61 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Outage Performance in Secure Cooperative NOMA
Enabling cooperation in a NOMA system is a promising approach to improve its
performance. In this paper, we study the cooperation in a secure NOMA system,
where the legitimate users are distributed uniformly in the network and the
eavesdroppers are distributed according to a homogeneous Poisson point process.
We consider a cooperative NOMA scheme (two users are paired as strong and weak
users) in two phases: 1) Direct transmission phase, in which the base station
broadcasts a superposition of the messages, 2) Cooperation phase, in which the
strong user acts as a relay to help in forwarding the messages of the weak
user. We study the secrecy outage performance in two cases: (i) security of the
strong user, (ii) security of both users, are guaranteed. In the first case, we
derive the exact secrecy outage probability of the system for some regions of
power allocation coefficients and a lower bound on the secrecy outage
probability is derived for the other regions. In the second case, the strong
user is a relay or a friendly jammer (as well as a relay), where an upper bound
on the secrecy outage probability is derived at high signal-to-noise-ratio
regimes. For both cases, the cooperation in a two-user paired NOMA system
necessitate to utilize the joint distribution of the distance between two
random users. Numerical results shows the superiority of the secure cooperative
NOMA for a range of the cooperation power compared to secure non-cooperative
NOMA systems
Physical layer security for NOMA: requirements, merits, challenges, and recommendations
Non-orthogonal multiple access (NOMA) has been
recognized as one of the most significant enabling technologies
for future wireless systems due to its eminent spectral efficiency,
its ability to provide an additional degree of freedom for ultra
reliable low latency communications (URLLC), and grant free
random access. Meanwhile, physical layer security (PLS) has got
much attention for future wireless communication systems due to
its capability to efficiently complement the cryptography-based
algorithms for enhancing overall security of the communication
system. In this article, security design requirements for downlink
power domain NOMA and solutions provided by PLS to fulfil
these requirements are discussed. The merits and challenges
which were encountered while employing PLS to NOMA are
identified. Finally, future recommendations and prospective so lutions are also presented.No sponso
Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks
Accepted by IEEE Transactions on Wireless CommunicationsAccepted by IEEE Transactions on Wireless Communication
A novel small-scale nonorthogonal communication technique using auxiliary signal superposition with enhanced security for future wireless networks
In this work, an advanced novel small-scale non-orthogonal communication technique utilizing physical layer security (PLS) for enhanced security and reliability for two users is proposed. This work is motivated by current challenges faced by conventional non-orthogonal multiple access (NOMA) techniques, for instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation resulting from channel estimation errors and the utilization of successive interference cancellation (SIC) algorithms at the receiver. The proposed model uses the wireless channel characteristics to eliminate user interference as well as completely degrade the received signal at the eavesdropper’s terminal. More specifically, auxiliary signals are precisely designed and superimposed on top of user signals from a dual-transmitter system to provide perfect secrecy against external and internal eavesdroppers, while providing low complexity at the receiver. The efficiency and novelty of the proposed system are presented via mathematical analysis and validated by Monte Carlo simulations. Results obtained indicate that the proposed model achieves less complex, secure, and more efficient communication, suitable for low power consumption and limited processing applications.This work is funded by the scientific and technological research council of Turkey (TÜBITAK) under grand 119E392
- …