1,402 research outputs found
Waveform Design for Secure SISO Transmissions and Multicasting
Wireless physical-layer security is an emerging field of research aiming at
preventing eavesdropping in an open wireless medium. In this paper, we propose
a novel waveform design approach to minimize the likelihood that a message
transmitted between trusted single-antenna nodes is intercepted by an
eavesdropper. In particular, with knowledge first of the eavesdropper's channel
state information (CSI), we find the optimum waveform and transmit energy that
minimize the signal-to-interference-plus-noise ratio (SINR) at the output of
the eavesdropper's maximum-SINR linear filter, while at the same time provide
the intended receiver with a required pre-specified SINR at the output of its
own max-SINR filter. Next, if prior knowledge of the eavesdropper's CSI is
unavailable, we design a waveform that maximizes the amount of energy available
for generating disturbance to eavesdroppers, termed artificial noise (AN),
while the SINR of the intended receiver is maintained at the pre-specified
level. The extensions of the secure waveform design problem to multiple
intended receivers are also investigated and semidefinite relaxation (SDR) -an
approximation technique based on convex optimization- is utilized to solve the
arising NP-hard design problems. Extensive simulation studies confirm our
analytical performance predictions and illustrate the benefits of the designed
waveforms on securing single-input single-output (SISO) transmissions and
multicasting
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …