781 results on '"Physical-layer security"'
Search Results
2. Secrecy performance of RIS-assisted wireless-powered systems with artificial-jamming generation
- Author
-
Ty, Vo Ta, Son, Pham Ngoc, and Duy, Tran Trung
- Published
- 2025
- Full Text
- View/download PDF
3. Attack from malicious access points in cell-free massive MIMO systems: Performance analysis and countermeasure
- Author
-
Sun, Lei, Wang, Ruiguang, and Xu, Weiyang
- Published
- 2025
- Full Text
- View/download PDF
4. Differential sensing approaches for scattering-based holographic encryption.
- Author
-
Taghavi, Mohammadrasoul and Marengo, Edwin A
- Subjects
- *
MULTIPLE scattering (Physics) , *IMAGE encryption , *DATA encryption , *IMAGING systems , *COMPUTER simulation - Abstract
We develop a new scattering-based framework for the holographic encryption of analog and digital signals. The proposed methodology, termed 'differential sensing', involves encryption of a wavefield image by means of two hard-to-guess, complex and random scattering media, namely, a background and a total (background plus scatterer) medium. Unlike prior developments in this area, not one but two scattering media are adopted for scrambling of the probing wavefields (as encoded, e.g. in a suitable ciphertext hologram) and, consequently, this method offers enhanced security. In addition, while prior works have addressed methods based on physical imaging in the encryption phase followed by computational imaging in the decryption stage, we examine the complementary modality wherein encryption is done computationally while decryption is done analogically, i.e. via the materialization of the required physical imaging system comprising the ciphertext hologram and the two unique (background and total) media. The practical feasibility of the proposed differential sensing approach is examined with the help of computer simulations incorporating multiple scattering. The advantages of this method relative to the conventional single-medium approach are discussed for both analog and digital signals. The paper also develops algorithms for the required in situ holography as well as a new wavefield-nulling-based approach for scattering-based encryption with envisioned applications in real-time customer validation and secure communication. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
5. Secrecy Offloading Analysis of NOMA-based UAVaided MEC in IoT Networks with Imperfect CSI and SIC.
- Author
-
Anh-Nhat Nguyen, Tung-Son Ngo, Ngoc-Anh Bui, Phuong-Chi Le, and Manh-Duc Hoang
- Subjects
MONTE Carlo method ,DRONE aircraft ,INTERNET of things ,GENETIC algorithms ,EAVESDROPPING - Abstract
Nonorthogonal multiple access (NOMA) increases spectrum efficacy by permitting multiple devices to share link resources. It can be used to provide convenient offloading computing services for edge devices (EDs) in unmanned aerial vehicle (UAV) and mobile-edge computing (MEC) networks. However, due to the Line-of-Sight (LoS) of UAV transmission, NOMA-based UAV-MEC systems are susceptible to information eavesdropping. In this paper, we investigate a secure offloading model for a NOMA-based UAV-aided MEC in Internet of Things (IoT) network concerning an aerial eavesdropper (EAV) that considers imperfect channel state information (ipCSI) and imperfect successive interference cancellation (ipSIC). We derive the expression of secrecy successful computation probability (SSCP) across the entire system to analyze EAV's impact on the performance of the NOMA-based UAV-aided MEC in IoT networks. In addition, we present a formulation of an optimization problem that optimizes the SSCP through the optimization of the UAV's altitude and location, as well as the offloading ratio. To address this issue, a genetic algorithm (GA)-based approach was implemented. The results of our study were corroborated by the Monte Carlo simulations, which assessed system performance by considering multiple system parameters including the UAV's location, altitude, average transmit signal-to-noise ratio (SNR), and offloading ratio. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
6. Overview of RIS-enabled secure transmission in 6G wireless networks
- Author
-
JungSook Bae, Waqas Khalid, Anseok Lee, Heesoo Lee, Song Noh, and Heejung Yu
- Subjects
6G ,Physical-layer security ,Reconfigurable intelligent surface ,Information technology ,T58.5-58.64 - Abstract
As the 6th-Generation (6G) wireless communication networks evolve, privacy concerns are expected due to the transmission of vast amounts of security-sensitive private information. In this context, a Reconfigurable Intelligent Surface (RIS) emerges as a promising technology capable of enhancing transmission efficiency and strengthening information security. This study demonstrates how RISs can play a crucial role in making 6G networks more secure against eavesdropping attacks. We discuss the fundamentals and standardization aspects of RISs, along with an in-depth analysis of Physical-Layer Security (PLS). Our discussion centers on PLS design using RIS, highlighting aspects including beamforming, resource allocation, artificial noise, and cooperative communications. We also identify the research issues, propose potential solutions, and explore future perspectives. Finally, numerical results are provided to support our discussions and demonstrate the enhanced security enabled by RIS.
- Published
- 2024
- Full Text
- View/download PDF
7. Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions.
- Author
-
Al-Moliki, Yahya M., Alqahtani, Ali H., Alresheedi, Mohammed T., and Al-Harthi, Yahya
- Subjects
OPTICAL communications ,VISIBLE spectra ,SIGNAL-to-noise ratio ,SPATIAL systems ,OPTICAL modulation - Abstract
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter is operational at any given time. A uniform selection (US) strategy is employed to choose the active transmitter. The two scenarios under examination encompass the conditions of non-negativity and average optical intensity, as well as the conditions of non-negativity, average optical intensity, and peak optical intensity. The secrecy rate is then obtained for these two scenarios while accounting for both signal-independent noise and signal-dependent noise. Additionally, the high signal-to-noise ratio (SNR) asymptotic behavior of the derived secrecy rate constraints is investigated. A channel-adaptive selection (CAS) strategy and a greedy selection (GS) scheme are utilized to select the active transmitter, aiming to enhance the secrecy performance. The current numerical findings affirm a pronounced convergence between the lower and upper bounds characterizing the secrecy rate. Notably, marginal asymptotic differentials in performance emerge at elevated SNRs. Furthermore, the GS system outperforms the CAS scheme and the US method, in that order. Additionally, the impact of friendly optical jamming on the secrecy rate is investigated. The results show that optical jamming significantly enhances the secrecy rate, particularly at higher power levels. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Enhanced Message Authentication Encryption Scheme Based on Physical- Layer Key Generation in Resource-Limited Internet of Things.
