428 research outputs found
On Robustness of Massive MIMO Systems Against Passive Eavesdropping under Antenna Selection
In massive MIMO wiretap settings, the base station can significantly suppress
eavesdroppers by narrow beamforming toward legitimate terminals. Numerical
investigations show that by this approach, secrecy is obtained at no
significant cost. We call this property of massive MIMO systems `secrecy for
free' and show that it not only holds when all the transmit antennas at the
base station are employed, but also when only a single antenna is set active.
Using linear precoding, the information leakage to the eavesdroppers can be
sufficiently diminished, when the total number of available transmit antennas
at the base station grows large, even when only a fixed number of them are
selected. This result indicates that passive eavesdropping has no significant
impact on massive MIMO systems, regardless of the number of active transmit
antennas.Comment: 7 pages, 2 figures; To be presented in IEEE Global Communications
Conference (Globecom) 2018 in Abu Dhabi, UA
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secure Communications in Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like millimeter wave (mmWave)
networks, have enhanced security. For a large-scale mmWave ad hoc network in
which eavesdroppers are randomly located, however, eavesdroppers can still
intercept the confidential messages, since they may reside in the signal beam.
This paper explores the potential of physical layer security in mmWave ad hoc
networks. Specifically, we characterize the impact of mmWave channel
characteristics, random blockages, and antenna gains on the secrecy
performance. For the special case of uniform linear array (ULA), a tractable
approach is proposed to evaluate the average achievable secrecy rate. We also
characterize the impact of artificial noise in such networks. Our results
reveal that in the low transmit powerregime, the use of low mmWave frequency
achieves better secrecy performance, and when increasing transmit power, a
transition from low mmWave frequency to high mmWave frequency is demanded for
obtaining a higher secrecy rate. More antennas at the transmitting nodes are
needed to decrease the antenna gain obtained by the eavesdroppers when using
ULA. Eavesdroppers can intercept more information by using a wide beam pattern.
Furthermore, the use of artificial noise may be ineffective for enhancing the
secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive
multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA)
networks by exploiting artificial noise (AN). An uplink training scheme is
first proposed with minimum mean squared error estimation at the base station.
Based on the estimated channel state information, the base station precodes the
confidential information and injects the AN. Following this, the ergodic
secrecy rate is derived for downlink transmission. An asymptotic secrecy
performance analysis is also carried out for a large number of transmit
antennas and high transmit power at the base station, respectively, to
highlight the effects of key parameters on the secrecy performance of the
considered system. Based on the derived ergodic secrecy rate, we propose the
joint power allocation of the uplink training phase and downlink transmission
phase to maximize the sum secrecy rates of the system. Besides, from the
perspective of security, another optimization algorithm is proposed to maximize
the energy efficiency. The results show that the combination of massive MIMO
technique and AN greatly benefits NOMA networks in term of the secrecy
performance. In addition, the effects of the uplink training phase and
clustering process on the secrecy performance are revealed. Besides, the
proposed optimization algorithms are compared with other baseline algorithms
through simulations, and their superiority is validated. Finally, it is shown
that the proposed system outperforms the conventional massive MIMO orthogonal
multiple access in terms of the secrecy performance
- …