611 research outputs found
Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection -- Secure DoF and Jammer Scaling Law
In this paper, we propose opportunistic jammer selection in a wireless
security system for increasing the secure degrees of freedom (DoF) between a
transmitter and a legitimate receiver (say, Alice and Bob). There is a jammer
group consisting of jammers among which Bob selects jammers. The
selected jammers transmit independent and identically distributed Gaussian
signals to hinder the eavesdropper (Eve). Since the channels of Bob and Eve are
independent, we can select the jammers whose jamming channels are aligned at
Bob, but not at Eve. As a result, Eve cannot obtain any DoF unless it has more
than receive antennas, where is the number of jammer's transmit
antenna each, and hence can be regarded as defensible dimensions against
Eve. For the jamming signal alignment at Bob, we propose two opportunistic
jammer selection schemes and find the scaling law of the required number of
jammers for target secure DoF by a geometrical interpretation of the received
signals.Comment: Accepted with minor revisions, IEEE Trans. on Signal Processin
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Ergodic Interference Alignment
This paper develops a new communication strategy, ergodic interference
alignment, for the K-user interference channel with time-varying fading. At any
particular time, each receiver will see a superposition of the transmitted
signals plus noise. The standard approach to such a scenario results in each
transmitter-receiver pair achieving a rate proportional to 1/K its
interference-free ergodic capacity. However, given two well-chosen time
indices, the channel coefficients from interfering users can be made to exactly
cancel. By adding up these two observations, each receiver can obtain its
desired signal without any interference. If the channel gains have independent,
uniform phases, this technique allows each user to achieve at least 1/2 its
interference-free ergodic capacity at any signal-to-noise ratio. Prior
interference alignment techniques were only able to attain this performance as
the signal-to-noise ratio tended to infinity. Extensions are given for the case
where each receiver wants a message from more than one transmitter as well as
the "X channel" case (with two receivers) where each transmitter has an
independent message for each receiver. Finally, it is shown how to generalize
this strategy beyond Gaussian channel models. For a class of finite field
interference channels, this approach yields the ergodic capacity region.Comment: 16 pages, 6 figure, To appear in IEEE Transactions on Information
Theor
Recommended from our members
Secure Communication for Spatially Sparse Millimeter-Wave Massive MIMO Channels via Hybrid Precoding
In this paper, we investigate secure communication over sparse millimeter-wave (mm-Wave) massive multiple-input multiple-output (MIMO) channels by exploiting the spatial sparsity of legitimate user's channel. We propose a secure communication scheme in which information data is precoded onto dominant angle components of the sparse channel through a limited number of radio-frequency (RF) chains, while artificial noise (AN) is broadcast over the remaining nondominant angles interfering only with the eavesdropper with a high probability. It is shown that the channel sparsity plays a fundamental role analogous to secret keys in achieving secure communication. Hence, by defining two statistical measures of the channel sparsity, we analytically characterize its impact on secrecy rate. In particular, a substantial improvement on secrecy rate can be obtained by the proposed scheme due to the uncertainty, i.e., 'entropy', introduced by the channel sparsity which is unknown to the eavesdropper. It is revealed that sparsity in the power domain can always contribute to the secrecy rate. In contrast, in the angle domain, there exists an optimal level of sparsity that maximizes the secrecy rate. The effectiveness of the proposed scheme and derived results are verified by numerical simulations
Interference Mitigation in Large Random Wireless Networks
A central problem in the operation of large wireless networks is how to deal
with interference -- the unwanted signals being sent by transmitters that a
receiver is not interested in. This thesis looks at ways of combating such
interference.
In Chapters 1 and 2, we outline the necessary information and communication
theory background, including the concept of capacity. We also include an
overview of a new set of schemes for dealing with interference known as
interference alignment, paying special attention to a channel-state-based
strategy called ergodic interference alignment.
In Chapter 3, we consider the operation of large regular and random networks
by treating interference as background noise. We consider the local performance
of a single node, and the global performance of a very large network.
In Chapter 4, we use ergodic interference alignment to derive the asymptotic
sum-capacity of large random dense networks. These networks are derived from a
physical model of node placement where signal strength decays over the distance
between transmitters and receivers. (See also arXiv:1002.0235 and
arXiv:0907.5165.)
In Chapter 5, we look at methods of reducing the long time delays incurred by
ergodic interference alignment. We analyse the tradeoff between reducing delay
and lowering the communication rate. (See also arXiv:1004.0208.)
In Chapter 6, we outline a problem that is equivalent to the problem of
pooled group testing for defective items. We then present some new work that
uses information theoretic techniques to attack group testing. We introduce for
the first time the concept of the group testing channel, which allows for
modelling of a wide range of statistical error models for testing. We derive
new results on the number of tests required to accurately detect defective
items, including when using sequential `adaptive' tests.Comment: PhD thesis, University of Bristol, 201
Wireless transmission protocols using relays for broadcast and information exchange channels
Relays have been used to overcome existing network performance bottlenecks in meeting the growing
demand for large bandwidth and high quality of service (QoS) in wireless networks. This thesis
proposes several wireless transmission protocols using relays in practical multi-user broadcast and
information exchange channels. The main theme is to demonstrate that efficient use of relays provides
an additional dimension to improve reliability, throughput, power efficiency and secrecy. First,
a spectrally efficient cooperative transmission protocol is proposed for the multiple-input and singleoutput
(MISO) broadcast channel to improve the reliability of wireless transmission. The proposed
protocol mitigates co-channel interference and provides another dimension to improve the diversity
gain. Analytical and simulation results show that outage probability and the diversity and multiplexing
tradeoff of the proposed cooperative protocol outperforms the non-cooperative scheme. Second,
a two-way relaying protocol is proposed for the multi-pair, two-way relaying channel to improve the
throughput and reliability. The proposed protocol enables both the users and the relay to participate
in interference cancellation. Several beamforming schemes are proposed for the multi-antenna
relay. Analytical and simulation results reveal that the proposed protocol delivers significant improvements
in ergodic capacity, outage probability and the diversity and multiplexing tradeoff if compared
to existing schemes. Third, a joint beamforming and power management scheme is proposed for
multiple-input and multiple-output (MIMO) two-way relaying channel to improve the sum-rate. Network
power allocation and power control optimisation problems are formulated and solved using
convex optimisation techniques. Simulation results verify that the proposed scheme delivers better
sum-rate or consumes lower power when compared to existing schemes. Fourth, two-way secrecy
schemes which combine one-time pad and wiretap coding are proposed for the scalar broadcast channel
to improve secrecy rate. The proposed schemes utilise the channel reciprocity and employ relays
to forward secret messages. Analytical and simulation results reveal that the proposed schemes are
able to achieve positive secrecy rates even when the number of users is large. All of these new wireless
transmission protocols help to realise better throughput, reliability, power efficiency and secrecy
for wireless broadcast and information exchange channels through the efficient use of relays
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
- …