- Author
-
Zeng Xing, Bo Zhao, Bo Xu, Guangliang Ren, and Zhiqiang Liu
- Subjects
ADVANCED Encryption Standard ,MESSAGE authentication codes ,INTERNET of things ,ALGORITHMS - Abstract
The Internet of Things (IoT) is facing growing security challenges due to its vulnerability. It is imperative to address the security issues using lightweight and efficient encryption schemes in resource-limited IoT. In this paper, we propose an enhanced message authentication encryption (MAE) scheme based on physical-layer key generation (PKG), which uses the random nature of wireless channels to generate and negotiate keys, and simultaneously encrypts the messages and authenticates the source. The proposed enhanced MAE scheme can greatly improve the security performance via dynamic keyed primitives construction while consuming very few resources. The enhanced MAE scheme is an efficient and lightweight secure communication solution, which is very suitable for resource-limited IoT. Theoretical analysis and simulations are carried out to confirm the security of the enhanced MAE scheme and evaluate its performance. A one-bit flipping in the session key or plain texts will result in a 50%-bit change in the ciphertext or message authentication code. The numerical results demonstrate the good performance of the proposed scheme in terms of diffusion and confusion. With respect to the typical advanced encryption standard (AES)- based scheme, the performance of the proposed scheme improves by 80.5% in terms of algorithm execution efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. On the Secrecy Sum-Rate of Internet of Things Networks: Scheduling and Power Control †.
- Author
-
Bang, Inkyu, Chae, Seong Ho, and Jung, Bang Chul
- Subjects
INTERNET of things ,MULTIPLE access protocols (Computer network protocols) ,WIRELESS communications ,MULTIUSER computer systems ,TELECOMMUNICATION systems ,TELECOMMUNICATION satellites ,ANTENNAS (Electronics) ,SCHEDULING ,SIGNAL-to-noise ratio - Abstract
Physical-layer security (PLS) has attracted much attention in wireless communications and has been considered one of the main candidates for enhancing wireless security in future 6G networks. Recent studies in the PLS area have focused on investigating and analyzing the characteristics of secure transmissions in multiuser networks (e.g., the massive number of Internet of Things (IoT) devices in 6G networks). Due to the difficulty of obtaining the exact secrecy capacity region in wireless multiuser networks, several alternative methods are used to characterize the secrecy performance of multiuser networks. For example, we can analyze the secrecy sum-rate scaling in terms of the number of users based on multiuser diversity (MUD). In this paper, we propose an opportunistic user scheduling scheme that achieves optimal MUD gain, combined with a power control mechanism for reducing information leakage to multiple eavesdroppers in wireless networks. The proposed scheme considers multiuser transmissions in one scheduling time slot by adopting orthogonal random beamforming at the receiver to exploit the full degrees-of-freedom gain with an assumption that each user (or IoT device) is equipped with a single antenna, and base station and eavesdroppers have multiple antennas. The main contribution of this paper is to derive the analytic result of the achievable secrecy sum-rate scaling in a high signal-to-noise ratio (SNR) regime. We evaluate the performance of the proposed scheduling scheme with a power control mechanism through simulations with both internal and external eavesdropping scenarios. We further discuss the extensibility of our analysis to various applications such as satellite communications and IoT networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Designing Multi-Hop Relaying Schemes in Cluster Networks Under Constraint of Intercept Probability with Presence of Multiple Eavesdroppers
- Author
-
Nam, Pham Minh, Dung, Nguyen Hung, Duy, Tran Trung, Tu, Lam-Thanh, Le-Tien, Thuong, Todor, Djourkov, editor, Kumar, Sivanappan, editor, Choi, Seung-Bok, editor, Nguyen-Xuan, Hung, editor, Nguyen, Quoc Hung, editor, and Trung Bui, Thanh, editor
- Published
- 2024
- Full Text
- View/download PDF
11. Performance analysis of physical-layer security in mid-infrared FSO communication system.
- Author
-
Zhong, Ruijing, Ji, Jianhua, Zeng, Tianliang, Wang, Ke, and Song, Yufeng
- Subjects
- *
ATMOSPHERIC turbulence , *FREE-space optical technology , *TELECOMMUNICATION systems - Abstract
Based on the eavesdropping model of non-line-of-sight (NLOS) scattering channel in mid-infrared (MIR) free-space optical (FSO) communication system, the physical-layer security is analyzed theoretically by considering the effects of the atmospheric turbulence, atmospheric attenuation, and beam divergence attenuation. The effects of atmospheric turbulence, transmission distance, and visibility on secrecy capacity and interception probability are investigated. Secrecy capacity and interception probability of near-infrared (NIR) system are compared with those of MIR system. It is theoretically demonstrated that the secrecy capacity of the NIR system is smaller than that of the MIR system. Closed-form expression of interception probability is derived. Furthermore, in the same visibility condition, the interception probability of the MIR system is much lower than that of the NIR system. Therefore, compared with the NIR system, MIR system has much better performance of physical-layer security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers.
