8 research outputs found
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
Schémas pratiques pour la diffusion (sécurisée) sur les canaux sans fils
Dans cette thèse, on s'est intéressé à l'étude des canaux de diffusion avec des contraintes de transmission pratiques. Tout d'abord, on a étudié l'impact de la contrainte pratique de l'utilisation d'un alphabet fini à l'entrée du canal de diffusion Gaussien avec deux utilisateurs. Deux modèles de canaux de diffusion sont considérés lorsqu'il y a, en plus d'un message commun pour les deux utilisateurs, (i) un message privé pour l'un des deux utilisateurs sans contrainte de sécurité (ii) un message confidentiel pour l'un des deux utilisateurs qui doit être totalement caché de l'autre utilisateur. On a présenté plusieurs stratégies de diffusion distinguées par leur complexité d'implémentation. Plus précisément, on a étudié les régions des débits atteignables en utilisant le partage de temps, la superposition de modulation et le codage par superposition. Pour la superposition de modulation et le cas général du codage par superposition, les régions des débits atteignables maximales sont obtenues en maximisant par rapport aux positions des symboles dans la constellation et la distribution de probabilité jointe. On a étudié le compromis entre la complexité d'implémentation des stratégies de transmission et leurs efficacités en termes de gains en débits atteignables. On a étudié aussi l'impact de la contrainte de sécurité sur la communication en comparant les débits atteignables avec et sans cette contrainte. Enfin, on a étudié les performances du système avec des schémas d'accusés de réception hybrides (HARQ) pour un canal à écoute à évanouissement par blocs lorsque l'émetteur n'a pas une information parfaite sur l'état instantané du canal mais connait seulement les statistiques. On a considéré un schéma adaptatif pour la communication sécurisée en utilisant des canaux de retour à niveaux multiples vers l'émetteur pour changer la longueur des sous mots de code à chaque retransmission afin que le débit utile secret soit maximisé sous des contraintes d'"outages".In this thesis, we aim to study broadcast channels with practical transmission constraints. First, we study the impact of finite input alphabet constraint on the achievable rates for the Gaussian broadcast channel with two users. We consider two models of broadcast channels, when there is in addition of a common message for two users, (i) a private message for one of them without secrecy constraint (ii) a confidential message for one of them which should be totally hidden from the other user. We present several broadcast strategies distinguished by their complexity of implementation. More precisely, we study achievable rate regions using time sharing, superposition modulation and superposition coding. For superposition modulation and superposition coding strategies, maximal achievable rate regions are obtained by maximizing over both symbol positions in the constellation and the joint probability distribution. We study the tradeoff between the complexity of implementation of the transmission strategies and their efficiency in terms of gains in achievable rates. We study also the impact of the secrecy constraint on communication by comparing the achievable rates with and without this constraint. Finally, we study the system performance using HARQ schemes for the block-fading wiretap channel when the transmitter has no instantaneous channel state information but knows channel statistics. We consider an adaptive-rate scheme for the secure communication by using multilevel feedback channels to change sub-codeword lengths at each retransmission, in order to maximize the secrecy throughput under outage probabilities constraints.PARIS11-SCD-Bib. électronique (914719901) / SudocSudocFranceF
An Overview of Physical Layer Security with Finite Alphabet Signaling
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research
Physical-Layer Security Enhancement in Wireless Communication Systems
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of our lives. Despite of their popularities, wireless communications are vulnerable to various attacks due to the open nature of radio propagation. In fact, communication security in wireless networks is becoming more critical than ever. As a solution, conventional cryptographic techniques are deployed on upper layers of network protocols. Along with direct attacks from lower layer, wireless security challenges come with the rapid evolution of sophisticated decipher techniques. Conventional security mechanisms are not necessarily effective against potential attacks from the open wireless environment anymore. As an alternative, physical-layer(PHY) security, utilizing unique features from lower layer, becomes a new research focus for many wireless communication systems.
In this thesis, three mechanisms for PHY security enhancement are investigated. Beginning with a discussion on the security vulnerability in highly standardized infrastructures, the thesis proposed a time domain scrambling scheme of orthogonal frequency division multiplexing (OFDM) system to improve the PHY security. The method relies on secretly scrambling each OFDM symbol in time domain, resulting in constellation transformation in frequency domain, to hide transmission features. As a complement to existing secrecy capacity maximization based optimal cooperative jamming systems, a security strategy based on the compromised secrecy region (CSR) minimization in cooperative jamming is then proposed when instantaneous channel state information(CSI) is not available. The optimal parameters of the jammer are derived to minimize the CSR which exhibits high secrecy outage probability. At last, security enhancement of OFDM system in cooperative networks is also investigated. The function selection strategies of cooperative nodes are studied. Our approach is capable of enhancing the security of broadband communications by selecting the proper function of each cooperative node. Numerical results demonstrate the feasibility of three proposed physical layer security mechanisms by examining the communication reliability, achievable CSR and secrecy capacity respectively
Wireless Physical Layer Security: Towards Practical Assumptions and Requirements
The current research on physical layer security is far from
implementations in practical networks, arguably due to
impractical assumptions in the literature and the limited
applicability of physical layer security. Aiming to reduce the
gap between theory and practice, this thesis focuses on wireless
physical layer security towards practical assumptions and
requirements.
