Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








260 Hits in 5.6 sec

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.  ...  Masood et al. study a MIMOME wiretap channel with multiple full duplex receivers and multiple eavesdrop- pers under the global perfect CSI and the imperfect SIC assumptions [93] .  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
We review the state of art of three important physical layer security codes, including low-density parity-check (LDPC) codes, polar codes, and lattice codes. 2) Massive MIMO: Deploying large antenna arrays  ...  The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  TABLE VIII : VIII Physical Layer Security of NOMA Masood et al. study a MIMOME wiretap channel with multiple full duplex receivers and multiple eavesdroppers under the global perfect CSI and the imperfect  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The MIMO wiretap channel was studied independently by Oggier and Hassibi [39] , who computed a similar upper bound on the MIMO secrecy capacity, and showed after a matrix optimization analysis that C  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The MIMO wiretap channel was studied independently by Oggier and Hassibi [39] , who computed a similar upper bound on the MIMO secrecy capacity, and showed after a matrix optimization analysis that C  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Secure Space Shift Keying Transmission Using Dynamic Antenna Index Assignment

Sina Rezaei Aghdam, Tolga M. Duman
2017 GLOBECOM 2017 - 2017 IEEE Global Communications Conference  
Index Terms -Physical layer security, MIMO wiretap channel, space shift keying.  ...  We first derive an asymptotic secrecy rate under the perfect channel reciprocity assumption.  ...  Asymptotic Ergodic Secrecy Rates with Perfect Reciprocity In this section, we perform an information-theoretic analysis of the proposed scheme under the perfect reciprocity assumption.  ... 
doi:10.1109/glocom.2017.8254185 dblp:conf/globecom/AghdamD17 fatcat:7o7gxpguwjdo7ebcxhriizm23q

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey [article]

Biao He, Xiangyun Zhou, Thushara D. Abhayapala
2013 arXiv   pre-print
We first present an overview of the main information-theoretic measures of the secrecy performance with imperfect CSI.  ...  To design physical layer security techniques under practical scenarios, the uncertainty and imperfections in the channel knowledge need to be taken into consideration.  ...  The ergodic secrecy rate for systems with imperfect channel estimations at both the legitimate receiver and the eavesdropper was derived.  ... 
arXiv:1307.4146v2 fatcat:nvho2lziqjep5my2zlibtk6hpm

An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

Long Kong, Yun Ai, Lei Lei, Georges Kaddoum, Symeon Chatzinotas, Björn Ottersten
2021 EURASIP Journal on Wireless Communications and Networking  
Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc.  ...  Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels.  ...  Acknowledgements The authors appreciate the University of Luxembourg for sponsoring the publication of this article. Authors' contributions All authors read and approved the final manuscript.  ... 
doi:10.1186/s13638-021-02065-4 pmid:34899875 pmcid:PMC8642773 fatcat:uystwjodpfglrf6sltzqfwkqdu

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems.  ...  Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges.  ...  The Imperfect CSI of Wiretap Channels In many situations, the perfect CSI of the main channel can be easily obtained by channel estimation and CSI feedback, whereas getting the perfect CSI of the wiretap  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Joint Precoding and Artificial Noise Design for MU-MIMO Wiretap Channels [article]

Eunsung Choi, Mintaek Oh, Jinseok Choi, Jeonghun Park, Namyoon Lee, Naofal Al-Dhahir
2022 arXiv   pre-print
However, finding a jointly optimal precoding and AN structure is very challenging in downlink multi-user multiple-input multiple-output (MU-MIMO) wiretap channels with multiple eavesdroppers.  ...  perfect or partial channel knowledge of eavesdroppers.  ...  In addition, thanks to the block-diagonal structure of the matrices of the generalized eigenvalue problem, the algorithm complexity can achieve low complexity. • Considering the imperfect CSIT for wiretap  ... 
arXiv:2207.09823v1 fatcat:r7qtjs26cvfh5i5hfzkgbbesre

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
Key issues are discussed along with potential solutions.  ...  However, as the definition and implementation of 5G networks are in progress, many security challenges arise.  ...  , at the cost of an augmented number of collisions and increased receiver complexity at the base station.  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

A Game-Theoretic Precoding for Secure Communication in MIMO Interference Channels

Boyang Huang, Yanjun Fang, Zhengmin Kong
2018 Mathematical Problems in Engineering  
We investigate the problem of secure communication in multiple-input-multiple-output (MIMO) interference channels from the perspective of physical layer security (PLS).  ...  Furthermore, the performance of the joint transceiver, including both the secrecy rate and the MSE, is evaluated by simulations.  ...  However, the analysis was limited to the two-users MIMO interference channels.  ... 
doi:10.1155/2018/3680791 fatcat:dmyxoboorrgcvh7u7ivefvpeze

Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI [article]

Bui Minh Tuan, Diep N. Nguyen, Nguyen Linh Trung, Van-Dinh Nguyen, Nguyen Van Huynh, Dinh Thai Hoang, Marwan Krunz, Eryk Dutkiewicz
2023 arXiv   pre-print
We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdropping attacks with imperfect CSI and even without CSI of legitimate channels.  ...  perfect CSI of the legitimate channels.  ...  domain and ˜ , converted to real Power constraints/norm Normalize average power Channel Generate imperfect complex channel ˜ Lambda Matrix multiplication with ˜ Hidden Simulate Tx-Rx channel, estimating  ... 
arXiv:2312.07011v1 fatcat:74j2alp63nf2jkknqs6miq64ze

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

Mulugeta Kassaw Tefera, Zengwang Jin, Shengbing Zhang
2022 Sensors  
The review begins with the fundamental concepts that are associated with PLS, including a discussion on conventional cryptographic techniques and wiretap channel models.  ...  With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22093589 pmid:35591279 pmcid:PMC9100781 fatcat:shioc6hcjzeghhlamyhe6axwwe

Wireless physical layer security

H. Vincent Poor, Rafael F. Schaefer
2016 Proceedings of the National Academy of Sciences of the United States of America  
Things, in which the end devices are of very low complexity.  ...  Whereas Shannon's work focused on symmetric key encryption systems, perhaps a more relevant development in this area was Aaron Wyner's work on the wiretap channel, which introduced the idea that secrecy  ...  This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1.  ... 
doi:10.1073/pnas.1618130114 pmid:28028211 pmcid:PMC5224364 fatcat:arb5vh24l5cjvpfgaeg3uedysy

Survey on Physical Layer Security for 5G Wireless Networks [article]

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio
2020 arXiv   pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security.  ...  Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided.  ...  [79] , performance analysis of wireless communications in a multi-user massive MIMO by using imperfect CSI [80] , and SOP analysis for massive MIMO scenarios [81] .  ... 
arXiv:2006.08044v1 fatcat:r5l25bicwjhanidz3qu7bbi4mi
« Previous Showing results 1 — 15 out of 260 results