214 research outputs found

    Vulnerability of LTE to Hostile Interference

    Full text link
    LTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we need it. Unfortunately, like any wireless technology, disruption through radio jamming is possible. This paper investigates the extent to which LTE is vulnerable to intentional jamming, by analyzing the components of the LTE downlink and uplink signals. The LTE physical layer consists of several physical channels and signals, most of which are vital to the operation of the link. By taking into account the density of these physical channels and signals with respect to the entire frame, as well as the modulation and coding schemes involved, we come up with a series of vulnerability metrics in the form of jammer to signal ratios. The ``weakest links'' of the LTE signals are then identified, and used to establish the overall vulnerability of LTE to hostile interference.Comment: 4 pages, see below for citation. M. Lichtman, J. Reed, M. Norton, T. Clancy, "Vulnerability of LTE to Hostile Interference'', IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 201

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Physical-Layer Security Enhancement in Wireless Communication Systems

    Get PDF
    Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of our lives. Despite of their popularities, wireless communications are vulnerable to various attacks due to the open nature of radio propagation. In fact, communication security in wireless networks is becoming more critical than ever. As a solution, conventional cryptographic techniques are deployed on upper layers of network protocols. Along with direct attacks from lower layer, wireless security challenges come with the rapid evolution of sophisticated decipher techniques. Conventional security mechanisms are not necessarily effective against potential attacks from the open wireless environment anymore. As an alternative, physical-layer(PHY) security, utilizing unique features from lower layer, becomes a new research focus for many wireless communication systems. In this thesis, three mechanisms for PHY security enhancement are investigated. Beginning with a discussion on the security vulnerability in highly standardized infrastructures, the thesis proposed a time domain scrambling scheme of orthogonal frequency division multiplexing (OFDM) system to improve the PHY security. The method relies on secretly scrambling each OFDM symbol in time domain, resulting in constellation transformation in frequency domain, to hide transmission features. As a complement to existing secrecy capacity maximization based optimal cooperative jamming systems, a security strategy based on the compromised secrecy region (CSR) minimization in cooperative jamming is then proposed when instantaneous channel state information(CSI) is not available. The optimal parameters of the jammer are derived to minimize the CSR which exhibits high secrecy outage probability. At last, security enhancement of OFDM system in cooperative networks is also investigated. The function selection strategies of cooperative nodes are studied. Our approach is capable of enhancing the security of broadband communications by selecting the proper function of each cooperative node. Numerical results demonstrate the feasibility of three proposed physical layer security mechanisms by examining the communication reliability, achievable CSR and secrecy capacity respectively

    Simultaneous Wireless Information and Power Transfer in 5G communication

    Get PDF
    Green communication technology is expected to be widely adopted in future generation networks to improve energy efficiency and reliability of wireless communication network. Among the green communication technologies,simultaneous wireless information and power transfer (SWIPT) is adopted for its flexible energy harvesting technology through the radio frequency (RF) signa lthati sused for information transmission. Even though existing SWIPT techniques are flexible and adoptable for the wireless communication networks, the power and time resources of the signal need to be shared between infor- mation transmission and RF energy harvesting, and this compromises the quality of the signal. Therefore,SWIP Ttechniques need to be designed to allow an efficient resource allocation for communication and energy harvesting. The goal oft his thesisis to design SWIP Ttechniques that allow efficient,reliable and secure joint communications and power transference. A problem associated to SWIPT techniques combined with multi carrier signals is that the increased power requirements inherent to energy harvesting purposes can exacerbate nonlinear distortion effects at the transmitter. Therefore, we evaluate nonlinear distortion and present feasible solutions to mitigate the impact of nonlinear distortion effects on the performance.Another goal of the thesisis to take advantage of the energy harvesting signals in SWIP Ttechniques for channel estimation and security purposes.Theperformance of these SWIPT techniques is evaluated analytically, and those results are validated by simulations. It is shownthatthe proposed SWIPT schemes can have excellent performance, out performing conventional SWIPT schemes.Espera-se que aschamadas tecnologiasde green communications sejam amplamente ado- tadas em futuras redes de comunicação sem fios para melhorar a sua eficiência energética a fiabilidade.Entre estas,encontram-se as tecnologias SWIPT (Simultaneous Wireless Information and Power Transference), nas quais um sinal radio é usado para transferir simultaneamente potência e informações.Embora as técnicas SWIPT existentes sejam fle- xíveis e adequadas para as redes de comunicações sem fios, os recursos de energia e tempo do sinal precisam ser compartilhados entre a transmissão de informações e de energia, o que pode comprometer a qualidade do sinal. Deste modo,as técnicas SWIPT precisam ser projetadas para permitir uma alocação eficiente de recursos para comunicação e recolha de energia. O objetivo desta tese é desenvolver técnicas SWIPT que permitam transferência de energia e comunicações eficientes,fiáveis e seguras.Um problema associado às técnicas SWIPT combinadas com sinais multi-portadora são as dificuldades de amplificação ine- rentes à combinação de sinais de transmissão de energia com sinais de transferência de dados, que podem exacerbar os efeitos de distorção não-linear nos sinais transmitidos. Deste modo, um dos objectivos desta tese é avaliar o impacto da distorção não-linear em sinais SWIPT, e apresentar soluções viáveis para mitigar os efeitos da distorção não-linear no desempenho da transmissão de dados.Outro objetivo da tese é aproveitar as vantagens dos sinais de transferência de energia em técnicas SWIPT para efeitos de estimação de canal e segurança na comunicação.Os desempenhos dessas técnicas SWIPT são avaliados analiticamente,sendo os respectivos resultados validados por simulações.É mostrado que os esquemas SWIPT propostos podem ter excelente desempenho, superando esquemas SWIPT convencionais

    Effects of Cyclic Prefix Jamming Versus Noise Jamming in OFDM Signals

    Get PDF
    Signal jamming of an orthogonal frequency-division multiplexing (OFDM) signal is simulated in MATLAB. Two different means of jamming are used to see, which is a more efficient way to disrupt a signal using the same signal power. The first way is a basic additive white Gaussian noise (AWGN) jammer that equally jams the entire signal. The second way is an AWGN jammer that targets only the cyclic prefix (CP) of the signal. These two methods of jamming are simulated using different channel models and unknowns to get varying results. The three channel models used in the simulations are the no channel case, the simple multipath case, and the fading multipath case. The general trend shows that as the channel model becomes more complex, the difference in the effectiveness of each jamming technique becomes less. The unknown in this research is the symbol-time delay. Since OFDM signals are characterized by multipath reception, the signal arrives at a symbol-time delay which is known or unknown to the jamming signal and the receiver. Realistically, the symbol-time delay is unknown to each and in that case, a Maximum Likelihood (ML) Estimator is used to find the estimated symbol-time delay. This research simulates the symbol-time delay as a known and an unknown at the jammer and receiver. The general trend shows that jamming the cyclic prefix is more effective than noise jamming when the symbol-time delay is unknown to the receiver
    corecore