- Author
-
Wang, Fan, Li, Cuiran, Xie, Jianli, Su, Lin, Liu, Yadan, and Du, Shaoyi
- Subjects
COGNITIVE radio ,RAYLEIGH fading channels ,COGNITIVE ability ,SIGNAL-to-noise ratio - Abstract
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the secrecy and throughput performance of an underlay cooperative cognitive vehicular network, where a pair of secondary vehicles communicate through a direct link and the assistance of a decode-and-forward (DF) secondary relay in the presence of Poisson-distributed colluding eavesdroppers and under an interference constraint set by the primary receiver. Considering mixed Rayleigh and double-Rayleigh fading channels, we design a realistic relaying transmission scheme and derive the closed-form expressions of secrecy and throughput performance, such as the secrecy outage probability (SOP), the connection outage probability (COP), the secrecy and connection outage probability (SCOP), and the overall secrecy throughput, for traditional and proposed schemes, respectively. An asymptotic analysis is further presented in the high signal-to-noise ratio (SNR) regime. Numerical results illustrate the impacts of network parameters on secrecy and throughput and reveal that the advantages of the proposed scheme are closely related to the channel gain of the relay link compared to the direct link. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Experimental Evaluation of Network-Controlled Physical-Layer Security Through Friendly Jamming
- Author
-
Sayed Amir Hoseini, Parastoo Sadeghi, Faycal Bouhafs, Neda Aboutorab, and Frank den Hartog
- Subjects
Artificial noise ,secrecy ,physical-layer security ,software-defined networking ,programmable networks ,friendly jamming ,Telecommunication ,TK5101-6720 ,Transportation and communications ,HE1-9990 - Abstract
In this paper, we present a real-life, cost-effective implementation of physical layer security (PLS) using friendly jamming (FJ) and the IEEE 802.11 technology. Our approach is based on a recent development in software-defined networking (SDN) called spectrum programming, where a network controller can execute an intelligent access point (AP) selection algorithm to connect the user station to the AP that provides the most secrecy while exploiting idle APs as jammers. Considering a system with two APs, our first contribution is a theoretical optimization of the power of FJ based on system power parameters, as well as distances between the two APs and the user station and the eavesdropper station. Our second contribution is demonstrating not only that PLS can be implemented with commercial-off-the-shelf Wi-Fi devices, but also that our theoretical network-centric approach allows for a significant increase of secrecy capacity and secrecy coverage by applying FJ. Our experiments show that the theoretical optimization of the transmit power of the jamming AP is valid in practice, effectively maximizing the throughput gap between the user and the eavesdropper. To our best knowledge, this is the first work linking information-theoretic optimization of FJ in PLS to a real-world implementation, which is compatible with Wi-Fi standards and devices.
- Published
- 2024
- Full Text
- View/download PDF
14. Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications
- Author
-
Mohammad Javad Saber and Mazen Hasna
- Subjects
High-altitude platform (HAP) ,unmanned aerial vehicle (UAV) ,free-space optical (FSO) ,relay communications ,physical-layer security ,secrecy performance ,Telecommunication ,TK5101-6720 ,Transportation and communications ,HE1-9990 - Abstract
High-altitude platform (HAP) stations are pivotal in non-terrestrial networks, enhancing communication capabilities and extending cost-effective network access to rural or remote areas. HAP-assisted free-space optical (FSO) communications provide a promising solution for improving data rates. To safeguard against eavesdropping, especially during emergencies, we propose a physical-layer security mechanism to enhance the control signaling resilience in disaster response and network failure detection. We investigate the secrecy performance of an integrated HAP-based FSO and unmanned aerial vehicle (UAV)-enabled radio frequency (RF) downlink system using the decode-and-forward relaying protocol. While optical links inherently provide better security, our focus is on the eavesdropping threats to the RF link. We derive novel and exact analytical and asymptotic closed-form expressions for the secrecy outage probability (SOP) and the probability of strictly positive secrecy capacity (PSPSC). Our results reveal the significant impact of atmospheric turbulence, RF fading, pointing errors, and optical detection technologies on the overall secrecy performance, providing valuable insights for designing secure mixed FSO and RF downlink communication systems.
- Published
- 2024
- Full Text
- View/download PDF
15. Dataset Augmentation and Fractional Frequency Offset Compensation Based Radio Frequency Fingerprint Identification in Drone Communications
- Author
-
Dongming Li, Zhaorui Wang, Yuting Lai, and Huafei Shen
- Subjects
drone communications ,physical-layer security ,radio frequency fingerprint ,Motor vehicles. Aeronautics. Astronautics ,TL1-4050 - Abstract
The open nature of the wireless channel makes the drone communication vulnerable to adverse spoofing attacks, and the radio frequency fingerprint (RFF) identification is promising in effectively safeguarding the access security for drones. Since drones are constantly flying in the three dimensional aerial space, the unique RFF identification problem emerges in drone communication that the effective extraction and identification of RFF suffer from the time-varying channel effects and unavoidable jitterings due to the constant flight. To tackle this issue, we propose augmenting the training RFF dataset by regenerating the drone channel characteristics and compensate the fractional frequency offset. The proposed method estimates the Rician K value of the channel and curve-fits the statistical distribution, the Rician channels are regenerated using the sinusoidal superposition method. Then, a probabilistic switching channel is also set up to introduce the Rayleigh channel effects into the training dataset. The proposed method effectively addresses the unilateral channel effects in the training dataset and achieves the balanced channel effect distribution. Consequently, the pre-trained model can extract channel-robust RFF features in drone air-ground channels. In addition, by compensating the fractional frequency offset, the proposed method removes the unstable frequency components and retains the stable integer frequency offset. Then, the stable frequency offset features that are robust to environmental changes can be extracted. The proposed method achieves an average classification accuracy of 97% under spatial and temporal varying conditions.
