29 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link

    Temperature aware power optimization for multicore floating-point units

    Full text link

    A Critical Review of Physical Layer Security in Wireless Networking

    Get PDF
    Wireless networking has kept evolving with additional features and increasing capacity. Meanwhile, inherent characteristics of wireless networking make it more vulnerable than wired networks. In this thesis we present an extensive and comprehensive review of physical layer security in wireless networking. Different from cryptography, physical layer security, emerging from the information theoretic assessment of secrecy, could leverage the properties of wireless channel for security purpose, by either enabling secret communication without the need of keys, or facilitating the key agreement process. Hence we categorize existing literature into two main branches, namely keyless security and key-based security. We elaborate the evolution of this area from the early theoretic works on the wiretap channel, to its generalizations to more complicated scenarios including multiple-user, multiple-access and multiple-antenna systems, and introduce not only theoretical results but practical implementations. We critically and systematically examine the existing knowledge by analyzing the fundamental mechanics for each approach. Hence we are able to highlight advantages and limitations of proposed techniques, as well their interrelations, and bring insights into future developments of this area

    Optimising multiple antenna techniques for physical layer security

    Get PDF
    Wireless communications offer data transmission services anywhere and anytime, but with the inevitable cost of introducing major security vulnerabilities. Indeed, an eavesdropper can overhear a message conveyed over the open insecure wireless media putting at risk the confidentiality of the wireless users. Currently, the way to partially prevent eavesdropping attacks is by ciphering the information between the authorised parties through complex cryptographic algorithms. Cryptography operates in the upper layers of the communication model, bit it does not address the security problem where the attack is suffered: at the transmission level. In this context, physical layer security has emerged as a promising framework to prevent eavesdropping attacks at the transmission level. Physical layer security is based on information-theoretic concepts and exploits the randomness and the uniqueness of the wireless channel. In this context, this thesis presents signal processing techniques to secure wireless networks at the physical layer by optimising the use of multiple-antennas. A masked transmission strategy is used to steer the confidential information towards the intended receiver, and, at the same time, broadcast an interfering signal to confuse unknown eavesdroppers. This thesis considers practical issues in multiple-antenna networks such as limited transmission resources and the lack of accurate information between the authorised transmission parties. The worst-case for the security, that occurs when a powerful eavesdropper takes advantage of any opportunity to put at risk the transmission confidentiality, is addressed. The techniques introduced improve the security by offering efficient and innovative transmission solutions to lock the communication at the physical layer. Notably, these transmission mechanisms strike a balance between confidentiality and quality to satisfy the practical requirements of modern wireless networks

    Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking

    Get PDF
    The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out

    Robust wireless sensor network for smart grid communication : modeling and performance evaluation