In the first half of the thesis, we reduce the dependence of
physical layer security on impractical assumptions. The secrecy
enhancements and analysis based on impractical assumptions cannot
lead to any true guarantee of secrecy in practical networks. The
current study of physical layer security was often based on the
idealized assumption of perfect channel knowledge on both
legitimate users and eavesdroppers. We study the impact of
channel estimation errors on secure transmission designs. We
investigate the practical scenarios where both the transmitter
and the receiver have imperfect channel state information (CSI).
Our results show how the optimal transmission design and the
achievable throughput vary with the amount of knowledge on the
eavesdropper's channel. Apart from the assumption of perfect CSI,
the analysis of physical layer security often ideally assumed the
number of eavesdropper antennas to be known. We develop an
innovative approach to study secure communication systems without
knowing the number of eavesdropper antennas by introducing the
concept of spatial constraint into physical layer security. That
is, the eavesdropper is assumed to have a limited spatial region
to place (possibly an infinite number of) antennas. We show that
a non-zero secrecy rate is achievable with the help of a friendly
jammer, even if the eavesdropper places an infinite number of
antennas in its spatial region.
In the second half of the thesis, we improve the applicability of
physical layer security. The current physical layer security
techniques to achieve confidential broadcasting were limited to
application in single-cell systems. The primary challenge to
achieve confidential broadcasting in the multi-cell network is to
deal with not only the inter-cell but also the intra-cell
information leakage and interference. To tackle this challenge,
we design linear precoders performing confidential broadcasting
in multi-cell networks. We optimize the precoder designs to
maximize the secrecy sum rate with based on the large-system
analysis. Finally, we improve the applicability of physical layer
security from a fundamental aspect. The analysis of physical
layer security based on the existing secrecy metric was often not
applicable in practical networks. We propose new metrics for
evaluating the secrecy of transmissions over fading channels to
address the practical limitations of using existing secrecy
metrics for such evaluations. The first metric establishes a link
between the concept of secrecy outage and the eavesdropper's
ability to decode confidential messages. The second metric
provides an error-probability-based secrecy metric which is often
used for the practical implementation of secure wireless systems.
The third metric characterizes how much or how fast the
confidential information is leaked to the eavesdropper. We show
that the proposed secrecy metrics enable one to appropriately
design secure communication systems with different views on how
secrecy is measured
Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Towards 6G
The next wave of wireless technologies is proliferating in connecting things
among themselves as well as to humans. In the era of the Internet of things
(IoT), billions of sensors, machines, vehicles, drones, and robots will be
connected, making the world around us smarter. The IoT will encompass devices
that must wirelessly communicate a diverse set of data gathered from the
environment for myriad new applications. The ultimate goal is to extract
insights from this data and develop solutions that improve quality of life and
generate new revenue. Providing large-scale, long-lasting, reliable, and near
real-time connectivity is the major challenge in enabling a smart connected
world. This paper provides a comprehensive survey on existing and emerging
communication solutions for serving IoT applications in the context of
cellular, wide-area, as well as non-terrestrial networks. Specifically,
wireless technology enhancements for providing IoT access in fifth-generation
(5G) and beyond cellular networks, and communication networks over the
unlicensed spectrum are presented. Aligned with the main key performance
indicators of 5G and beyond 5G networks, we investigate solutions and standards
that enable energy efficiency, reliability, low latency, and scalability
(connection density) of current and future IoT networks. The solutions include
grant-free access and channel coding for short-packet communications,
non-orthogonal multiple access, and on-device intelligence. Further, a vision
of new paradigm shifts in communication networks in the 2030s is provided, and
the integration of the associated new technologies like artificial
intelligence, non-terrestrial networks, and new spectra is elaborated. Finally,
future research directions toward beyond 5G IoT networks are pointed out.Comment: Submitted for review to IEEE CS&
Wireless Resource Management in Industrial Internet of Things
Wireless communications are highly demanded in Industrial Internet of Things (IIoT) to realize the vision of future flexible, scalable and customized manufacturing. Despite the academia research and on-going standardization efforts, there are still many challenges for IIoT, including the ultra-high reliability and low latency requirements, spectral shortage, and limited energy supply. To tackle the above challenges, we will focus on wireless resource management in IIoT in this thesis by designing novel framework, analyzing performance and optimizing wireless resources. We first propose a bandwidth reservation scheme for Tactile Internet in the local area network of IIoT. Specifically, we minimize the reserved bandwidth taking into account the classification errors while ensuring the latency and reliability requirements. We then extend to the more challenging long distance communications for IIoT, which can support the global skill-set delivery network. We propose to predict the future system state and send to the receiver in advance, and thus the delay experienced by the user is reduced. The bandwidth usage is analysed and minimized to ensure delay and reliability requirements. Finally, we address the issue of energy supply in IIoT, where Radio frequency energy harvesting (RFEH) is used to charge unattended IIoT low-power devices remotely and continuously. To motivate the third-party chargers, a contract theory-based framework is proposed, where the optimal contract is derived to maximize the social welfare
HARQ with Quantized 1-Bit CSI Feedback for Block Fading Wiretap Channels
none1noneTomasin, StefanoTomasin, Stefan