11 research outputs found

    A novel small-scale nonorthogonal communication technique using auxiliary signal superposition with enhanced security for future wireless networks

    Get PDF
    In this work, an advanced novel small-scale non-orthogonal communication technique utilizing physical layer security (PLS) for enhanced security and reliability for two users is proposed. This work is motivated by current challenges faced by conventional non-orthogonal multiple access (NOMA) techniques, for instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation resulting from channel estimation errors and the utilization of successive interference cancellation (SIC) algorithms at the receiver. The proposed model uses the wireless channel characteristics to eliminate user interference as well as completely degrade the received signal at the eavesdropper’s terminal. More specifically, auxiliary signals are precisely designed and superimposed on top of user signals from a dual-transmitter system to provide perfect secrecy against external and internal eavesdroppers, while providing low complexity at the receiver. The efficiency and novelty of the proposed system are presented via mathematical analysis and validated by Monte Carlo simulations. Results obtained indicate that the proposed model achieves less complex, secure, and more efficient communication, suitable for low power consumption and limited processing applications.This work is funded by the scientific and technological research council of Turkey (TÜBITAK) under grand 119E392

    Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services

    Get PDF
    This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book

    Secure communication via untrusted switchable decode-and-forward relay

    Get PDF
    In this paper, a practical power efficient technique is proposed for an untrusted decode-and-forward (DAF) based cooperative communication system to provide secure communication between the source and the destination. More specifically, a DAF relay, called switchable DAF (sDAF), is designed in such a way that it can be switched to amplify-and-forward (AAF) in certain predefined situations. The algorithm is based on destination-assisted jamming and comprised of two phases. The first phase securely shares the random manipulating sequence (RMS) through an untrusted relay, while the second phase uses this RMS for secure communication through untrusted relay. This algorithm not only provides secrecy, but also enhances the power efficiency as compared to other destination-assisted jamming techniques.Institute of Electrical and Electronics EngineersIEEE Spanish SectionPolytechnic University of Valenci

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    An Overview of Physical Layer Security with Finite Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research

    Physical layer authenticated image encryption for Iot network based on biometric chaotic signature for MPFrFT OFDM system

    Get PDF
    In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of (Formula presented.). The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application. © 2023 by the authors

    Optical Communication

    Get PDF
    Optical communication is very much useful in telecommunication systems, data processing and networking. It consists of a transmitter that encodes a message into an optical signal, a channel that carries the signal to its desired destination, and a receiver that reproduces the message from the received optical signal. It presents up to date results on communication systems, along with the explanations of their relevance, from leading researchers in this field. The chapters cover general concepts of optical communication, components, systems, networks, signal processing and MIMO systems. In recent years, optical components and other enhanced signal processing functions are also considered in depth for optical communications systems. The researcher has also concentrated on optical devices, networking, signal processing, and MIMO systems and other enhanced functions for optical communication. This book is targeted at research, development and design engineers from the teams in manufacturing industry, academia and telecommunication industries

    Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond

    No full text
    WOS: 000401091800055In this letter, a secure waveform design for future 5G wireless system is proposed. The developed waveform referred to as secure orthogonal transform division multiplexing (OTDM) waveform, is designed to diagonalize the multi-path channel matrix of only the legitimate receiver (Bob), while degrading eavesdropper's reception. In particular, instead of using fixed exponential basis functions, generated by IFFT and FFT as in OFDM, orthogonal transform basis functions, which are extracted from the Bob's channel, are utilized to modulate and demodulate the data symbols securely. The simulation results prove that the proposed design provides a significant practical security gap between the Bob's and Eve's performance. The design is shown to be robust against channel imperfection, and it neither sacrifices communication resources nor considers any knowledge on the eavesdropper's channel. Besides security, the scheme results in a higher SNR, leading to a 3-5-dB gain over OFDM at BER = 10(-3).The Scientific and Technological Research Council of Turkey (TUBITAK) [114E244]This material is based upon work supported by The Scientific and Technological Research Council of Turkey (TUBITAK) under grant No. 114E244
    corecore