1,567 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Coalitions in Cooperative Wireless Networks
Cooperation between rational users in wireless networks is studied using
coalitional game theory. Using the rate achieved by a user as its utility, it
is shown that the stable coalition structure, i.e., set of coalitions from
which users have no incentives to defect, depends on the manner in which the
rate gains are apportioned among the cooperating users. Specifically, the
stability of the grand coalition (GC), i.e., the coalition of all users, is
studied. Transmitter and receiver cooperation in an interference channel (IC)
are studied as illustrative cooperative models to determine the stable
coalitions for both flexible (transferable) and fixed (non-transferable)
apportioning schemes. It is shown that the stable sum-rate optimal coalition
when only receivers cooperate by jointly decoding (transferable) is the GC. The
stability of the GC depends on the detector when receivers cooperate using
linear multiuser detectors (non-transferable). Transmitter cooperation is
studied assuming that all receivers cooperate perfectly and that users outside
a coalition act as jammers. The stability of the GC is studied for both the
case of perfectly cooperating transmitters (transferrable) and under a partial
decode-and-forward strategy (non-transferable). In both cases, the stability is
shown to depend on the channel gains and the transmitter jamming strengths.Comment: To appear in the IEEE Journal on Selected Areas in Communication,
Special Issue on Game Theory in Communication Systems, 200
- …