2,170 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Resource Allocation for Energy-Efficient 3-Way Relay Channels
Throughput and energy efficiency in 3-way relay channels are studied in this
paper. Unlike previous contributions, we consider a circular message exchange.
First, an outer bound and achievable sum rate expressions for different
relaying protocols are derived for 3-way relay channels. The sum capacity is
characterized for certain SNR regimes. Next, leveraging the derived achievable
sum rate expressions, cooperative and competitive maximization of the energy
efficiency are considered. For the cooperative case, both low-complexity and
globally optimal algorithms for joint power allocation at the users and at the
relay are designed so as to maximize the system global energy efficiency. For
the competitive case, a game theoretic approach is taken, and it is shown that
the best response dynamics is guaranteed to converge to a Nash equilibrium. A
power consumption model for mmWave board-to-board communications is developed,
and numerical results are provided to corroborate and provide insight on the
theoretical findings.Comment: Submitted to IEEE Transactions on Wireless Communication
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
This paper investigates reliable and covert transmission strategies in a
multiple-input multiple-output (MIMO) wiretap channel with a transmitter,
receiver and an adversarial wiretapper, each equipped with multiple antennas.
In a departure from existing work, the wiretapper possesses a novel capability
to act either as a passive eavesdropper or as an active jammer, under a
half-duplex constraint. The transmitter therefore faces a choice between
allocating all of its power for data, or broadcasting artificial interference
along with the information signal in an attempt to jam the eavesdropper
(assuming its instantaneous channel state is unknown). To examine the resulting
trade-offs for the legitimate transmitter and the adversary, we model their
interactions as a two-person zero-sum game with the ergodic MIMO secrecy rate
as the payoff function. We first examine conditions for the existence of
pure-strategy Nash equilibria (NE) and the structure of mixed-strategy NE for
the strategic form of the game.We then derive equilibrium strategies for the
extensive form of the game where players move sequentially under scenarios of
perfect and imperfect information. Finally, numerical simulations are presented
to examine the equilibrium outcomes of the various scenarios considered.Comment: 27 pages, 8 figures. To appear, IEEE Transactions on Signal
Processin
Energy Harvesting Wireless Communications: A Review of Recent Advances
This article summarizes recent contributions in the broad area of energy
harvesting wireless communications. In particular, we provide the current state
of the art for wireless networks composed of energy harvesting nodes, starting
from the information-theoretic performance limits to transmission scheduling
policies and resource allocation, medium access and networking issues. The
emerging related area of energy transfer for self-sustaining energy harvesting
wireless networks is considered in detail covering both energy cooperation
aspects and simultaneous energy and information transfer. Various potential
models with energy harvesting nodes at different network scales are reviewed as
well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications
(Special Issue: Wireless Communications Powered by Energy Harvesting and
Wireless Energy Transfer
Spectrum Sharing in RF-Powered Cognitive Radio Networks using Game Theory
We investigate the spectrum sharing problem of a radio frequency (RF)-powered
cognitive radio network, where a multi-antenna secondary user (SU) harvests
energy from RF signals radiated by a primary user (PU) to boost its available
energy before information transmission. In this paper, we consider that both
the PU and SU are rational and self-interested. Based on whether the SU helps
forward the PU's information, we develop two different operation modes for the
considered network, termed as non-cooperative and cooperative modes. In the
non-cooperative mode, the SU harvests energy from the PU and then use its
available energy to transmit its own information without generating any
interference to the primary link. In the cooperative mode, the PU employs the
SU to relay its information by providing monetary incentives and the SU splits
its energy for forwarding the PU's information as well as transmitting its own
information. Optimization problems are respectively formulated for both
operation modes, which constitute a Stackelberg game with the PU as a leader
and the SU as a follower. We analyze the Stackelberg game by deriving solutions
to the optimization problems and the Stackelberg Equilibrium (SE) is
subsequently obtained. Simulation results show that the performance of the
Stackelberg game can approach that of the centralized optimization scheme when
the distance between the SU and its receiver is large enough.Comment: Presented at PIMRC'1
- …