Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








389 Hits in 3.8 sec

MIMO Secret Communications Against an Active Eavesdropper [article]

Lingxiang Li and Athina P. Petropulu and Zhi Chen
2016 arXiv   pre-print
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret in the presence of an active Eve, who is capable of jamming as well as eavesdropping in Full-Duplex (FD) mode.  ...  active attacks and offering countermeasures to guarantee reliable secret communications [17] - [23] .  ...  the total network throughput by choosing to be a jammer, or an eavesdropper, or combination of the above, so that it creates the most unfavorable conditions for secret communications.  ... 
arXiv:1612.01564v1 fatcat:atngksovtff5bl4hha4q3egfae

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  In addition, our work survey research about physical layer security over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter wave communications, heterogeneous  ...  In [59] , the authors proposed a reliable communication that does not require statistical information about the links for a TDD massive MIMO with an active eavesdropper.  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

Survey on Physical Layer Security for 5G Wireless Networks [article]

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio
2020 arXiv   pre-print
The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer.  ...  Finally, our work surveys physical layer security research over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter-wave communications, heterogeneous networks,  ...  In [84] , the authors proposed a reliable communication that does not need statistical information about the links for a TDD massive MIMO with an active eavesdropper.  ... 
arXiv:2006.08044v1 fatcat:r5l25bicwjhanidz3qu7bbi4mi

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The evolution towards 5G wireless communications poses new challenges for physical layer security research.  ...  provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications  ...  Similar as the massive MIMO case, for TDD communication systems, if an active eavesdropper jeopardizes the channel estimation phase for the desired user, this may result in a significant secure threat.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

Spatial Signature Modulation: A Novel Secure Modulation Approach for MIMO Wiretap Channel

Amr Abdelaziz, Ashraf Elbayoumy
2017 Journal of Engineering Science and Military Technologies  
The problem of exchanging confidential messages between nodes, A and B, in the presence of an active adversary, E, over an insecure MIMO channel is considered.  ...  After establishing a secret common information, we show that the continuous use of AoA as a mean for message source authenticity provides a considerable advantage against active adversary during the message  ...  Definition 1: SKA protocol consists of C messages is said to be secure against an active eavesdropper whenever it satisfies: together with that the probability of declaring an active adversary, E, as unauthentic  ... 
doi:10.21608/ejmtc.2017.1438.1055 fatcat:3ubfrjodcbhttnxxeoaetdtaam

Securing RFIDs by Randomizing the Modulation and Channel

Haitham Hassanieh, Jue Wang, Dina Katabi, Tadayoshi Kohno
2015 Symposium on Networked Systems Design and Implementation  
Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys.  ...  It is the first system that defends RFIDs against MIMO eavesdroppers, even when the RFID reader has no MIMO capability.  ...  Finally, this paper focuses on passive attacks as opposed to active attacks, in which an adversary repeatedly queries an RFID card to infer the secret key or obtain confidential information.  ... 
dblp:conf/nsdi/HassaniehWKK15 fatcat:3lubw44yxnh5plw6lrnbmslhfa

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
We review the state of art of three important physical layer security codes, including low-density parity-check (LDPC) codes, polar codes, and lattice codes. 2) Massive MIMO: Deploying large antenna arrays  ...  physical layer deserves to receive more attention from the research community.  ...  Similar as the massive MIMO case, for TDD communication systems, if an active eavesdropper jeopardizes the channel estimation phase for the desired user, this may result in a significant secure threat.  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Physical-Layer Security in 6G Networks

L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, A. Stoica, G. Abreu, H. Haas
2021 IEEE Open Journal of the Communications Society  
These heterogeneous nodes constitute an ultra dense network managing tons of information, often very sensitive.  ...  However, the eavesdropper can pretend to be a legitimate user and launch an active attack by sending a pilot sequence of his own.  ...  The issue of active eavesdropper or multiple eavesdroppers in heterogeneous networks is addressed in [21] , [22] , [23] , [24] , while the issue of pilot spoofing in MIMO systems is considered in  ... 
doi:10.1109/ojcoms.2021.3103735 fatcat:kcntnplyqnc45bp5i5wceiwk4m

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  In [235] , [236] , the authors considered a MIMO wiretap channel with an active eavesdropper that can either listen or jam, and pose its interactions with the transmitter as a zero-sum game with the  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  In [235] , [236] , the authors considered a MIMO wiretap channel with an active eavesdropper that can either listen or jam, and pose its interactions with the transmitter as a zero-sum game with the  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
2016 Proceedings of the IEEE  
Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer.  ...  This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network  ...  communications against eavesdropping attacks.  ... 
doi:10.1109/jproc.2016.2558521 fatcat:yttlvv4vlne5hh5l4zs6qlh2ra

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
In light of this, herein we provide an overview on some promising physical-layer techniques, focusing on the requirements and design challenges for machine-type communication scenarios.  ...  In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios.  ...  In [28] , a secure communication for time-division duplex multi-cell multi-user massive MIMO systems was investigated when an active eavesdropping performs PCAs.  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

An Overview of Key Technologies in Physical Layer Security

Abraham Sanenga, Galefang Allycan Mapunda, Tshepiso Merapelo Ludo Jacob, Leatile Marata, Bokamoso Basutli, Joseph Monamati Chuma
2020 Entropy  
Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided.  ...  It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques.  ...  Therefore, it is highly important to improve wireless networks against cyber-criminal activities.  ... 
doi:10.3390/e22111261 pmid:33287029 fatcat:ngkceebvprbbbkrwamjzqtwaci

Secrecy Analysis of a MIMO Full-Duplex Active Eavesdropper with Channel Estimation Errors

Long Kong, Jiguang He, Georges Kaddoum, Satyanarayana Vuppala, Lin Wang
2016 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)  
In this paper, we investigate the secrecy performance of the multiple-input multiple-output (MIMO) wiretap channels in the presence of an active full-duplex eavesdropper with consideration of channel estimation  ...  Index Terms-Physical layer security, channel estimation error, the MIMO full-duplex active eavesdropper.  ...  of an active eavesdropper.  ... 
doi:10.1109/vtcfall.2016.7881216 dblp:conf/vtc/KongHKVW16 fatcat:2yf6525o7bf4jcwv6m6jbadqza

Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities

Guyue Li, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, Aiqun Hu
2019 Entropy  
Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices.  ...  This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications.  ...  IBFD communications can noticeably boost the secret key rate in an operationally interesting regime of parameters.  ... 
doi:10.3390/e21050497 pmid:33267211 fatcat:zpxpobcv4rbbnpfldljtn3dh2a
« Previous Showing results 1 — 15 out of 389 results