478 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Cooperative Cognitive Relaying Under Primary and Secondary Quality of Service Satisfaction

    Full text link
    This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission according to time division multiple access, and the remainder of the secondary users, which we refer to as secondary relays, attempt to decode the primary packet. Afterwards, the secondary relays employ cooperative beamforming to forward the primary packet and to provide protection to the secondary destination of the secondary source scheduled for transmission from interference. We characterize the diversity-multiplexing tradeoff of the primary source under the proposed protocol. We consider certain quality of service for each user specified by its required throughput. The optimization problem is stated under such condition. It is shown that the optimization problem is linear and can be readily solved. We show that the sum of the secondary required throughputs must be less than or equal to the probability of correct packets reception.Comment: This paper was accepted in PIMRC 201

    Security versus Reliability Analysis of Opportunistic Relaying

    Full text link
    Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping between legitimate users, when the main link spanning from source to destination has better propagation conditions than the wiretap link from source to eavesdropper. In this paper, we identify and analyze the tradeoffs between the security and reliability of wireless communications in the presence of eavesdropping attacks. Typically, the reliability of the main link can be improved by increasing the source's transmit power (or decreasing its date rate) to reduce the outage probability, which unfortunately increases the risk that an eavesdropper succeeds in intercepting the source message through the wiretap link, since the outage probability of the wiretap link also decreases when a higher transmit power (or lower date rate) is used. We characterize the security-reliability tradeoffs (SRT) of conventional direct transmission from source to destination in the presence of an eavesdropper, where the security and reliability are quantified in terms of the intercept probability by an eavesdropper and the outage probability experienced at the destination, respectively. In order to improve the SRT, we then propose opportunistic relay selection (ORS) and quantify the attainable SRT improvement upon increasing the number of relays. It is shown that given the maximum tolerable intercept probability, the outage probability of our ORS scheme approaches zero for N→∞N \to \infty, where NN is the number of relays. Conversely, given the maximum tolerable outage probability, the intercept probability of our ORS scheme tends to zero for N→∞N \to \infty.Comment: 9 pages. IEEE Transactions on Vehicular Technology, 201

    Energy Efficiency of Network Cooperation for Cellular Uplink Transmissions

    Full text link
    There is a growing interest in energy efficient or so-called "green" wireless communication to reduce the energy consumption in cellular networks. Since today's wireless terminals are typically equipped with multiple network access interfaces such as Bluetooth, Wi-Fi, and cellular networks, this paper investigates user terminals cooperating with each other in transmitting their data packets to a base station (BS) by exploiting the multiple network access interfaces, referred to as inter-network cooperation, to improve the energy efficiency in cellular uplink transmission. Given target outage probability and data rate requirements, we develop a closed-form expression of energy efficiency in Bits-per-Joule for the inter-network cooperation by taking into account the path loss, fading, and thermal noise effects. Numerical results show that when the cooperating users move towards to each other, the proposed inter-network cooperation significantly improves the energy efficiency as compared with the traditional non-cooperation and intra-network cooperation. This implies that given a certain amount of bits to be transmitted, the inter-network cooperation requires less energy than the traditional non-cooperation and intra-network cooperation, showing the energy saving benefit of inter-network cooperation.Comment: in Proceedings of the 2013 IEEE International Conference on Communications (IEEE ICC 2013), Budapest, Hungary, June 201

    User Cooperation in TDMA Wireless System

    Get PDF
    Abstract: Reliability of radio link is limited, owing to path loss, shadowing and multi-path fading. This necessitates the use of a certain type of diversity. In recent years, cooperative diversity has gained considerable attention. Here, wireless nodes cooperate in such a way that they share their antennas and other resources, to create a virtual array through distributed transmission and signal processing. This increases coverage and reduces transmitted power, thereby bringing down co-channel interference, which results in increased system capacity. This paper gives an overview of the state of art of various cooperation schemes and issues related to their implementation
    • …
    corecore