- Published
- 2024
- Full Text
- View/download PDF
16. Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions
- Author
-
Yahya M. Al-Moliki, Ali H. Alqahtani, Mohammed T. Alresheedi, and Yahya Al-Harthi
- Subjects
physical-layer security ,secrecy rate ,spatial modulation ,signal-independent noise ,signal-dependent noise ,visible light communications ,Applied optics. Photonics ,TA1501-1820 - Abstract
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter is operational at any given time. A uniform selection (US) strategy is employed to choose the active transmitter. The two scenarios under examination encompass the conditions of non-negativity and average optical intensity, as well as the conditions of non-negativity, average optical intensity, and peak optical intensity. The secrecy rate is then obtained for these two scenarios while accounting for both signal-independent noise and signal-dependent noise. Additionally, the high signal-to-noise ratio (SNR) asymptotic behavior of the derived secrecy rate constraints is investigated. A channel-adaptive selection (CAS) strategy and a greedy selection (GS) scheme are utilized to select the active transmitter, aiming to enhance the secrecy performance. The current numerical findings affirm a pronounced convergence between the lower and upper bounds characterizing the secrecy rate. Notably, marginal asymptotic differentials in performance emerge at elevated SNRs. Furthermore, the GS system outperforms the CAS scheme and the US method, in that order. Additionally, the impact of friendly optical jamming on the secrecy rate is investigated. The results show that optical jamming significantly enhances the secrecy rate, particularly at higher power levels.
- Published
- 2024
- Full Text
- View/download PDF
17. Deep learning approach for physical-layer security in Gaussian multiple access wiretap channel
- Author
-
Emmanuel Obeng Frimpong, Taehoon Kim, and Inkyu Bang
- Subjects
Physical-layer security ,Deep learning ,Gaussian wiretap channel ,Multiple access channel ,Loss function ,Information technology ,T58.5-58.64 - Abstract
Deep learning (DL) has exhibited great potential in communication systems. Recent advances in DL-based physical-layer techniques have shown that the communication system can be modeled as an autoencoder (AE), which performs end-to-end learning tasks. In this article, we investigate an AE-based deep learning framework for physical-layer security where multiple transmitters send their own data to a common receiver under an eavesdropping scenario (i.e., Gaussian multiple access wiretap channel). We have newly designed an integrated loss function with respect to secrecy performance in terms of symbol error rate among multiple users. Further, we verify that our training approach based on the proposed loss function can achieve better secrecy performance compared with the conventional training one.
- Published
- 2023
- Full Text
- View/download PDF
18. Secure massive MIMO system with two-way relay cooperative transmission in 6G networks
- Author
-
Yumeng Su, Hongyuan Gao, and Shibo Zhang
- Subjects
6G ,Physical-layer security ,Massive MIMO ,Multiple-relay collaboration ,Two-way relaying ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract With the advent of Internet of Everything and the era of big data, massive multiple-input multiple-output (MIMO) is considered as an essential technology to meet the growing communication requirements for beyond 5G and the forthcoming 6G networks. This paper considers a secure massive MIMO system, where the legitimate user and the base station exchange messages via two-way relays with the presence of passive eavesdroppers. To achieve the trade-off between the physical-layer security and communication reliability, we design a cooperative transmission mode based on multiple-relay collaboration, where some relays broadcast the received signals and other relays act as friendly jammers to prevent the interception by eavesdroppers. A quantum chemical reaction optimization (QCRO) algorithm is proposed to find the most suitable scheme for multiple-relay collaboration. Simulation results highlight excellent performance of the proposed transmission mode under QCRO in different communication scenarios, which can be considered as a potential solution for the security issue in future wireless networks.
- Published
- 2023
- Full Text
- View/download PDF
19. Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel.
- Author
-
Harman, Daniel, Knapp, Karl, Sweat, Tyler, Lundrigan, Philip, Rice, Michael, and Harrison, Willie
- Subjects
- *
PHYSICAL layer security , *ORTHOGONAL frequency division multiplexing , *GAUSSIAN channels , *WIRETAPPING , *SOUND measurement , *WIRELESS channels - Abstract
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap channel using channel sounding measurements to analyze the potential for secure communication in a real-world scenario. A multi-input, multi-output, multi-eavesdropper (MIMOME) system is deployed using orthogonal frequency division multiplexing (OFDM) over an 802.11n wireless network. Channel state information (CSI) measurements were taken in an indoor environment to analyze time-varying scenarios and spatial variations. It is shown that secrecy capacity is highly affected by environmental changes, such as foot traffic, network congestion, and propagation characteristics of the physical environment. We also present a numerical method for calculating MIMOME secrecy capacity in general and comment on the use of OFDM with regard to calculating secrecy capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Physical-layer security with frequency diverse array for DF multi-antenna relaying SWIPT system.
- Author
-
Jian, Jiangwei, Huang, Bang, and Wang, Wen-Qin
- Subjects
- *
WIRELESS power transmission - Abstract
In this letter, we establish physical-layer security based on frequency diverse array (FDA) together with directional modulation (DM) for decode and forward (DF) relaying simultaneous wireless information and power transfer (SWIPT) system. The analytical expressions of the ergodic system secrecy capacity under the time switching (TS) protocol are derived. Moreover, the impacts of system parameters on secure performance are analysed. Numerical results reveal that the proposed method achieves better security performance than conventional PA solutions, especially in the range dimension. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning.
