77,158 research outputs found
Physical Layer Security in Vehicular Communication Networks in the Presence of Interference
This paper studies the physical layer security of a vehicular communication
network in the presence of interference constraints by analysing its secrecy
capacity. The system considers a legitimate receiver node and an eavesdropper
node, within a shared network, both under the effect of interference from other
users. The double-Rayleigh fading channel is used to capture the effects of the
wireless communication channel for the vehicular network. We present the
standard logarithmic expression for the system capacity in an alternate form,
to facilitate analysis in terms of the joint moment generating functions (MGF)
of the random variables representing the channel fading and interference.
Closed-form expressions for the MGFs are obtained and Monte-Carlo simulations
are provided throughout to validate the results. The results show that
performance of the system in terms of the secrecy capacity is affected by the
number of interferers and their distances. The results further demonstrate the
effect of the uncertainty in eavesdropper location on the analysis
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Secrecy rate optimization for secure multicast communications
Recently, physical layer security has been recognized as a new design paradigm to provide security in wireless networks. In contrast to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance security of wireless communications. This paper studies optimization frameworks for a multicasting network in which a transmitter broadcasts the same information to a group of legitimate users in the presence of multiple eavesdroppers. In particular, power minimization and secrecy rate maximization problems are investigated for a multicasting secrecy network. First, the power minimization problem is solved for different numbers of legitimate users and eavesdroppers. Next, the secrecy rate maximization problem is investigated with the help of private jammers to improve the achievable secrecy rates through a game theoretic approach. These jammers charge the transmitter for their jamming services based on the amount of interference caused to the eavesdroppers. For a fixed interference price scenario, a closed-form solution for the optimal interference requirement to maximize the revenue of the transmitter is derived. This rate maximization problem for a nonfixed interference price scenario is formulated as a Stackelberg game in which the jammers and transmitter are the leaders and follower, respectively. For the proposed game, a Stackelberg equilibrium is derived to maximize the revenues of both the transmitter and the private jammers. To support the derived theoretical results, simulation results are provided with different numbers of legitimate users and eavesdroppers. In addition, these results show that physical layer security based jamming schemes could be incorporated in emerging and future wireless networks to enhance the quality of secure communications
Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers
In this paper, we study physical layer security
in an underlay cognitive radio (CR) network. We consider
the problem of secure communication between a secondary
transmitter-receiver pair in the presence of randomly distributed
eavesdroppers under an interference constraint set by the primary
user. For different channel knowledge assumptions at the
transmitter, we design four transmission protocols to achieve the
secure transmission in the CR network. We give a comprehensive
performance analysis for each protocol in terms of transmission
delay, security, reliability, and the overall secrecy throughput.
Furthermore, we determine the optimal design parameter for
each transmission protocol by solving the optimization problem
of maximizing the secrecy throughput subject to both security
and reliability constraints. Numerical results illustrate the performance
comparison between different transmission protocols.ARC Discovery Projects Grant DP15010390
Performance Analysis of Secondary Users in Heterogeneous Cognitive Radio Network
Continuous increase in wireless subscriptions and static allocation of wireless frequency bands to the primary users (PUs) are fueling the radio frequency (RF) shortage problem. Cognitive radio network (CRN) is regarded as a solution to this problem as it utilizes the scarce RF in an opportunisticmanner to increase the spectrumefficiency. InCRN, secondary users (SUs) are allowed to access idle frequency bands opportunistically without causing harmful interference to the PUs. In CRN, the SUs determine the presence of PUs through spectrum sensing and access idle bands by means of dynamic spectrum access. Spectrum sensing techniques available in the literature do not consider mobility. One of the main objectives of this thesis is to include mobility of SUs in spectrum sensing. Furthermore, due to the physical characteristics of CRN where licensed RF bands can be dynamically accessed by various unknown wireless devices, security is a growing concern. This thesis also addresses the physical layer security issues in CRN. Performance of spectrum sensing is evaluated based on probability of misdetection and false alarm, and expected overlapping time, and performance of SUs in the presence of attackers is evaluated based on secrecy rates
Enhancing physical layer security in wireless networks with cooperative approaches
Motivated by recent developments in wireless communication, this thesis aims to
characterize the secrecy performance in several types of typical wireless networks.
