Results 1 - 10
of
10
Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization
- IEEE Trans. Signal Process
, 2012
"... Abstract—This paper studies robust transmission schemes for MISO wiretap channels with imperfect channel state information (CSI) for the eavesdropper link. Both the cases of direct transmis-sion and cooperative jamming with a helper are investigated. The error in the eavesdropper’s CSI is assumed to ..."
Abstract
-
Cited by 27 (5 self)
- Add to MetaCart
Abstract—This paper studies robust transmission schemes for MISO wiretap channels with imperfect channel state information (CSI) for the eavesdropper link. Both the cases of direct transmis-sion and cooperative jamming with a helper are investigated. The error in the eavesdropper’s CSI is assumed to be norm-bounded, and robust transmit covariance matrices are obtained based on worst-case secrecy rate maximization, under both individual and global power constraints. Numerical results show the advantage of the proposed robust design. In particular, under a global power constraint, although cooperative jamming is not necessary for optimal transmission with perfect eavesdropper’s CSI, we show that robust jamming support can increase the secrecy rate in the presence of channel mismatch. I.
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
"... This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, with-out rely ..."
Abstract
-
Cited by 18 (1 self)
- Add to MetaCart
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, with-out relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.
Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks
"... Abstract—In this paper, we investigate the roles of cooperative ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we investigate the roles of cooperative
Secure Communication in Multiple Relay Networks Through Decode-and-Forward Strategies
"... Abstract: In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decodeand-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategi ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
(Show Context)
Abstract: In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decodeand-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategies that implement different versions of this scheme suited for cooperation with multiple relays. Our goal is to give an efficient cooperation paradigm based on the DF scheme to provide and improve secrecy in a multiple relay network. We first study the DF strategy for secrecy in a single relay network. We propose a suboptimal DF with zero forcing (DF/ZF) strategy for which we obtain the optimal power control policy. Next, we consider the multiple relay problem. We propose three different strategies based on DF/ZF and obtain their achievable secrecy rates. The first strategy is a single hop strategy whereas the other two strategies are multiple hop strategies. In the first strategy, we show that it is possible to eliminate all the relays’ signals from the eavesdropper’s observation (full ZF), however, the achievable secrecy rate is limited by the worst sourcerelay channel. Our second strategy overcomes the drawback of the first strategy, however, with the disadvantage of enabling partial ZF only. Our third strategy provides a reasonable compromise between the first two strategies. That is, in this strategy, full ZF is possible and the rate achieved does not suffer from the drawback of the first strategy. We conclude our study by a set of numerical results to illustrate the performance of each of the proposed strategies in terms of the achievable rates in different practical scenarios. Index Terms: Decode-and-forward (DF) scheme, information theoretic security, multiple hop strategies, relay networks, secrecy rate.
Deaf Cooperation for Secrecy With Multiple Antennas at the Helper
"... Abstract—In this paper, we investigate the roles of cooperative ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we investigate the roles of cooperative
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
"... ar ..."
(Show Context)
SECURE M -PSK COMMUNICATION VIA DIRECTIONAL MODULATION
"... ABSTRACT In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M -PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase o ..."
Abstract
- Add to MetaCart
ABSTRACT In this work, a directional modulation-based technique is devised to enhance the security of a multi-antenna wireless communication system employing M -PSK modulation to convey information. The directional modulation method operates by steering the array beam in such a way that the phase of the received signal at the receiver matches that of the intended M -PSK symbol. Due to the difference between the channels of the legitimate receiver and the eavesdropper, the signals received by the eavesdropper generally encompass a phase component different than the actual symbols. As a result, the transceiver which employs directional modulation can impose a high symbol error rate on the eavesdropper without requiring to know the eavesdropper's channel. The optimal directional modulation beamformer is designed to minimize the consumed power subject to satisfying a specific resulting phase and minimal signal amplitude at each antenna of the legitimate receiver. The simulation results show that the directional modulation results in a much higher symbol error rate at the eavesdropper compared to the conventional benchmark scheme, i.e., zero-forcing precoding at the transmitter.
Deaf Cooperation for Secrecy with a Multi-Antenna Helper
"... Abstract—In this paper, we investigate the roles of cooperative ..."
(Show Context)
ALIGNMENT AND COOPERATION FOR SECRECY IN MULTI-USER CHANNELS
, 2011
"... The study of the physical layer has offered a new perspective to the problem of communication security. This led to the development of a vast set of ideas and techniques rooted in information theory which can be employed in practice to provide unbreakable security. The information-theoretic approach ..."
Abstract
- Add to MetaCart
The study of the physical layer has offered a new perspective to the problem of communication security. This led to the development of a vast set of ideas and techniques rooted in information theory which can be employed in practice to provide unbreakable security. The information-theoretic approach relies mainly on the physical nature of the communication medium. In a wireless medium, the unique features of the wireless communication channel, such as its fading and broadcast nature, can be exploited to achieve higher secure information rates. In this dissertation, we study the secure transmission problem in wireless channels from an information-theoretic perspective. We first consider the fading multiple access wiretap channel. We give two new achievable schemes that use the time-varying (fading) nature of the channel to align the interference from different users at the eavesdropper perfectly in a one-dimensional space while creating a higher-dimensional space for the interfering signals at the legitimate receiver hence allowing for better chance of recovery. While we achievethis alignment through signal scaling at the transmitters in our first scheme (scaling based alignment), we let nature provide this alignment through the ergodicity of the