- Author
-
Marabissi, Dania, Abrardo, Andrea, and Mucchi, Lorenzo
- Subjects
- *
PHYSICAL layer security , *INFORMATION technology security , *REINFORCEMENT learning , *CO-channel interference , *COMPUTER network security , *WIRELESS channels - Abstract
Densification of networks through heterogeneous cells deployment is considered a key technology to satisfy the huge traffic growth in future wireless systems. In addition to achieving the required communication capacity and efficiency, another significant challenge arises from the broadcast nature of wireless channels: vulnerability to wiretapping. Physical-layer security is envisaged as an additional level of security to provide confidentiality of radio communications. Typical characteristics of the wireless channel (noise, interference) can be exploited to keep a message confidential from potential eavesdroppers. In particular, heterogeneous networks (HetNet) have inherent security features: while the legitimate user can benefit of the HetNet architecture, the eavesdropper is strongly affected by the inter-cell interference. This paper presents an overview of HetNets intrinsic security benefits, mainly focusing on users association and resource allocation policies. In particular, allocation of radio resources is a poorly investigated topic when related to information security. However, in systems with a large radio resource reuse like HetNets, co-channel interference can be suitably exploited to resist to the eavesdropper. This paper presents a new framework for radio resources allocation using reinforcement learning (Q-learning) to increase the security level in HetNets. A coordinated scheduling among different cells using the same radio resources is proposed based on the exploitation of the spatial information. The goal is to optimize the security at physical layer. The reinforcement learning approach represents a feasible and efficient solution to the proposed problem. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. SCIM: Incorporating secure communication and interference management in one operation
- Author
-
Zhao Li, Pintian Lyu, Jun Li, Zhixian Chang, Jia Liu, and Zheng Yan
- Subjects
Physical-layer security ,Secure communication ,Anti-eavesdropping ,Interference management ,Secrecy rate ,Information technology ,T58.5-58.64 - Abstract
Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. Meanwhile, as a result of the limitation of spectrum resources, massive wireless connections will incur serious interference, which may damage the efficiency of data transmission. Therefore, improving both efficiency and secrecy of data transmission is of research significance. In this paper, we propose a wireless transmission scheme by taking both Secure Communication (SC) and Interference Management (IM) into account, namely SCIM. With this scheme, an SCIM signal is generated by the legitimate transmitter (Tx) and sent along with the desired signal, so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver (Rx). Meanwhile, the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance. Therefore, the secrecy of desired transmission is improved. In this way, both the transmission efficiency and privacy are enhanced. Then, by taking various transmission preferences into account, we develop different implementations of SCIM, including Interference Suppression First SCIM (ISF-SCIM), Data Transmission First SCIM (DTF-SCIM), Anti-Eavesdropping First SCIM (AEF-SCIM), and Secrecy Rate Maximization SCIM (SRM-SCIM). Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.
- Published
- 2023
- Full Text
- View/download PDF
23. Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location
- Author
-
Pham Minh Nam, Ha Duy Hung, Tran Trung Duy, and Le-Tien Thuong
- Subjects
Physical-layer security ,Harvest-to-jam cooperative jamming ,Outage probability ,Intercept probability ,Random networks ,Information technology ,T58.5-58.64 - Abstract
This paper evaluates outage probability (OP) and intercept probability (IP) of physical-layer security based MIMO networks adopting cooperative jamming (Coop-Jam). In the considered scenario, a multi-antenna source communicates with a multi-antenna destination employing transmit antenna selection (TAS)/ selection combining (SC), in presence of a multi-antenna eavesdropper using SC. One of jammers appearing near the destination is selected for generating jamming noises on the eavesdropper. Moreover, the destination supports the wireless energy for the chosen jammer, and cooperates with it to remove the jamming noises. We consider two jammer selection approaches, named RAND and SHORT. In RAND, the destination randomly selects the jammer, and in SHORT, the jammer, which is nearest to the destination, is chosen. We derive exact and asymptotic expressions of OP and IP over Rayleigh fading, and perform Monte-Carlo simulations to verify the correction of our derivation. The results present advantages of the proposed RAND and SHORT methods, as compared with the corresponding one without using Coop-Jam.
- Published
- 2023
- Full Text
- View/download PDF
24. STBC-Enabled Secure Wireless Transmission With Cooperative Devices Under Imperfect CSI of Destination
- Author
-
Tianji Shen, Yuto Hama, and Hideki Ochiai
- Subjects
Channel state information ,jamming ,multiple-input multiple-output ,physical-layer security ,selective relaying ,space-time block code ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from a source to a destination assisted by cooperative devices. In the first phase, a space-time block code (STBC) is employed; thus, the source does not require any channel state information (CSI). In the second phase, the cooperative devices are divided into two groups, depending on whether they serve for relaying or jamming. Based on the imperfect CSI toward the destination, the devices allocated to the relay group assist the source in forwarding information, whereas those within the jamming group send artificial noise (AN) so as to prevent the eavesdropper from receiving information. Furthermore, the system utilizes two grouping strategies, referred to as random and adaptive. In the former case the role (relaying or jamming) of each device is predetermined randomly, whereas in the latter case it is determined autonomously depending on the decoding results. We analyze the outage probability of our proposed system with and without power allocation optimization under the assumption of imperfect CSI at the cooperative devices, and their accuracy is verified by Monte-Carlo simulations.
- Published
- 2023
- Full Text
- View/download PDF
25. Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption
- Author
-
Mohammad Mahmudul Hasan, Michael Cheffena, and Slobodan Petrovic
- Subjects
Physical-layer security ,chaotic function ,MIMO ,OFDM ,SLM ,PAPR ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Ensuring physical-layer security (PLS) in wireless communication has always been a challenge due to the broadcasting nature of the transmission. In this work, a multilevel chaotic encryption (MCE) system is proposed to improve PLS in Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems under Rayleigh fading channel. Additionally, the proposed technique improves the transmission performance by reducing the high Peak-to-Average-Power Ratio (PAPR) which is also considered as one of the major drawbacks of Multicarrier Modulations (MCM) like OFDM. In the proposed scheme, multilevel encryption is achieved in two steps. In the first step, a precoding matrix based on a unique chaotic sequence scrambles the modulated symbols. In the second step, phase scrambling is used based on chaotic sequence for selective mapping to provide a second level of encryption for the entire transmission. We evaluated the security performances using randomness of the proposed MCE, achievable key-space, and security analysis under cryptographic attacks from the perspective of Cryptanalysis. We verified the communication performances in terms of computational complexity of the system, PAPR, and error performances considering multipath Rayleigh fading wireless channel. The proposed MCE provides a huge key-space of $\sim 10^{302}$ which can resist any cryptographic attacks. Also, the pseudo-random nature of the multilevel chaotic scrambling reduces the PAPR by reducing autocorrelation of the OFDM signal. The proposed low-complexity MCE solution outperforms existing encryption schemes when compared in terms of security, computational complexity, and PAPR. Mathematical analysis and simulation results show that the proposed MCE scheme can enhance physical layer security along with significant reduction in PAPR without compromising the error performances of the system.
