149 research outputs found
Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy
This paper studies physical layer security in a wireless ad hoc network with
numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid
full-/half-duplex receiver deployment strategy is proposed to secure legitimate
transmissions, by letting a fraction of legitimate receivers work in the
full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon
their information receptions, and letting the other receivers work in the
half-duplex mode just receiving their desired signals. The objective of this
paper is to choose properly the fraction of FD receivers for achieving the
optimal network security performance. Both accurate expressions and tractable
approximations for the connection outage probability and the secrecy outage
probability of an arbitrary legitimate link are derived, based on which the
area secure link number, network-wide secrecy throughput and network-wide
secrecy energy efficiency are optimized respectively. Various insights into the
optimal fraction are further developed and its closed-form expressions are also
derived under perfect self-interference cancellation or in a dense network. It
is concluded that the fraction of FD receivers triggers a non-trivial trade-off
between reliability and secrecy, and the proposed strategy can significantly
enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE
Transactions on Wireless Communications, 201
Secrecy Energy Efficiency of MIMOME Wiretap Channels with Full-Duplex Jamming
Full-duplex (FD) jamming transceivers are recently shown to enhance the
information security of wireless communication systems by simultaneously
transmitting artificial noise (AN) while receiving information. In this work,
we investigate if FD jamming can also improve the systems secrecy energy
efficiency (SEE) in terms of securely communicated bits-per- Joule, when
considering the additional power used for jamming and self-interference (SI)
cancellation. Moreover, the degrading effect of the residual SI is also taken
into account. In this regard, we formulate a set of SEE maximization problems
for a FD multiple-input-multiple-output multiple-antenna eavesdropper (MIMOME)
wiretap channel, considering both cases where exact or statistical channel
state information (CSI) is available. Due to the intractable problem structure,
we propose iterative solutions in each case with a proven convergence to a
stationary point. Numerical simulations indicate only a marginal SEE gain,
through the utilization of FD jamming, for a wide range of system conditions.
However, when SI can efficiently be mitigated, the observed gain is
considerable for scenarios with a small distance between the FD node and the
eavesdropper, a high Signal-to-noise ratio (SNR), or for a bidirectional FD
communication setup.Comment: IEEE Transactions on Communication
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications System
Physical layer security (PLS) technologies are expected to play an important
role in the next-generation wireless networks, by providing secure
communication to protect critical and sensitive information from illegitimate
devices. In this paper, we propose a novel secure communication scheme where
the legitimate receiver use full-duplex (FD) technology to transmit jamming
signals with the assistance of simultaneous transmitting and reflecting
reconfigurable intelligent surface (STARRIS) which can operate under the energy
splitting (ES) model and the mode switching (MS) model, to interfere with the
undesired reception by the eavesdropper. We aim to maximize the secrecy
capacity by jointly optimizing the FD beamforming vectors, amplitudes and phase
shift coefficients for the ESRIS, and mode selection and phase shift
coefficients for the MS-RIS. With above optimization, the proposed scheme can
concentrate the jamming signals on the eavesdropper while simultaneously
eliminating the self-interference (SI) in the desired receiver. To tackle the
coupling effect of multiple variables, we propose an alternating optimization
algorithm to solve the problem iteratively. Furthermore, we handle the
non-convexity of the problem by the the successive convex approximation (SCA)
scheme for the beamforming optimizations, amplitudes and phase shifts
optimizations for the ES-RIS, as well as the phase shifts optimizations for the
MS-RIS. In addition, we adopt a semi-definite relaxation (SDR) and Gaussian
randomization process to overcome the difficulty introduced by the binary
nature of mode optimization of the MS-RIS. Simulation results validate the
performance of our proposed schemes as well as the efficacy of adapting both
two types of STAR-RISs in enhancing secure communications when compared to the
traditional selfinterference cancellation technology.Comment: 12 pages, 7 figure
Cooperative Jamming with AF Relay in Power Monitoring and Communication Systems for Mining
In underground mines, physical layer security (PLS) technology is a promising method for the effective and secure communication to monitor the mining process. Therefore, in this paper, we investigate the PLS of an amplify-and-forward relay-aided system in power monitoring and communication systems for mining, with the consideration of multiple eavesdroppers. Explicitly, we propose a PLS scheme of cooperative jamming and precoding for a full-duplex system considering imperfect channel state information. To maximize the secrecy rate of the communications, an effective block coordinate descent algorithm is used to design the precoding and jamming matrix at both the source and the relay. Furthermore, the effectiveness and convergence of the proposed scheme with high channel state information uncertainty have been proven
Physical layer security jamming : Theoretical limits and practical designs in wireless networks
Physical layer security has been recently recognized as a promising new
design paradigm to provide security in wireless networks. In addition to the
existing conventional cryptographic methods, physical layer security exploits
the dynamics of fading channels to enhance secured wireless links. In this
approach, jamming plays a key role by generating noise signals to confuse the
potential eavesdroppers, and significantly improves quality and reliability of
secure communications between legitimate terminals. This article presents
theoretical limits and practical designs of jamming approaches for physical
layer security. In particular, the theoretical limits explore the achievable
secrecy rates of user cooperation based jamming whilst the centralized, and
game theoretic based precoding techniques are reviewed for practical
implementations. In addition, the emerging wireless energy harvesting
techniques are exploited to harvest the required energy to transmit jamming
signals. Future directions of these approaches, and the associated research
challenges are also briefly outlined
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
IRS-aided UAV for Future Wireless Communications: A Survey and Research Opportunities
Both unmanned aerial vehicles (UAVs) and intelligent reflecting surfaces
(IRS) are gaining traction as transformative technologies for upcoming wireless
networks. The IRS-aided UAV communication, which introduces IRSs into UAV
communications, has emerged in an effort to improve the system performance
while also overcoming UAV communication constraints and issues. The purpose of
this paper is to provide a comprehensive overview of IRSassisted UAV
communications. First, we provide five examples of how IRSs and UAVs can be
combined to achieve unrivaled potential in difficult situations. The
technological features of the most recent relevant researches on IRS-aided UAV
communications from the perspective of the main performance criteria, i.e.,
energy efficiency, security, spectral efficiency, etc. Additionally, previous
research studies on technology adoption as machine learning algorithms. Lastly,
some promising research directions and open challenges for IRS-aided UAV
communication are presented
Physical layer security jamming: Theoretical limits and practical designs in wireless networks
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined
- …