6,986 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A BLE-based multi-gateway network infrastructure with handover support for mobile BLE peripherals
Bluetooth Low Energy (BLE) is a popular technology within the Internet of Things. It allows low-power, star networks to be set up between a BLE gateway and multiple, power-constrained BLE devices. However, these networks tend to be static, not supporting BLE devices that can freely move around in an environment of multiple interconnected BLE gateways and perform handovers whenever necessary. This work proposes two alternative network architectures for mobile BLE peripherals. One leverages on IPv6 over BLE, whereas the other combines default BLE mechanisms with an additional custom controller. On top, we study in detail the handover mechanism that must be present in both architectures and compare the performance of both a passive and active handover approach. The passive handover approach can be set up without any extra implementation, but an active handover approach offers more proactive handover decisions and can provide a much lower handover latency. All proposed solutions have been implemented and validated on real hardware, showing the feasibility of having future infrastructures with support for mobile BLE devices
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less
networks comprised of mobile nodes that communicate over wireless links without
any central control on a peer-to-peer basis. These individual nodes act as
routers to forward both their own data and also their neighbours' data by
sending and receiving packets to and from other nodes in the network. The
relatively easy configuration and the quick deployment make ad hoc networks
suitable the emergency situations (such as human or natural disasters) and for
military units in enemy territory. Securing data dissemination between these
nodes in such networks, however, is a very challenging task. Exposing such
information to anyone else other than the intended nodes could cause a privacy
and confidentiality breach, particularly in military scenarios. In this paper
we present a novel framework to enhance the privacy and data confidentiality in
mobile ad hoc networks by attaching the originator policies to the messages as
they are sent between nodes. We evaluate our framework using the Network
Simulator (NS-2) to check whether the privacy and confidentiality of the
originator are met. For this we implemented the Policy Enforcement Points
(PEPs), as NS-2 agents that manage and enforce the policies attached to packets
at every node in the MANET.Comment: 12 page
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted
relay network by jointly designing power splitting (PS) ratio and relay
beamforming with the proposed global optimal algorithm (GOA) and local optimal
algorithm (LOA). Different from the literature, artificial noise (AN) sent by
the destination not only degrades the channel condition of the eavesdropper to
improve the secrecy rate, but also becomes a new source of energy powering the
untrusted relay based on PS. Hence, it is of high economic benefits and
efficiency to take advantage of AN compared with the literature. Simulation
results show that LOA can achieve satisfactory secrecy rate performance
compared with that of GOA, but with less computation time.Comment: Submitted to GlobeCom201
A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions
Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted
- …