353 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems
rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been
thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying
nature, is expected to be an integral part of future wireless communications and Internet of drones
(IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems
including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate
receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such
scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated)
and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches
very challenging and inefficient for such systems. This motives the utilization of alternative approaches
enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based
on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there
is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest
advances and state of art researches on the field of applying PLS to UAV systems in a unified and
structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and
use cases of UAVs, which are categorized based on how the drone is utilized and employed in the
communication system setup. The main classified categories include the deployment of the flying, mobile
UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations
and future open research issues are stated and discussed.No sponso
Secure Compute-and-Forward Transmission With Artificial Noise and Full-Duplex Devices
We consider a wiretap channel with an eavesdropper (Eve) and an honest but
curious relay (Ray). Ray and the destination (Bob) are full-duplex (FD)
devices. Since we aim at not revealing information on the secret message to the
relay, we consider the scaled compute-and-forward (SCF) where scaled lattice
coding is used in the transmission by both the source (Alice) and Bob in order
to allow Ray to decode only a linear combination of the two messages. At the
same time Ray transmits artificial noise (AN) to confuse Eve. When Ray relays
the decoded linear combination, Alice and Bob are transmitting AN against Eve.
This can be a 5G cellular communication scenario where a mobile terminal (MT)
aims at transmitting a secret message to a FD base station (BS), with the
assistance of a network FD relay. With respect to existing literature the
innovations of this paper are: a) Bob and Ray are FD devices; b) Alice, Ray and
Bob transmit also AN; and c) the channel to Eve is not known to Alice, Bob and
Ray. For this scenario we derive bounds on both the secrecy outage probability
under Rayleigh fading conditions of the channels to Eve, and the achievable
secrecy-outage rates.Comment: submitted to PIMR
Efficient Power Allocation Schemes for Hybrid Decode-Amplify-Forward Relay Based Wireless Cooperative Network
Cooperative communication in various wireless domains, such as cellular networks, sensor networks and wireless ad hoc networks, has gained significant interest recently. In cooperative network, relays between the source and the destination, form a virtual MIMO that creates spatial diversity at the destination, which overcomes the fading effect of wireless channels. Such relay assisted schemes have potential to increase the channel capacity and network coverage. Most current research on cooperative communication are focused broadly on efficient protocol design and analysis, resource allocation, relay selection and cross layer optimization. The first part of this research aims at introducing hybrid decode-amplify-forward (HDAF) relaying in a distributed Alamouti coded cooperative network. Performance of such adaptive relaying scheme in terms of symbol error rate (SER), outage probability and average channel capacity is derived theoretically and verified through simulation based study. This work is further extended to a generalized multi HDAF relaying cooperative frame work. Various efficient power allocation schemes such as maximized channel capacity based, minimized SER based and total power minimization based are proposed and their superiority in performance over the existing equal power allocation scheme is demonstrated in the simulation results. Due to the broadcast nature of wireless transmission, information privacy in wireless networks becomes a critical issue. In the context of physical layer security, the role of multi HDAF relaying based cooperative model with control jamming and multiple eavesdroppers is explored in the second part of the research. Performance evaluation parameters such as secrecy rate, secrecy outage and intercept probability are derived theoretically. Further the importance of the proposed power allocation schemes in enhancing the secrecy performance of the network in the presence of multiple eavesdroppers is studied in detail through simulation based study and analysis. For all the proposed power allocation schemes in this research, the optimization problems are defined under total power constraint and are solved using Lagrange multiplier method and also evolutionary algorithms such as Differential evolution and Invasive Weed Optimization are employed. Monte Carlo simulation based study is adopted throughout the research. It is concluded that HDAF relaying based wireless cooperative network with optimal power allocation schemes offers improved and reliable performance compared to conventional amplify forward and decode forward relaying schemes. Above research contributions will be applicable for future generation wireless cooperative networks
- …