257 research outputs found

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    A survey of symbiotic radio: Methodologies, applications, and future directions

    Get PDF
    The sixth generation (6G) wireless technology aims to achieve global connectivity with environmentally sustainable networks to improve the overall quality of life. The driving force behind these networks is the rapid evolution of the Internet of Things (IoT), which has led to a proliferation of wireless applications across various domains through the massive deployment of IoT devices. The major challenge is to support these devices with limited radio spectrum and energy-efficient communication. Symbiotic radio (SRad) technology is a promising solution that enables cooperative resource-sharing among radio systems through symbiotic relationships. By fostering mutualistic and competitive resource sharing, SRad technology enables the achievement of both common and individual objectives among the different systems. It is a cutting-edge approach that allows for the creation of new paradigms and efficient resource sharing and management. In this article, we present a detailed survey of SRad with the goal of offering valuable insights for future research and applications. To achieve this, we delve into the fundamental concepts of SRad technology, including radio symbiosis and its symbiotic relationships for coexistence and resource sharing among radio systems. We then review the state-of-the-art methodologies in-depth and introduce potential applications. Finally, we identify and discuss the open challenges and future research directions in this field

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    Cyclostationary Algorithm for Signal Analysis in Cognitive 4G Networks with Spectral Sensing and Resource Allocation

    Get PDF
    Cognitive Radio (CR) effectively involved in the management of spectrum to perform improved data transmission. CR system actively engaged in the data sensing, learning and dynamic adjustment of radio spectrum parameters with management of unused spectrum in the signal. The spectrum sensing is indispensable in the CR for the management of Primary Users (PUs) and Secondary users (SUs) without any interference. Spectrum sensing is considered as the effective adaptive signal processing model to evaluate the computational complexity model for the signal transmission through Matched filtering, Waveform and Cyclostationary based Energy sensing model. Cyclostationary based model is effective for the energy based sensing model based on unique characteristics with estimation of available channel in the spectrum to extract the received signal in the PU signal. Cyclostationary based model uses the spectrum availability without any periodic property to extract the noise features. This paper developed a Adaptive Cross Score Cyclostationary (ACSCS) to evaluate the spectrum sensing in the CR network. The developed ACSCS model uses the computational complexity with estimation of Signal-to-Interference-and-Noise Ratio (SINR) elimination of cost function. ACSCS model uses the Adaptive Least square Spectral Self-Coherence Restoral (SCORE) with the Adaptive Cross Score (ACS) to overcome the issues in CR. With the derived ACSCS algorithm minimizes the computational complexity based on cost function compared with the ACS algorithm. To minimize the computational complexity pipeline triangular array based Gram-Schmidt Orthogonalization (GSO) structure for the optimization of network. The simulation performance analysis with the ACSCS scheme uses the Rician Multipath Fading channel to estimate detection probability to sense the Receiver Operating Characteristics, detection probability and probability of false alarm using Maximum Likelihood (ML) detector. The ACSC model uses the Square-law combining (SLC) with the moment generation function in the multipath fading channel for the channel sensing with reduced computational complexity. The simulation analysis expressed that ACSC scheme achieves the maximal detection probability value of 1. The analysis expressed that proposed ACSC scheme achieves the improved channel estimation in the 4G communication environment
    • …
    corecore