89 research outputs found
Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances
Sixth-generation (6G) networks pose substantial security risks because
confidential information is transmitted over wireless channels with a broadcast
nature, and various attack vectors emerge. Physical layer security (PLS)
exploits the dynamic characteristics of wireless environments to provide secure
communications, while reconfigurable intelligent surfaces (RISs) can facilitate
PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight
security solution can be designed for low-end Internet of Things (IoT) devices,
depending on the design scenario and communication objective. This article
discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and
jamming attacks. The theoretical background and literature review of RIS-aided
PLS are discussed, and design solutions related to resource allocation,
beamforming, artificial noise, and cooperative communication are presented. We
provide simulation results to show the effectiveness of RIS in terms of PLS. In
addition, we examine the research issues and possible solutions for RIS
modeling, channel modeling and estimation, optimization, and machine learning.
Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa
Power allocation and signal labelling on physical layer security
PhD ThesisSecure communications between legitimate users have received considerable
attention recently. Transmission cryptography, which introduces
secrecy on the network layer, is heavily relied on conventionally to secure
communications. However, it is theoretically possible to break the
encryption if unlimited computational resource is provided. As a result,
physical layer security becomes a hot topic as it provides perfect secrecy
from an information theory perspective. The study of physical layer
security on real communication system model is challenging and important,
as the previous researches are mainly focusing on the Gaussian
input model which is not practically implementable.
In this thesis, the physical layer security of wireless networks employing
finite-alphabet input schemes are studied. In particular, firstly, the secrecy
capacity of the single-input single-output (SISO) wiretap channel
model with coded modulation (CM) and bit-interleaved coded modulation
(BICM) is derived in closed-form, while a fast, sub-optimal power
control policy (PCP) is presented to maximize the secrecy capacity performance.
Since finite-alphabet input schemes achieve maximum secrecy
capacity at medium SNR range, the maximum amount of energy that
the destination can harvest from the transmission while satisfying the
secrecy rate constraint is computed. Secondly, the effects of mapping
techniques on secrecy capacity of BICM scheme are investigated, the secrecy
capacity performances of various known mappings are compared on
8PSK, 16QAM and (1,5,10) constellations, showing that Gray mapping
obtains lowest secrecy capacity value at high SNRs. We propose a new
mapping algorithm, called maximum error event (MEE), to optimize the
secrecy capacity over a wide range of SNRs. At low SNR, MEE mapping
achieves a lower secrecy rate than other well-known mappings, but
at medium-to-high SNRs MEE mapping achieves a significantly higher
secrecy rate over a wide range of SNRs. Finally, the secrecy capacity and
power allocation algorithm (PA) of finite-alphabet input wiretap channels
with decode-and-forward (DF) relays are proposed, the simulation
results are compared with the equal power allocation algorithm
NOMA-assisted multiple access scheme for IoT deployment: Relay selection model and secrecy performance improvement
In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access (NOMA). This paper proposes a new scheme to consider secure performance, to be called relay selection NOMA (RS-NOMA). In particular, we consider metrics to evaluate secure performance in such an RS-NOMA system where a base station (master node in IoT) sends confidential messages to two main sensors (so-called NOMA users) under the influence of an external eavesdropper. In the proposed IoT scheme, both two NOMA sensors and an illegal sensor are served with different levels of allocated power at the base station. It is noticed that such RS-NOMA operates in two hop transmission of the relaying system. We formulate the closed-form expressions of secure outage probability (SOP) and the strictly positive secure capacity (SPSC) to examine the secrecy performance under controlling setting parameters such as transmit signal-to-noise ratio (SNR), the number of selected relays, channel gains, and threshold rates. The different performance is illustrated as performing comparisons between NOMA and orthogonal multiple access (OMA). Finally, the advantage of NOMA in secure performance over orthogonal multiple access (OMA) is confirmed both analytically and numerically.Web of Science193art. no. 73
Iterative receiver in multiuser relaying systems with fast frequency-hopping modulation
In this thesis, a novel iterative receiver and its improved version are proposed for
relay-assisted multiuser communications, in which multiple users transmit to a destination
with the help of a relay and using fast frequency-hopping modulation. Each
user employs a channel encoder to protect its information and facilitate interference
cancellation at the receiver. The signal received at the relay is either amplified, or
partially decoded with a simple energy detector, before being forwarded to the destination.
Under flat Rayleigh fading channels, the receiver at the destination can
be implemented non-coherently, i.e., it does not require the instantaneous channel
information to demodulate the users’ transmitted signals. The proposed iterative
algorithm at the destination exploits the soft outputs of the channel decoders to
successively extract the maximum likelihood symbols of the users and perform interference
cancellation. The iterative method is successfully applied for both cases of
amplify-and-forward and partial decode-and-forward relaying. The error performance
of the proposed iterative receiver is investigated by computer simulation. Under the
same spectral efficiency, simulation results demonstrate the excellent performance of
the proposed receiver when compared to the performance of decoding without interference
cancellation as well as the performance of the maximum likelihood multiuser
detection previously developed for uncoded transmission. Simulation results also suggest
that a proper selection of channel coding schemes can help to support significant
more users without consuming extra system resources.
In addition, to further enhance the receiver’s performance in terms of the bit error
rate, an improved version of the iterative receiver is presented. Such an improved receiver
invokes inner-loop iterations between the channel decoders and the demappers
in such a way that the soft outputs of the channel decoders are also used to refine the
outputs of the demappers for every outer-loop iteration. Simulation results indicate
a performance gain of about 2.5dB by using the two-loop receiver when compared to
the performance of the first proposed receiver
Cost-Effective Signal Processing Algorithms for Physical-Layer Security in Wireless Networks
Data privacy in traditional wireless communications is accomplished by cryptography techniques at the upper layers of the protocol stack. This thesis aims at contributing to the critical security issue residing in the physical-layer of wireless networks, namely, secrecy rate in various transmission environments. Physical-layer security opens the gate to the exploitation of channel characteristics to achieve data secure transmission.
Precoding techniques, as a critical aspect in pre-processing signals prior to transmission has become an effective approach and recently drawn significant attention in the literature. In our research, novel non-linear precoders are designed focusing on the improvement of the physical-layer secrecy rate with consideration of computational complexity as well as the Bit Error Ratio (BER) performance. In the process of designing the precoder, strategies such as Lattice Reduction (LR) and Artificial Noise (AN) are employed to achieve certain design requirements.
The deployment and allocation of resources such as relays to assist the transmission also have gained significant interest. In multiple-antenna relay networks, we examine various relay selection criteria with arbitrary knowledge of the channels to the users and the eavesdroppers. Furthermore, we provide novel effective relay selection criteria that can achieve a high secrecy rate performance. More importantly they do not require knowledge of the channels of the eavesdroppers and the interference.
Combining the jamming technique with resource allocation of relay networks, we investigate an opportunistic relaying and jamming scheme for Multiple-Input Multiple-Output (MIMO) buffer-aided downlink relay networks. More specifically, a novel Relaying and Jamming Function Selection (RJFS) algorithm as well as a buffer-aided RJFS algorithm are developed along with their ability to achieve a higher secrecy rate. Relying on the proposed relay network, we detail the characteristics of the system, under various relay selection criteria, develop exhaustive search and greedy search-based algorithms, with or without inter-relay Interference Cancellation (IC)
- …