27 research outputs found

    Eavesdropper localization in random walk channels

    Get PDF
    Eavesdroppers are notoriously difficult to detect and locate in traditional wireless communication systems, especially if they are silent. We show that in molecular communications, where information molecules undergo random walk propagation, eavesdropper detection and localization is possible if the eavesdropper is an absorbing receiver. This is due to the fact that the random walk process has a finite return probability and the eavesdropper is a detectable energy sink of which its location can be reverse estimated

    On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone

    Full text link
    This paper investigates the physical-layer security for a random indoor visible light communication (VLC) network with imperfect channel state information (CSI) and a protected zone. The VLC network consists of three nodes, i.e., a transmitter (Alice), a legitimate receiver (Bob), and an eavesdropper (Eve). Alice is fixed in the center of the ceiling, and the emitted signal at Alice satisfies the non-negativity and the dimmable average optical intensity constraint. Bob and Eve are randomly deployed on the receiver plane. By employing the protected zone and considering the imperfect CSI, the stochastic characteristics of the channel gains for both the main and the eavesdropping channels is first analyzed. After that, the closed-form expressions of the average secrecy capacity and the lower bound of secrecy outage probability are derived, respectively. Finally, Monte-Carlo simulations are provided to verify the accuracy of the derived theoretical expressions. Moreover, the impacts of the nominal optical intensity, the dimming target, the protected zone and the imperfect CSI on secrecy performance are discussed, respectively.Comment: Accepted by IEEE Systems Joutna

    Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization

    Full text link
    Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to design an artificial noise (AN)-aided transmit strategy, such that the achievable secrecy rate is maximized subject to the sum power constraint. AN-aided secure transmission has recently been found to be a promising approach for blocking eavesdropping attempts. In many existing studies, the confidential information transmit covariance and the AN covariance are not simultaneously optimized. In particular, for design convenience, it is common to prefix the AN covariance as a specific kind of spatially isotropic covariance. This paper considers joint optimization of the transmit and AN covariances for secrecy rate maximization (SRM), with a design flexibility that the AN can take any spatial pattern. Hence, the proposed design has potential in jamming the eavesdroppers more effectively, based upon the channel state information (CSI). We derive an optimization approach to the SRM problem through both analysis and convex conic optimization machinery. We show that the SRM problem can be recast as a single-variable optimization problem, and that resultant problem can be efficiently handled by solving a sequence of semidefinite programs. Our framework deals with a general setup of multiple multi-antenna eavesdroppers, and can cater for additional constraints arising from specific application scenarios, such as interference temperature constraints in interference networks. We also generalize the framework to an imperfect CSI case where a worst-case robust SRM formulation is considered. A suboptimal but safe solution to the outage-constrained robust SRM design is also investigated. Simulation results show that the proposed AN-aided SRM design yields significant secrecy rate gains over an optimal no-AN design and the isotropic AN design, especially when there are more eavesdroppers.Comment: To appear in IEEE Trans. Signal Process., 201
    corecore