- Published
- 2023
- Full Text
- View/download PDF
26. Physical-layer security enhancement using artificial noise for D2D communication in vehicular platooning networks
- Author
-
Inkyu Bang, Jong-Hyun Kim, and Taehoon Kim
- Subjects
Physical-layer security ,Platooning ,V2V networks ,Artificial noise ,D2D communications ,Information technology ,T58.5-58.64 - Abstract
In this article, we introduce physical-layer security enhancement technique based on artificial noise for secure device-to-device (D2D) communications within a platoon in vehicular platooning networks. In particular, we consider a scenario that two D2D-enabled platoons are on the same way. All the vehicles in one platoon are used to generate artificial noise to enhance the secrecy of D2D communications within the other platoon against information leakage to a potential eavesdropping vehicle. We propose artificial noise generation strategies by the platoon according to the assumption on channel state information (CSI): full-CSI and partial CSI assumptions. We further analyze the effect of artificial noise depending on the relationship between the number of vehicles in two platoons. We finally evaluate the performance of our proposed schemes in terms of secrecy rate through extensive simulations and provide useful intuitions for secure platooning.
- Published
- 2022
- Full Text
- View/download PDF
27. On secrecy performance analysis of multi-antenna STAR-RIS-assisted downlink NOMA systems
- Author
-
Shu Xu, Chen Liu, Hong Wang, Mujun Qian, and Jin Li
- Subjects
Reconfigurable intelligent surface ,Non-orthogonal multiple access ,Simultaneous transmitting and reflecting ,Physical-layer security ,Secrecy outage probability ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract To accommodate the stringent requirements of enhanced coverage quality and improved spectral efficiency, simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-aided communication has been perceived as an interesting research topic. This paper investigates a downlink STAR-RIS-aided non-orthogonal multiple access (NOMA) system, where a STAR-RIS is deployed to enhance the transmission qualities between users and a multiple-antenna base station (BS). The considered STAR-RIS utilizes the energy splitting (ES) protocol to serve a pair of NOMA users located at both sides of STAR-RIS. Based on the ES protocol, each reconfigurable element can operate in the modes of transmission and reflection simultaneously. In an effort to characterize the secrecy performance, we first derive the closed-form expressions of secrecy outage probability (SOP) for STAR-RIS-aided NOMA system. Then, the asymptotic performance of the derived SOP is analyzed. For gleaning further insights, secrecy diversity order (SDO) is derived according to the asymptotic approximation in the high signal-to-noise ratio and main-to-eavesdropper ratio regimes. As a further advance, the system parameters are optimized to minimize the SOP of the system. Our analytical results demonstrate that the multiple-antenna BS has almost no impact on SDO for STAR-RIS-aided NOMA system. In simulations, it is demonstrated that the theoretical results match with the simulation results very well and the SOP of STAR-RIS-aided NOMA is less than that of conventional orthogonal multiple access (OMA) system obviously.
- Published
- 2022
- Full Text
- View/download PDF
28. On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
- Author
-
Mengdie Han and Jiliang Zhang
- Subjects
Physical-layer security ,Internet of Things ,Non-orthogonal multiple access ,Time switching ,SWIPT ,Relay selection ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels. Specifically, we consider the scenario that a power-constrained source and N (N⩾1) IoT relays first harvest energy from a dedicated power beacon under a time switching mode, and then the source sends a confidential information to a legitimate user via a selected IoT relay, which forwards the decoded signal together with its own information data under a NOMA protocol to two legitimate users in the presence of an eavesdropper. Moreover, a two-stage relay selection criterion is also adopted to enhance the system’s secrecy performance. As a benchmark, we also adopt a random relay selection scheme to analyze the secrecy performance. To clearly reveal the benefits of our proposed schemes, the analytical expressions for SOP under those two schemes have been obtained and validated through Monte-Carlo simulations.
- Published
- 2022
- Full Text
- View/download PDF
29. Secure massive MIMO system with two-way relay cooperative transmission in 6G networks.
- Author
-
Su, Yumeng, Gao, Hongyuan, and Zhang, Shibo
- Subjects
- *
LINEAR network coding , *MIMO systems , *PARTICIPATORY design , *BIG data , *CHEMICAL reactions - Abstract
With the advent of Internet of Everything and the era of big data, massive multiple-input multiple-output (MIMO) is considered as an essential technology to meet the growing communication requirements for beyond 5G and the forthcoming 6G networks. This paper considers a secure massive MIMO system, where the legitimate user and the base station exchange messages via two-way relays with the presence of passive eavesdroppers. To achieve the trade-off between the physical-layer security and communication reliability, we design a cooperative transmission mode based on multiple-relay collaboration, where some relays broadcast the received signals and other relays act as friendly jammers to prevent the interception by eavesdroppers. A quantum chemical reaction optimization (QCRO) algorithm is proposed to find the most suitable scheme for multiple-relay collaboration. Simulation results highlight excellent performance of the proposed transmission mode under QCRO in different communication scenarios, which can be considered as a potential solution for the security issue in future wireless networks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. 非理想信道状态信息下 RIS 辅助的安全通信.
