29 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Critical Review of Physical Layer Security in Wireless Networking
Wireless networking has kept evolving with additional features and increasing capacity. Meanwhile, inherent characteristics of wireless networking make it more vulnerable than wired networks. In this thesis we present an extensive and comprehensive review of physical layer security in wireless networking. Different from cryptography, physical layer security, emerging from the information theoretic assessment of secrecy, could leverage the properties of wireless channel for security purpose, by either enabling secret communication without the need of keys, or facilitating the key agreement process. Hence we categorize existing literature into two main branches, namely keyless security and key-based security. We elaborate the evolution of this area from the early theoretic works on the wiretap channel, to its generalizations to more complicated scenarios including multiple-user, multiple-access and multiple-antenna systems, and introduce not only theoretical results but practical implementations. We critically and systematically examine the existing knowledge by analyzing the fundamental mechanics for each approach. Hence we are able to highlight advantages and limitations of proposed techniques, as well their interrelations, and bring insights into future developments of this area
Optimising multiple antenna techniques for physical layer security
Wireless communications offer data transmission services anywhere and anytime, but with the inevitable cost of introducing major security vulnerabilities. Indeed, an eavesdropper can overhear a message conveyed over the open insecure wireless media putting at risk the confidentiality of the wireless users. Currently, the way to partially prevent eavesdropping attacks is by ciphering the information between the authorised parties through complex cryptographic algorithms. Cryptography operates in the upper layers of the communication model, bit it does not address the security problem where the attack is suffered: at the transmission level.
In this context, physical layer security has emerged as a promising framework to prevent eavesdropping attacks at the transmission level. Physical layer security is based on information-theoretic concepts and exploits the randomness and the uniqueness of the wireless channel. In this context, this thesis presents signal processing techniques to secure wireless networks at the physical layer by optimising the use of multiple-antennas. A masked transmission strategy is used to steer the confidential information towards the intended receiver, and, at the same time, broadcast an interfering signal to confuse unknown eavesdroppers. This thesis considers practical issues in multiple-antenna networks such as limited transmission resources and the lack of accurate information between the authorised transmission parties. The worst-case for the security, that occurs when a powerful eavesdropper takes advantage of any opportunity to put at risk the transmission confidentiality, is addressed. The techniques introduced improve the security by offering efficient and innovative transmission solutions to lock the communication at the physical layer. Notably, these transmission mechanisms strike a balance between confidentiality and quality to satisfy the practical requirements of modern wireless networks
Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out
Recommended from our members
MIMO-based Friendly Jamming and Interference Management Techniques for Secure Wireless Communications
The ever-increasing growth of wireless systems has made them an essential part of our daily life. People rely heavily on wireless networks for communications and to conduct critical transactions from their mobile devices, including financial transactions, access to health records, etc. The proliferation of wireless communication devices opens the door for many security breaches, ranging from eavesdropping to jamming attacks. Such a disadvantage stems from the broadcast nature of wireless transmissions, which creates an exposed environment.
In this dissertation, we focus on eavesdropping attacks. While cryptographic techniques can be used to thwart eavesdropping attacks and enable secure wireless communications, they are not sufficient to protect the lower-layer headers of a packet (i.e., PHY and MAC headers). Hence, even though the secret message is encrypted, these unencrypted headers can be exploited by an adversary to extract invaluable information and initiate malicious attacks (e.g., traffic classification). Physical-layer (PHY-layer) security has been introduced as a promising candidate to prevent attacks that exploit unencrypted lower layer headers.
PHY-layer security techniques typically rely on injecting an intentional interference into the medium so as to confuse nearby eavesdroppers (Eve). Specifically, a legitimate transmit-receive (Alice-Bob) pair generates a bogus signal, namely friendly jamming (FJ), along with the information signal, to increase interference at Eve(s) but without affecting the legitimate receiver (Bob). Depending on which end of a legitimate link is responsible for generating the FJ signal, two types of FJ techniques exist: transmitter-based (TxFJ) and receiver-based (RxFJ).
