339 research outputs found
Secure Full-Duplex Two-Way Relaying for SWIPT
This letter studies bi-directional secure information exchange in a
simultaneous wireless information and power transfer (SWIPT) system enabled by
a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward
(AF) relay. The AF relay injects artificial noise (AN) in order to confuse the
eavesdropper. Specifically, we assume a zeroforcing (ZF) solution constraint to
eliminate the residual self-interference (RSI). As a consequence, we address
the optimal joint design of the ZF matrix and the AN covariance matrix at the
relay node as well as the transmit power at the sources. We propose an
alternating algorithm utilizing semi-definite programming (SDP) technique and
one-dimensional searching to achieve the optimal solution. Simulation results
are provided to demonstrate the effectiveness of the proposed algorithm.Comment: Submitted to IEEE Wireless Communications Letter
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Power Efficient and Secure Full-Duplex Wireless Communication Systems
In this paper, we study resource allocation for a full-duplex (FD) radio base
station serving multiple half-duplex (HD) downlink and uplink users
simultaneously. The considered resource allocation algorithm design is
formulated as a non-convex optimization problem taking into account minimum
required receive signal-to-interference-plus-noise ratios (SINRs) for downlink
and uplink communication and maximum tolerable SINRs at potential
eavesdroppers. The proposed optimization framework enables secure downlink and
uplink communication via artificial noise generation in the downlink for
interfering the potential eavesdroppers. We minimize the weighted sum of the
total downlink and uplink transmit power by jointly optimizing the downlink
beamformer, the artificial noise covariance matrix, and the uplink transmit
power. We adopt a semidefinite programming (SDP) relaxation approach to obtain
a tractable solution for the considered problem. The tightness of the SDP
relaxation is revealed by examining a sufficient condition for the global
optimality of the solution. Simulation results demonstrate the excellent
performance achieved by the proposed scheme and the significant transmit power
savings enabled optimization of the artificial noise covariance matrix.Comment: 6 pages, invited paper, IEEE Conference on Communications and Network
Security (CNS) 2015 in Florence, Italy, on September 30, 201
On Secrecy Performance for Energy-Harvesting Multi-Antenna Relaying Networks with a Dual-Use Source
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence of a dual-use source node and an eavesdropper. Specifically, the source has dual roles in the dual-hop communication: 1) to transmit confidential information in the first hop; 2) to generate jamming signal to interfere the eavesdropper in the second hop. Moreover, the multi-antenna relay deploys a power-splitting harvesting scheme to coordinate the information receiving and energy harvesting, and adopts maximal ratio combining technique to process the multiple copies of signals. Considering decode-and-forward protocol and transmit antenna selection scheme, we derive an analytical expression for secrecy outage probability, and perform Monte Carlo simulation to validate the analysis. Analytical results show that the SOP performance with the dual-use source node can be effectively improved when the relay-destination channel does not have absolute advantage over the relay-eavesdropper channel
- …