375 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Secure Massive MIMO Transmission in the Presence of an Active Eavesdropper
In this paper, we investigate secure and reliable transmission strategies for
multi-cell multi-user massive multiple-input multiple-output (MIMO) systems in
the presence of an active eavesdropper. We consider a time-division duplex
system where uplink training is required and an active eavesdropper can attack
the training phase to cause pilot contamination at the transmitter. This forces
the precoder used in the subsequent downlink transmission phase to implicitly
beamform towards the eavesdropper, thus increasing its received signal power.
We derive an asymptotic achievable secrecy rate for matched filter precoding
and artificial noise (AN) generation at the transmitter when the number of
transmit antennas goes to infinity. For the achievability scheme at hand, we
obtain the optimal power allocation policy for the transmit signal and the AN
in closed form. For the case of correlated fading channels, we show that the
impact of the active eavesdropper can be completely removed if the transmit
correlation matrices of the users and the eavesdropper are orthogonal. Inspired
by this result, we propose a precoder null space design exploiting the low rank
property of the transmit correlation matrices of massive MIMO channels, which
can significantly degrade the eavesdropping capabilities of the active
eavesdropper.Comment: To appear in ICC 1
Pilot contamination for active eavesdropping
Abstract—Existing studies on physical layer security often assume the availability of perfect channel state information (CSI)
and overlook the importance of channel training needed for obtaining the CSI. In this letter, we discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance. We derive a new
security attack from the pilot contamination phenomenon, which targets at systems using reverse training to obtain the CSI at the
transmitter for precoder design. This attack changes the precoder used by the legitimate transmitter in a controlled manner to
strengthen the signal reception at the eavesdropper during data transmission. Furthermore, we discuss an efficient use of the transmission energy of an advanced full-duplex eavesdropper to simultaneously achieve a satisfactory eavesdropping performance whilst degrading the detection performance of the legitimate receiver.This work was supported by the Australian Research Council's Discovery Projects funding scheme (project no. DP110102548) and the Research Council of Norway through the project 197565/V30
A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer
In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret keys. The secret key is utilized for the frequency hopping (FH) sequence of the proposed communication system. We then proceed to derive a new closed-form expression for the achievable secret key rate (SKR) and the ergodic secrecy rate (ESR) for characterizing the secrecy benefits of our proposed scheme, in terms of both information secrecy and transmission resiliency. Moreover, the optimal power sharing between the AN and the message signal is investigated with the objective of enhancing the secrecy rate. Finally, through extensive simulations, we demonstrate that our proposed system model outperforms the state-of-The-Art transmission schemes in terms of secrecy and resiliency. Several numerical examples and discussions are also provided to offer further engineering insights
- …