A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. ...
Masood et al. study a MIMOME wiretap channel with multiple full duplex receivers and multiple eavesdrop- pers under the global perfect CSI and the imperfect SIC assumptions [93] . ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
We review the state of art of three important physical layer security codes, including low-density parity-check (LDPC) codes, polar codes, and lattice codes. 2) Massive MIMO: Deploying large antenna arrays ...
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
TABLE VIII : VIII Physical Layer Security of NOMA Masood et al. study a MIMOME wiretap channel with multiple full duplex receivers and multiple eavesdroppers under the global perfect CSI and the imperfect ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
The MIMO wiretap channel was studied independently by Oggier and Hassibi [39] , who computed a similar upper bound on the MIMO secrecy capacity, and showed after a matrix optimization analysis that C ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
The MIMO wiretap channel was studied independently by Oggier and Hassibi [39] , who computed a similar upper bound on the MIMO secrecy capacity, and showed after a matrix optimization analysis that C ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Secure Space Shift Keying Transmission Using Dynamic Antenna Index Assignment
2017
GLOBECOM 2017 - 2017 IEEE Global Communications Conference
Index Terms -Physical layer security, MIMO wiretap channel, space shift keying. ...
We first derive an asymptotic secrecy rate under the perfect channel reciprocity assumption. ...
Asymptotic Ergodic Secrecy Rates with Perfect Reciprocity In this section, we perform an information-theoretic analysis of the proposed scheme under the perfect reciprocity assumption. ...
doi:10.1109/glocom.2017.8254185
dblp:conf/globecom/AghdamD17
fatcat:7o7gxpguwjdo7ebcxhriizm23q
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
[article]
2013
arXiv
pre-print
We first present an overview of the main information-theoretic measures of the secrecy performance with imperfect CSI. ...
To design physical layer security techniques under practical scenarios, the uncertainty and imperfections in the channel knowledge need to be taken into consideration. ...
The ergodic secrecy rate for systems with imperfect channel estimations at both the legitimate receiver and the eavesdropper was derived. ...
arXiv:1307.4146v2
fatcat:nvho2lziqjep5my2zlibtk6hpm
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
2021
EURASIP Journal on Wireless Communications and Networking
Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc. ...
Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. ...
Acknowledgements The authors appreciate the University of Luxembourg for sponsoring the publication of this article.
Authors' contributions All authors read and approved the final manuscript. ...
doi:10.1186/s13638-021-02065-4
pmid:34899875
pmcid:PMC8642773
fatcat:uystwjodpfglrf6sltzqfwkqdu
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges. ...
The Imperfect CSI of Wiretap Channels In many situations, the perfect CSI of the main channel can be easily obtained by channel estimation and CSI feedback, whereas getting the perfect CSI of the wiretap ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Joint Precoding and Artificial Noise Design for MU-MIMO Wiretap Channels
[article]
2022
arXiv
pre-print
However, finding a jointly optimal precoding and AN structure is very challenging in downlink multi-user multiple-input multiple-output (MU-MIMO) wiretap channels with multiple eavesdroppers. ...
perfect or partial channel knowledge of eavesdroppers. ...
In addition, thanks to the block-diagonal structure of the matrices of the generalized eigenvalue problem, the algorithm complexity can achieve low complexity. • Considering the imperfect CSIT for wiretap ...
arXiv:2207.09823v1
fatcat:r7qtjs26cvfh5i5hfzkgbbesre
Safeguarding MTC at the Physical Layer: Potentials and Challenges
2020
IEEE Access
Key issues are discussed along with potential solutions. ...
However, as the definition and implementation of 5G networks are in progress, many security challenges arise. ...
, at the cost of an augmented number of collisions and increased receiver complexity at the base station. ...
doi:10.1109/access.2020.2996383
fatcat:espxiyuqnfgcvgw2yxy4p24vxy
A Game-Theoretic Precoding for Secure Communication in MIMO Interference Channels
2018
Mathematical Problems in Engineering
We investigate the problem of secure communication in multiple-input-multiple-output (MIMO) interference channels from the perspective of physical layer security (PLS). ...
Furthermore, the performance of the joint transceiver, including both the secrecy rate and the MSE, is evaluated by simulations. ...
However, the analysis was limited to the two-users MIMO interference channels. ...
doi:10.1155/2018/3680791
fatcat:dmyxoboorrgcvh7u7ivefvpeze
Securing MIMO Wiretap Channel with Learning-Based Friendly Jamming under Imperfect CSI
[article]
2023
arXiv
pre-print
We thus introduce a novel deep learning-based FJ framework that can effectively defeat eavesdropping attacks with imperfect CSI and even without CSI of legitimate channels. ...
perfect CSI of the legitimate channels. ...
domain and ˜ , converted to real Power constraints/norm Normalize average power Channel Generate imperfect complex channel ˜ Lambda Matrix multiplication with ˜ Hidden Simulate Tx-Rx channel, estimating ...
arXiv:2312.07011v1
fatcat:74j2alp63nf2jkknqs6miq64ze
A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security
2022
Sensors
The review begins with the fundamental concepts that are associated with PLS, including a discussion on conventional cryptographic techniques and wiretap channel models. ...
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s22093589
pmid:35591279
pmcid:PMC9100781
fatcat:shioc6hcjzeghhlamyhe6axwwe
Wireless physical layer security
2016
Proceedings of the National Academy of Sciences of the United States of America
Things, in which the end devices are of very low complexity. ...
Whereas Shannon's work focused on symmetric key encryption systems, perhaps a more relevant development in this area was Aaron Wyner's work on the wiretap channel, which introduced the idea that secrecy ...
This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1. ...
doi:10.1073/pnas.1618130114
pmid:28028211
pmcid:PMC5224364
fatcat:arb5vh24l5cjvpfgaeg3uedysy
Survey on Physical Layer Security for 5G Wireless Networks
[article]
2020
arXiv
pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security. ...
Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided. ...
[79] , performance analysis of wireless communications in a multi-user massive MIMO by using imperfect CSI [80] , and SOP analysis for massive MIMO scenarios [81] . ...
arXiv:2006.08044v1
fatcat:r5l25bicwjhanidz3qu7bbi4mi
« Previous
Showing results 1 — 15 out of 260 results