138 research outputs found

    Effects of Correlation of Channel Gains on the Secrecy Capacity in the Gaussian Wiretap Channel

    Get PDF
    Secrecy capacity is one of the most important characteristic of a wireless communication channel. Therefore, the study of this characteristic wherein the system has correlated channel gains and study them for different line-of-sight (LOS) propagation scenarios is of ultimate importance. The primary objective of this thesis from the mathematical side is to determine the secrecy capacity (SC) for correlated channel gains for the main and eavesdropper channels in a Gaussian Wiretap channel as a function from main parameters (μ, Σ, ρ). f(h1, h2) is the joint distribution of the two channel gains at channel use (h1, h2), fi(hi) is the main distribution of the channel gain hi. The results are based on assumption of the Gaussian distribution of channel gains (gM, gE). The main task of estimating the secrecy capacity is reduced to the problem of solving linear partial differential equations (PDE). Different aspects of the analysis of secrecy capacity considered in this research are the Estimation of SC mathematically and numerically for correlated SISO systems and a mathematical example for MIMO systems with PDE. The variations in Secrecy Capacity are studied for Rayleigh (NLOS) distribution and Rician (LOS) distribution. Suitable scenarios are identified in which secure communication is possible with correlation of channel gains. Also, the new algorithm using PDE has a higher speed and than analog algorithms constructed on the classical statistical Monte Carlo methods. Taking into account the normality of the distribution of system parameters, namely the channel gain (gM, gE), the algorithm is constructed for systems of partial differential equations which satisfies the secrecy criterion. Advisor: H. Andrew Harm

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Physical-Layer Security Over Non-Small-Scale Fading Channels

    Get PDF

    Location-Based Beamforming for Rician Wiretap Channels

    Full text link
    We propose a location-based beamforming scheme for wiretap channels, where a source communicates with a legitimate receiver in the presence of an eavesdropper. We assume that the source and the eavesdropper are equipped with multiple antennas, while the legitimate receiver is equipped with a single antenna. We also assume that all channels are in a Rician fading environment, the channel state information from the legitimate receiver is perfectly known at the source, and that the only information on the eavesdropper available at the source is her location. We first describe how the beamforming vector that minimizes the secrecy outage probability of the system is obtained, illustrating its dependence on the eavesdropper's location. We then derive an easy-to-compute expression for the secrecy outage probability when our proposed location-based beamforming is adopted. Finally, we investigate the impact location uncertainty has on the secrecy outage probability, showing how our proposed solution can still allow for secrecy even when the source has limited information on the eavesdropper's location.Comment: 6 pages, 4 figure
    corecore