29 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    New non-orthogonal transmission schemes for achieving highly efficient, reliable, and secure multi-user communications

    Get PDF
    Next-generation wireless communication paradigms demand poperties such as high reliability, low power consumption, and enhanced security. Also, the ever-increasing demand for better wireless services has led to the continuous improvement and emergence of various wireless networks such as 5G and beyond networks. Beyond 5G communication systems (i.e., 6G) are envisioned to utilize technologies such as artificial intelligence, ultra-dense small cells, reconfigurable antennas, distributed networks, multi-band and full-duplex communications, as well as novel non-orthogonal multiple access methods. In this work, we first revisit and review the various current non-orthogonal multiple access (NOMA) techniques available in the literature and proposed by both academia and industry. Then, we discuss their strengths and weaknesses in different application areas. To address the limitations of the existing NOMA schemes, we develop and propose novel NOMA communication paradigms designed for achieving highly efficient, reliable, and secure multi-user communications using superimposed auxiliary signals and pre-coded matrices methods. The new proposed NOMA systems are motivated by the many limitations faced by current NOMA-based systems. For instance, power-domain NOMA is not included in release 17 of 3GPP as a work item. This is due to its performance degradation, resulting from successive interference cancellation (SIC) and channel estimation errors. The efficiency and novelty of the proposed models are presented via mathematical analysis and validated by Monte Carlo simulations.This work was supported in part by the Scientific and Technological Research Council of Turkey (TUBITAK), under project grant No. 119E392

    Determination of optically stimulated luminescence dosimetric characteristics and suitability for entrance surface dose assessement in diagnostic x-ray examinations

    Get PDF
    The availability of Optically Stimulated Luminescence (OSL) dosimeter system developed by Landauer Inc. (Glenwood IL) has greatly improved radiation dosimetry application in the medical field. Recent studies with OSL dosimeters (nanoDots) gave much emphases to patient radiation exposure in radiotherapy but ignoring the potential risks from radiographic examinations. This study focused on the measurement of entrance surface dose (ESD) resulting from radiographic examination. Monitoring procedures have been developed by the International Atomic Energy Agency (IAEA) to estimate ESD, while considering exposure parameters and patient’s characteristics. However, dosimetric properties of the OSL system must be characterized to ascertain its suitability for ESD measurements in medical radiography due to energy dependence and over-response factors of the Al2O3 material. This thesis consists of three phases: 1) evaluating stability of the new OSL dosimetry system, 2) characterizing the nanoDots in radiographic energy range from 40 kV to 150 kV with typical doses ranging from 0 to 20 mGy, and 3) assessing suitability of the nanoDots for ESD measurement in routine X-ray examinations. The dosimetric characteristics of the nanoDots in the above energy range are presented in this study, including repeatability, reproducibility, signal depletion, element correction factor, linearity, angular and energy dependence, and dose measurement accuracy. Experimental results showed repeatability of below 5% and reproducibility of less than 2%. OSL signals after sequential readouts were reduced by approximately 0.5% per readout and having good linearity for doses between 5 – 20 mGy. The nanoDots OSL dosimeter showed significant angular and energy dependence in this energy range, and corresponding energy correction factors were determined in the range of 0.76 – 1.12. ESDs were determined in common diagnostic X-ray examinations using three different methods including direct (measured on phantom/patient) and indirect (without phantom) measurements with nanoDots OSL dosimeters, and CALDose_X 5.0 software calculations. Results from direct and indirect ESD measurements showed good agreement within relative uncertainties of 5.9% and 12%, respectively, in accordance with the International Electrotechnical Commission (IEC) 61674 specifications. However, the measured results were below ESDs calculated with CALDose_X 5.0 software. Measured eye and gonad doses were found to be significant compared to ESDs during anterior-posterior (AP) abdomen and AP skull examinations, respectively. The results obtained in this research work indicate the suitability of utilizing nanoDots OSL dosimeter for entrance surface dose assessment during diagnostic X-ray examinations

    Beamforming and non-orthogonal multiple access for rate and secrecy enhancement of fifth generation communication system

