2,065 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Performance Analysis of Cooperative V2V and V2I Communications under Correlated Fading
Cooperative vehicular networks will play a vital role in the coming years to
implement various intelligent transportation-related applications. Both
vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications
will be needed to reliably disseminate information in a vehicular network. In
this regard, a roadside unit (RSU) equipped with multiple antennas can improve
the network capacity. While the traditional approaches assume antennas to
experience independent fading, we consider a more practical uplink scenario
where antennas at the RSU experience correlated fading. In particular, we
evaluate the packet error probability for two renowned antenna correlation
models, i.e., constant correlation (CC) and exponential correlation (EC). We
also consider intermediate cooperative vehicles for reliable communication
between the source vehicle and the RSU. Here, we derive closed-form expressions
for packet error probability which help quantify the performance variations due
to fading parameter, correlation coefficients and the number of intermediate
helper vehicles. To evaluate the optimal transmit power in this network
scenario, we formulate a Stackelberg game, wherein, the source vehicle is
treated as a buyer and the helper vehicles are the sellers. The optimal
solutions for the asking price and the transmit power are devised which
maximize the utility functions of helper vehicles and the source vehicle,
respectively. We verify our mathematical derivations by extensive simulations
in MATLAB.Comment: Internet of Vehicles (IoV), Vehicular communication, Antenna
correlation, Stackelberg game, Vehicle-to-infrastructure (V2I),
Vehicle-to-vehicle (V2V), Game theory, Cooperative vehicular network
Secure wireless powered and cooperative jamming D2D communications
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks
Secure wireless powered and cooperative jamming D2D communications
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a non-energy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks
- …