- Author
-
李 萌, 孙艺夫, 安 康, 牛和昊, 朱勇刚, 李 程, and 关东方
- Subjects
ROBUST optimization ,BEAMFORMING ,RADAR interference ,EAVESDROPPING ,TRANSMITTERS (Communication) ,COMPUTER simulation ,RESOURCE allocation - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
31. Secrecy Performance of Multi-RIS-Assisted Wireless Systems.
- Author
-
Nguyen, Ba Cao, Van, Quyet-Nguyen, Dung, Le The, Hoang, Tran Manh, Vinh, Nguyen Van, and Luu, Gia Thien
- Subjects
- *
RADIO transmitter fading , *MATHEMATICAL analysis , *COMPUTER simulation , *WIRELESS communications - Abstract
This paper presents a theoretical framework using multiple reconfigurable intelligent surfaces (RISs) for enhancing the secrecy performance of wireless systems. In particular, multiple RISs are exploited to support transmitter-legitimate user communication under the existence of an eavesdropper. Two practical scenarios are investigated, i.e., there are only transmitter-eavesdropper links (case 1) and there are both transmitter-eavesdropper and transmitter-RIS-eavesdropper links (case 2). We mathematically obtain the closed-form expressions of the average secrecy capacity (ASC) of the considered system in these two investigated cases over Nakagami-m fading channels. The impacts of the system parameters, such as the locations of the RISs, the number of REs, and the Nakagami-m channels, are deeply evaluated. Computer simulations are used to validate our mathematical analysis. Numerical results clarify the benefits of using multiple RISs for improving the secrecy performance of wireless systems. Specifically, the ASCs in cases 1 and 2 are significantly higher than that in the case without RISs. Importantly, when the locations of the RISs are fixed, we can arrange the larger RSIs near either the transmitter or legitimate user to achieve higher ASCs. In addition, when the numbers of reflecting elements (REs) in the RISs increase, the ASCs in cases 1 and 2 are greatly enhanced. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT.
- Author
-
Qian, Pengzhi, Zhang, Yu, Yan, Xiaojuan, Chen, Yong, and Sun, Yifu
- Subjects
GENETIC algorithms ,TABU search algorithm ,INTERNET of things ,TELECOMMUNICATION systems ,COMPUTATIONAL complexity ,DRONE aircraft ,RADAR interference - Abstract
Reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAV) have been extensively studied on the Internet of Things (IoT) systems to improve communication performance. In this paper, we aimed to counter simultaneous jamming and eavesdropping attacks by jointly designing an active beamforming vector at the base station (BS) and reflect phase shifts at the RIS. Specifically, considering imperfect angular channel state information (CSI), the sum secrecy rate maximization problem in the worst case could be formulated, which is NP-hard and non-convex. To address this problem, we improved the robust enhanced signal-to-leakage-and-noise ratio (E-SLNR) beamforming to reduce the computational complexity and mitigate the impact of interference, eavesdropping and jamming. Furthermore, a genetic algorithm with a tabu search (GA-TS) method was proposed to efficiently obtain an approximate optimal solution. The simulation results demonstrated that the proposed GA-TS method converged faster with better results than conventional GA, while the proposed robust scheme could achieve higher sum secrecy rates than the zero-forcing (ZF) and SLNR schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Deep Q-Learning-Based Buffer-Aided Relay Selection for Reliable and Secure Communications in Two-Hop Wireless Relay Networks.
- Author
-
Zhang, Cheng, Liao, Xuening, Wu, Zhenqiang, Qiu, Guoyong, Chen, Zitong, and Yu, Zhiliang
- Subjects
- *
MONTE Carlo method , *MULTICASTING (Computer networks) , *WIRELESS communications security , *WIRELESS communications , *WIRELESS channels - Abstract
This paper investigates the problem of buffer-aided relay selection to achieve reliable and secure communications in a two-hop amplify-and-forward (AF) network with an eavesdropper. Due to the fading of wireless signals and the broadcast nature of wireless channels, transmitted signals over the network may be undecodable at the receiver end or have been eavesdropped by eavesdroppers. Most available buffer-aided relay selection schemes consider either reliability or security issues in wireless communications; rarely is work conducted on both reliability and security issues. This paper proposes a buffer-aided relay selection scheme based on deep Q-learning (DQL) that considers both reliability and security. By conducting Monte Carlo simulations, we then verify the reliability and security performances of the proposed scheme in terms of the connection outage probability (COP) and secrecy outage probability (SOP), respectively. The simulation results show that two-hop wireless relay network can achieve reliable and secure communications by using our proposed scheme. We also performed comparison experiments between our proposed scheme and two benchmark schemes. The comparison results indicate that our proposed scheme outperforms the max-ratio scheme in terms of the SOP. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Survey of capacity limits and implementation techniques in wireless covert communication
- Author
-
Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, and Guojiang XIA
- Subjects
wireless covert communication ,low probability of detection communication ,physical-layer security ,information security ,Telecommunication ,TK5101-6720 - Abstract
The differences and connections between wireless covert communication (WCC) and related concepts were clarified.The WCC research based on hypothesis testing theory and information theory was focused.The basic research model and the categories of specific models were introduced.The existing works were classified and reviewed in two parts, namely, capacity limits and implementation techniques.The former part reviewed the works that reveal the limit rate, and divided them into two categories as per the order of the limit rate: squared root rate and positive rate.The latter part reviewed the works that analyze the performance of WCC systems and optimize the implementation schemes, and classified them as per their application scenarios.Finally, potential research directions were discussed.
