807 research outputs found
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
In this paper, a joint relay selection and power allocation (JRP) scheme is
proposed to enhance the physical layer security of a cooperative network, where
a multiple antennas source communicates with a single-antenna destination in
presence of untrusted relays and passive eavesdroppers (Eves). The objective is
to protect the data confidentially while concurrently relying on the untrusted
relays as potential Eves to improve both the security and reliability of the
network. To realize this objective, we consider cooperative jamming performed
by the destination while JRP scheme is implemented. With the aim of maximizing
the instantaneous secrecy rate, we derive a new closed-form solution for the
optimal power allocation and propose a simple relay selection criterion under
two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the
proposed scheme, a new closed-form expression is derived for the ergodic
secrecy rate (ESR) and the secrecy outage probability as security metrics, and
a new closed-form expression is presented for the average symbol error rate
(SER) as a reliability measure over Rayleigh fading channels. We further
explicitly characterize the high signal-to-noise ratio slope and power offset
of the ESR to highlight the impacts of system parameters on the ESR. In
addition, we examine the diversity order of the proposed scheme to reveal the
achievable secrecy performance advantage. Finally, the secrecy and reliability
diversity-multiplexing tradeoff of the optimized network are provided.
Numerical results highlight that the ESR performance of the proposed JRP scheme
for NCE and CE cases is increased with respect to the number of untrustworthy
relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and
Security (In press
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks
We study physical-layer security in wireless ad hoc networks and investigate
two types of multi-antenna transmission schemes for providing secrecy
enhancements. To establish secure transmission against malicious eavesdroppers,
we consider the generation of artificial noise with either sectoring or
beamforming. For both approaches, we provide a statistical characterization and
tradeoff analysis of the outage performance of the legitimate communication and
the eavesdropping links. We then investigate the networkwide secrecy throughput
performance of both schemes in terms of the secrecy transmission capacity, and
study the optimal power allocation between the information signal and the
artificial noise. Our analysis indicates that, under transmit power
optimization, the beamforming scheme outperforms the sectoring scheme, except
for the case where the number of transmit antennas are sufficiently large. Our
study also reveals some interesting differences between the optimal power
allocation for the sectoring and beamforming schemes.Comment: to appear in IEEE Transactions on Information Forensics and Securit
Cooperative Jamming for Secure Communications in MIMO Relay Networks
Secure communications can be impeded by eavesdroppers in conventional relay
systems. This paper proposes cooperative jamming strategies for two-hop relay
networks where the eavesdropper can wiretap the relay channels in both hops. In
these approaches, the normally inactive nodes in the relay network can be used
as cooperative jamming sources to confuse the eavesdropper. Linear precoding
schemes are investigated for two scenarios where single or multiple data
streams are transmitted via a decode-and-forward (DF) relay, under the
assumption that global channel state information (CSI) is available. For the
case of single data stream transmission, we derive closed-form jamming
beamformers and the corresponding optimal power allocation. Generalized
singular value decomposition (GSVD)-based secure relaying schemes are proposed
for the transmission of multiple data streams. The optimal power allocation is
found for the GSVD relaying scheme via geometric programming. Based on this
result, a GSVD-based cooperative jamming scheme is proposed that shows
significant improvement in terms of secrecy rate compared to the approach
without jamming. Furthermore, the case involving an eavesdropper with unknown
CSI is also investigated in this paper. Simulation results show that the
secrecy rate is dramatically increased when inactive nodes in the relay network
participate in cooperative jamming.Comment: 30 pages, 7 figures, to appear in IEEE Transactions on Signal
Processin
- …