525 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    On the benefits of Cross Layer Feedback in Multi-hop Wireless Networks

    Full text link
    Wireless networks operate under harsh and time-varying channel conditions. In wireless networks the time varying channel conditions lead to variable SINR and high BER. The wireless channel is distinct from and more unpredictable than the far more reliable wireline channel. {\em Cross layer feedback} is a mechanism where layers provide {\em selective} information to other layers to boost the performance of wireless networks. {\em Cross layer feedback} can lead to a tremendous increase in the performance of the TCP/IP stack in wireless networks, and an increase in the user's satisfaction level. However, it is possible that naive feedbacks (or optimizations) can work non-coherently; therefore, these can negatively effect the performance of the TCP/IP stack. In this paper, we holistically analyze each layer of the TCP/IP stack, and propose possible Cross layer feedbacks which work coherently. The proposed Cross layer feedbacks can greatly enhance the performance of the TCP/IP stack in wireless networks

    Cross-layer schemes for performance optimization in wireless networks

    Get PDF
    Wireless networks are undergoing rapid progress and inspiring numerous applications. As the application of wireless networks becomes broader, they are expected to not only provide ubiquitous connectivity, but also support end users with certain service guarantees. End-to-end delay is an important Quality of Service (QoS) metric in multihop wireless networks. This dissertation addresses how to minimize end-to-end delay through joint optimization of network layer routing and link layer scheduling. Two cross-layer schemes, a loosely coupled cross-layer scheme and a tightly coupled cross-layer scheme, are proposed. The two cross-layer schemes involve interference modeling in multihop wireless networks with omnidirectional antenna. In addition, based on the interference model, multicast schedules are optimized to minimize the total end-to-end delay. Throughput is another important QoS metric in wireless networks. This dissertation addresses how to leverage the spatial multiplexing function of MIMO links to improve wireless network throughput. Wireless interference modeling of a half-duplex MIMO node is presented. Based on the interference model, routing, spatial multiplexing, and scheduling are jointly considered in one optimization model. The throughput optimization problem is first addressed in constant bit rate networks and then in variable bit rate networks. In a variable data rate network, transmitters can use adaptive coding and modulation schemes to change their data rates so that the data rates are supported by the Signal to Noise and Interference Ratio (SINR). The problem of achieving maximum throughput in a millimeter-wave wireless personal area network is studied --Abstract, page iv

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modiļ¬ed our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the ļ¬eld of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Network lifetime extension, power conservation and interference suppression for next generation mobile wireless networks

    Get PDF
    Two major focus research areas related to the design of the next generation multihop wireless networks are network lifetime extension and interference suppression. In this dissertation, these two issues are addressed. In the area of interference suppression, a new family of projection multiuser detectors, based on a generalized, two-stage design is proposed. Projection multiuser detectors provide efficient protection against undesired interference of unknown power, while preserving simple design, with closed-form solution for error probabilities. It is shown that these detectors are linearly optimal, if the interference power is unknown. In the area of network lifetime extension, a new approach to minimum energy routing for multihop wireless networks in Rayleigh fading channels is proposed. It is based on the concept of power combining, whereby two users transmit same signal to the destination user, emulating transmit diversity with two transmit antennas. Analytical framework for the evaluation of the benefits of power combining, in terms of the total transmit power reduction, is defined. Simulation results, which match closely the analytical results, indicate that significant improvements, in terms of transmit power reduction and network lifetime extension, are achievable. The messaging load, generated by the new scheme, is moderate, and can be further optimized

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    QoS multicast routing protocol oriented to cognitive network using competitive coevolutionary algorithm

    Get PDF
    The human intervention in the network management and maintenance should be reduced to alleviate the ever-increasing spatial and temporal complexity. By mimicking the cognitive behaviors of human being, the cognitive network improves the scalability, self-adaptation, self-organization, and self-protection in the network. To implement the cognitive network, the cognitive behaviors for the network nodes need to be carefully designed. Quality of service (QoS) multicast is an important network problem. Therefore, it is appealing to develop an effective QoS multicast routing protocol oriented to cognitive network. In this paper, we design the cognitive behaviors summarized in the cognitive science for the network nodes. Based on the cognitive behaviors, we propose a QoS multicast routing protocol oriented to cognitive network, named as CogMRT. It is a distributed protocol where each node only maintains local information. The routing search is in a hop by hop way. Inspired by the small-world phenomenon, the cognitive behaviors help to accumulate the experiential route information. Since the QoS multicast routing is a typical combinatorial optimization problem and it is proved to be NP-Complete, we have applied the competitive coevolutionary algorithm (CCA) for the multicast tree construction. The CCA adopts novel encoding method and genetic operations which leverage the characteristics of the problem. We implement and evaluate CogMRT and other two promising alternative protocols in NS2 platform. The results show that CogMRT has remarkable advantages over the counterpart traditional protocols by exploiting the cognitive favors
    • ā€¦
    corecore