In this dissertation, we propose to advance the state-of-art in PHY-layer security by considering multi-link scenarios, including multi-user multiple-input multiple-output (MU-MIMO) and peer-to-peer (P2P) networks. Specifically, we consider a scenario where one or more external Eve(s) attempt to snoop on communications of various links. In such networks, transmission of one link may be interfered with neighboring links' transmissions. Thus, special care must be dedicated to handling interference.
In our first contribution in this dissertation, we consider a P2P network tapped by external Eve(s) in which each Alice-Bob pair conceals its communications using TxFJ. TxFJ is realized at Alice side using MIMO precoding. The goal is to design the precoders for both information and TxFJ signals at all Alices so as to maximize a given utility (e.g., sum of communication rates) while preventing eavesdropping elsewhere. Because legitimate links do not cooperate with each other and there is no centralized authority to perform optimization, every link selfishly aims at maximizing its secrecy rate. Using non-cooperative game theory, we design a distributed method for maximizing the sum of secrecy rates. Under the exact knowledge of eavesdropping channels, we show that our distributed method has a comparable secrecy sum-rate to a centralized approach.
In our next contribution, we focus on employing practical precoders in our design for a P2P network. Specifically, we employed a zero-forcing-based (ZF-based) precoder for the TxFJ of each Alice-Bob pair in a P2P network. We also assume that each link has a certain rate demand to be satisfied. In such a scenario, even though the non-cooperative game designed for this P2P network is shown to be convergent to its unique Nash Equilibrium (NE), there is still no guarantee that the resulting NE is Pareto-optimal. Hence, we propose a modified price-based game, in which each link is penalized for generating interference on other legitimate links. We show that the price-based game converges to the Pareto-optimal point of secrecy rate region. We then leverage mixed-strategy games to provide solutions that are robust to uncertainties in knowledge of eavesdropping channels. The proposed ZF-based design of precoders is also implemented on software-defined radios to assess its performance on a single link in real-world scenarios.
In another contribution of this dissertation, we consider to further enhance the secrecy of each link in a P2P network by equipping each receiver with RxFJ. Hence, in addition to the power allocation between TxFJ and information signals, we optimize RxFJ power as well. We show that by using RxFJ at each Bob, we could leverage the well-established concept of concave games, which compared to non-convex games enjoy more simplified game-theoretic analysis. We derive sufficient conditions under which the game admits a unique NE. We also propose another version of our power control algorithm that can be implemented asynchronously, making it robust to transmission delays in the network.
In our last contribution, we consider the downlink of a MU-MIMO network in the presence of an external Eve. No knowledge of Eve's location is assumed at the access point. The network is studied in underloaded and overloaded conditions. In an underloaded (overloaded) network, the number of antennas at the access point is larger (smaller) than the total number of downlink users' antennas. In the overloaded setting, traditional methods of creating TxFJ, such as ZF-based methods, are infeasible. We propose a linear precoding scheme that relaxes such infeasibility in overloaded MU-MIMO networks. In the worst-case scenario where Eve has knowledge of the channels between access point and downlink users, we show that our method imposes the most stringent condition on the number of antennas required at Eve to cancel out TxFJ signals. We also show that choosing the number of independent streams to be sent to downlink users has an important role in achieving a tradeoff between security, reliability, and the achievable rate
Robust wireless sensor network for smart grid communication : modeling and performance evaluation
Our planet is gradually heading towards an energy famine due to growing population and industrialization. Hence, increasing electricity consumption and prices, diminishing fossil fuels and lack significantly in environment-friendliness due to their emission of greenhouse gasses, and inefficient usage of existing energy supplies have caused serious network congestion problems in many countries in recent years. In addition to this overstressed situation, nowadays, the electric power system is facing many challenges, such as high maintenance cost, aging equipment, lack of effective fault diagnostics, power supply reliability, etc., which further increase the possibility of system breakdown. Furthermore, the adaptation of the new renewable energy sources with the existing power plants to provide an alternative way for electricity production transformed it in a very large and complex scale, which increases new issues. To address these challenges, a new concept of next generation electric power system, called the "smart grid", has emerged in which Information and Communication Technologies (ICTs) are playing the key role.
