103 research outputs found
Trajectory and power design for aerial CRNs with colluding eavesdroppers
Unmanned aerial vehicles (UAVs) can provide wireless access services to
terrestrial users without geographical limitations and will become an essential
part of the future communication system. However, the openness of wireless
channels and the mobility of UAVs make the security of UAV-based communication
systems particularly challenging. This work investigates the security of aerial
cognitive radio networks (CRNs) with multiple uncertainties colluding
eavesdroppers. A cognitive aerial base station transmits messages to cognitive
terrestrial users using the spectrum resource of the primary users. All
secondary terrestrial users and illegitimate receivers jointly decode the
received message. The average secrecy rate of the aerial CRNs is maximized by
jointly optimizing the UAV's trajectory and transmission power. An iterative
algorithm based on block coordinate descent and successive convex approximation
is proposed to solve the non-convex mixed-variable optimization problem.
Numerical results verify the effectiveness of our proposed algorithm and show
that our scheme improves the secrecy performance of airborne CRNs.Comment: 10 pages, 7 figures.submitted to the IEEE journal for revie
Security for 5G Mobile Wireless Networks
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized
Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
Wireless communications are particularly vulnerable to eavesdropping attacks
due to their broadcast nature. To effectively deal with eavesdroppers, existing
security techniques usually require accurate channel state information (CSI),
e.g., for friendly jamming (FJ), and/or additional computing resources at
transceivers, e.g., cryptography-based solutions, which unfortunately may not
be feasible in practice. This challenge is even more acute in low-end IoT
devices. We thus introduce a novel deep learning-based FJ framework that can
effectively defeat eavesdropping attacks with imperfect CSI and even without
CSI of legitimate channels. In particular, we first develop an
autoencoder-based communication architecture with FJ, namely AEFJ, to jointly
maximize the secrecy rate and minimize the block error rate at the receiver
without requiring perfect CSI of the legitimate channels. In addition, to deal
with the case without CSI, we leverage the mutual information neural estimation
(MINE) concept and design a MINE-based FJ scheme that can achieve comparable
security performance to the conventional FJ methods that require perfect CSI.
Extensive simulations in a multiple-input multiple-output (MIMO) system
demonstrate that our proposed solution can effectively deal with eavesdropping
attacks in various settings. Moreover, the proposed framework can seamlessly
integrate MIMO security and detection tasks into a unified end-to-end learning
process. This integrated approach can significantly maximize the throughput and
minimize the block error rate, offering a good solution for enhancing
communication security in wireless communication systems.Comment: 12 pages, 15 figure
- …