2 research outputs found
Security Analysis in Multicasting over Shadowed Rician and {\alpha}-{\mu} Fading Channels: A Dual-hop Hybrid Satellite Terrestrial Relaying Network
In this era of 5G technology, the ever-increasing demands for high data rates
lead researchers to develop hybrid satellite-terrestrial (HST) networks as a
substitution to the conventional cellular terrestrial systems. Since an HST
network suffers from a masking effect which can be mitigated by adopting the
terrestrial relaying strategy, in this work, we focus on wireless multicasting
through an HST relaying net-work (HSTRN) in which a satellite sends messages to
multiple terrestrial nodes via multiple relays under the wiretapping efforts of
multiple eavesdroppers. Our concern is to protect the multicast messages from
being eavesdropped taking advantage of the well-known opportunistic relaying
technique. We consider the satellite links follow Shadowed Rician fading
whereas the terrestrial links undergo alpha-mu fading. The secrecy performance
of the proposed HSTRN model is accomplished by deriving expressions for the
probability of nonzero secrecy multicast capacity, ergodic secrecy multicast
capacity, and secure outage probability for multicasting in closed-form.
Capitalizing on the derived expressions, we analyze how a perfect secrecy level
can be preserved in spite of harsh channel conditions and also present a
secrecy trade-off in terms of the number of relays, multicast users, and
multiple eavesdroppers. Finally, the numerical analyses are corroborated via
Monte-Carlo simulations
Survey on Physical Layer Security for 5G Wireless Networks
Physical layer security is a promising approach that can benefit traditional
encryption methods. The idea of physical layer security is to take advantage of
the features of the propagation medium and its impairments to ensure secure
communication in the physical layer. This work introduces a comprehensive
review of the main information-theoretic metrics used to measure the secrecy
performance in physical layer security. Furthermore, a theoretical framework
related to the most commonly used physical layer security techniques to improve
the secrecy performance is provided. Finally, our work surveys physical layer
security research over several enabling 5G technologies, such as massive
multiple-input multiple-output, millimeter-wave communications, heterogeneous
networks, non-orthogonal multiple access, and full-duplex. Also, we include the
key concepts of each of the aforementioned technologies. Future fields of
research and technical challenges of physical layer security are also
identified