703 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
In this paper, we investigate methods for reducing the likelihood that a
message transmitted between two multiantenna nodes is intercepted by an
undetected eavesdropper. In particular, we focus on the judicious transmission
of artificial interference to mask the desired signal at the time it is
broadcast. Unlike previous work that assumes some prior knowledge of the
eavesdropper's channel and focuses on maximizing secrecy capacity, we consider
the case where no information regarding the eavesdropper is available, and we
use signal-to-interference-plus-noise-ratio (SINR) as our performance metric.
Specifically, we focus on the problem of maximizing the amount of power
available to broadcast a jamming signal intended to hide the desired signal
from a potential eavesdropper, while maintaining a prespecified SINR at the
desired receiver. The jamming signal is designed to be orthogonal to the
information signal when it reaches the desired receiver, assuming both the
receiver and the eavesdropper employ optimal beamformers and possess exact
channel state information (CSI). In practice, the assumption of perfect CSI at
the transmitter is often difficult to justify. Therefore, we also study the
resulting performance degradation due to the presence of imperfect CSI, and we
present robust beamforming schemes that recover a large fraction of the
performance in the perfect CSI case. Numerical simulations verify our
analytical performance predictions, and illustrate the benefit of the robust
beamforming schemes.Comment: 10 pages, 5 figures; to appear, IEEE Transactions on Signal
Processing, 201
Transmit design for MIMO wiretap channel with a malicious jammer
In this paper, we consider the transmit design for multi-input multi-output
(MIMO) wiretap channel including a malicious jammer. We first transform the
system model into the traditional three-node wiretap channel by whitening the
interference at the legitimate user. Additionally, the eavesdropper channel
state information (ECSI) may be fully or statistically known, even unknown to
the transmitter. Hence, some strategies are proposed in terms of different
levels of ECSI available to the transmitter in our paper. For the case of
unknown ECSI, a target rate for the legitimate user is first specified. And
then an inverse water-filling algorithm is put forward to find the optimal
power allocation for each information symbol, with a stepwise search being used
to adjust the spatial dimension allocated to artificial noise (AN) such that
the target rate is achievable. As for the case of statistical ECSI, several
simulated channels are randomly generated according to the distribution of
ECSI. We show that the ergodic secrecy capacity can be approximated as the
average secrecy capacity of these simulated channels. Through maximizing this
average secrecy capacity, we can obtain a feasible power and spatial dimension
allocation scheme by using one dimension search. Finally, numerical results
reveal the effectiveness and computational efficiency of our algorithms.Comment: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring
- …