26 research outputs found
Wireless transmission protocols using relays for broadcast and information exchange channels
Relays have been used to overcome existing network performance bottlenecks in meeting the growing
demand for large bandwidth and high quality of service (QoS) in wireless networks. This thesis
proposes several wireless transmission protocols using relays in practical multi-user broadcast and
information exchange channels. The main theme is to demonstrate that efficient use of relays provides
an additional dimension to improve reliability, throughput, power efficiency and secrecy. First,
a spectrally efficient cooperative transmission protocol is proposed for the multiple-input and singleoutput
(MISO) broadcast channel to improve the reliability of wireless transmission. The proposed
protocol mitigates co-channel interference and provides another dimension to improve the diversity
gain. Analytical and simulation results show that outage probability and the diversity and multiplexing
tradeoff of the proposed cooperative protocol outperforms the non-cooperative scheme. Second,
a two-way relaying protocol is proposed for the multi-pair, two-way relaying channel to improve the
throughput and reliability. The proposed protocol enables both the users and the relay to participate
in interference cancellation. Several beamforming schemes are proposed for the multi-antenna
relay. Analytical and simulation results reveal that the proposed protocol delivers significant improvements
in ergodic capacity, outage probability and the diversity and multiplexing tradeoff if compared
to existing schemes. Third, a joint beamforming and power management scheme is proposed for
multiple-input and multiple-output (MIMO) two-way relaying channel to improve the sum-rate. Network
power allocation and power control optimisation problems are formulated and solved using
convex optimisation techniques. Simulation results verify that the proposed scheme delivers better
sum-rate or consumes lower power when compared to existing schemes. Fourth, two-way secrecy
schemes which combine one-time pad and wiretap coding are proposed for the scalar broadcast channel
to improve secrecy rate. The proposed schemes utilise the channel reciprocity and employ relays
to forward secret messages. Analytical and simulation results reveal that the proposed schemes are
able to achieve positive secrecy rates even when the number of users is large. All of these new wireless
transmission protocols help to realise better throughput, reliability, power efficiency and secrecy
for wireless broadcast and information exchange channels through the efficient use of relays
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
Recommended from our members
Secure Communication for Spatially Sparse Millimeter-Wave Massive MIMO Channels via Hybrid Precoding
In this paper, we investigate secure communication over sparse millimeter-wave (mm-Wave) massive multiple-input multiple-output (MIMO) channels by exploiting the spatial sparsity of legitimate user's channel. We propose a secure communication scheme in which information data is precoded onto dominant angle components of the sparse channel through a limited number of radio-frequency (RF) chains, while artificial noise (AN) is broadcast over the remaining nondominant angles interfering only with the eavesdropper with a high probability. It is shown that the channel sparsity plays a fundamental role analogous to secret keys in achieving secure communication. Hence, by defining two statistical measures of the channel sparsity, we analytically characterize its impact on secrecy rate. In particular, a substantial improvement on secrecy rate can be obtained by the proposed scheme due to the uncertainty, i.e., 'entropy', introduced by the channel sparsity which is unknown to the eavesdropper. It is revealed that sparsity in the power domain can always contribute to the secrecy rate. In contrast, in the angle domain, there exists an optimal level of sparsity that maximizes the secrecy rate. The effectiveness of the proposed scheme and derived results are verified by numerical simulations
An Overview of Physical Layer Security with Finite Alphabet Signaling
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research
Physical-Layer Security in Wireless Communication Systems
The use of wireless networks has grown significantly in contemporary
times, and continues to develop further. The broadcast nature of
wireless communications, however, makes them particularly vulnerable
to eavesdropping. Unlike traditional solutions, which usually handle
security at the application layer, the primary concern of this
dissertation is to analyze and develop solutions based on coding
techniques at the physical-layer.
