Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








158 Hits in 4.2 sec

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The evolution towards 5G wireless communications poses new challenges for physical layer security research.  ...  The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  probability wide secrecy throughput maximization.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  keys over public channels.  ...  In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel. B.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels

Nan Yang, Shihao Yan, Jinhong Yuan, Robert Malaney, Ramanan Subramanian, Ingmar Land
2015 IEEE Transactions on Communications  
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input single-output wiretap channels with multiple antennas at the transmitter and a single antenna at the receiver and  ...  We show that the maximum effective secrecy throughput requires more power to be allocated to the AN signal when the quality of the transmitterreceiver channel or the transmitter-eavesdropper channel improves  ...  CONCLUSIONS We proposed two transmission schemes using AN that maximize the EST in MISO wiretap channels with a passive eavesdropper.  ... 
doi:10.1109/tcomm.2015.2419634 fatcat:ucjwlm6bkbe5jg3bslgoo33igq

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  keys over public channels.  ...  In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel. B.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems.  ...  , secrecy outrage probability minimization, power consumption minimization, and secure energy efficiency maximization.  ...  single-output (MISO) channels.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  The evolution towards 5G wireless communications poses new challenges for physical layer security research.  ...  In addition, the deployment of the full duplex receivers is optimized for the network-wide secrecy throughput maximization. T.  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini
2016 IEEE Access  
In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is  ...  better than the main channel.  ...  The performance analyses of a multi-cell MISO downlink system, where a multi-antenna base station transmits confidential messages to its legitimate users with a passive eavesdropper present in each cell  ... 
doi:10.1109/access.2016.2612585 fatcat:lhpjsjnkl5gg7oqjticfmww3x4

Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming

Minyan Pei, A. Lee Swindlehurst, Dongtang Ma, Jibo Wei
2014 IEEE Transactions on Signal Processing  
This paper studies a multi-antenna wiretap channel with a passive eavesdropper and an external helper, where only quantized channel information regarding the legitimate receiver is available at the transmitter  ...  Assuming zero-forcing transmission at the helper and random vector quantization of the channels, an analytic expression for the achievable ergodic secrecy rate due to the resulting quantization errors  ...  System Model We consider a MISO wiretap channel that includes a transmitter (Alice), a legitimate receiver (Bob), a friendly jammer (Helper) and an eavesdropper (Eve).  ... 
doi:10.1109/tsp.2013.2295059 fatcat:h5sefvaxgnaxxdgi45z2mb5cry

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security.  ...  The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  Particularly, it was developed the optimal power allocation between AN and the signal of interest that maximizes the secrecy throughput for AN beamforming.  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

Secrecy Enhancement of Multiuser MISO Networks Using OSTBC and Artificial Noise

Maoqiang Yang, Bangning Zhang, Yuzhen Huang, Nan Yang, Daniel Benevides da Costa, Daoxing Guo
2017 IEEE Transactions on Vehicular Technology  
To evaluate the secrecy performance of the proposed OSTBC-SC-AN and OSTBC-SWC-AN schemes, we derive new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput  ...  Moreover, two opportunistic scheduling schemes, namely, selection combining (SC) and scan-and-wait combining (SWC), are leveraged to select one legitimate user for data transmission.  ...  We derived new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput to evaluate the secrecy performance achieved by the proposed OSTBC-SC-AN and OSTBC-SWC-AN  ... 
doi:10.1109/tvt.2017.2725643 fatcat:l72yx25uazfbdggn6glwo3pg4i

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey [article]

Biao He, Xiangyun Zhou, Thushara D. Abhayapala
2013 arXiv   pre-print
Finally, the open problems for the on-going and future research are discussed.  ...  We first present an overview of the main information-theoretic measures of the secrecy performance with imperfect CSI.  ...  The s.d.o.f region for single-user Gaussian multi-input, multi-output (MIMO) wiretap channel was investigated in [20] .  ... 
arXiv:1307.4146v2 fatcat:nvho2lziqjep5my2zlibtk6hpm

Secrecy Outage of SWIPT in the Presence of Cooperating Eavesdroppers [article]

Furqan Jameel, Shurjeel Wyne
2019 arXiv   pre-print
We derive a closed-form expression for the secrecy outage probability of the considered Multiple-Input-Multiple-Output Multiple-Eavesdroppers system.  ...  This work investigates the secrecy performance for a simultaneous wireless information and power transfer system that operates in the presence of cooperating eavesdroppers.  ...  The AP is assumed to have CSI for main channel to S as well as CSI of wiretap channels from AP to the eavesdroppers [9, 10] .  ... 
arXiv:1903.03522v1 fatcat:c6cukwpi3ffkpmrrq2u4pm6e24

Secrecy outage of SWIPT in the presence of cooperating eavesdroppers

Furqan Jameel, Shurjeel Wyne
2017 Zenodo  
We derive a closed-form expression for the secrecy outage probability of the considered Multiple-Input-Multiple-Output Multiple-Eavesdroppers system.  ...  The multi-antenna access point's transmission is used for information-decoding by a multi-antenna node and for energy-harvesting (EH) by multiple single-antenna nodes.  ...  The AP is assumed to have CSI for main channel to S as well as CSI of wiretap channels from AP to the eavesdroppers [9, 10] .  ... 
doi:10.5281/zenodo.2587177 fatcat:y5wkhhejmzh5fi2dyqx24zx2ja

Survey on Physical Layer Security for 5G Wireless Networks [article]

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio
2020 arXiv   pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security.  ...  Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided.  ...  Fig. 1 1 The wiretap channel model consisting of two legitimate nodes and an eavesdropper. Fig. 2 2 The model of AN network for a wiretap channel consisting of two main nodes and an eavesdropper.  ... 
arXiv:2006.08044v1 fatcat:r5l25bicwjhanidz3qu7bbi4mi

RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey [article]

Majid H. Khoshafa, Omar Maraqa, Jules M. Moualeu, Sylvester Aboagye, Telex M. N. Ngatched, Mohamed H. Ahmed, Yasser Gadallah, Marco Di Renzo
2024 arXiv   pre-print
Physical layer security (PLS) has received a growing interest from the research community for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption.  ...  potential enabling technologies, RIS has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic wireless channel  ...  account for the reliability and secrecy constraints inherent in wiretap channels.  ... 
arXiv:2403.10412v1 fatcat:yjnv3tiarnh4lpwxyam2qtpvqe
« Previous Showing results 1 — 15 out of 158 results