    Get PDF
    Our planet is gradually heading towards an energy famine due to growing population and industrialization. Hence, increasing electricity consumption and prices, diminishing fossil fuels and lack significantly in environment-friendliness due to their emission of greenhouse gasses, and inefficient usage of existing energy supplies have caused serious network congestion problems in many countries in recent years. In addition to this overstressed situation, nowadays, the electric power system is facing many challenges, such as high maintenance cost, aging equipment, lack of effective fault diagnostics, power supply reliability, etc., which further increase the possibility of system breakdown. Furthermore, the adaptation of the new renewable energy sources with the existing power plants to provide an alternative way for electricity production transformed it in a very large and complex scale, which increases new issues. To address these challenges, a new concept of next generation electric power system, called the "smart grid", has emerged in which Information and Communication Technologies (ICTs) are playing the key role. For a reliable smart grid, monitoring and control of power system parameters in the transmission and distribution segments are crucial. This necessitates the deployment of a robust communication network within the power grid. Traditionally, power grid communications are realized through wired communications, including power line communication (PLC). However, the cost of its installation might be expensive especially for remote control and monitoring applications. More recently, plenty of research interests have been drawn to the wireless communications for smart grid applications. In this regard, the most promising methods of smart grid monitoring explored in the literature is based on wireless sensor network (WSN). Indeed, the collaborative nature of WSN brings significant advantages over the traditional wireless networks, including low-cost, wider coverage, self-organization, and rapid deployment. Unfortunately, harsh and hostile electric power system environments pose great challenges in the reliability of sensor node communications because of strong RF interference and noise called impulsive noise. On account of the fundamental of WSN-based smart grid communications and the possible impacts of impulsive noise on the reliability of sensor node communications, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three fold: (i) investigation and performance analysis of impulsive noise mitigation techniques for point-to-point single-carrier communication systems impaired by bursty impulsive noise; (ii) design and performance analysis of collaborative WSN for smart grid communication by considering the RF noise model in the designing process, a particular intension is given to how the time-correlation among the noise samples can be taken into account; (iii) optimal minimum mean square error (MMSE)estimation of physical phenomenon like temperature, current, voltage, etc., typically modeled by a Gaussian source in the presence of impulsive noise. In the first part, we compare and analyze the widely used non-linear methods such as clipping, blanking, and combined clipping-blanking to mitigate the noxious effects of bursty impulsive noise for point-to-point communication systems with low-density parity-check (LDPC) coded single-carrier transmission. While, the performance of these mitigation techniques are widely investigated for multi-carrier communication systems using orthogonal frequency division multiplexing (OFDM) transmission under the effect of memoryless impulsive noise, we note that OFDM is outperformed by its single-carrier counterpart when the impulses are very strong and/or they occur frequently, which likely exists in contemporary communication systems including smart grid communications. Likewise, the assumption of memoryless noise model is not valid for many communication scenarios. Moreover, we propose log-likelihood ratio (LLR)-based impulsive noise mitigation for the considered scenario. We show that the memory property of the noise can be exploited in the LLR calculation through maximum a posteriori (MAP) detection. In this context, provided simulation results highlight the superiority of the LLR-based mitigation scheme over the simple clipping/blanking schemes. The second contribution can be divided into two aspects: (i) we consider the performance analysis of a single-relay decode-and-forward (DF) cooperative relaying scheme over channels impaired by bursty impulsive noise. For this channel, the bit error rate (BER) performances of direct transmission and a DF relaying scheme using M-PSK modulation in the presence of Rayleigh fading with a MAP receiver are derived; (ii) as a continuation of single-relay collaborative WSN scheme, we propose a novel relay selection protocol for a multi-relay DF collaborative WSN taking into account the bursty impulsive noise. The proposed protocol chooses the N’th best relay considering both the channel gains and the states of the impulsive noise of the source-relay and relay-destination links. To analyze the performance of the proposed protocol, we first derive closed-form expressions for the probability density function (PDF) of the received SNR. Then, these PDFs are used to derive closed-form expressions for the BER and the outage probability. Finally, we also derive the asymptotic BER and outage expressions to quantify the diversity benefits. From the obtained results, it is seen that the proposed receivers based on the MAP detection criterion is the most suitable one for bursty impulsive noise environments as it has been designed according to the statistical behavior of the noise. Different from the aforementioned contributions, talked about the reliable detection of finite alphabets in the presence of bursty impulsive noise, in the thrid part, we investigate the optimal MMSE estimation for a scalar Gaussian source impaired by impulsive noise. In Chapter 5, the MMSE optimal Bayesian estimation for a scalar Gaussian source, in the presence of bursty impulsive noise is considered. On the other hand, in Chapter 6, we investigate the distributed estimation of a scalar Gaussian source in WSNs in the presence of Middleton class-A noise. From the obtained results we conclude that the proposed optimal MMSE estimator outperforms the linear MMSE estimator developed for Gaussian channel

    Lecture Notes on Network Information Theory

    Full text link
    These lecture notes have been converted to a book titled Network Information Theory published recently by Cambridge University Press. This book provides a significantly expanded exposition of the material in the lecture notes as well as problems and bibliographic notes at the end of each chapter. The authors are currently preparing a set of slides based on the book that will be posted in the second half of 2012. More information about the book can be found at http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
    corecore