162 research outputs found

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    L'intertextualité dans les publications scientifiques

    No full text
    La base de données bibliographiques de l'IEEE contient un certain nombre de duplications avérées avec indication des originaux copiés. Ce corpus est utilisé pour tester une méthode d'attribution d'auteur. La combinaison de la distance intertextuelle avec la fenêtre glissante et diverses techniques de classification permet d'identifier ces duplications avec un risque d'erreur très faible. Cette expérience montre également que plusieurs facteurs brouillent l'identité de l'auteur scientifique, notamment des collectifs de chercheurs à géométrie variable et une forte dose d'intertextualité acceptée voire recherchée

    An Overview of Physical Layer Security with Finite Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research

    Enhanced Air-Interfaces for Fifth Generation Mobile Broadband Communication

    Get PDF
    In broadband wireless multicarrier communication systems, intersymbol interference (ISI) and intercarrier interference (ICI) should be reduced. In orthogonal frequency division multiplexing (OFDM), the cyclic prefix (CP) guarantees to reduce the ISI interference. However, the CP reduces spectral and power efficiency. In this thesis, iterative interference cancellation (IIC) with iterative decoding is used to reduce ISI and ICI from the received signal in multicarrier modulation (MCM) systems. Alternative schemes as well as OFDM with insufficient CP are considered; filter bank multicarrier (FBMC/Offset QAM) and discrete wavelet transform based multicarrier modulation (DWT-MCM). IIC is applied in these different schemes. The required components are calculated from either the hard decision of the demapper output or the estimated decoded signal. These components are used to improve the received signal. Channel estimation and data detection are very important parts of the receiver design of the wireless communication systems. Iterative channel estimation using Wiener filter channel estimation with known pilots and IIC is used to estimate and improve data detection. Scattered and interference approximation method (IAM) preamble pilot are using to calculate the estimated values of the channel coefficients. The estimated soft decoded symbols with pilot are used to reduce the ICI and ISI and improve the channel estimation. The combination of Multi-Input Multi-Output MIMO and OFDM enhances the air-interface for the wireless communication system. In a MIMO-MCM scheme, IIC and MIMO-IIC-based successive interference cancellation (SIC) are proposed to reduce the ICI/ISI and cross interference to a given antenna from the signal transmitted from the target and the other antenna respectively. The number of iterations required can be calculated by analysing the convergence of the IIC with the help of EXtrinsic Information Transfer (EXIT) charts. A new EXIT approach is proposed to provide a means to define performance for a given outage probability on quasi-static channels

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link
    • …
    corecore