500 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Cooperative Jamming for Secure Communications in MIMO Relay Networks

    Full text link
    Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops. In these approaches, the normally inactive nodes in the relay network can be used as cooperative jamming sources to confuse the eavesdropper. Linear precoding schemes are investigated for two scenarios where single or multiple data streams are transmitted via a decode-and-forward (DF) relay, under the assumption that global channel state information (CSI) is available. For the case of single data stream transmission, we derive closed-form jamming beamformers and the corresponding optimal power allocation. Generalized singular value decomposition (GSVD)-based secure relaying schemes are proposed for the transmission of multiple data streams. The optimal power allocation is found for the GSVD relaying scheme via geometric programming. Based on this result, a GSVD-based cooperative jamming scheme is proposed that shows significant improvement in terms of secrecy rate compared to the approach without jamming. Furthermore, the case involving an eavesdropper with unknown CSI is also investigated in this paper. Simulation results show that the secrecy rate is dramatically increased when inactive nodes in the relay network participate in cooperative jamming.Comment: 30 pages, 7 figures, to appear in IEEE Transactions on Signal Processin

    Full-Duplex Relay with Jamming Protocol for Improving Physical-Layer Security

    Full text link
    This paper proposes a jointly cooperative relay and jamming protocol based on full-duplex (FD) capable relay to increase the source-destination secrecy rate in the presence of different types of eavesdroppers. In this so called \textit{FD-Relay with jamming (FDJ)} protocol, the FD-Relay, first, simultaneously receives data and sends jamming to the eavesdropper, and, then, forwards the data, while the source jams the eavesdropper. Achievable secrecy rates of the proposed FDJ in presence of different eavesdropper types and self-interference (SI) are derived and compared with those of the traditional half-duplex (HD) relay. The adaptive power allocation for secrecy rate maximization in a multi-carrier scenario for both proposed FDJ and HD-Relay is formulated as a non-convex optimization problem and corresponding iterative solution algorithm is developed using the difference-of-two-concave-functions (DC) programming technique. The simulation results confirm that FDJ offers significant improvements in the secrecy rate over the HD-Relay.Comment: PIMRC 201

    Enhancing wireless security via optimal cooperative jamming

    Get PDF
    In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node. We consider the availability of both full and partial channel state information (CSI), and we take into account average power limitation at the relays as we formulate the rate maximization problem as a primal-dual problem. We derive the closed form solution for the full CSI case, and we show that the optimal solution allows the transmission of only one relay. For the partial CSI case, we define the concept of secrecy outage, where some of packets are intercepted by the eavesdropper, and we derive the secrecy outage probability and throughput in terms of average channel statistics. Due to the high nonlinearity of the secrecy throughput term, we propose a gradient update algorithm for obtaining the optimal power solutions for the partial CSI case. Our simulations demonstrate the gains of cooperative jamming over direct transmission for both full and partial CSI cases, where it is shown that the secrecy rate of the direct transmission is increased significantly, by %20−%80, when CJ is employed with our optimal power assignment algorithm

    Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

    Full text link
    Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication and so on. In this paper, we propose a hybrid cooperative beamforming and jamming scheme to secure communication based on the social trust degree under a stochastic geometry framework. The friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. We aim to analyze the involved connection outage probability (COP) and secrecy outage probability (SOP) of the performance in the networks. To achieve this target, we propose a double Gamma ratio (DGR) approach through Gamma approximation. Based on this, the COP and SOP are tractably obtained in closed-form. We further consider the SOP in the presence of Poisson Point Process (PPP) distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.Comment: 30 pages, 11 figures, to be published in IEEE Transactions on Communication
    • …
    corecore