195 research outputs found
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users
Joint resource allocation involving optimization of subcarrier allocation,
subcarrier pairing (SCP), and power allocation in a cooperative secure
orthogonal frequency division multiple access (OFDMA) communication system with
untrusted users is considered. Both amplify and forward (AF), and decode and
forward (DF) modes of operations are considered with individual power budget
constraints for source and relay. After finding optimal subcarrier allocation
for an AF relayed system, we prove the joint power allocation as a generalized
convex problem, and solve it optimally. Compared to the conventional channel
gain matching view, the optimal SCP is emphasized as a novel concept of channel
gain tailoring. We prove that the optimal SCP pairs subcarriers such that the
variance among the effective channel gains is minimized. For a DF relayed
system, we show that depending on the power budgets of source and relay, SCP
can either be in a subordinate role where it improves the energy efficiency, or
in a main role where it improves the spectral efficiency of the system. In an
AF relayed system we confirm that SCP plays a crucial role, and improves the
spectral efficiency of the system. The channel gain tailoring property of SCP,
various roles of SCP in improving the spectral and the energy efficiency of a
cooperative communication system are validated with the help of simulation
results
Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels
This letter studies parallel independent Gaussian channels with uncertain
eavesdropper channel state information (CSI). Firstly, we evaluate the
probability of zero secrecy rate in this system for (i) given instantaneous
channel conditions and (ii) a Rayleigh fading scenario. Secondly, when non-zero
secrecy is achievable in the low SNR regime, we aim to solve a robust power
allocation problem which minimizes the outage probability at a target secrecy
rate. We bound the outage probability and obtain a linear fractional program
that takes into account the uncertainty in eavesdropper CSI while allocating
power on the parallel channels. Problem structure is exploited to solve this
optimization problem efficiently. We find the proposed scheme effective for
uncertain eavesdropper CSI in comparison with conventional power allocation
schemes.Comment: 4 pages, 2 figures. Author version of the paper published in IEEE
Wireless Communications Letters. Published version is accessible at
http://dx.doi.org/10.1109/LWC.2015.249734
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks
In this paper, we explore the physical-layer security in cooperative wireless
networks with multiple relays where both amplify-and-forward (AF) and
decode-and-forward (DF) protocols are considered. We propose the AF and DF
based optimal relay selection (i.e., AFbORS and DFbORS) schemes to improve the
wireless security against eavesdropping attack. For the purpose of comparison,
we examine the traditional AFbORS and DFbORS schemes, denoted by T-AFbORS and
TDFbORS, respectively. We also investigate a so-called multiple relay combining
(MRC) framework and present the traditional AF and DF based MRC schemes, called
T-AFbMRC and TDFbMRC, where multiple relays participate in forwarding the
source signal to destination which then combines its received signals from the
multiple relays. We derive closed-form intercept probability expressions of the
proposed AFbORS and DFbORS (i.e., P-AFbORS and P-DFbORS) as well as the
T-AFbORS, TDFbORS, T-AFbMRC and T-DFbMRC schemes in the presence of
eavesdropping attack. We further conduct an asymptotic intercept probability
analysis to evaluate the diversity order performance of relay selection schemes
and show that no matter which relaying protocol is considered (i.e., AF and
DF), the traditional and proposed optimal relay selection approaches both
achieve the diversity order M where M represents the number of relays. In
addition, numerical results show that for both AF and DF protocols, the
intercept probability performance of proposed optimal relay selection is
strictly better than that of the traditional relay selection and multiple relay
combining methods.Comment: 13 page
- …