99 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
PHYSICAL LAYER SECURITY IN THE 5G HETEROGENEOUS WIRELESS SYSTEM WITH IMPERFECT CSI
5G is expected to serve completely heterogeneous scenarios where devices with low or high software and hardware complexity will coexist. This entails a security challenge because low complexity devices such as IoT sensors must still have secrecy in their communications. This project proposes tools to maximize the secrecy rate in a scenario with legitimate users and eavesdroppers considering: i) the limitation that low complexity users have in computational power and ii) the eavesdroppers? unwillingness to provide their channel state information to the base station. The tools have been designed based on the physical layer security field and solve the resource allocation from two different approaches that are suitable in different use cases: i) using convex optimization theory or ii) using classification neural networks. Results show that, while the convex approach provides the best secrecy performance, the learning approach is a good alternative for dynamic scenarios or when wanting to save transmitting power
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks
Accepted by IEEE Transactions on Wireless CommunicationsAccepted by IEEE Transactions on Wireless Communication
A cooperative jamming technique to protect a two-user broadcast channel with confidential messages and an external eavesdropper
This work addresses the security of a two-user broadcast channel. The challenge of protecting a
broadcast channel is associated with the necessity of securing the system, not only against eavesdropping
attacks originating from external nodes, but also to ensure that the inside users do not eavesdrop on each
other’s information. To address this issue, the present work proposes a cooperative jamming scheme
that provides protection against eavesdropping attacks carried out simultaneously by inside users and
external eavesdroppers. To achieve this goal, the developed scheme combines real interference alignment
with a blind cooperative jamming technique defined in the literature. An information theoretical
analysis shows that positive secure degrees of freedom are achievable using the proposed solution.publishe
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
- …