409 research outputs found
Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy
This paper studies physical layer security in a wireless ad hoc network with
numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid
full-/half-duplex receiver deployment strategy is proposed to secure legitimate
transmissions, by letting a fraction of legitimate receivers work in the
full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon
their information receptions, and letting the other receivers work in the
half-duplex mode just receiving their desired signals. The objective of this
paper is to choose properly the fraction of FD receivers for achieving the
optimal network security performance. Both accurate expressions and tractable
approximations for the connection outage probability and the secrecy outage
probability of an arbitrary legitimate link are derived, based on which the
area secure link number, network-wide secrecy throughput and network-wide
secrecy energy efficiency are optimized respectively. Various insights into the
optimal fraction are further developed and its closed-form expressions are also
derived under perfect self-interference cancellation or in a dense network. It
is concluded that the fraction of FD receivers triggers a non-trivial trade-off
between reliability and secrecy, and the proposed strategy can significantly
enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE
Transactions on Wireless Communications, 201
Wireless communication, sensing, and REM: A security perspective
The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio signals in the environment using wireless sensing and radio environment mapping (REM) methods. This is, however, accompanied by threats such as eavesdropping, manipulation, and disruption posed by malicious attackers. To this end, this work analyzes the wireless sensing and radio environment awareness mechanisms, highlighting their vulnerabilities and provides solutions for mitigating them. As an example, the different threats to REM and its consequences in a vehicular communication scenario are described. Furthermore, the use of REM for securing communications is discussed and future directions regarding sensing/REM security are highlighted
The Role of Physical Layer Security in Satellite-Based Networks
In the coming years, 6G will revolutionize the world with a large amount of
bandwidth, high data rates, and extensive coverage in remote and rural areas.
These goals can only be achieved by integrating terrestrial networks with
non-terrestrial networks. On the other hand, these advancements are raising
more concerns than other wireless links about malicious attacks on
satellite-terrestrial links due to their openness. Over the years, physical
layer security (PLS) has emerged as a good candidate to deal with security
threats by exploring the randomness of wireless channels. In this direction,
this paper reviews how PLS methods are implemented in satellite communications.
Firstly, we discuss the ongoing research on satellite-based networks by
highlighting the key points in the literature. Then, we revisit the research
activities on PLS in satellite-based networks by categorizing the different
system architectures. Finally, we highlight research directions and
opportunities to leverage the PLS in future satellite-based networks
Physical-layer security in 6G networks
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These heterogeneous nodes constitute an ultra dense network managing tons of information, often very sensitive. To trust the services provided by such network, security is a mandatory feature by design. In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments. This paper discusses challenges, solutions and visions of PLS in beyond-5G networks
Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out
- …