28 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Spectral, Energy and Computation Efficiency in Future 5G Wireless Networks
Wireless technology has revolutionized the way people communicate. From first generation, or 1G, in the 1980s to current, largely deployed 4G in the 2010s, we have witnessed not only a technological leap, but also the reformation of associated applications. It is expected that 5G will become commercially available in 2020. 5G is driven by ever-increasing demands for high mobile traffic, low transmission delay, and massive numbers of connected devices. Today, with the popularity of smart phones, intelligent appliances, autonomous cars, and tablets, communication demands are higher than ever, especially when it comes to low-cost and easy-access solutions.
Existing communication architecture cannot fulfill 5G’s needs. For example, 5G requires connection speeds up to 1,000 times faster than current technology can provide. Also, from transmitter side to receiver side, 5G delays should be less than 1ms, while 4G targets a 5ms delay speed. To meet these requirements, 5G will apply several disruptive techniques. We focus on two of them: new radio and new scheme. As for the former, we study the non-orthogonal multiple access (NOMA) and as for the latter, we use mobile edge computing (MEC).
Traditional communication systems allow users to communicate alternatively, which clearly avoids inter-user interference, but also caps the connection speed. NOMA, on the other hand, allows multiple users to transmit simultaneously. While NOMA will inevitably cause excessive interference, we prove such interference can be mitigated by an advanced receiver side technique. NOMA has existed on the research frontier since 2013. Since that time, both academics and industry professionals have extensively studied its performance. In this dissertation, our contribution is to incorporate NOMA with several potential schemes, such as relay, IoT, and cognitive radio networks. Furthermore, we reviewed various limitations on NOMA and proposed a more practical model.
In the second part, MEC is considered. MEC is a transformation from the previous cloud computing system. In particular, MEC leverages powerful devices nearby and instead of sending information to distant cloud servers, the transmission occurs in closer range, which can effectively reduce communication delay. In this work, we have proposed a new evaluation metric for MEC which can more effectively leverage the trade-off between the amount of computation and the energy consumed thereby.
A practical communication system for wearable devices is proposed in the last part, which combines all the techniques discussed above. The challenges for wearable communication are inherent in its diverse needs, as some devices may require low speed but high reliability (factory sensors), while others may need low delay (medical devices). We have addressed these challenges and validated our findings through simulations
Transmit optimization techniques for physical layer security
PhD ThesisOver the last several decades, reliable communication has received considerable
attention in the area of dynamic network con gurations and
distributed processing techniques. Traditional secure communications
mainly considered transmission cryptography, which has been developed
in the network layer. However, the nature of wireless transmission introduces
various challenges of key distribution and management in establishing
secure communication links. Physical layer security has been
recently recognized as a promising new design paradigm to provide security
in wireless networks in addition to existing conventional cryptographic
methods, where the physical layer dynamics of fading channels
are exploited to establish secure wireless links. On the other hand, with
the ever-increasing demand of wireless access users, multi-antenna transmission
has been considered as one of e ective approaches to improve
the capacity of wireless networks. Multi-antenna transmission applied
in physical layer security has extracted more and more attentions by
exploiting additional degrees of freedom and diversity gains.
In this thesis, di erent multi-antenna transmit optimization techniques
are developed for physical layer secure transmission. The secrecy rate
optimization problems (i.e., power minimization and secrecy rate maximization)
are formulated to guarantee the optimal power allocation.
First, transmit optimization for multiple-input single-output (MISO) secrecy
channels are developed to design secure transmit beamformer that
minimize the transmit power to achieve a target secrecy rate. Besides,
the associated robust scheme with the secrecy rate outage probability
constraint are presented with statistical channel uncertainty, where the
outage probability constraint requires that the achieved secrecy rate
exceeds certain thresholds with a speci c probability. Second, multiantenna
cooperative jammer (CJ) is presented to provide jamming services
that introduces extra interference to assist a multiple-input multipleoutput
(MIMO) secure transmission. Transmit optimization for this CJaided
MIMO secrecy channel is designed to achieve an optimal power
allocation. Moreover, secure transmission is achieved when the CJ introduces
charges for its jamming service based on the amount of the
interference caused to the eavesdropper, where the Stackelberg game
is proposed to handle, and the Stackelberg equilibrium is analytically
derived. Finally, transmit optimization for MISO secure simultaneous
wireless information and power transfer (SWIPT) is investigated, where
secure transmit beamformer is designed with/without the help of arti -
cial noise (AN) to maximize the achieved secrecy rate such that satisfy
the transmit power budget and the energy harvesting (EH) constraint.
The performance of all proposed schemes are validated by MATLAB
simulation results
Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue
This paper brings the novel idea of paying the utility to the winning agents in terms of some physical entity in cooperative communications. Our setting is a secret two-way communication channel where two transmitters exchange information in the presence of an eavesdropper. The relays are selected from a set of interested parties, such that the secrecy sum rate is maximized. In return, the selected relay nodes' energy harvesting requirements will be fulfilled up to a certain threshold through their own payoff so that they have the natural incentive to be selected and involved in the communication. However, relays may exaggerate their private information in order to improve their chance to be selected. Our objective is to develop a mechanism for relay selection that enforces them to reveal the truth since otherwise they may be penalized. We also propose a joint cooperative relay beamforming and transmit power optimization scheme based on an alternating optimization approach. Note that the problem is highly non-convex, since the objective function appears as a product of three correlated Rayleigh quotients. While a common practice in the existing literature is to optimize the relay beamforming vector for given transmit power via rank relaxation, we propose a second-order cone programming-based approach in this paper, which requires a significantly lower computational task. The performance of the incentive control mechanism and the optimization algorithm has bee