214 research outputs found
Vulnerability of LTE to Hostile Interference
LTE is well on its way to becoming the primary cellular standard, due to its
performance and low cost. Over the next decade we will become dependent on LTE,
which is why we must ensure it is secure and available when we need it.
Unfortunately, like any wireless technology, disruption through radio jamming
is possible. This paper investigates the extent to which LTE is vulnerable to
intentional jamming, by analyzing the components of the LTE downlink and uplink
signals. The LTE physical layer consists of several physical channels and
signals, most of which are vital to the operation of the link. By taking into
account the density of these physical channels and signals with respect to the
entire frame, as well as the modulation and coding schemes involved, we come up
with a series of vulnerability metrics in the form of jammer to signal ratios.
The ``weakest links'' of the LTE signals are then identified, and used to
establish the overall vulnerability of LTE to hostile interference.Comment: 4 pages, see below for citation. M. Lichtman, J. Reed, M. Norton, T.
Clancy, "Vulnerability of LTE to Hostile Interference'', IEEE Global
Conference on Signal and Information Processing (GlobalSIP), Dec 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Physical-Layer Security Enhancement in Wireless Communication Systems
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of our lives. Despite of their popularities, wireless communications are vulnerable to various attacks due to the open nature of radio propagation. In fact, communication security in wireless networks is becoming more critical than ever. As a solution, conventional cryptographic techniques are deployed on upper layers of network protocols. Along with direct attacks from lower layer, wireless security challenges come with the rapid evolution of sophisticated decipher techniques. Conventional security mechanisms are not necessarily effective against potential attacks from the open wireless environment anymore. As an alternative, physical-layer(PHY) security, utilizing unique features from lower layer, becomes a new research focus for many wireless communication systems.
In this thesis, three mechanisms for PHY security enhancement are investigated. Beginning with a discussion on the security vulnerability in highly standardized infrastructures, the thesis proposed a time domain scrambling scheme of orthogonal frequency division multiplexing (OFDM) system to improve the PHY security. The method relies on secretly scrambling each OFDM symbol in time domain, resulting in constellation transformation in frequency domain, to hide transmission features. As a complement to existing secrecy capacity maximization based optimal cooperative jamming systems, a security strategy based on the compromised secrecy region (CSR) minimization in cooperative jamming is then proposed when instantaneous channel state information(CSI) is not available. The optimal parameters of the jammer are derived to minimize the CSR which exhibits high secrecy outage probability. At last, security enhancement of OFDM system in cooperative networks is also investigated. The function selection strategies of cooperative nodes are studied. Our approach is capable of enhancing the security of broadband communications by selecting the proper function of each cooperative node. Numerical results demonstrate the feasibility of three proposed physical layer security mechanisms by examining the communication reliability, achievable CSR and secrecy capacity respectively
Simultaneous Wireless Information and Power Transfer in 5G communication
Green communication technology is expected to be widely adopted in future generation
networks to improve energy efficiency and reliability of wireless communication network.
Among the green communication technologies,simultaneous wireless information and
power transfer (SWIPT) is adopted for its flexible energy harvesting technology through
the radio frequency (RF) signa lthati sused for information transmission. Even though
existing SWIPT techniques are flexible and adoptable for the wireless communication
networks, the power and time resources of the signal need to be shared between infor-
mation transmission and RF energy harvesting, and this compromises the quality of the
signal. Therefore,SWIP Ttechniques need to be designed to allow an efficient resource
allocation for communication and energy harvesting.
The goal oft his thesisis to design SWIP Ttechniques that allow efficient,reliable and
secure joint communications and power transference. A problem associated to SWIPT
techniques combined with multi carrier signals is that the increased power requirements
inherent to energy harvesting purposes can exacerbate nonlinear distortion effects at the
transmitter. Therefore, we evaluate nonlinear distortion and present feasible solutions to
mitigate the impact of nonlinear distortion effects on the performance.Another goal of
the thesisis to take advantage of the energy harvesting signals in SWIP Ttechniques for
channel estimation and security purposes.Theperformance of these SWIPT techniques is
evaluated analytically, and those results are validated by simulations. It is shownthatthe
proposed SWIPT schemes can have excellent performance, out performing conventional
SWIPT schemes.Espera-se que aschamadas tecnologiasde green communications sejam amplamente ado-
tadas em futuras redes de comunicação sem fios para melhorar a sua eficiência energética
a fiabilidade.Entre estas,encontram-se as tecnologias SWIPT (Simultaneous Wireless
Information and Power Transference), nas quais um sinal radio é usado para transferir
simultaneamente potência e informações.Embora as técnicas SWIPT existentes sejam fle-
xíveis e adequadas para as redes de comunicações sem fios, os recursos de energia e tempo
do sinal precisam ser compartilhados entre a transmissão de informações e de energia, o
que pode comprometer a qualidade do sinal. Deste modo,as técnicas SWIPT precisam ser
projetadas para permitir uma alocação eficiente de recursos para comunicação e recolha
de energia.
O objetivo desta tese é desenvolver técnicas SWIPT que permitam transferência de
energia e comunicações eficientes,fiáveis e seguras.Um problema associado às técnicas
SWIPT combinadas com sinais multi-portadora são as dificuldades de amplificação ine-
rentes à combinação de sinais de transmissão de energia com sinais de transferência de
dados, que podem exacerbar os efeitos de distorção não-linear nos sinais transmitidos.
Deste modo, um dos objectivos desta tese é avaliar o impacto da distorção não-linear em
sinais SWIPT, e apresentar soluções viáveis para mitigar os efeitos da distorção não-linear
no desempenho da transmissão de dados.Outro objetivo da tese é aproveitar as vantagens
dos sinais de transferência de energia em técnicas SWIPT para efeitos de estimação de
canal e segurança na comunicação.Os desempenhos dessas técnicas SWIPT são avaliados
analiticamente,sendo os respectivos resultados validados por simulações.É mostrado que
os esquemas SWIPT propostos podem ter excelente desempenho, superando esquemas
SWIPT convencionais
Effects of Cyclic Prefix Jamming Versus Noise Jamming in OFDM Signals
Signal jamming of an orthogonal frequency-division multiplexing (OFDM) signal is simulated in MATLAB. Two different means of jamming are used to see, which is a more efficient way to disrupt a signal using the same signal power. The first way is a basic additive white Gaussian noise (AWGN) jammer that equally jams the entire signal. The second way is an AWGN jammer that targets only the cyclic prefix (CP) of the signal. These two methods of jamming are simulated using different channel models and unknowns to get varying results. The three channel models used in the simulations are the no channel case, the simple multipath case, and the fading multipath case. The general trend shows that as the channel model becomes more complex, the difference in the effectiveness of each jamming technique becomes less. The unknown in this research is the symbol-time delay. Since OFDM signals are characterized by multipath reception, the signal arrives at a symbol-time delay which is known or unknown to the jamming signal and the receiver. Realistically, the symbol-time delay is unknown to each and in that case, a Maximum Likelihood (ML) Estimator is used to find the estimated symbol-time delay. This research simulates the symbol-time delay as a known and an unknown at the jammer and receiver. The general trend shows that jamming the cyclic prefix is more effective than noise jamming when the symbol-time delay is unknown to the receiver
- …