158 research outputs found
On Robustness of Massive MIMO Systems Against Passive Eavesdropping under Antenna Selection
In massive MIMO wiretap settings, the base station can significantly suppress
eavesdroppers by narrow beamforming toward legitimate terminals. Numerical
investigations show that by this approach, secrecy is obtained at no
significant cost. We call this property of massive MIMO systems `secrecy for
free' and show that it not only holds when all the transmit antennas at the
base station are employed, but also when only a single antenna is set active.
Using linear precoding, the information leakage to the eavesdroppers can be
sufficiently diminished, when the total number of available transmit antennas
at the base station grows large, even when only a fixed number of them are
selected. This result indicates that passive eavesdropping has no significant
impact on massive MIMO systems, regardless of the number of active transmit
antennas.Comment: 7 pages, 2 figures; To be presented in IEEE Global Communications
Conference (Globecom) 2018 in Abu Dhabi, UA
Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels
This paper studies the impact of transmit antenna selection on the secrecy
performance of massive MIMO wiretap channels. We consider a scenario in which a
multi-antenna transmitter selects a subset of transmit antennas with the
strongest channel gains. Confidential messages are then transmitted to a
multi-antenna legitimate receiver while the channel is being overheard by a
multi-antenna eavesdropper. For this setup, we approximate the distribution of
the instantaneous secrecy rate in the large-system limit. The approximation
enables us to investigate the optimal number of selected antennas which
maximizes the asymptotic secrecy throughput of the system. We show that
increasing the number of selected antennas enhances the secrecy performance of
the system up to some optimal value, and that further growth in the number of
selected antennas has a destructive effect. Using the large-system
approximation, we obtain the optimal number of selected antennas analytically
for various scenarios. Our numerical investigations show an accurate match
between simulations and the analytic results even for not so large dimensions.Comment: 6 pages, 4 figures, IEEE GLOBECOM 201
Security for 5G Mobile Wireless Networks
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …