27 research outputs found
Eavesdropper localization in random walk channels
Eavesdroppers are notoriously difficult to detect and locate in traditional wireless communication systems, especially if they are silent. We show that in molecular communications, where information molecules undergo random walk propagation, eavesdropper detection and localization is possible if the eavesdropper is an absorbing receiver. This is due to the fact that the random walk process has a finite return probability and the eavesdropper is a detectable energy sink of which its location can be reverse estimated
On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone
This paper investigates the physical-layer security for a random indoor
visible light communication (VLC) network with imperfect channel state
information (CSI) and a protected zone. The VLC network consists of three
nodes, i.e., a transmitter (Alice), a legitimate receiver (Bob), and an
eavesdropper (Eve). Alice is fixed in the center of the ceiling, and the
emitted signal at Alice satisfies the non-negativity and the dimmable average
optical intensity constraint. Bob and Eve are randomly deployed on the receiver
plane. By employing the protected zone and considering the imperfect CSI, the
stochastic characteristics of the channel gains for both the main and the
eavesdropping channels is first analyzed. After that, the closed-form
expressions of the average secrecy capacity and the lower bound of secrecy
outage probability are derived, respectively. Finally, Monte-Carlo simulations
are provided to verify the accuracy of the derived theoretical expressions.
Moreover, the impacts of the nominal optical intensity, the dimming target, the
protected zone and the imperfect CSI on secrecy performance are discussed,
respectively.Comment: Accepted by IEEE Systems Joutna
Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization
Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to
design an artificial noise (AN)-aided transmit strategy, such that the
achievable secrecy rate is maximized subject to the sum power constraint.
AN-aided secure transmission has recently been found to be a promising approach
for blocking eavesdropping attempts. In many existing studies, the confidential
information transmit covariance and the AN covariance are not simultaneously
optimized. In particular, for design convenience, it is common to prefix the AN
covariance as a specific kind of spatially isotropic covariance. This paper
considers joint optimization of the transmit and AN covariances for secrecy
rate maximization (SRM), with a design flexibility that the AN can take any
spatial pattern. Hence, the proposed design has potential in jamming the
eavesdroppers more effectively, based upon the channel state information (CSI).
We derive an optimization approach to the SRM problem through both analysis and
convex conic optimization machinery. We show that the SRM problem can be recast
as a single-variable optimization problem, and that resultant problem can be
efficiently handled by solving a sequence of semidefinite programs. Our
framework deals with a general setup of multiple multi-antenna eavesdroppers,
and can cater for additional constraints arising from specific application
scenarios, such as interference temperature constraints in interference
networks. We also generalize the framework to an imperfect CSI case where a
worst-case robust SRM formulation is considered. A suboptimal but safe solution
to the outage-constrained robust SRM design is also investigated. Simulation
results show that the proposed AN-aided SRM design yields significant secrecy
rate gains over an optimal no-AN design and the isotropic AN design, especially
when there are more eavesdroppers.Comment: To appear in IEEE Trans. Signal Process., 201