9 research outputs found

    Fundamental properties of on-off transmission scheme for wiretap channels

    Get PDF
    This work reveals some fundamental properties of an on-off transmission (OOT) scheme, in which a transmitter sends signals occasionally as per the capacity of the main channel in order to achieve physical layer security. To this end, we first identify the widely used hybrid secrecy outage probability as a function of the transmission probability and the conditional secrecy outage probability of the OOT scheme. This indicates, for the first time, that the hybrid secrecy outage probability can be achieved by the OOT scheme. We then derive a lower bound on the conditional secrecy outage probability of the OOT scheme in case of transmission, which is solely determined by the average signal-to-noise ratios (SNRs) of the main channel and eavesdropper’s channel. Finally, we re-investigate the OOT scheme within an absolutely completely passive eavesdropping scenario, in which even the average SNR of the eavesdropper’s channel is not required. Specifically, we derive an easy-evaluated expression for the average conditional secrecy outage probability of the OOT scheme by adopting an annulus threat model.ARC Discovery Projects Grant DP150103905

    Covert communication with finite blocklength in AWGN channels

    Get PDF
    Covert communication is to achieve a reliable transmission from a transmitter to a receiver while guaranteeing an arbitrarily small probability of this transmission being detected by a warden. In this work, we study the covert communication in AWGN channels with finite blocklength, in which the number of channel uses is finite. Specifically, we analytically prove that the entire block (all available channel uses) should be utilized to maximize the effective throughput of the transmission subject to a predetermined covert requirement. This is a nontrivial result because more channel uses results in more observations at the warden for detecting the transmission. We also determine the maximum allowable transmit power per channel use, which is shown to decrease as the blocklength increases. Despite the decrease in the maximum allowable transmit power per channel use, the maximum allowable total power over the entire block is proved to increase with the blocklength, which leads to the fact that the effective throughput increases with the blocklength.ARC Discovery Projects Grant DP15010390

    Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver

    Get PDF
    This work proposes a new channel training (CT) scheme for a full-duplex receiver to enhance physical layer security. Equipped with NB full-duplex antennas, the receiver simultaneously receives the information signal and transmits artificial noise (AN). In order to reduce the non-cancellable self-interference due to the transmitted AN, the receiver has to estimate the self-interference channel prior to the data communication phase. In the proposed CT scheme, the receiver transmits a limited number of pilot symbols which are known only to itself. Such a secret CT scheme prevents an eavesdropper from estimating the jamming channel from the receiver to the eavesdropper, hence effectively degrading the eavesdropping capability. We analytically examine the connection probability (i.e., the probability of the data being successfully decoded by the receiver) of the legitimate channel and the secrecy outage probability due to eavesdropping for the proposed secret CT scheme. Based on our analysis, the optimal power allocation between CT and data/AN transmission at the legitimate transmitter/receiver is determined. Our examination shows that the newly proposed secret CT scheme significantly outperforms the non-secret CT scheme that uses publicly known pilots when the number of antennas at the eavesdropper is larger than one.ARC Discovery Projects Grant DP15010390

    TAS-Based Incremental Hybrid Decode–Amplify–Forward Relaying for Physical Layer Security Enhancement

    Get PDF
    In this paper, a transmit antenna selection (TAS)- based incremental hybrid decode-amplify-forward (IHDAF) scheme is proposed to enhance physical layer security in cooperative relay networks. Specifically, TAS is adopted at the source in order to reduce the feedback overhead. In the proposed TAS-based IHDAF scheme, the network transmits signals to the destination adaptive select direction transmission mode, AF mode or DF mode depending on the capacity of the source-relay link and source-relay link. In order to fully examine the benefits of the proposed TAS-based IHDAF scheme, we first derive its secrecy outage probability (SOP) in a closed-form expression. We then conduct asymptotic analysis on the SOP, which reveals the secrecy performance floor of the proposed TAS-based IHDAF scheme when no channel state information is available at the source. Theoretical analysis and simulation results demonstrate that the proposed TAS-based IHDAF scheme outperforms the selective decode-and-forward (SDF), the incremental decodeand-forward (IDF), and the noncooperative direction transmission (DT) schemes in terms of the SOP and effective secrecy throughout, especially when the relay is close to the destination. Furthermore, the proposed TAS-based IHDAF scheme offer a good trade-off between complexity and performance compare with using all antennas at the source.ARC Discovery Projects Grant DP150103905
    corecore