8 research outputs found
On–Off-Based Secure Transmission Design With Outdated Channel State Information
We design new secure on-off transmission schemes
in wiretap channels with outdated channel state information
(CSI). In our design we consider not only the outdated CSI from
the legitimate receiver but two distinct scenarios, depending on
whether or not the outdated CSI from the eavesdropper is known
at the transmitter. Under this consideration our schemes exploit
the useful knowledge contained in the available outdated CSI,
based on which the transmitter decides whether to transmit or
not. We derive new closed-form expressions for the transmission
probability, the connection outage probability, the secrecy outage
probability, and the reliable and secure transmission probability
to characterize the achievable performance. Based on these
results, we present the optimal solutions that maximize the
secrecy throughput under dual connection and secrecy outage
constraints. Our analytical and numerical results offer detailed
insights into the design of the wiretap coding parameters and
the imposed outage constraints. We further show that allowing
more freedom on the codeword transmission rate enables a larger
feasible region of the dual outage constraints by exploiting the
trade-off between reliability and security.ARC Discovery Projects Grant DP15010390
QoS-aware Stochastic Spatial PLS Model for Analysing Secrecy Performance under Eavesdropping and Jamming
Securing wireless communication, being inherently vulnerable to eavesdropping
and jamming attacks, becomes more challenging in resource-constrained networks
like Internet-of-Things. Towards this, physical layer security (PLS) has gained
significant attention due to its low complexity. In this paper, we address the
issue of random inter-node distances in secrecy analysis and develop a
comprehensive quality-of-service (QoS) aware PLS framework for the analysis of
both eavesdropping and jamming capabilities of attacker. The proposed solution
covers spatially stochastic deployment of legitimate nodes and attacker. We
characterise the secrecy outage performance against both attacks using
inter-node distance based probabilistic distribution functions. The model takes
into account the practical limits arising out of underlying QoS requirements,
which include the maximum distance between legitimate users driven by transmit
power and receiver sensitivity. A novel concept of eavesdropping zone is
introduced, and relative impact of jamming power is investigated. Closed-form
expressions for asymptotic secrecy outage probability are derived offering
insights into design of optimal system parameters for desired security level
against the attacker's capability of both attacks. Analytical framework,
validated by numerical results, establishes that the proposed solution offers
potentially accurate characterisation of the PLS performance and key design
perspective from point-of-view of both legitimate user and attacker.Comment: Accepted in IET communication
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201