220 research outputs found
Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels
We propose a new location-based beamforming (LBB) scheme for wiretap
channels, where a multi-antenna source communicates with a single-antenna
legitimate receiver in the presence of a multi-antenna eavesdropper. We assume
that all channels are in a Rician fading environment, the channel state
information from the legitimate receiver is perfectly known at the source, and
that the only information on the eavesdropper available at the source is her
location. We first describe how the optimal beamforming vector that minimizes
the secrecy outage probability of the system is obtained, illustrating its
dependence on the eavesdropper's location. We then derive an easy-to-compute
expression for the secrecy outage probability when our proposed LBB scheme is
adopted. We also consider the positive impact a friendly jammer can have on our
beamforming solution, showing how the path to optimality remains the same.
Finally, we investigate the impact of location uncertainty on the secrecy
outage probability, showing how our solution can still allow for secrecy even
when the source only has a noisy estimate of the eavesdropper's location. Our
work demonstrates how a multi-antenna array, operating in the most general
channel conditions and most likely system set-up, can be configured rapidly in
the field so as to deliver an optimal physical layer security solution.Comment: 11 pages, 8 figures. Accepted for publication in IEEE Transactions on
Wireless Communications. arXiv admin note: substantial text overlap with
arXiv:1510.0856
Location-Based Beamforming for Rician Wiretap Channels
We propose a location-based beamforming scheme for wiretap channels, where a
source communicates with a legitimate receiver in the presence of an
eavesdropper. We assume that the source and the eavesdropper are equipped with
multiple antennas, while the legitimate receiver is equipped with a single
antenna. We also assume that all channels are in a Rician fading environment,
the channel state information from the legitimate receiver is perfectly known
at the source, and that the only information on the eavesdropper available at
the source is her location. We first describe how the beamforming vector that
minimizes the secrecy outage probability of the system is obtained,
illustrating its dependence on the eavesdropper's location. We then derive an
easy-to-compute expression for the secrecy outage probability when our proposed
location-based beamforming is adopted. Finally, we investigate the impact
location uncertainty has on the secrecy outage probability, showing how our
proposed solution can still allow for secrecy even when the source has limited
information on the eavesdropper's location.Comment: 6 pages, 4 figure
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secure Communications in Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like millimeter wave (mmWave)
networks, have enhanced security. For a large-scale mmWave ad hoc network in
which eavesdroppers are randomly located, however, eavesdroppers can still
intercept the confidential messages, since they may reside in the signal beam.
This paper explores the potential of physical layer security in mmWave ad hoc
networks. Specifically, we characterize the impact of mmWave channel
characteristics, random blockages, and antenna gains on the secrecy
performance. For the special case of uniform linear array (ULA), a tractable
approach is proposed to evaluate the average achievable secrecy rate. We also
characterize the impact of artificial noise in such networks. Our results
reveal that in the low transmit powerregime, the use of low mmWave frequency
achieves better secrecy performance, and when increasing transmit power, a
transition from low mmWave frequency to high mmWave frequency is demanded for
obtaining a higher secrecy rate. More antennas at the transmitting nodes are
needed to decrease the antenna gain obtained by the eavesdroppers when using
ULA. Eavesdroppers can intercept more information by using a wide beam pattern.
Furthermore, the use of artificial noise may be ineffective for enhancing the
secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication
- …