40 research outputs found
Physical Layer Security for Visible Light Communication Systems:A Survey
Due to the dramatic increase in high data rate services and in order to meet
the demands of the fifth-generation (5G) networks, researchers from both
academia and industry are exploring advanced transmission techniques, new
network architectures and new frequency spectrum such as the visible light
spectra. Visible light communication (VLC) particularly is an emerging
technology that has been introduced as a promising solution for 5G and beyond.
Although VLC systems are more immune against interference and less susceptible
to security vulnerabilities since light does not penetrate through walls,
security issues arise naturally in VLC channels due to their open and
broadcasting nature, compared to fiber-optic systems. In addition, since VLC is
considered to be an enabling technology for 5G, and security is one of the 5G
fundamental requirements, security issues should be carefully addressed and
resolved in the VLC context. On the other hand, due to the success of physical
layer security (PLS) in improving the security of radio-frequency (RF) wireless
networks, extending such PLS techniques to VLC systems has been of great
interest. Only two survey papers on security in VLC have been published in the
literature. However, a comparative and unified survey on PLS for VLC from
information theoretic and signal processing point of views is still missing.
This paper covers almost all aspects of PLS for VLC, including different
channel models, input distributions, network configurations,
precoding/signaling strategies, and secrecy capacity and information rates.
Furthermore, we propose a number of timely and open research directions for
PLS-VLC systems, including the application of measurement-based indoor and
outdoor channel models, incorporating user mobility and device orientation into
the channel model, and combining VLC and RF systems to realize the potential of
such technologies
Optical wireless communications for cyber-secure ubiquitous wireless networks
Wireless connectivity is no longer limited to facilitating communications between individuals, but is also required to support diverse and heterogeneous applications, services and infrastructures. Internet of things (IoT) systems will dominate future technologies, allowing any and all devices to create, share and process data. If artificial intelligence resembles the brain of IoT, then high-speed connectivity forms the nervous system that connects the devices. For IoT to safely operate autonomously, it requires highly secure and reliable wireless links. In this article, we shed light on the potential of optical wireless communications to provide high-speed secure and reliable ubiquitous access as an enabler for fifth generation and beyond wireless networks
On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone
This paper investigates the physical-layer security for a random indoor
visible light communication (VLC) network with imperfect channel state
information (CSI) and a protected zone. The VLC network consists of three
nodes, i.e., a transmitter (Alice), a legitimate receiver (Bob), and an
eavesdropper (Eve). Alice is fixed in the center of the ceiling, and the
emitted signal at Alice satisfies the non-negativity and the dimmable average
optical intensity constraint. Bob and Eve are randomly deployed on the receiver
plane. By employing the protected zone and considering the imperfect CSI, the
stochastic characteristics of the channel gains for both the main and the
eavesdropping channels is first analyzed. After that, the closed-form
expressions of the average secrecy capacity and the lower bound of secrecy
outage probability are derived, respectively. Finally, Monte-Carlo simulations
are provided to verify the accuracy of the derived theoretical expressions.
Moreover, the impacts of the nominal optical intensity, the dimming target, the
protected zone and the imperfect CSI on secrecy performance are discussed,
respectively.Comment: Accepted by IEEE Systems Joutna
Wireless networks physical layer security : modeling and performance characterization
Intrigued by the rapid growth and expand of wireless devices, data security is increasingly playing a significant role in our daily transactions and interactions with different entities. Possible examples, including e-healthcare information and online shopping, are becoming vulnerable due to the intrinsic nature of wireless transmission medium and the widespread open access of wireless links. Traditionally, the communication security is mainly regarded as the tasks at the upper layers of layered protocol stack, security techniques, including personal access control, password protection, and end-to-end encryption, have been widely studied in the open literature. More recently, plenty of research interests have been drawn to the physical layer forms of secrecy. As a new but appealing paradigm at physical layer, physical layer security is based on two pioneering works: (i) Shannon’s information-theoretic formulation and (ii) Wyner’s wiretap formulation.
On account of the fundamental of physical layer security and the different nature of various wireless network, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three-fold:(i) exploration of secrecy metrics to more general fading channels; (ii) characterization a new fading channel model and its reliability and security analysis in digital communication systems; and (iii) investigation of physical layer security over the random multiple-input multiple-output (MIMO) α −μ fading channels.
