14 research outputs found
Cost-Effective Signal Processing Algorithms for Physical-Layer Security in Wireless Networks
Data privacy in traditional wireless communications is accomplished by cryptography techniques at the upper layers of the protocol stack. This thesis aims at contributing to the critical security issue residing in the physical-layer of wireless networks, namely, secrecy rate in various transmission environments. Physical-layer security opens the gate to the exploitation of channel characteristics to achieve data secure transmission.
Precoding techniques, as a critical aspect in pre-processing signals prior to transmission has become an effective approach and recently drawn significant attention in the literature. In our research, novel non-linear precoders are designed focusing on the improvement of the physical-layer secrecy rate with consideration of computational complexity as well as the Bit Error Ratio (BER) performance. In the process of designing the precoder, strategies such as Lattice Reduction (LR) and Artificial Noise (AN) are employed to achieve certain design requirements.
The deployment and allocation of resources such as relays to assist the transmission also have gained significant interest. In multiple-antenna relay networks, we examine various relay selection criteria with arbitrary knowledge of the channels to the users and the eavesdroppers. Furthermore, we provide novel effective relay selection criteria that can achieve a high secrecy rate performance. More importantly they do not require knowledge of the channels of the eavesdroppers and the interference.
Combining the jamming technique with resource allocation of relay networks, we investigate an opportunistic relaying and jamming scheme for Multiple-Input Multiple-Output (MIMO) buffer-aided downlink relay networks. More specifically, a novel Relaying and Jamming Function Selection (RJFS) algorithm as well as a buffer-aided RJFS algorithm are developed along with their ability to achieve a higher secrecy rate. Relying on the proposed relay network, we detail the characteristics of the system, under various relay selection criteria, develop exhaustive search and greedy search-based algorithms, with or without inter-relay Interference Cancellation (IC)
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
An Overview of Physical Layer Security with Finite Alphabet Signaling
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research
Practical Interference Exploitation Precoding without Symbol-by-Symbol Optimization: A Block-Level Approach
In this paper, we propose a constructive interference (CI)-based block-level
precoding (CI-BLP) approach for the downlink of a multi-user multiple-input
single-output (MU-MISO) communication system. Contrary to existing CI precoding
approaches which have to be designed on a symbol-by-symbol level, here a
constant precoding matrix is applied to a block of symbol slots within a
channel coherence interval, thus significantly reducing the computational costs
over traditional CI-based symbol-level precoding (CI-SLP) as the CI-BLP
optimization problem only needs to be solved once per block. For both PSK and
QAM modulation, we formulate an optimization problem to maximize the minimum CI
effect over the block subject to a block- rather than symbol-level power
budget. We mathematically derive the optimal precoding matrix for CI-BLP as a
function of the Lagrange multipliers in closed form. By formulating the dual
problem, the original CI-BLP optimization problem is further shown to be
equivalent to a quadratic programming (QP) optimization. Numerical results
validate our derivations, and show that the proposed CI-BLP scheme achieves
improved performance over the traditional CI-SLP method, thanks to the relaxed
power constraint over the considered block of symbol slots
Interference management for Interference Channels: Performance improvement and lattice techniques
This thesis focuses on interference management methods for interference channels, in particular on interference alignment. The aim is to contribute to the understanding of issues such as the performance of the interference alignment scheme and lattice codes for interference channels. Interference alignment is studied from two perspectives. One is the signal space perspective where precoding methods are designed to align the interference in half of the received subspace. Cadambe and Jafar found precoding matrices to achieve the theoretical degrees of freedom. However, using an interference suppression technique over the Cadambe and Jafar scheme, yields poor performance. Thus, in this thesis precoding methods such as singular value decomposition and Tomlinson-Harashima precoding are proposed to improve performance. The second perspective is on the signal scale, where structured codes are used to align interference. For this, lattice codes are suitable. In this research, the problem was initially approached with a many-to-one interference channel. Using lattices, joint maximum-likelihood decoding of the desired signal and the sum of the interference signals is used, and the union bound of the error probability for user 1 is derived, in terms of the theta series. Later, a symmetric interference channel is studied. Jafar built a scheme for every level of interference, where interference was aligned and could be cancelled. In this thesis, Barnes-Wall lattices are used since they have a similar structure to the scheme proposed by Jafar, and it is shown to be possible to improve the performance of the technique using codes constructed with Barnes-Wall lattices. Finally, previous work has found the generalized degrees of freedom for a two-user symmetric interference channel using random codes. Here, we obtain the generalized degrees of freedom for that channel setting using lattice Gaussian distribution.Open Acces