301 research outputs found
Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Simultaneous Wireless Information and Power Transfer in 5G communication
Green communication technology is expected to be widely adopted in future generation
networks to improve energy efficiency and reliability of wireless communication network.
Among the green communication technologies,simultaneous wireless information and
power transfer (SWIPT) is adopted for its flexible energy harvesting technology through
the radio frequency (RF) signa lthati sused for information transmission. Even though
existing SWIPT techniques are flexible and adoptable for the wireless communication
networks, the power and time resources of the signal need to be shared between infor-
mation transmission and RF energy harvesting, and this compromises the quality of the
signal. Therefore,SWIP Ttechniques need to be designed to allow an efficient resource
allocation for communication and energy harvesting.
The goal oft his thesisis to design SWIP Ttechniques that allow efficient,reliable and
secure joint communications and power transference. A problem associated to SWIPT
techniques combined with multi carrier signals is that the increased power requirements
inherent to energy harvesting purposes can exacerbate nonlinear distortion effects at the
transmitter. Therefore, we evaluate nonlinear distortion and present feasible solutions to
mitigate the impact of nonlinear distortion effects on the performance.Another goal of
the thesisis to take advantage of the energy harvesting signals in SWIP Ttechniques for
channel estimation and security purposes.Theperformance of these SWIPT techniques is
evaluated analytically, and those results are validated by simulations. It is shownthatthe
proposed SWIPT schemes can have excellent performance, out performing conventional
SWIPT schemes.Espera-se que aschamadas tecnologiasde green communications sejam amplamente ado-
tadas em futuras redes de comunicação sem fios para melhorar a sua eficiência energética
a fiabilidade.Entre estas,encontram-se as tecnologias SWIPT (Simultaneous Wireless
Information and Power Transference), nas quais um sinal radio é usado para transferir
simultaneamente potência e informações.Embora as técnicas SWIPT existentes sejam fle-
xíveis e adequadas para as redes de comunicações sem fios, os recursos de energia e tempo
do sinal precisam ser compartilhados entre a transmissão de informações e de energia, o
que pode comprometer a qualidade do sinal. Deste modo,as técnicas SWIPT precisam ser
projetadas para permitir uma alocação eficiente de recursos para comunicação e recolha
de energia.
O objetivo desta tese é desenvolver técnicas SWIPT que permitam transferência de
energia e comunicações eficientes,fiáveis e seguras.Um problema associado às técnicas
SWIPT combinadas com sinais multi-portadora são as dificuldades de amplificação ine-
rentes à combinação de sinais de transmissão de energia com sinais de transferência de
dados, que podem exacerbar os efeitos de distorção não-linear nos sinais transmitidos.
Deste modo, um dos objectivos desta tese é avaliar o impacto da distorção não-linear em
sinais SWIPT, e apresentar soluções viáveis para mitigar os efeitos da distorção não-linear
no desempenho da transmissão de dados.Outro objetivo da tese é aproveitar as vantagens
dos sinais de transferência de energia em técnicas SWIPT para efeitos de estimação de
canal e segurança na comunicação.Os desempenhos dessas técnicas SWIPT são avaliados
analiticamente,sendo os respectivos resultados validados por simulações.É mostrado que
os esquemas SWIPT propostos podem ter excelente desempenho, superando esquemas
SWIPT convencionais
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
- …