527 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Attacking Massive MIMO Cognitive Radio Networks by Optimized Jamming
Massive multiple-input multiple-output (MaMIMO) and cognitive radio networks (CRNs) are two promising technologies for improving spectral efficiency of next-generation wireless communication networks. In this paper, we investigate the problem of physical layer security in the networks that jointly use both technologies, named MaMIMO-CRN. Specifically, to investigate the vulnerability of this network, we design an optimized attacking scenario to MaMIMO-CRNs by a jammer. For having the most adversary effect on the uplink transmission of the legitimate MaMIMO-CRN, we propose an efficient method for power allocation of the jammer. The legitimate network consists of a training and a data transmission phase, and both of these phases are attacked by the jammer using an optimized power split between them. The resulting power allocation problem is non-convex. We thus propose three different efficient methods for solving this problem, and we show that under some assumptions, a closed-form solution can also be obtained. Our results show the vulnerability of the MaMIMO-CRN to an optimized jammer. It is also shown that increasing the number of antennas at the legitimate network does not improve the security of the network
- …