown. We assume that the unknown eavesdropper
location is within an ellipse characterizing the coverage region of the
transmitter. By sequentially optimizing the transmit power, the flight path of
the UAV and its jamming power, we aim at maximizing the average secrecy rate
with arbitrary eavesdropper location. Simulation results demonstrate that the
optimal flight path obtains better secrecy rate performance compared to that
using direct UAV flight path encasing the transmitter and the legitimate
receiver. Most importantly, even with the unknown eavesdropper location, we
obtained a secrecy rate that is comparable to a scenario when the
eavesdropper's location is known. However, the average secrecy rate with the
unknown eavesdropper location varies depending on the proximity of the
eavesdropper to the known location of the transmitter. We also observe that due
to the UAV-aided jamming, the average secrecy rate stabilizes at some point
even though the average received envelope power of the eavesdropper increases.
This essentially demonstrates the effectiveness of the proposed scheme.Comment: Submitted to IEEE Access. Contents may be subject to copyright to
IEE
- …