19 research outputs found

    Transmit optimization techniques for physical layer security

    Get PDF
    PhD ThesisOver the last several decades, reliable communication has received considerable attention in the area of dynamic network con gurations and distributed processing techniques. Traditional secure communications mainly considered transmission cryptography, which has been developed in the network layer. However, the nature of wireless transmission introduces various challenges of key distribution and management in establishing secure communication links. Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks in addition to existing conventional cryptographic methods, where the physical layer dynamics of fading channels are exploited to establish secure wireless links. On the other hand, with the ever-increasing demand of wireless access users, multi-antenna transmission has been considered as one of e ective approaches to improve the capacity of wireless networks. Multi-antenna transmission applied in physical layer security has extracted more and more attentions by exploiting additional degrees of freedom and diversity gains. In this thesis, di erent multi-antenna transmit optimization techniques are developed for physical layer secure transmission. The secrecy rate optimization problems (i.e., power minimization and secrecy rate maximization) are formulated to guarantee the optimal power allocation. First, transmit optimization for multiple-input single-output (MISO) secrecy channels are developed to design secure transmit beamformer that minimize the transmit power to achieve a target secrecy rate. Besides, the associated robust scheme with the secrecy rate outage probability constraint are presented with statistical channel uncertainty, where the outage probability constraint requires that the achieved secrecy rate exceeds certain thresholds with a speci c probability. Second, multiantenna cooperative jammer (CJ) is presented to provide jamming services that introduces extra interference to assist a multiple-input multipleoutput (MIMO) secure transmission. Transmit optimization for this CJaided MIMO secrecy channel is designed to achieve an optimal power allocation. Moreover, secure transmission is achieved when the CJ introduces charges for its jamming service based on the amount of the interference caused to the eavesdropper, where the Stackelberg game is proposed to handle, and the Stackelberg equilibrium is analytically derived. Finally, transmit optimization for MISO secure simultaneous wireless information and power transfer (SWIPT) is investigated, where secure transmit beamformer is designed with/without the help of arti - cial noise (AN) to maximize the achieved secrecy rate such that satisfy the transmit power budget and the energy harvesting (EH) constraint. The performance of all proposed schemes are validated by MATLAB simulation results

    SECURE PERFORMANCE ANALYSIS OF ADAPTIVE ENERGY HARVESTING ENABLED RELAYING NETWORKS

    Get PDF
    In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH) enabled dual-hop amplify-and-forward relaying network is investigated. First, the security outage probability analysis is studied for conventional networks under a single passive eavesdropper attack. Then, the outage performance analysis in two cases regarding energy harvesting is investigated. Moreover, the proposed work enhances Physical Layer (PHY) security performance of two-hop relaying model using Cooperative Jamming Dual-Hop Techniques (CJDH). For this purpose, new closed-form expressions are derived for the outage probability of CJDH model in the presence of interference over Rayleigh fading channels. A power allocation optimization problem for energy harvesting protocol is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper

    Transmitter Optimization Techniques for Physical Layer Security

    Get PDF
    Information security is one of the most critical issues in wireless networks as the signals transmitted through wireless medium are more vulnerable for interception. Although the existing conventional security techniques are proven to be safe, the broadcast nature of wireless communications introduces different challenges in terms of key exchange and distributions. As a result, information theoretic physical layer security has been proposed to complement the conventional security techniques for enhancing security in wireless transmissions. On the other hand, the rapid growth of data rates introduces different challenges on power limited mobile devices in terms of energy requirements. Recently, research work on wireless power transfer claimed that it has been considered as a potential technique to extend the battery lifetime of wireless networks. However, the algorithms developed based on the conventional optimization approaches often require iterative techniques, which poses challenges for real-time processing. To meet the demanding requirements of future ultra-low latency and reliable networks, neural network (NN) based approach can be employed to determine the resource allocations in wireless communications. This thesis developed different transmission strategies for secure transmission in wireless communications. Firstly, transmitter designs are focused in a multiple-input single-output simultaneous wireless information and power transfer system with unknown eavesdroppers. To improve the performance of physical layer security and the harvested energy, artificial noise is incorporated into the network to mask the secret information between the legitimate terminals. Then, different secrecy energy efficiency designs are considered for a MISO underlay cognitive radio network, in the presence of an energy harvesting receiver. In particular, these designs are developed with different channel state information assumptions at the transmitter. Finally, two different power allocation designs are investigated for a cognitive radio network to maximize the secrecy rate of the secondary receiver: conventional convex optimization framework and NN based algorithm

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link

    PHY Layer Anonymous Precoding: Sender Detection Performance and Diversity-Multiplexing Tradeoff

    Get PDF
    Departing from traditional data security-oriented designs, the aim of anonymity is to conceal the transmitters’ identities during communications to all possible receivers. In this work, joint anonymous transceiver design at the physical (PHY) layer is investigated. We first present sender detection error rate (DER) performance analysis, where closed-form expression of DER is derived for a generic precoding scheme applied at the transmitter side. Based on the tight DER expression, a fully DER-tunable anonymous transceiver design is demonstrated. An alias channel-based combiner is first proposed, which helps the receiver find a Euclidean space that is close to the propagation channel of the received signal for high quality reception, but does not rely on the recognition of the real sender’s channel. Then, two novel anonymous precoders are proposed under a given DER requirement, one being able to provide full multiplexing performance, and the other flexibly adjusting the number of multiplexing streams with further consideration of the receive-reliability. Simulation demonstrates that the proposed joint transceiver design can always guarantee the subscribed DER performance, while well striking the trade-off among the multiplexing, diversity and anonymity performance

    Temperature aware power optimization for multicore floating-point units

    Full text link
    corecore