41 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Relaying in the Internet of Things (IoT): A Survey

    Get PDF
    The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    Get PDF
    This paper investigates the physical-layer security of an amplify-and-forward wireless cooperative network, where N source nodes communicate with their corresponding destination nodes under the help of an untrusted relay. In each slot, only one user-pair is scheduled to transmit the information, and the destination-aided cooperative jamming is adopted to protect information from being intercepted by the untrusted relay. Three user-pair selection schemes have been proposed for the considered system, namely opportunistic user-pair selection (OUS) scheme, greedy user-pair selection (GUS) scheme, and genie-aided user-pair selection scheme. Both the secrecy outage probability and the average secrecy rate have been studied to evaluate the performance of the OUS and GUS schemes, and the asymptotic analysis has also been obtained. It reveals that the proposed schemes can improve the secrecy performance for the cooperative multiuser networks as the number of user-pairs increases. We also prove that the achievable diversity order of both OUS and GUS schemes is N/2 . Finally, numerical and simulation results are presented to validate the accuracy of the developed analytical results

    Secure Communication with a Wireless-Powered Friendly Jammer

    Get PDF
    In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the information-bearing signal under the protection of a jamming signal sent by the jammer using the harvested energy in the first phase. We analytically characterize the long-time behavior of the proposed protocol and derive a closed-form expression for the throughput. We further optimize the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint. Our analytical results show that the throughput performance differs significantly between the single-antenna jammer case and the multi-antenna jammer case. For instance, as the source transmit power increases, the throughput quickly reaches an upper bound with single-antenna jammer, while the throughput grows unbounded with multi-antenna jammer. Our numerical results also validate the derived analytical results.Comment: accepted for publication in IEEE Transactions on Wireless Communication

    Resource Allocation for Wireless-Powered Full-Duplex Relaying Systems with Nonlinear Energy Harvesting Efficiency

    Get PDF
    In wireless power transfer (WPT)-assisted relaying systems, spectral efficiency (SE) of source-relay link plays a dominant role in system SE performance due to the limited transmission power at the WPT-aided relay. In this paper, we propose a novel protocol for a downlink orthogonal frequency division multiple access (OFDMA) system with a WPT-aided relay operating in full-duplex (FD) decode-and-forward (DF) mode, where the time slot durations of the source-relay and relay-users hops are designed to be dynamic, to enhance the utilization of degrees of freedom and hence the system SE. In particular, a multiple-input and signal-output (MISO) source-relay channel is considered to satisfy the stringent sensitivity of the energy harvesting (EH) circuit at the relay, while a single-input and single-output (SISO) relay-user channel is considered to alleviate the power consumption at the relay node. Taking into account the non-linearity of EH efficiency, a near-optimal iteration-based dynamic WPT-aided FD relaying (A-FR) algorithm is developed by jointly optimizing the time slot durations, subcarriers, and transmission power at the source and the relay. Furthermore, self-interference generated at the relay is utilized as a vital energy source rather than being canceled, which increases substantially the total energy harvested at the FD relay. We also reveal some implicit characteristics of the considered WPT-aided FD relaying system through intensive discussions. Simulation results confirm that the proposed A-FR achieves a significant enhancement in terms of SE with different relay's locations and the number of users, compared to the conventional symmetric WPT-aided FD relaying (S-FR) and the time-switching-based WPT-aided FD relaying (TS-FR) benchmarks
    corecore