First, in chapter , we consider a scenario where a source node
wishes to broadcast two confidential messages to two receivers,
while a wire-tapper also receives the transmitted signal. This model
is motivated by wireless communications, where individual secure
messages are broadcast over open media and can be received by any
illegitimate receiver. The secrecy level is measured by the
equivocation rate at the eavesdropper. We first study the general
(non-degraded) broadcast channel with an eavesdropper, and present
an inner bound on the secrecy capacity region for this model. This
inner bound is based on a combination of random binning, and the
Gelfand-Pinsker binning. We further study the situation in which the
channels are degraded. For the degraded broadcast channel with an
eavesdropper, we present the secrecy capacity region. Our achievable
coding scheme is based on Cover's superposition scheme and random
binning. We refer to this scheme as the Secret Superposition Scheme.
Our converse proof is based on a combination of the converse proof
of the conventional degraded broadcast channel and Csiszar Lemma. We
then assume that the channels are Additive White Gaussian Noise and
show that the Secret Superposition Scheme with Gaussian codebook is
optimal. The converse proof is based on Costa's entropy power
inequality. Finally, we use a broadcast strategy for the slowly
fading wire-tap channel when only the eavesdropper's channel is
fixed and known at the transmitter. We derive the optimum power
allocation for the coding layers, which maximizes the total average
rate.
Second, in chapter , we consider the
Multiple-Input-Multiple-Output (MIMO) scenario of a broadcast
channel where a wiretapper also receives the transmitted signal via
another MIMO channel. First, we assume that the channels are
degraded and the wiretapper has the worst channel. We establish the
capacity region of this scenario. Our achievability scheme is the
Secret Superposition Coding. For the outerbound, we use notion of
the enhanced channels to show that the secret superposition of
Gaussian codes is optimal. We show that we only need to enhance the
channels of the legitimate receivers, and the channel of the
eavesdropper remains unchanged. We then extend the result of the
degraded case to a non-degraded case. We show that the secret
superposition of Gaussian codes, along with successive decoding,
cannot work when the channels are not degraded. We develop a Secret
Dirty Paper Coding scheme and show that it is optimal for this
channel. We then present a corollary generalizing the capacity
region of the two receivers case to the case of multiple receivers.
Finally, we investigate a scenario which frequently occurs in the
practice of wireless networks. In this scenario, the transmitter and
the eavesdropper have multiple antennae, while both intended
receivers have a single antenna (representing resource limited
mobile units). We characterize the secrecy capacity region in terms
of generalized eigenvalues of the receivers' channels and the
eavesdropper's channel. We refer to this configuration as the MISOME
case. We then present a corollary generalizing the results of the
two receivers case to multiple receivers. In the high SNR regime, we
show that the capacity region is a convex closure of rectangular
regions.
Finally, in chapter , we consider a -user secure Gaussian
Multiple-Access-Channel with an external eavesdropper. We establish
an achievable rate region for the secure discrete memoryless MAC.
Thereafter, we prove the secrecy sum capacity of the degraded
Gaussian MIMO MAC using Gaussian codebooks. For the non-degraded
Gaussian MIMO MAC, we propose an algorithm inspired by the
interference alignment technique to achieve the largest possible
total Secure-Degrees-of-Freedom . When all the terminals are
equipped with a single antenna, Gaussian codebooks have shown to be
inefficient in providing a positive S-DoF. Instead, we propose a
novel secure coding scheme to achieve a positive S-DoF in the single
antenna MAC. This scheme converts the single-antenna system into a
multiple-dimension system with fractional dimensions. The
achievability scheme is based on the alignment of signals into a
small sub-space at the eavesdropper, and the simultaneous separation
of the signals at the intended receiver. We use tools from the field
of Diophantine Approximation in number theory to analyze the
probability of error in the coding scheme. We prove that the total
S-DoF of can be achieved for almost all channel
gains. For the other channel gains, we propose a multi-layer coding
scheme to achieve a positive S-DoF. As a function of channel gains,
therefore, the achievable S-DoF is discontinued