    Get PDF
    The fifth-generation (5G) communication systems have many anticipated functionalities and requirements such as high data rate, massive connectivity, wide coverage area, low latency and enhanced secrecy performance. In order to meet these criteria, communication schemes that combine 5G key enabling technologies need to be investigated. In this thesis, a novel communication system that merges non-orthogonal multiple access (NOMA), energy harvesting, beamforming, and full-duplex (FD) techniques in order to enhance both capacity and secrecy of 5G system is introduced. In the capacity improving scheme, NOMA is first combined with beamforming to serve more than one user in each beamforming vector. Next, simultaneous wireless information and power transfer (SWIPT) technique is exploited to encourage the strong user (user with better channel condition) to relay the information messages of the weak user (user with poor channel condition) in FD manner. The total sum rate maximisation problem is formulated and solved by means of convex-concave procedure. The system performance is also analysed by deriving the outage probability of both users. Additionally, the model is extended to a more general case wherein the users are moving, and the outage probability of this dynamic topology is provided by means of the stochastic geometry framework. Novel secure schemes are also introduced to safeguard legitimate users’ information from internal and external eavesdroppers. In the internal eavesdropper’s case, artificial signal concept is adopted to protect NOMA’s weak user’s information from being intercepted by the strong user. The secrecy outage probability of theweak user is derived and validated. In addition, game theory discipline is exploited to provide an efficient eavesdropping avoidance algorithm. Null-steering beamforming is adopted in the external eavesdropper’s case in two different schemes namely self and nonself-cooperative jamming. In self-cooperative strategy, the base station applies the null-steering jamming to impair the eavesdropper channel, while sending the information-bearing signals to the intended legitimate users. Whereas in the nonself-cooperative jamming scheme, the base station provides the helpers with the required information and power by means of SWIPT technique in the first phase. The helpers deploy null-steering beamforming to jam the eavesdropper during the information exchange between the base station and the intended users in the second phase. The secrecy outage probability of the legitimate users is derived in both jamming schemes. Game theory is also introduced to the nonself-cooperative jamming scheme for further improvements on the secrecy outage behaviour and the economic revenue of the system. The proposed capacity enhancing scheme demonstrates about 200% higher sum rate when compared with the non-cooperative and half-duplex cooperative NOMA systems. In addition, the novel secure scheme in the internal eavesdropper case is proven to enhance the information security of the weak user without compromising the functionalities of the strong user or NOMA superiority over orthogonal multiple access systems. Null-steering based jamming system also illustrates improved secrecy performance in the external eavesdropper case when compared to the conventional jamming schemes. Numerical simulations are carried out in order to validate the derived closed-form expressions and to illustrate the performance enhancement achieved by the proposed schemes where the rate is increased by 200% and the secrecy outage probability is decreased by 33% when compared to the baseline systems

    An advanced non-orthogonal multiple access security technique for future wireless communication networks

    Get PDF
    The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for achieving reliable and secure communication in the multiple-input single-output non-orthogonal multiple access (MISO-NOMA) systems. This system is capable of providing enhanced confidential communication as well as inter-user interference cancellation without using the successive interference cancellation (SIC) method. The conventional NOMA was previously adopted under the name of multi-user superposition transmission (MUST) in release 13 of 3GPP but recently excluded from 3GPP-release 17 due to its performance degradation. In this work, we analyze the drawbacks in conventional NOMA and present a new kind of NOMA with more improved performance metrics. The proposed algorithm combines the benefit of pre-coder matrices with simultaneous transmission using antenna diversity to provide simple, reliable, and secure communication without complex processing at the receivers in downlink scenarios. The effectiveness of the proposed algorithm is verified and proven by extensive analysis and numerical simulations.This work was supported in part by the Scientific and Technological Research Council of Turkey (TÜBİTAK), under project grant No. 119E39

    A New Design Paradigm for Secure Full-Duplex Multiuser Systems

    Full text link
    We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) secrecy rate (SR) among all legitimate users, where the information signals at the FD-BS are accompanied with artificial noise to debilitate the Eves' channels. To enhance the max-min SR, a major part of the power budget should be allocated to serve the users with poor channel qualities, such as those far from the FD-BS, undermining the SR for other users, and thus compromising the SR per-user. In addition, the main obstacle in designing an FD system is due to the self-interference (SI) and co-channel interference (CCI) among users. We therefore propose an alternative solution, where the FD-BS uses a fraction of the time block to serve near DL users and far UL users, and the remaining fractional time to serve other users. The proposed scheme mitigates the harmful effects of SI, CCI and multiuser interference, and provides system robustness. The SR optimization problem has a highly nonconcave and nonsmooth objective, subject to nonconvex constraints. For the case of perfect channel state information (CSI), we develop a low-complexity path-following algorithm, which involves only a simple convex program of moderate dimension at each iteration. We show that our path-following algorithm guarantees convergence at least to a local optimum. Then, we extend the path-following algorithm to the cases of partially known Eves' CSI, where only statistics of CSI for the Eves are known, and worst-case scenario in which Eves can employ a more advanced linear decoder. The merit of our proposed approach is further demonstrated by extensive numerical results.Comment: Accepted for publication in IEEE Journal on Selected Areas in Communications (JSAC), 201
    corecore