121 research outputs found
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Non-Orthogonal Multiple Access and Artificial-Noise Aided Secure Transmission in FD Relay Networks
In this paper, we investigate an artificial-noise (AN)
aided secure transmission for non-orthogonal multiple access
(NOMA) full-duplex (FD) relay network. We propose a novel
joint NOMA and AN-aided full-duplex relay (NOMA-ANFDR)
scheme to enhance the physical security. In this scheme, the
optimal power allocation between the information and the AN
signal is determined such that the capacity of the two end-to-end
(i.e., two source-relay-destination pairs) channel are maximized
to ensure the highest quality of cooperative transmission. To fully
examine the benefits of the NOMA-ANFDR scheme, we derive a
new closed-form expression for the secrecy outage probability. We
show that the NOMA-ANFDR scheme significantly outperforms
the joint NOMA and AN in half-duplex relay (NOMA-ANHDR)
scheme as well as the NOMA-HDR scheme in terms of minimum
secrecy outage probability and effect secrecy throughout. This
result indicates that adopting the joint of FD and AN technique
at relays can effectively enhance the physical layer secrecy
performance in the NOMA cooperative network.ARC Discovery Projects Grant DP150103905
Physical layer security for NOMA: requirements, merits, challenges, and recommendations
Non-orthogonal multiple access (NOMA) has been
recognized as one of the most significant enabling technologies
for future wireless systems due to its eminent spectral efficiency,
its ability to provide an additional degree of freedom for ultra
reliable low latency communications (URLLC), and grant free
random access. Meanwhile, physical layer security (PLS) has got
much attention for future wireless communication systems due to
its capability to efficiently complement the cryptography-based
algorithms for enhancing overall security of the communication
system. In this article, security design requirements for downlink
power domain NOMA and solutions provided by PLS to fulfil
these requirements are discussed. The merits and challenges
which were encountered while employing PLS to NOMA are
identified. Finally, future recommendations and prospective so lutions are also presented.No sponso
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
Full Duplex Component-Forward Cooperative Communication for a Secure Wireless Communication System
The technological breakthrough in the form of Internet of Things (IoT), Big data and connected world is increasing the demand of better spectrum utilization. Half-Duplex (HD) transmission is mostly used in the earlier communication systems. The high transmission demand requires the better utilization of the existing spectrum. There are several possible ways to overcome the problem of better spectrum usage. In-Band Full Duplex (IBFD) is one of the techniques that can double the Spectral Efficiency (SE) in a Beyond 5G (B5G) communication system. In this paper, our aim is to use the spectral efficient IBFD scheme to improve the security of the system with minimum interference. The interference can be reduced by the addition of orthogonality between the transmitted and received signal of a relay. A component-forward scheme is proposed in this paper to create such orthogonality. For achieving the desired aim, IBFD is used with Device-to-Device (D2D), Artificial Noise (AN), Modulation based orthogonalization, Radio Frequency Energy Harvesting (RFEH) and proposed Full-Duplex Component Forward (FD-CF) algorithm for multiple relays. We also use non-linear harvested power as one of the sources to reuse the exiting power for evaluating the system performance. The derivation of Secrecy Outage Probability (SOP) and throughput is derived in this paper for the FD-CF cooperative communication and is explored with and without non-linear RFEH. The simulation results show the comparison between the component-forward and decode-and-forward communication with one or more relays
- …