114 research outputs found

    Optimal signalling strategies and power allocation for secret key generation schemes in the presence of a jammer

    Get PDF
    Secret key generation (SKG) schemes have been shown to be vulnerable to denial of service (DoS) attacks in the form of jamming. In this paper, a comprehensive study on the impact of correlated and uncorrelated jamming in wireless SKG systems is presented. First, optimal signalling schemes for the legitimate users and jamming approaches for an active adversary launching a DoS attack on the SKG system are derived. It is shown that the legitimate users should employ constant signalling. On the other hand, the jammer should inject either correlated jamming when imperfect channel state information (CSI) regarding the main channel is at their disposal, or, uncorrelated jamming when the main channel CSI is completely unknown. In both cases, optimal power allocation policies are studied under short-term power constrains for M block fading additive white Gaussian noise (BF-AWGN) channels. Numerical evaluations demonstrate that equidistribution of the jamming power is near-optimal in the case of uncorrelated jamming

    On the effects of memoryless nonlinearities on M-QAM and DQPSK OFDM signals

    No full text
    Published versio

    Energy Harvesting in Secret Key Generation Systems under Jamming Attacks

    Get PDF
    Secret key generation (SKG) from shared randomness at two remote locations has been shown to be vulnerable to denial of service attacks in the form of jamming. Typically, such attacks are alleviated with frequency hopping/spreading techniques that rely on expansion of the system bandwidth. In the present study, energy harvesting (EH) is exploited as a novel counter-jamming approach that alleviates the need for extra bandwidth resources. Assuming the legitimate users have EH capabilities, the idea is that part of the jamming signal can potentially be harvested and converted into useful communication power. In this framework, the competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game. A critical transmission power for the legitimate users is identified which allows to completely characterize the unique NE of the game in closed form. Remarkably, this threshold also provides the option to effectively neutralize the jammer, i.e., prevent the jammer from carrying out the attack altogether. Through numerical evaluations, EH is shown to be a counter-jamming approach that can offer substantial gains in terms of relative SKG rates

    Secret Key Generation in Rayleigh Block Fading AWGN Channels under Jamming Attacks

    Get PDF
    Jamming attacks have been shown to disrupt secret key generation (SKG) in systems that exploit the reciprocity of the wireless medium to generate symmetric keys at two remote locations through public discussion. In this study, the use of frequency hopping/spreading in Rayleigh block fading additive white Gaussian noise (BF-AWGN) channels is investigated as a means to counteract such attacks. The competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game and the corresponding Nash equilibria (NE) are characterized analytically and in closed form. It is found that the jammer's optimal strategy is to spread its power across the entire spectrum. On the contrary, the pair of legitimate users should use frequency spreading only in favorable transmission conditions, and frequency hopping otherwise (e.g., low signal to jamming power ratio). Numerical results show that frequency hopping/spreading in BF-AWGN channels is an effective technique for combating jamming attacks in SKG systems; a modest increase of the system bandwidth can substantially increase the SKG rates

    Energy Harvesting in Secret Key Generation Systems under Jamming Attacks

    Get PDF
    Secret key generation (SKG) from shared randomness at two remote locations has been shown to be vulnerable to denial of service attacks in the form of jamming. Typically, such attacks are alleviated with frequency hopping/spreading techniques that rely on expansion of the system bandwidth. In the present study, energy harvesting (EH) is exploited as a novel counter-jamming approach that alleviates the need for extra bandwidth resources. Assuming the legitimate users have EH capabilities, the idea is that part of the jamming signal can potentially be harvested and converted into useful communication power. In this framework, the competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game. A critical transmission power for the legitimate users is identified which allows to completely characterize the unique NE of the game in closed form. Remarkably, this threshold also provides the option to effectively neutralize the jammer, i.e., prevent the jammer from carrying out the attack altogether. Through numerical evaluations, EH is shown to be a counter-jamming approach that can offer substantial gains in terms of relative SKG rates

    A spectral model for RF oscillators with power-law phase noise

    No full text
    Published versio

    Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference

    Get PDF
    Physical-layer network coding (PNC) has been proposed for next generation networks. In this paper, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite and uniform signal input distributions, we establish upper bounds (UBs) on the achievable perfect secrecy rates and make these explicit when pulse amplitude modulation modems are used. We then describe two simple, explicit encoders that can achieve perfect secrecy rates close to these UBs with respect to an untrustworthy relay in the single antenna and single relay setting. Last, we generalize our system to a multiple-input multiple-output relay channel, where the relay has more antennas than the users and study optimal precoding matrices, which maintain a required secrecy constraint. Our results establish that the design of PNC transmission schemes with enhanced throughput and guaranteed data confidentiality is feasible in next generation systems

    An overview of optimal and sub-optimal detection techniques for a non orthogonal spectrally efficient FDM

    Get PDF
    Spectrally Efficient non orthogonal Frequency Division Multiplexing (SEFDM) Systems occupy less bandwidth than equivalent orthogonal FDM (OFDM). However, enhanced spectral efficiency comes at the expense of an increased complexity in the signal detection. In this work, we present an overview of different detection techniques that trade the error performance optimality for the signal recovery computational effort. Linear detection methods like Zero Forcing (ZF) and Minimum Mean Squared Error (MMSE) offer fixed complexity but suffer from a significant degradation of the Bit Error Rate (BER). On the other hand optimal receivers like Sphere Decoders (SD) achieve the optimal solution in terms of error performance. Notwithstanding, their applicability is severely constrained by the SEFDM signal dimension, the frequency separation between the carriers as well as the noise level in the system

    Non-parametric Estimation of Geometric Anisotropy from Environmental Sensor Network Measurements

    Get PDF
    This paper addresses the estimation of geometric anisotropy parameters from scattered data in two dimensional spaces. The parameters involve the orientation angle of the principal anisotropy axes and the anisotropy ratio (i.e., the ratio of the principal correlation lengths). The mathematical background is based on the covariance Hessian identity (CHI) method developed in [3, 1]. CHI links the expectation of the first-order sample derivatives tensor with the Hessian matrix of the covariance function [6]. The paper focuses on the application of CHI to samples that require segmentation into clusters, either due to sampling density variations or due to systematic changes in the process values. A non-parametric isotropy test is also presented. Finally, a composite (real and synthetic) data set is used to investigate the impact of CHI anisotropy estimation on spatial interpolation with ordinary kriging

    On the tradeoffs between network state knowledge and secrecy

    Get PDF
    In this paper, the impact of network-state knowledge on the feasibility of secrecy is studied in the context of non-colluding active eavesdropping. The main contribution is the investigation of several scenarios in which increasing the available knowledge at each of the network components leads to some paradoxical observations in terms of the average secrecy capacity and average information leakage. These observations are in the context of a broadcast channel similar to the time-division downlink of a single-cell cellular system. Here, providing more knowledge to the eavesdroppers makes them more conservative in their attacks, and thus, less harmful in terms of average information leakage. Similarly, providing more knowledge to the transmitter makes it more careful and less willing to transmit, which reduces the expected secrecy capacity. These findings are illustrated with a numerical analysis that shows the impact of most of the network parameters in the feasibility of secrecy. © 2013 NICT
    • …
    corecore