For a reliable smart grid, monitoring and control of power system parameters in the transmission and distribution segments are crucial. This necessitates the deployment of a robust communication network within the power grid. Traditionally, power grid communications are realized through wired communications, including power line communication (PLC). However, the cost of its installation might be expensive especially for remote control and monitoring applications. More recently, plenty of research interests have been drawn to the wireless communications for smart grid applications. In this regard, the most promising methods of smart grid monitoring explored in the literature is based on wireless sensor network (WSN). Indeed, the collaborative nature of WSN brings significant advantages over the traditional wireless networks, including low-cost, wider coverage, self-organization, and rapid deployment. Unfortunately, harsh and hostile electric power system environments pose great challenges in the reliability of sensor node communications because of strong RF interference and noise called impulsive noise.
On account of the fundamental of WSN-based smart grid communications and the possible impacts of impulsive noise on the reliability of sensor node communications, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three fold: (i) investigation and performance analysis of impulsive noise mitigation techniques for point-to-point single-carrier communication systems impaired by bursty impulsive noise; (ii) design and performance analysis of collaborative WSN for smart grid communication by considering the RF noise model in the designing process, a particular intension is given to how the time-correlation among the noise samples can be taken into account; (iii) optimal minimum mean square error (MMSE)estimation of physical phenomenon like temperature, current, voltage, etc., typically modeled by a Gaussian source in the presence of impulsive noise.
In the first part, we compare and analyze the widely used non-linear methods such as clipping, blanking, and combined clipping-blanking to mitigate the noxious effects of bursty impulsive noise for point-to-point communication systems with low-density parity-check (LDPC) coded single-carrier transmission. While, the performance of these mitigation techniques are widely investigated for multi-carrier communication systems using orthogonal frequency division multiplexing (OFDM) transmission under the effect of memoryless impulsive noise, we note that OFDM is outperformed by its single-carrier counterpart when the impulses are very strong and/or they occur frequently, which likely exists in contemporary communication systems including smart grid communications. Likewise, the assumption of memoryless noise model is not valid for many communication scenarios. Moreover, we propose log-likelihood ratio (LLR)-based impulsive noise mitigation for the considered scenario. We show that the memory property of the noise can be exploited in the LLR calculation through maximum a posteriori (MAP) detection. In this context, provided simulation results highlight the superiority of the LLR-based mitigation scheme over the simple clipping/blanking schemes.
The second contribution can be divided into two aspects: (i) we consider the performance analysis of a single-relay decode-and-forward (DF) cooperative relaying scheme over channels impaired by bursty impulsive noise. For this channel, the bit error rate (BER) performances of direct transmission and a DF relaying scheme using M-PSK modulation in the presence of Rayleigh fading with a MAP receiver are derived; (ii) as a continuation of single-relay collaborative WSN scheme, we propose a novel relay selection protocol for a multi-relay DF collaborative WSN taking into account the bursty impulsive noise. The proposed protocol chooses the N’th best relay considering both the channel gains and the states of the impulsive noise of the source-relay and relay-destination links. To analyze the performance of the proposed protocol, we first derive closed-form expressions for the probability density function (PDF) of the received SNR. Then, these PDFs are used to derive closed-form expressions for the BER and the outage probability. Finally, we also derive the asymptotic BER and outage expressions to quantify the diversity benefits. From the obtained results, it is seen that the proposed receivers based on the MAP detection criterion is the most suitable one for bursty impulsive noise environments as it has been designed according to the statistical behavior of the noise.
Different from the aforementioned contributions, talked about the reliable detection of finite alphabets in the presence of bursty impulsive noise, in the thrid part, we investigate the optimal MMSE estimation for a scalar Gaussian source impaired by impulsive noise. In Chapter 5, the MMSE optimal Bayesian estimation for a scalar Gaussian source, in the presence of bursty impulsive noise is considered. On the other hand, in Chapter 6, we investigate the distributed estimation of a scalar Gaussian source in WSNs in the presence of Middleton class-A noise. From the obtained results we conclude that the proposed optimal MMSE estimator outperforms the linear MMSE estimator developed for Gaussian channel
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/