84 research outputs found

    A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center

    Get PDF
    © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Cognitive radio networks (CRNs) are found to be, without difficulty wide-open to external malicious threats. Secure communication is an important prerequisite for forthcoming fifth-generation (5G) systems, and CRs are not exempt. A framework for developing the accomplishable benefits of physical layer security (PLS) in an amplify-andforward cooperative spectrum sensing (AF-CSS) in a cognitive radio network (CRN) using a stochastic geometry is proposed. In the CRN the spectrum sensing data from secondary users (SU) are collected by a fusion center (FC) with the assistance of access points (AP) as cognitive relays, and when malicious eavesdropping SU are listening. In this paper we focus on the secure transmission of active APs relaying their spectrum sensing data to the FC. Closed expressions for the average secrecy rate are presented. Analytical formulations and results substantiate our analysis and demonstrate that multiple antennas at the APs is capable of improving the security of an AF-CSSCRN. The obtained numerical results also show that increasing the number of FCs, leads to an increase in the secrecy rate between the AP and its correlated FC

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Secure Communications in Millimeter Wave Ad Hoc Networks

    Get PDF
    Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate. We also characterize the impact of artificial noise in such networks. Our results reveal that in the low transmit powerregime, the use of low mmWave frequency achieves better secrecy performance, and when increasing transmit power, a transition from low mmWave frequency to high mmWave frequency is demanded for obtaining a higher secrecy rate. More antennas at the transmitting nodes are needed to decrease the antenna gain obtained by the eavesdroppers when using ULA. Eavesdroppers can intercept more information by using a wide beam pattern. Furthermore, the use of artificial noise may be ineffective for enhancing the secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication

    Robust Schemes to Enhance Energy Consumption Efficiency for Millimeter Wave-Based Microcellular Network in Congested Urban Environments

    Get PDF
    Future wireless communication networks will be largely characterized by small cell deployments, typically on the order of 200 meters of radius/cell, at most. Meanwhile, recent studies show that base stations (BS) account for about 80 to 95 % of the total network power. This simply implies that more energy will be consumed in the future wireless network since small cell means massive deployment of BS. This phenomenon makes energy-efficient (EE) control a central issue of critical consideration in the design of future wireless networks. This paper proposes and investigates (the performance of) two different energy-saving approaches namely, adaptive-sleep sectorization (AS), adaptive hybrid partitioning schemes (AH) for small cellular networks using smart antenna technique. We formulated a generic base-model for the above-mentioned schemes and applied the spatial Poisson process to reduce the system complexity and to improve flexibility in the beam angle reconfiguration of the adaptive antenna, also known as a smart antenna (SA). The SA uses the scalable algorithms to track active users in different segments/sectors of the microcell, making the proposed schemes capable of targeting specific users or groups of users in periods of sparse traffic, and capable of performing optimally when the network is highly congested. The capabilities of the proposed smart/adaptive antenna approaches can be easily adapted and integrated into the massive MIMO for future deployment. Rigorous numerical analysis at different orders of sectorization shows that among the proposed schemes, the AH strategy outperforms the AS in terms of energy saving by about 52 %. Generally, the proposed schemes have demonstrated the ability to significantly increase the power consumption efficiency of micro base stations for future generation cellular systems, over the traditional design methodologies

    Hybrid Processing Design for Multipair Massive MIMO Relaying with Channel Spatial Correlation