Advanced techniques are designed and evaluated to enhance physical layer security in
these networks with realistic assumptions, such as signal propagation loss, random node
distribution and non-instantaneous channel state information (CSI).
The first part of the thesis investigates secret communication through relay-assisted
cognitive interference channel. The primary and secondary base stations (PBS and SBS)
communicate with the primary and secondary receivers (PR and SR) respectively in the
presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with
the PBS over the same spectrum instead of waiting for an idle channel. To improve
security, cognitive relays transmit cooperative jamming (CJ) signals to create additional
interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to
improve the secrecy rate of cognitive interference channels depending on the structure of
cooperative relays. In the scheme where the multiple-antenna relay transmits weighted
jamming signals, the combined approach of CJ and beamforming is investigated. In
the scheme with multiple relays transmitting weighted jamming signals, the combined
approach of CJ and relay selection is analyzed. Numerical results show that both these
two schemes are effective in improving physical layer security of cognitive interference
channel.
In the second part, the focus is shifted to physical layer security in a random wireless
network where both legitimate and eavesdropping nodes are randomly distributed. Three
scenarios are analyzed to investigate the impact of various factors on security. In
scenario one, the basic scheme is studied without a protected zone and interference. The
probability distribution function (PDF) of channel gain with both fading and path loss
has been derived and further applied to derive secrecy connectivity and ergodic secrecy
capacity. In the second scenario, we studied using a protected zone surrounding the source
node to enhance security where interference is absent. Both the cases that eavesdroppers
are aware and unaware of the protected zone boundary are investigated. Based on the
above scenarios, further deployment of the protected zones at legitimate receivers is
designed to convert detrimental interference into a beneficial factor. Numerical results
are investigated to check the reliability of the PDF for reciprocal of channel gain and to
analyze the impact of protected zones on secrecy performance.
In the third part, physical layer security in the downlink transmission of cellular network
is studied. To model the repulsive property of the cellular network planning, we assume
that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while
the eavesdroppers are deployed as an independent Poisson point process (PPP). The
distribution function of the distances from a typical point to the nodes of the HCPP is
derived. The noise-limited and interference-limited cellular networks are investigated
by applying the fractional frequency reuse (FFR) in the system. For the noise-limited
network, we derive the secrecy outage probability with two different strategies, i.e. the
best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For
the interference-limited network with the nearest BS serve, two transmission schemes are
analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both
the schemes of transmitting with the best BS and the application of the FFR are beneficial
for physical layer security in the downlink cellular networks, while the improvement du
On the Calculation of the Incomplete MGF with Applications to Wireless Communications
(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. DOI: 10.1109/TCOMM.2016.2626440The incomplete moment generating function (IMGF) has paramount relevance in communication theory, since it appears in a plethora of scenarios when analyzing the performance of communication systems. We here present a general method for calculating the IMGF of any arbitrary fading distribution. Then, we provide exact closed-form expressions for the IMGF of the very general κ-μ shadowed fading model, which includes the popular κ-μ, η-μ, Rician shadowed, and other classical models as particular cases. We illustrate the practical applicability of this result by analyzing several scenarios of interest in wireless communications: 1) physical layer security in the presence of an eavesdropper; 2) outage probability analysis with interference and background noise; 3) channel capacity with side information at the transmitter and the receiver; and 4) average bit-error rate with adaptive modulation, when the fading on the desired link can be modeled by any of the aforementioned distributions.Universidad de Málaga. Campus de Execelencia Internacional. Andalucía Tech
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
- …