158 research outputs found
To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a
multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the
direct link between the source and destination is broken. Our objective is to
maximize the secrecy rate at the destination subject to the transmit power
constraints of the AF relay and the HJ helpers. In the case of perfect channel
state information (CSI), the joint optimization of the artificial noise (AN)
covariance matrix for cooperative jamming and the AF beamforming matrix is
studied using semi-definite relaxation (SDR) which is tight, while suboptimal
solutions are also devised with lower complexity. For the imperfect CSI case,
we provide the equivalent reformulation of the worst-case robust optimization
to maximize the minimum achievable secrecy rate. Inspired by the optimal
solution to the case of perfect CSI, a suboptimal robust scheme is proposed
striking a good tradeoff between complexity and performance. Finally, numerical
results for various settings are provided to evaluate the proposed schemes.Comment: 16 pages (double column), 8 figures, submitted for possible journal
publicatio
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective
This article examines the secrecy coding aided wireless communications from a
source to a destination in the presence of an eavesdropper from a
security-reliability tradeoff (SRT) perspective. Explicitly, the security is
quantified in terms of the intercept probability experienced at the
eavesdropper, while the outage probability encountered at the destination is
used to measure the transmission reliability. We characterize the SRT of
conventional direct transmission from the source to the destination and show
that if the outage probability is increased, the intercept probability
decreases, and vice versa. We first demonstrate that the employment of relay
nodes for assisting the source-destination transmissions is capable of
defending against eavesdropping, followed by quantifying the benefits of
single-relay selection (SRS) as well as of multi-relay selection (MRS) schemes.
More specifically, in the SRS scheme, only the single "best" relay is selected
for forwarding the source signal to the destination, whereas the MRS scheme
allows multiple relays to participate in this process. It is illustrated that
both the SRS and MRS schemes achieve a better SRT than the conventional direct
transmission, especially upon increasing the number of relays. Numerical
results also show that as expected, the MRS outperforms the SRS in terms of its
SRT. Additionally, we present some open challenges and future directions for
the wireless relay aided physical-layer security.Comment: 16 pages, IEEE Network, 201
Secure Communications in Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like millimeter wave (mmWave)
networks, have enhanced security. For a large-scale mmWave ad hoc network in
which eavesdroppers are randomly located, however, eavesdroppers can still
intercept the confidential messages, since they may reside in the signal beam.
This paper explores the potential of physical layer security in mmWave ad hoc
networks. Specifically, we characterize the impact of mmWave channel
characteristics, random blockages, and antenna gains on the secrecy
performance. For the special case of uniform linear array (ULA), a tractable
approach is proposed to evaluate the average achievable secrecy rate. We also
characterize the impact of artificial noise in such networks. Our results
reveal that in the low transmit powerregime, the use of low mmWave frequency
achieves better secrecy performance, and when increasing transmit power, a
transition from low mmWave frequency to high mmWave frequency is demanded for
obtaining a higher secrecy rate. More antennas at the transmitting nodes are
needed to decrease the antenna gain obtained by the eavesdroppers when using
ULA. Eavesdroppers can intercept more information by using a wide beam pattern.
Furthermore, the use of artificial noise may be ineffective for enhancing the
secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication
Security versus Reliability Analysis of Opportunistic Relaying
Physical-layer security is emerging as a promising paradigm of securing
wireless communications against eavesdropping between legitimate users, when
the main link spanning from source to destination has better propagation
conditions than the wiretap link from source to eavesdropper. In this paper, we
identify and analyze the tradeoffs between the security and reliability of
wireless communications in the presence of eavesdropping attacks. Typically,
the reliability of the main link can be improved by increasing the source's
transmit power (or decreasing its date rate) to reduce the outage probability,
which unfortunately increases the risk that an eavesdropper succeeds in
intercepting the source message through the wiretap link, since the outage
probability of the wiretap link also decreases when a higher transmit power (or
lower date rate) is used. We characterize the security-reliability tradeoffs
(SRT) of conventional direct transmission from source to destination in the
presence of an eavesdropper, where the security and reliability are quantified
in terms of the intercept probability by an eavesdropper and the outage
probability experienced at the destination, respectively. In order to improve
the SRT, we then propose opportunistic relay selection (ORS) and quantify the
attainable SRT improvement upon increasing the number of relays. It is shown
that given the maximum tolerable intercept probability, the outage probability
of our ORS scheme approaches zero for , where is the number
of relays. Conversely, given the maximum tolerable outage probability, the
intercept probability of our ORS scheme tends to zero for .Comment: 9 pages. IEEE Transactions on Vehicular Technology, 201
Performance enhancement solutions in wireless communication networks
In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations.
First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput.
Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol).
Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo.
Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost.
Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol).
Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově
- …