2,724 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Secure Communication over Parallel Relay Channel

    Full text link
    We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel which consists of multiple relay-eavesdropper channels as subchannels. For the discrete memoryless model, we establish outer and inner bounds on the rate-equivocation region. The inner bound allows mode selection at the relay. For each subchannel, secure transmission is obtained through one of two coding schemes at the relay: decoding-and-forwarding the source message or confusing the eavesdropper through noise injection. For the Gaussian memoryless channel, we establish lower and upper bounds on the perfect secrecy rate. Furthermore, we study a special case in which the relay does not hear the source and show that under certain conditions the lower and upper bounds coincide. The results established for the parallel Gaussian relay-eavesdropper channel are then applied to study the fading relay-eavesdropper channel. Analytical results are illustrated through some numerical examples.Comment: To Appear in IEEE Transactions on Information Forensics and Securit

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Simultaneous Wireless Information and Power Transfer in 5G communication

    Get PDF
    Green communication technology is expected to be widely adopted in future generation networks to improve energy efficiency and reliability of wireless communication network. Among the green communication technologies,simultaneous wireless information and power transfer (SWIPT) is adopted for its flexible energy harvesting technology through the radio frequency (RF) signa lthati sused for information transmission. Even though existing SWIPT techniques are flexible and adoptable for the wireless communication networks, the power and time resources of the signal need to be shared between infor- mation transmission and RF energy harvesting, and this compromises the quality of the signal. Therefore,SWIP Ttechniques need to be designed to allow an efficient resource allocation for communication and energy harvesting. The goal oft his thesisis to design SWIP Ttechniques that allow efficient,reliable and secure joint communications and power transference. A problem associated to SWIPT techniques combined with multi carrier signals is that the increased power requirements inherent to energy harvesting purposes can exacerbate nonlinear distortion effects at the transmitter. Therefore, we evaluate nonlinear distortion and present feasible solutions to mitigate the impact of nonlinear distortion effects on the performance.Another goal of the thesisis to take advantage of the energy harvesting signals in SWIP Ttechniques for channel estimation and security purposes.Theperformance of these SWIPT techniques is evaluated analytically, and those results are validated by simulations. It is shownthatthe proposed SWIPT schemes can have excellent performance, out performing conventional SWIPT schemes.Espera-se que aschamadas tecnologiasde green communications sejam amplamente ado- tadas em futuras redes de comunicação sem fios para melhorar a sua eficiência energética a fiabilidade.Entre estas,encontram-se as tecnologias SWIPT (Simultaneous Wireless Information and Power Transference), nas quais um sinal radio é usado para transferir simultaneamente potência e informações.Embora as técnicas SWIPT existentes sejam fle- xíveis e adequadas para as redes de comunicações sem fios, os recursos de energia e tempo do sinal precisam ser compartilhados entre a transmissão de informações e de energia, o que pode comprometer a qualidade do sinal. Deste modo,as técnicas SWIPT precisam ser projetadas para permitir uma alocação eficiente de recursos para comunicação e recolha de energia. O objetivo desta tese é desenvolver técnicas SWIPT que permitam transferência de energia e comunicações eficientes,fiáveis e seguras.Um problema associado às técnicas SWIPT combinadas com sinais multi-portadora são as dificuldades de amplificação ine- rentes à combinação de sinais de transmissão de energia com sinais de transferência de dados, que podem exacerbar os efeitos de distorção não-linear nos sinais transmitidos. Deste modo, um dos objectivos desta tese é avaliar o impacto da distorção não-linear em sinais SWIPT, e apresentar soluções viáveis para mitigar os efeitos da distorção não-linear no desempenho da transmissão de dados.Outro objetivo da tese é aproveitar as vantagens dos sinais de transferência de energia em técnicas SWIPT para efeitos de estimação de canal e segurança na comunicação.Os desempenhos dessas técnicas SWIPT são avaliados analiticamente,sendo os respectivos resultados validados por simulações.É mostrado que os esquemas SWIPT propostos podem ter excelente desempenho, superando esquemas SWIPT convencionais

    Low-resolution ADC receiver design, MIMO interference cancellation prototyping, and PHY secrecy analysis.

    Get PDF
    This dissertation studies three independent research topics in the general field of wireless communications. The first topic focuses on new receiver design with low-resolution analog-to-digital converters (ADC). In future massive multiple-input-multiple-output (MIMO) systems, multiple high-speed high-resolution ADCs will become a bottleneck for practical applications because of the hardware complexity and power consumption. One solution to this problem is to adopt low-cost low-precision ADCs instead. In Chapter II, MU-MIMO-OFDM systems only equipped with low-precision ADCs are considered. A new turbo receiver structure is proposed to improve the overall system performance. Meanwhile, ultra-low-cost communication devices can enable massive deployment of disposable wireless relays. In Chapter III, the feasibility of using a one-bit relay cluster to help a power-constrained transmitter for distant communication is investigated. Nonlinear estimators are applied to enable effective decoding. The second topic focuses prototyping and verification of a LTE and WiFi co-existence system, where the operation of LTE in unlicensed spectrum (LTE-U) is discussed. LTE-U extends the benefits of LTE and LTE Advanced to unlicensed spectrum, enabling mobile operators to offload data traffic onto unlicensed frequencies more efficiently and effectively. With LTE-U, operators can offer consumers a more robust and seamless mobile broadband experience with better coverage and higher download speeds. As the coexistence leads to considerable performance instability of both LTE and WiFi transmissions, the LTE and WiFi receivers with MIMO interference canceller are designed and prototyped to support the coexistence in Chapter IV. The third topic focuses on theoretical analysis of physical-layer secrecy with finite blocklength. Unlike upper layer security approaches, the physical-layer communication security can guarantee information-theoretic secrecy. Current studies on the physical-layer secrecy are all based on infinite blocklength. Nevertheless, these asymptotic studies are unrealistic and the finite blocklength effect is crucial for practical secrecy communication. In Chapter V, a practical analysis of secure lattice codes is provided
    corecore