26 research outputs found
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks
We study physical-layer security in wireless ad hoc networks and investigate
two types of multi-antenna transmission schemes for providing secrecy
enhancements. To establish secure transmission against malicious eavesdroppers,
we consider the generation of artificial noise with either sectoring or
beamforming. For both approaches, we provide a statistical characterization and
tradeoff analysis of the outage performance of the legitimate communication and
the eavesdropping links. We then investigate the networkwide secrecy throughput
performance of both schemes in terms of the secrecy transmission capacity, and
study the optimal power allocation between the information signal and the
artificial noise. Our analysis indicates that, under transmit power
optimization, the beamforming scheme outperforms the sectoring scheme, except
for the case where the number of transmit antennas are sufficiently large. Our
study also reveals some interesting differences between the optimal power
allocation for the sectoring and beamforming schemes.Comment: to appear in IEEE Transactions on Information Forensics and Securit
Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of the outage performance of the legitimate communication and the eavesdropping links. We then investigate the network-wide secrecy throughput performance of both schemes in terms of the secrecy transmission capacity, and study the optimal power allocation between the information signal and the artificial noise. Our analysis indicates that, under transmit power optimization, the beamforming scheme outperforms the sectoring scheme, except for the case where the number of transmit antennas are sufficiently large. Our study also reveals some interesting differences between the optimal power allocation for the sectoring and beamforming schemes.The work of X. Zhang andM. R.McKay was supported by the Hong Kong Research Grants Council under Grant 616312. The work of X. Zhou was supported by the Australian Research Council's Discovery Projects funding scheme under Project DP11010254
Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks
Accepted by IEEE Transactions on Wireless CommunicationsAccepted by IEEE Transactions on Wireless Communication
Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy
This paper studies physical layer security in a wireless ad hoc network with
numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid
full-/half-duplex receiver deployment strategy is proposed to secure legitimate
transmissions, by letting a fraction of legitimate receivers work in the
full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon
their information receptions, and letting the other receivers work in the
half-duplex mode just receiving their desired signals. The objective of this
paper is to choose properly the fraction of FD receivers for achieving the
optimal network security performance. Both accurate expressions and tractable
approximations for the connection outage probability and the secrecy outage
probability of an arbitrary legitimate link are derived, based on which the
area secure link number, network-wide secrecy throughput and network-wide
secrecy energy efficiency are optimized respectively. Various insights into the
optimal fraction are further developed and its closed-form expressions are also
derived under perfect self-interference cancellation or in a dense network. It
is concluded that the fraction of FD receivers triggers a non-trivial trade-off
between reliability and secrecy, and the proposed strategy can significantly
enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE
Transactions on Wireless Communications, 201
Enhancing physical layer security in wireless networks with cooperative approaches
Motivated by recent developments in wireless communication, this thesis aims to
characterize the secrecy performance in several types of typical wireless networks.
Advanced techniques are designed and evaluated to enhance physical layer security in
these networks with realistic assumptions, such as signal propagation loss, random node
distribution and non-instantaneous channel state information (CSI).
The first part of the thesis investigates secret communication through relay-assisted
cognitive interference channel. The primary and secondary base stations (PBS and SBS)
communicate with the primary and secondary receivers (PR and SR) respectively in the
presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with
the PBS over the same spectrum instead of waiting for an idle channel. To improve
security, cognitive relays transmit cooperative jamming (CJ) signals to create additional
interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to
improve the secrecy rate of cognitive interference channels depending on the structure of
cooperative relays. In the scheme where the multiple-antenna relay transmits weighted
jamming signals, the combined approach of CJ and beamforming is investigated. In
the scheme with multiple relays transmitting weighted jamming signals, the combined
approach of CJ and relay selection is analyzed. Numerical results show that both these
two schemes are effective in improving physical layer security of cognitive interference
channel.
In the second part, the focus is shifted to physical layer security in a random wireless
network where both legitimate and eavesdropping nodes are randomly distributed. Three
scenarios are analyzed to investigate the impact of various factors on security. In
scenario one, the basic scheme is studied without a protected zone and interference. The
probability distribution function (PDF) of channel gain with both fading and path loss
has been derived and further applied to derive secrecy connectivity and ergodic secrecy
capacity. In the second scenario, we studied using a protected zone surrounding the source
node to enhance security where interference is absent. Both the cases that eavesdroppers
are aware and unaware of the protected zone boundary are investigated. Based on the
above scenarios, further deployment of the protected zones at legitimate receivers is
designed to convert detrimental interference into a beneficial factor. Numerical results
are investigated to check the reliability of the PDF for reciprocal of channel gain and to
analyze the impact of protected zones on secrecy performance.