    Get PDF
    Massive multiple-input multiple-output (MIMO) avails of simple transceiver design which can tackle many drawbacks of relay systems in terms of complicated signal processing, latency, and noise amplification. However, the cost and circuit complexity of having one radio frequency (RF) chain dedicated to each antenna element are prohibitive in practice. In this paper, we address this critical issue in amplify-and-forward (AF) relay systems using a hybrid analog and digital (A/D) transceiver structure. More specifically, leveraging the channel long-term properties, we design the analog beamformer which aims to minimize the channel estimation error and remain invariant over a long timescale. Then, the beamforming is completed by simple digital signal processing, i.e., maximum ratio combining/maximum ratio transmission (MRC/MRT) or zero-forcing (ZF) in the baseband domain. We present analytical bounds on the achievable spectral efficiency taking into account the spatial correlation and imperfect channel state information at the relay station. Our analytical results reveal that the hybrid A/D structure with ZF digital processor exploits spatial correlation and offers a higher spectral efficiency compared to the hybrid A/D structure with MRC/MRT scheme. Our numerical results showcase that the hybrid A/D beamforming design captures nearly 95% of the spectral efficiency of a fully digital AF relaying topology even by removing half of the RF chains. It is also shown that the hybrid A/D structure is robust to coarse quantization, and even with 2-bit resolution, the system can achieve more than 93% of the spectral efficiency offered by the same hybrid A/D topology with infinite resolution phase shifters.Comment: 17 pages, 13 figures, to appear in IEEE Transactions on Communication

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    Secrecy Enhancement in Cooperative Relaying Systems

    Get PDF
    Cooperative communications is obviously an evolution in wireless networks due to its noticeable advantages such as increasing the coverage as well as combating fading and shadowing effects. However, the broadcast characteristic of a wireless medium which is exploited in cooperative communications leads to a variety of security vulnerabilities. As cooperative communication networks are globally expanded, they expose to security attacks and threats more than ever. Primarily, researchers have focused on upper layers of network architectures to meet the requirements for secure cooperative transmission while the upper-layer security solutions are incapable of combating a number of security threats, e.g., jamming attacks. To address this issue, physical-layer security has been recommended as a complementary solution in the literature. In this thesis, physical layer attacks of the cooperative communication systems are studied, and corresponding security techniques including cooperative jamming, beamforming and diversity approaches are investigated. In addition, a novel security solution for a two-hop decode-and-forward relaying system is presented where the transmitters insert a random phase shift to the modulated data of each hop. The random phase shift is created based on a shared secret among communicating entities. Thus, the injected phase shift confuses the eavesdropper and secrecy capacity improves. Furthermore, a cooperative jamming strategy for multi-hop decode-and-forward relaying systems is presented where multiple non-colluding illegitimate nodes can overhear the communication. The jamming signal is created by the transmitter of each hop while being sent with the primary signal. The jamming signal is known at the intended receiver as it is according to a secret common knowledge between the communicating entities. Hence, artificial noise misleads the eavesdroppers, and decreases their signal-to-noise-ratio. As a result, secrecy capacity of the system is improved. Finally, power allocation among friendly jamming and main signal is proposed to ensure that suggested scheme enhances secrecy

    Cooperative Relaying In Power Line Environment: A Survey and Tutorial

    Get PDF
    Exchange of information is essential in any society and the demand for faster, cheaper, and secure communications is increasing every day. With other hi-tech initiatives like IPv6 and Internet-of-Things (IOT) already in the horizon, demand for broadband is set to escalate beyond its current level. Inherently laden in the challenges posed by this technology are fresh opportunities in terms of penetration of data services into rural communities and development of innovative strategies for more efficient use of the grid. Though still in its developmental phase/stage, Power Line Communication (PLC) has grown beyond theoretical fantasy to become a reality. The proofs are the readily available PLC systems that can be purchased off the shelfto achieve in-house networking and the much talked about, smart metering technology; generally regarded as the “new bride” in utilities industry. One of the biggest gains of PLC is its use of existing electrical cables, thereby eliminating cost of installation and maintenance of data cables. However, given that the power infrastructure was traditionally built to deliver electricity, data signals do suffer various forms of distortions and impairments as they transit it. This paper presents a tutorial on the deployed wireless system technique which is to be adapted to PLC scenario for the purpose of managing the available source energy for achieving reliable communication system. One of these techniques is the cooperative diversity. Its application and deployment in power line environment is explored. The improvement achieved through cooperative diversity in some PLC systems were presented along with the associated limitations. Finally, future areas of research which will further improve the reliability of PLC systems and reduce its power consumption during transmission is shown
    corecore