312 research outputs found

    Waveform Design for Secure SISO Transmissions and Multicasting

    Full text link
    Wireless physical-layer security is an emerging field of research aiming at preventing eavesdropping in an open wireless medium. In this paper, we propose a novel waveform design approach to minimize the likelihood that a message transmitted between trusted single-antenna nodes is intercepted by an eavesdropper. In particular, with knowledge first of the eavesdropper's channel state information (CSI), we find the optimum waveform and transmit energy that minimize the signal-to-interference-plus-noise ratio (SINR) at the output of the eavesdropper's maximum-SINR linear filter, while at the same time provide the intended receiver with a required pre-specified SINR at the output of its own max-SINR filter. Next, if prior knowledge of the eavesdropper's CSI is unavailable, we design a waveform that maximizes the amount of energy available for generating disturbance to eavesdroppers, termed artificial noise (AN), while the SINR of the intended receiver is maintained at the pre-specified level. The extensions of the secure waveform design problem to multiple intended receivers are also investigated and semidefinite relaxation (SDR) -an approximation technique based on convex optimization- is utilized to solve the arising NP-hard design problems. Extensive simulation studies confirm our analytical performance predictions and illustrate the benefits of the designed waveforms on securing single-input single-output (SISO) transmissions and multicasting

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Physical-Layer Security of SIMO Communication Systems over Multipath Fading Conditions

    Get PDF
    The present work investigates the physical layer security of wireless communication systems over non-homogeneous fading environments, i.e. and and fading models, which are typically encountered in realistic wireless transmission scenarios in the context of conventional and emerging communication systems. This study considers a single-input multiple-output system that consists of a single-antenna transmitter, a multi-antenna legitimate receiver, and an active multiantenna eavesdropper. To this end, novel exact analytic expressions are derived for the corresponding average secrecy capacity and secrecy outage probability, which are corroborated by respective results from computer simulations. Capitalizing on the offered results, the physical layer security is quantified in terms of different parameters, which leads to useful insights on the impact of non-homogeneous fading environment and the number of employed antennas on the achieved physical layer security levels of the underlying system configuration. The offered results and insights are useful for the design of such systems as well as for the computational requirements and sustainability relating to such systems, since emerging communications are largely characterized by stringent quality of service and complexity requirements.acceptedVersionPeer reviewe

    Physical-Layer Security Over Non-Small-Scale Fading Channels

    Get PDF

    On secrecy performance of mixed generalized Gamma and Málaga RF-FSO variable gain relaying channel

    Get PDF
    The emergence of an array of new wireless networks has led researchers to evaluate the prospect of utilizing the physical properties of the wireless medium in order to design secure systems. In this paper, the physical layer secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system with variable gain relaying scheme is investigated in the presence of an eavesdropper. We assume that the eavesdropper can wiretap the transmitted confidential data from the RF link only. It is further assumed that the main and eavesdropper RF links are modeled as generalized Gamma (GG) fading channel, and the free space optical (FSO) link experiences Málaga turbulence with pointing error impairment. Our primary concern is to protect this confidential information from being wiretapped. Besides pointing error, the atmospheric turbulence and two types of detection techniques (i.e. heterodyne detection and intensity modulation with direct detection) are also taken into consideration. Utilizing amplify-and-forward (AF) scheme, the novel mathematical closed-form expressions for average secrecy capacity, lower bound of secrecy outage probability, and strictly positive secrecy capacity are derived. As both the links (RF and FSO) undergo generalized fading channels, the derived expressions are also general. We present a unification of some existing works utilizing the proposed model to better clarify the novelty of this work. Finally, all the derived expressions are justified via Monte-Carlo simulations
    corecore