4,249 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Ieee access special section editorial: Cloud and big data-based next-generation cognitive radio networks
In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-Time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the
Recommended from our members
Advances and emerging challenges in cognitive internet-of-things
The evolution of IoT devices and their adoption in new generation intelligent systems has generated a huge demand for wireless bandwidth. This bandwidth problem is further exacerbated by another characteristics of IoT applications, i.e. IoT devices are usually deployed in massive number, thus leading to an awkward scenario that many bandwidth-hungry devices are chasing after the very limited wireless bandwidth within a small geographic area. As such, cognitive radio has received much attention of there search community as an important means for addressing the bandwidth needs of IoT applications. When enabling IoT devices with cognitive functionalities including spectrum sensing, dynamic spectrum accessing, circumstantial perceiving and self-learning, one will also need to fully study other critical issues such as standardization, privacy protection and heterogeneous coexistence. In this paper, we investigate the structural frameworks and potential applications of cognitive IoT. We further discuss the spectrum-based functionalities and heterogeneity for cognitive IoT. Security and privacy issues involved in cognitive IoT are also investigated. Finally, we present the key challenges and future direction of research on cognitiveradio-based IoT networks
- …