In the third part, physical layer security in the downlink transmission of cellular network
is studied. To model the repulsive property of the cellular network planning, we assume
that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while
the eavesdroppers are deployed as an independent Poisson point process (PPP). The
distribution function of the distances from a typical point to the nodes of the HCPP is
derived. The noise-limited and interference-limited cellular networks are investigated
by applying the fractional frequency reuse (FFR) in the system. For the noise-limited
network, we derive the secrecy outage probability with two different strategies, i.e. the
best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For
the interference-limited network with the nearest BS serve, two transmission schemes are
analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both
the schemes of transmitting with the best BS and the application of the FFR are beneficial
for physical layer security in the downlink cellular networks, while the improvement du
Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers
In this paper, we study physical layer security
in an underlay cognitive radio (CR) network. We consider
the problem of secure communication between a secondary
transmitter-receiver pair in the presence of randomly distributed
eavesdroppers under an interference constraint set by the primary
user. For different channel knowledge assumptions at the
transmitter, we design four transmission protocols to achieve the
secure transmission in the CR network. We give a comprehensive
performance analysis for each protocol in terms of transmission
delay, security, reliability, and the overall secrecy throughput.
Furthermore, we determine the optimal design parameter for
each transmission protocol by solving the optimization problem
of maximizing the secrecy throughput subject to both security
and reliability constraints. Numerical results illustrate the performance
comparison between different transmission protocols.ARC Discovery Projects Grant DP15010390
Physical layer security solutions against passive and colluding eavesdroppers in large wireless networks and impulsive noise environments
Wireless networks have experienced rapid evolutions toward sustainability, scalability and interoperability. The digital economy is driven by future networked societies to a more holistic community of intelligent infrastructures and connected services for a more sustainable and smarter society. Furthermore, an enormous amount of sensitive and confidential information, e.g., medical records, electronic media, financial data, and customer files, is transmitted via wireless channels. The implementation of higher layer key distribution and management was challenged by the emergence of these new advanced systems. In order to resist various malicious abuses and security attacks, physical layer security (PLS) has become an appealing alternative. The basic concept behind PLS is to exploit the characteristics of wireless channels for the confidentiality. Its target is to blind the eavesdroppers such that they cannot extract any confidential information from the received signals. This thesis presents solutions and analyses to improve the PLS in wireless networks.
In the second chapter, we investigate the secrecy capacity performance of an amplify-andforward (AF) dual-hop network for both distributed beamforming (DBF) and opportunistic relaying (OR) techniques. We derive the capacity scaling for two large sets; trustworthy relays and untrustworthy aggressive relays cooperating together with a wire-tapper aiming to intercept the message. We show that the capacity scaling in the DBF is lower bounded by a value which depends on the ratio between the number of the trustworthy and the untrustworthy aggressive relays, whereas the capacity scaling of OR is upper bounded by a value depending on the number of relays as well as the signal to noise ratio (SNR).
In the third chapter, we propose a new location-based multicasting technique, for dual phase AF large networks, aiming to improve the security in the presence of non-colluding passive eavesdroppers. We analytically demonstrate that the proposed technique increases the security by decreasing the probability of re-choosing a sector that has eavesdroppers, for each transmission time. Moreover, we also show that the secrecy capacity scaling of our technique is the same as for broadcasting. Hereafter, the lower and upper bounds of the secrecy outage probability are calculated, and it is shown that the security performance is remarkably enhanced, compared to the conventional multicasting technique.
In the fourth chapter, we propose a new cooperative protocol, for dual phase amplify-andforward large wireless sensor networks, aiming to improve the transmission security while taking into account the limited capabilities of the sensor nodes. In such a network, a portion of the K relays can be potential passive eavesdroppers. To reduce the impact of these untrustworthy relays on the network security, we propose a new transmission protocol, where the source agrees to share with the destination a given channel state information (CSI) of source-trusted relay-destination link to encode the message. Then, the source will use this CSI again to map the right message to a certain sector while transmitting fake messages to the other sectors. Adopting such a security protocol is promising because of the availability of a high number of cheap electronic sensors with limited computational capabilities. For the proposed scheme, we derived the secrecy outage probability (SOP) and demonstrated that the probability of receiving the right encoded information by an untrustworthy relay is inversely proportional to the number of sectors. We also show that the aggressive behavior of cooperating untrusted relays is not effective compared to the case where each untrusted relay is trying to intercept the transmitted message individually.
Fifth and last, we investigate the physical layer security performance over Rayleigh fading channels in the presence of impulsive noise, as encountered, for instance, in smart grid environments. For this scheme, secrecy performance metrics were considered with and without destination assisted jamming at the eavesdropper’s side. From the obtained results, it is verified that the SOP, without destination assisted jamming, is flooring at high signal-to-noise-ratio values and that it can be significantly improved with the use of jamming