531 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
In this paper, a joint relay selection and power allocation (JRP) scheme is
proposed to enhance the physical layer security of a cooperative network, where
a multiple antennas source communicates with a single-antenna destination in
presence of untrusted relays and passive eavesdroppers (Eves). The objective is
to protect the data confidentially while concurrently relying on the untrusted
relays as potential Eves to improve both the security and reliability of the
network. To realize this objective, we consider cooperative jamming performed
by the destination while JRP scheme is implemented. With the aim of maximizing
the instantaneous secrecy rate, we derive a new closed-form solution for the
optimal power allocation and propose a simple relay selection criterion under
two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the
proposed scheme, a new closed-form expression is derived for the ergodic
secrecy rate (ESR) and the secrecy outage probability as security metrics, and
a new closed-form expression is presented for the average symbol error rate
(SER) as a reliability measure over Rayleigh fading channels. We further
explicitly characterize the high signal-to-noise ratio slope and power offset
of the ESR to highlight the impacts of system parameters on the ESR. In
addition, we examine the diversity order of the proposed scheme to reveal the
achievable secrecy performance advantage. Finally, the secrecy and reliability
diversity-multiplexing tradeoff of the optimized network are provided.
Numerical results highlight that the ESR performance of the proposed JRP scheme
for NCE and CE cases is increased with respect to the number of untrustworthy
relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and
Security (In press
Multi-Domain Polarization for Enhancing the Physical Layer Security of MIMO Systems
A novel Physical Layer Security (PLS) framework is conceived for enhancing
the security of the wireless communication systems by exploiting multi-domain
polarization in Multiple-Input Multiple-Output (MIMO) systems. We design a
sophisticated key generation scheme based on multi-domain polarization, and the
corresponding receivers. An in-depth analysis of the system's secrecy rate is
provided, demonstrating the confidentiality of our approach in the presence of
eavesdroppers having strong computational capabilities. More explicitly, our
simulation results and theoretical analysis corroborate the advantages of the
proposed scheme in terms of its bit error rate (BER), block error rate (BLER),
and maximum achievable secrecy rate. Our findings indicate that the innovative
PLS framework effectively enhances the security and reliability of wireless
communication systems. For instance, in a MIMO setup, the proposed
PLS strategy exhibits an improvement of dB compared to conventional MIMO,
systems at a BLER of while the eavesdropper's BLER reaches
Efficient Gaussian Process Classification-based Physical-Layer Authentication with Configurable Fingerprints for 6G-Enabled IoT
Physical-Layer Authentication (PLA) has been recently believed as an
endogenous-secure and energy-efficient technique to recognize IoT terminals.
However, the major challenge of applying the state-of-the-art PLA schemes
directly to 6G-enabled IoT is the inaccurate channel fingerprint estimation in
low Signal-Noise Ratio (SNR) environments, which will greatly influence the
reliability and robustness of PLA. To tackle this issue, we propose a
configurable-fingerprint-based PLA architecture through Intelligent Reflecting
Surface (IRS) that helps create an alternative wireless transmission path to
provide more accurate fingerprints. According to Baye's theorem, we propose a
Gaussian Process Classification (GPC)-based PLA scheme, which utilizes the
Expectation Propagation (EP) method to obtain the identities of unknown
fingerprints. Considering that obtaining sufficient labeled fingerprint samples
to train the GPC-based authentication model is challenging for future 6G
systems, we further extend the GPC-based PLA to the Efficient-GPC (EGPC)-based
PLA through active learning, which requires fewer labeled fingerprints and is
more feasible. We also propose three fingerprint selecting algorithms to choose
fingerprints, whose identities are queried to the upper-layers authentication
mechanisms. For this reason, the proposed EGPC-based scheme is also a
lightweight cross-layer authentication method to offer a superior security
level. The simulations conducted on synthetic datasets demonstrate that the
IRS-assisted scheme reduces the authentication error rate by 98.69% compared to
the non-IRS-based scheme. Additionally, the proposed fingerprint selection
algorithms reduce the authentication error rate by 65.96% to 86.93% and 45.45%
to 70.00% under perfect and imperfect channel estimation conditions,
respectively, when compared with baseline algorithms.Comment: 12 pages, 9 figure
- …