16 research outputs found

    On the secrecy performance and power allocation in relaying networks with untrusted relay in the partial secrecy regime

    No full text
    Abstract Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional equivocation, which is related to the decoding error probability at the eavesdropper, so as to provide a comprehensive insight on the practical implementation of wireless systems with different levels of secrecy requirements. Considering the partial secrecy regime, in this paper we examine the secrecy performance of an amplify-and-forward relaying network with an untrusted relay node, where a destination-based jamming is employed to enable secure transmissions. In this regard, a closed-form approximation is derived for the generalized secrecy outage probability, and integral-form expressions are obtained for the average fractional equivocation and the average information leakage rate. Additionally, equal and optimal power allocation schemes are investigated and compared for the three metrics. From this analysis, we show that different power allocation approaches lead to different system design criteria. The obtained expressions are validated via Monte Carlo simulations

    Wireless-powered full-duplex UAV relay networks over FTR channels

    No full text
    Abstract A thorough understanding of fundamental limits of wireless-powered unmanned aerial vehicle (UAV) relay networks in millimeter waves is still missing. We narrow this gap by investigating the outage performance of a UAV-assisted wireless network over fluctuating two-ray (FTR) channels. The FTR fading model is particularly appealing since well characterizes the wireless propagation in a wide range of frequencies, including those in millimeter waves. The proposed setup consists of a source-destination pair communicating with the assistance of a UAV, which is a wireless-powered relay station operating in full-duplex mode under the amplify-and-forward protocol. For the wireless energy harvesting at the UAV, wireless power transfer (WPT), simultaneous wireless information and power transfer (SWIPT), and self-recycling energy techniques are employed together. To characterize the system outage probability, we obtain an integral-form expression derived from an approximate analysis and a simple closed-form expression derived from an asymptotic analysis at the high signal-to-noise ratio (SNR) regime. Monte Carlo simulations are provided to validate the correctness of our theoretical results and provide insights on the network performance in terms of key system parameters. Interestingly, obtained results show that the FTR fading parameters corresponding to the first hop and second hop play no role on the system outage performance at high SNR. Instead, it is mainly governed by the effect of the residual self-interference at the UAV, leading to outage floors

    Positioning and power optimisation for UAV-assisted networks in the presence of eavesdroppers:a multi-armed bandit approach

    No full text
    Abstract Unmanned aerial vehicles (UAVs) are becoming increasingly attractive for the ambitious expectations for 5G and beyond networks due to their several benefits. Indeed, UAV-assisted communications introduce a new range of challenges and opportunities regarding the security of these networks. Thus, in this paper we explore the opportunities that UAVs can provide for physical layer security solutions. Particularly, we analyse the secrecy performance of a ground wireless communication network assisted by N friendly UAV jammers in the presence of an eavesdropper. To tackle the secrecy performance of this system, we introduce a new area-based metric, the weighted secrecy coverage (WSC), that measures the improvement on the secrecy performance of a system over a certain physical area given by the introduction of friendly jamming. Herein, the optimal 3D positioning of the UAVs and the power allocation is addressed in order to maximise the WSC. For that purpose, we provide a reinforcement learning-based solution by modelling the positioning problem as a multi-armed bandit problem over three positioning variables for the UAVs: angle, height and orbit radius. Our results show that the proposed algorithm improves the secrecy of the system over time in terms of the WSC, and it converges into a stable state close to the exhaustive search solution for discretised actions, where there is a trade-off between expediency of the positioning of the UAVs to positions of better secrecy outcome and energy consumption

    6G security challenges and potential solutions

    Get PDF
    Abstract Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless systems with the possible challenges and potential solutions. Especially, we discuss the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including distributed ledger technologies, physical layer security, distributed artificial intelligence (AI)/ machine learning (ML), Visible Light Communication (VLC), THz bands, and quantum communication

    Impact of wireless energy transfer strategies on the secrecy performance of untrustworthy relay networks

    No full text
    Abstract This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique is adopted in order to prevent the relay from decoding confidential messages from the source. Additionally, three time switching-based wireless energy transfer strategies are investigated for supplying power to the relay. For these three strategies, we derive simple closed-form asymptotic expressions for the secrecy outage probability at high signal-to-noise ratio. Moreover, we provide analytical expressions for the optimum power allocation factor for the information transmission phase. Finally, Monte Carlo simulations are carried out to verify the theoretical results through different illustrative cases

    Secrecy capacity maximization for a hybrid relay-RIS scheme in mmWave MIMO networks

    No full text
    Abstract The hybrid relay-reflecting intelligent surface (HRRIS) has been recently introduced as an efficient solution to overcome the double path loss and limited beamforming diversity of the conventional fully passive reflecting surface. This motivates us to investigate the application of the HR-RIS in improving the secrecy capacity of millimeter wave multiple-input-multiple-output (MIMO) systems with the presence of multi-antenna eavesdropper. The joint optimization of the transmit beamformer and the relay-reflecting coefficients at RIS is tackled via alternating optimization. In the proposed solution, a closed-form expression for the optimal transmit beamformer at the transmitter is derived, and a metaheuristic solution based on particle swarm optimization is proposed to optimize the active and passive elements at the HR-RIS. The simulation results verify that under various scenarios, the HR-RIS provides significant improvement in the secrecy capacity with respect to the conventional passive reflecting surface

    Safeguarding MTC at the physical layer:potentials and challenges

    No full text
    Abstract 5G networks must provide a highly resilient, secure, and privacy-protected platform to support the emergence of new business and technologies expected from the so-called vertical-industry paradigm. However, as the definition and implementation of 5G networks are in progress, many security challenges arise. Thus, special emphasis will be given in the coming years to provide security and privacy for 5G and beyond networks. In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios. In light of this, herein we provide an overview on some promising physical-layer techniques, focusing on the requirements and design challenges for machine-type communication scenarios. Key issues are discussed along with potential solutions

    Blockchain and game theory convergence for network slice brokering

    No full text
    Abstract As a distributed ledger technology, blockchain has received significant attention in revolutionizing telecommunication and networking domains. This article proposes a blockchain-based network slice brokering mechanism for multioperator and multitenant environments of the envisioned 6G networks

    Survey on physical layer security for 5G wireless networks

    No full text
    Abstract Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the propagation medium’s features and impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security. Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve secrecy performance is provided. Finally, our work surveys physical layer security research over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter-wave communications, heterogeneous networks, non-orthogonal multiple access, and full-duplex. We also include the key concepts of each of the technologies mentioned above. Also identified are future fields of research and technical challenges of physical layer security

    Towards 6G-enabled internet of vehicles:security and privacy

    No full text
    Abstract The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number of innovative applications. Particularly, 6G will be a prominent supporter for the evolution towards a truly Intelligent Transportation System and the realization of the Smart City concept by fulfilling the limitations of 5G, once vehicular networks are becoming highly dynamic and complex with stringent requirements on ultra-low latency, high reliability, and massive connections. More importantly, providing security and privacy to such critical systems should be a top priority as vulnerabilities can be catastrophic, thus there are huge concerns regarding data collected from sensors, people and their habits. In this paper, we provide a timely deliberation of the role that promissory 6G enabling technologies such as artificial intelligence, network softwarisation, network slicing, blockchain, edge computing, intelligent reflecting surfaces, backscatter communications, terahertz links, visible light communications, physical layer authentication, and cell-free massive multiple-input multiple-output (MIMO) will play on providing the expected level of security and privacy for the Internet of Vehicles
    corecore