857 research outputs found

    Waveform Design for Secure SISO Transmissions and Multicasting

    Full text link
    Wireless physical-layer security is an emerging field of research aiming at preventing eavesdropping in an open wireless medium. In this paper, we propose a novel waveform design approach to minimize the likelihood that a message transmitted between trusted single-antenna nodes is intercepted by an eavesdropper. In particular, with knowledge first of the eavesdropper's channel state information (CSI), we find the optimum waveform and transmit energy that minimize the signal-to-interference-plus-noise ratio (SINR) at the output of the eavesdropper's maximum-SINR linear filter, while at the same time provide the intended receiver with a required pre-specified SINR at the output of its own max-SINR filter. Next, if prior knowledge of the eavesdropper's CSI is unavailable, we design a waveform that maximizes the amount of energy available for generating disturbance to eavesdroppers, termed artificial noise (AN), while the SINR of the intended receiver is maintained at the pre-specified level. The extensions of the secure waveform design problem to multiple intended receivers are also investigated and semidefinite relaxation (SDR) -an approximation technique based on convex optimization- is utilized to solve the arising NP-hard design problems. Extensive simulation studies confirm our analytical performance predictions and illustrate the benefits of the designed waveforms on securing single-input single-output (SISO) transmissions and multicasting

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Chaotic communications over radio channels

    Get PDF

    Effects of Correlation of Channel Gains on the Secrecy Capacity in the Gaussian Wiretap Channel

    Get PDF
    Secrecy capacity is one of the most important characteristic of a wireless communication channel. Therefore, the study of this characteristic wherein the system has correlated channel gains and study them for different line-of-sight (LOS) propagation scenarios is of ultimate importance. The primary objective of this thesis from the mathematical side is to determine the secrecy capacity (SC) for correlated channel gains for the main and eavesdropper channels in a Gaussian Wiretap channel as a function from main parameters (μ, Σ, ρ). f(h1, h2) is the joint distribution of the two channel gains at channel use (h1, h2), fi(hi) is the main distribution of the channel gain hi. The results are based on assumption of the Gaussian distribution of channel gains (gM, gE). The main task of estimating the secrecy capacity is reduced to the problem of solving linear partial differential equations (PDE). Different aspects of the analysis of secrecy capacity considered in this research are the Estimation of SC mathematically and numerically for correlated SISO systems and a mathematical example for MIMO systems with PDE. The variations in Secrecy Capacity are studied for Rayleigh (NLOS) distribution and Rician (LOS) distribution. Suitable scenarios are identified in which secure communication is possible with correlation of channel gains. Also, the new algorithm using PDE has a higher speed and than analog algorithms constructed on the classical statistical Monte Carlo methods. Taking into account the normality of the distribution of system parameters, namely the channel gain (gM, gE), the algorithm is constructed for systems of partial differential equations which satisfies the secrecy criterion. Advisor: H. Andrew Harm

    On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication Systems

    Get PDF
    As an alternative and appealing approach to providing information security in wireless communication systems, secret key generation at physical layer has demonstrated its potential in terms of efficiency and reliability over traditional cryptographic methods. Without the necessity of a management centre for key distribution or reliance on computational complexity, physical layer key generation protocols enable two wireless entities to extract identical and dynamic keys from the randomness of the wireless channels associated with them. In this thesis, the reliability of secret key generation at the physical layer is examined in practical wireless channels with imperfect channel state information (CSI). Theoretical analyses are provided to relate key match rate with channel\u27s signal-to-noise ratio (SNR), degrees of channel reciprocity, and iterations of information reconciliation. In order to increase key match rate of physical layer secret key generation, improved schemes in the steps of channel estimation and sample quantization are proposed respectively. In the channel estimation step, multiple observations of the wireless channels are integrated with a linear processor to provide a synthesized and more accurate estimation of the wireless channel. In the sample quantization step, a magnitude based quantization method with two thresholds is proposed to quantize partial samples, where specific quantization areas are selected to reduce cross-over errors. Significant improvements in key match rate are proven for both schemes in theoretical analysis and numerical simulations. Key match rate can even achieve 100% in both schemes with the assistance of information reconciliation process. In the end, a practical application of physical layer secret key generation is presented, where dynamic keys extracted from the wireless channels are utilized for securing secret data transmission and providing efficient access control
    corecore