A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
MIMO Secret Communications Against an Active Eavesdropper
[article]
2016
arXiv
pre-print
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret in the presence of an active Eve, who is capable of jamming as well as eavesdropping in Full-Duplex (FD) mode. ...
active attacks and offering countermeasures to guarantee reliable secret communications [17] - [23] . ...
the total network throughput by choosing to be a jammer, or an eavesdropper, or combination of the above, so that it creates the most unfavorable conditions for secret communications. ...
arXiv:1612.01564v1
fatcat:atngksovtff5bl4hha4q3egfae
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey
2019
Zenodo
The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer. ...
In addition, our work survey research about physical layer security over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter wave communications, heterogeneous ...
In [59] , the authors proposed a reliable communication that does not require statistical information about the links for a TDD massive MIMO with an active eavesdropper. ...
doi:10.5281/zenodo.3532040
fatcat:lct4ai7lf5hzpmepwqwv6e72t4
Survey on Physical Layer Security for 5G Wireless Networks
[article]
2020
arXiv
pre-print
The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer. ...
Finally, our work surveys physical layer security research over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter-wave communications, heterogeneous networks, ...
In [84] , the authors proposed a reliable communication that does not need statistical information about the links for a TDD massive MIMO with an active eavesdropper. ...
arXiv:2006.08044v1
fatcat:r5l25bicwjhanidz3qu7bbi4mi
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
The evolution towards 5G wireless communications poses new challenges for physical layer security research. ...
provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications ...
Similar as the massive MIMO case, for TDD communication systems, if an active eavesdropper jeopardizes the channel estimation phase for the desired user, this may result in a significant secure threat. ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
Spatial Signature Modulation: A Novel Secure Modulation Approach for MIMO Wiretap Channel
2017
Journal of Engineering Science and Military Technologies
The problem of exchanging confidential messages between nodes, A and B, in the presence of an active adversary, E, over an insecure MIMO channel is considered. ...
After establishing a secret common information, we show that the continuous use of AoA as a mean for message source authenticity provides a considerable advantage against active adversary during the message ...
Definition 1: SKA protocol consists of C messages is said to be secure against an active eavesdropper whenever it satisfies: together with that the probability of declaring an active adversary, E, as unauthentic ...
doi:10.21608/ejmtc.2017.1438.1055
fatcat:3ubfrjodcbhttnxxeoaetdtaam
Securing RFIDs by Randomizing the Modulation and Channel
2015
Symposium on Networked Systems Design and Implementation
Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. ...
It is the first system that defends RFIDs against MIMO eavesdroppers, even when the RFID reader has no MIMO capability. ...
Finally, this paper focuses on passive attacks as opposed to active attacks, in which an adversary repeatedly queries an RFID card to infer the secret key or obtain confidential information. ...
dblp:conf/nsdi/HassaniehWKK15
fatcat:3lubw44yxnh5plw6lrnbmslhfa
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
We review the state of art of three important physical layer security codes, including low-density parity-check (LDPC) codes, polar codes, and lattice codes. 2) Massive MIMO: Deploying large antenna arrays ...
physical layer deserves to receive more attention from the research community. ...
Similar as the massive MIMO case, for TDD communication systems, if an active eavesdropper jeopardizes the channel estimation phase for the desired user, this may result in a significant secure threat. ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
Physical-Layer Security in 6G Networks
2021
IEEE Open Journal of the Communications Society
These heterogeneous nodes constitute an ultra dense network managing tons of information, often very sensitive. ...
However, the eavesdropper can pretend to be a legitimate user and launch an active attack by sending a pilot sequence of his own. ...
The issue of active eavesdropper or multiple eavesdroppers in heterogeneous networks is addressed in [21] , [22] , [23] , [24] , while the issue of pilot spoofing in MIMO systems is considered in ...
doi:10.1109/ojcoms.2021.3103735
fatcat:kcntnplyqnc45bp5i5wceiwk4m
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
In [235] , [236] , the authors considered a MIMO wiretap channel with an active eavesdropper that can either listen or jam, and pose its interactions with the transmitter as a zero-sum game with the ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
In [235] , [236] , the authors considered a MIMO wiretap channel with an active eavesdropper that can either listen or jam, and pose its interactions with the transmitter as a zero-sum game with the ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
2016
Proceedings of the IEEE
Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. ...
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network ...
communications against eavesdropping attacks. ...
doi:10.1109/jproc.2016.2558521
fatcat:yttlvv4vlne5hh5l4zs6qlh2ra
Safeguarding MTC at the Physical Layer: Potentials and Challenges
2020
IEEE Access
In light of this, herein we provide an overview on some promising physical-layer techniques, focusing on the requirements and design challenges for machine-type communication scenarios. ...
In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios. ...
In [28] , a secure communication for time-division duplex multi-cell multi-user massive MIMO systems was investigated when an active eavesdropping performs PCAs. ...
doi:10.1109/access.2020.2996383
fatcat:espxiyuqnfgcvgw2yxy4p24vxy
An Overview of Key Technologies in Physical Layer Security
2020
Entropy
Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. ...
It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. ...
Therefore, it is highly important to improve wireless networks against cyber-criminal activities. ...
doi:10.3390/e22111261
pmid:33287029
fatcat:ngkceebvprbbbkrwamjzqtwaci
Secrecy Analysis of a MIMO Full-Duplex Active Eavesdropper with Channel Estimation Errors
2016
2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)
In this paper, we investigate the secrecy performance of the multiple-input multiple-output (MIMO) wiretap channels in the presence of an active full-duplex eavesdropper with consideration of channel estimation ...
Index Terms-Physical layer security, channel estimation error, the MIMO full-duplex active eavesdropper. ...
of an active eavesdropper. ...
doi:10.1109/vtcfall.2016.7881216
dblp:conf/vtc/KongHKVW16
fatcat:2yf6525o7bf4jcwv6m6jbadqza
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities
2019
Entropy
Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. ...
This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. ...
IBFD communications can noticeably boost the secret key rate in an operationally interesting regime of parameters. ...
doi:10.3390/e21050497
pmid:33267211
fatcat:zpxpobcv4rbbnpfldljtn3dh2a
« Previous
Showing results 1 — 15 out of 389 results