Taking into account the classic Alice-Bob-Eve wiretap model, the first contribution can be divided into four aspects: (i) we have investigated the secrecy performance over single-input single-output (SISO) α −μ fading channels. The probability of non-zero (PNZ) secrecy capacity and the lower bound of secrecy outage probability (SOP) are derived for the special case when the main channel and wiretap channel undergo the same non-linearity fading parameter, i.e., α. Later on, for the purpose of filling the gap of lacking closed-form expression of SOP in the open literature and extending the obtained results in chapter 2 to the single-input multiple-output (SIMO) α − μ wiretap fading channels, utilizing the fact that the received signal-tonoise ratios (SNRs) at the legitimate receiver and eavesdropper can be approximated as new α −μ distributed random variables (RVs), the SOP metric is therefore derived, and given in terms of the bivariate Fox’s H-function; (ii) the secrecy performance over the Fisher-Snedecor F wiretap fading channels is initially considered. The SOP, PNZ, and ASC are finalized in terms of Meijer’s G-function; (iii) in order to generalize the obtained results over α −μ and Fisher-Snedecor F wiretap fading channels, a more flexible and general fading channel, i.e., Fox’s H-function fading model, are taken into consideration. Both the exact and asymptotic analysis of SOP, PNZ, and average secrecy capacity (ASC), are developed with closed-form expressions; and (iv) finally, motivated by the fact that the mixture gamma (MG) distribution is an appealing tool, which can be used to model the received instantaneous SNRs over wireless fading channels, the secrecy metrics over wiretap fading channels are derived based on the MG approach.
Due to the limited transmission power and communication range, cooperative relays or multi-hop wireless networks are usually regarded as two promising means to address these concerns. Inspired by the obtained results in Chapters 2 and 3, the second main contribution is to propose a novel but simple fading channel model, namely, the cascaded α −μ. This new distribution is advantageous since it encompasses the existing cascaded Rayleigh, cascaded Nakagami-m, and cascaded Weibull with ease. Based on this, both the reliability and secrecy performance of a digital system over cascaded α −μ fading channels are further evaluated. Closed-form expressions of reliability metrics (including amount of fading (AF), outage probability, average channel capacity, and average symbol error probability (ABEP).) and secrecy metrics (including SOP, PNZ, and ASC) are respectively provided. Besides, their asymptotic behaviors are also performed and compared with the exact results.
Considering the impacts of users’ densities, spatial distribution, and the path-loss exponent on secrecy issue, the third aspect of this thesis is detailed in Chapter 8 as the secrecy investigation of stochastic MIMO system over α −μ wiretap fading channels. Both the stochastic geometry and conventional space-time transmission (STT) scheme are used in the system configuration. The secrecy issue is mathematically evaluated by three metrics, i.e., connection outage, the probability of non-zero secrecy capacity and the ergodic secrecy capacity. Those three metrics are later on derived regarding two ordering scheme, and further compared with Monte-Carlo simulations
Recommended from our members
Blockchain based secure message dissemination in vehicular networks
Vehicular ad-hoc networks (VANETs) are one of the key elements in Intelligent Transportation System (ITS) to enable information exchange among vehicles and Roadside Units (RSUs) via vehicle-to-vehicle (V2V) and vehicle-to- nfrastructure (V2I) communications. With continuously increasing number of vehicles on road, there are numerous security and privacy challenges associated with VANETs. Communication among vehicles is needed to be secure and bandwidth efficient. Also, the messages exchanged between vehicles must be authentic so as to maintain a trusted network in a privacy-preserving manner. Furthermore, a sustainable economic model is required to incentivise honest and cooperative vehicles. Traditional security and privacy solutions in centralised networks are not applicable to VANETs due to its distributed nature, heterogeneity, high mobility and low latency requirements. Meanwhile, the new development of blockchain has been attracting significant interests due to its key features including consensus to evaluate message credibility and immutable storage in distributed ledger, which provides an alternative solution to the security and privacy challenges in VANETs.
This thesis aims to present blockchain solutions for the security and privacy of VANETs meeting the stringent requirements of low latency and bandwidth-efficient message dissemination. VANETs are simulated in OMNeT++ to validate the proposed solutions. Specifically, two novel blockchain consensus algorithms have been developed for message authentication and relay selection in presence of malicious vehicles. The first employs a voting based message validation and relay selection, which reduces the failure rate in message validation by 11% as compared to reputation based consensus. The second utilises federated learning supported by blockchain as a better privacy-preserving solution, which is 65.2% faster than the first voting based solution. Both approaches include blockchain-based incentive mechanisms and game theory analysis to observe strategic behaviour of honest and malicious vehicles. To further study the privacy aspect of vehicular networks, the integration of blockchain with physical layer security is also theoretically analysed in Vehicle-to-Everything (V2X) communications scenarios. The integration results in 8.2 Mbps increased goodput as compared to the blockchain solution alone.
In essence, our research work shows that blockchain can offer better control and security, as compared to centralised solutions, if properly adjusted according to the application and network requirements. Thus, the proposed solutions can provide guidelines for practically feasible application of blockchain in vehicular networks