- Published
- 2022
- Full Text
- View/download PDF
35. RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks.
- Author
-
Shawky, Mahmoud A., Shah, Syed Tariq, Abbasi, Qammer H., Hussein, Mohamed, Imran, Muhammad A., Hasan, Syed Faraz, Ansari, Shuja, and Taha, Ahmad
- Subjects
- *
DENIAL of service attacks , *STRUCTURAL optimization , *SOFTWARE radio , *WIRELESS communications , *COMPUTER network security - Abstract
Wireless communication has become an integral part of modern vehicles. However, securing the information exchanged between interconnected terminals poses a significant challenge. Effective security solutions should be computationally inexpensive, ultra-reliable, and capable of operating in any wireless propagation environment. Physical layer secret key generation has emerged as a promising technique, which leverages the inherent randomness of wireless-channel responses in amplitude and phase to generate high-entropy symmetric shared keys. The sensitivity of the channel-phase responses to the distance between network terminals makes this technique a viable solution for secure vehicular communication, given the dynamic behavior of these terminals. However, the practical implementation of this technique in vehicular communication is hindered by fluctuations in the communication link between line-of-sight (LoS) and non-line-of-sight (NLoS) conditions. This study introduces a key-generation approach that uses a reconfigurable intelligent surface (RIS) to secure message exchange in vehicular communication. The RIS improves the performance of key extraction in scenarios with low signal-to-noise ratios (SNRs) and NLoS conditions. Additionally, it enhances the network's security against denial-of-service (DoS) attacks. In this context, we propose an efficient RIS configuration optimization technique that reinforces the signals received from legitimate users and weakens the signals from potential adversaries. The effectiveness of the proposed scheme is evaluated through practical implementation using a 1-bit RIS with 64 × 64 elements and software-defined radios operating within the 5G frequency band. The results demonstrate improved key-extraction performance and increased resistance to DoS attacks. The hardware implementation of the proposed approach further validated its effectiveness in enhancing key-extraction performance in terms of the key generation and mismatch rates, while reducing the effect of the DoS attacks on the network. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. 基于能量采集的友好干扰机辅助下多中继系统安全传输方案.
- Author
-
张广大, 任清华, and 樊志凯
- Subjects
CO-channel interference ,ENERGY harvesting ,SIGNAL-to-noise ratio ,SYMBOL error rate ,DECODE & forward communication ,TRANSMITTERS (Communication) - Abstract
Copyright of Systems Engineering & Electronics is the property of Journal of Systems Engineering & Electronics Editorial Department and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
37. Reconfiguring wireless environments via intelligent surfaces for 6G: reflection, modulation, and security.
- Author
-
Xu, Jindan, Yuen, Chau, Huang, Chongwen, Ul Hassan, Naveed, Alexandropoulos, George C., Di Renzo, Marco, and Debbah, Mérouane
- Abstract
The reconfigurable intelligent surface (RIS) has been recognized as an essential enabling technology for sixth-generation (6G) mobile communication networks. An RIS comprises a large number of small and low-cost reflecting elements whose parameters can be dynamically adjusted with a programmable controller. Each of these elements can effectively reflect a phase-shifted version of the incident electromagnetic wave. By configuring the wave phases in real time, the propagation environment of the information-bearing signals can be dynamically manipulated to enhance communication reliability, boost transmission rate, expand cellular coverage, and strengthen communication security. In this study, we provide an overview on RIS-assisted wireless communications. Specifically, we elaborate on the state-of-the-art enabling techniques for the RIS technology as well as their corresponding substantial benefits from the perspectives of RIS reflection and RIS modulation. With these benefits, we envision the integration of RISs into emerging applications for 6G. In addition, communication security is of unprecedented importance in future 6G networks with ubiquitous wireless services in multifarious verticals and areas. We highlight potential contributions of RISs to physical-layer security, in terms of secrecy rate and secrecy outage probability, exemplified by a typical case study from both theoretical and numerical aspects. Finally, we discuss challenges and opportunities on the deployment of RISs in practice to motivate future research. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Physical-Layer Security with Irregular Reconfigurable Intelligent Surfaces for 6G Networks †.
- Author
-
Frimpong, Emmanuel Obeng, Oh, Bong-Hwan, Kim, Taehoon, and Bang, Inkyu
- Subjects
- *
LINEAR network coding , *TELECOMMUNICATION systems , *TABU search algorithm , *SECURITY management - Abstract
The goal of 6G is to make far-reaching changes in communication systems with stricter demands, such as high throughput, extremely low latency, stronger security, and ubiquitous connectivity. Several promising techniques, such as reconfigurable intelligent surfaces (RISs), have been introduced to achieve these goals. An RIS is a 2D low-cost array of reflecting elements that can adjust the electromagnetic properties of an incident signal. In this paper, we guarantee secrecy by using an irregular RIS (IRIS). The main idea of an IRIS is to irregularly activate reflecting elements for a given number of RIS elements. In this work, we consider a communication scenario in which, with the aid of an IRIS, a multi-antenna base station establishes a secure link with a legitimate single-antenna user in the presence of a single-antenna eavesdropper. To this end, we formulate a topology-and-precoding optimization problem to maximize the secrecy rate. We then propose a Tabu search-based algorithm to jointly optimize the RIS topology and the precoding design. Finally, we present simulation results to validate the proposed algorithm, which highlights the performance gain of the IRIS in improving secure transmissions compared to an RIS. Our results show that exploiting an IRIS can allow additional spatial diversity to be achieved, resulting in secrecy performance improvement and overcoming the limitations of conventional RIS-assisted systems (e.g., a large number of active elements). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. On secrecy outage probability for downlink NOMA systems with relay–antenna selection
- Author
-
Shu Xu, Chen Liu, Hong Wang, Mujun Qian, and Wenfeng Sun
- Subjects
Wireless communication ,Non-orthogonal multiple access ,Relay–antenna selection ,Physical-layer security ,Secrecy outage probability ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay–antenna selection to enhance physical-layer security of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining or SC to process the received signals. Under the condition that the channel state information of the eavesdropping channel is available or unavailable, two effective relay–antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay–antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access scheme obviously.
- Published
- 2022
- Full Text
- View/download PDF
40. Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers.
- Author
-
Thai, Chan Dai Truyen, Tran, Thanh T., and Huynh, De-Thu
- Subjects
- *
WIRELESS communications security , *RADAR interference , *DEGREES of freedom - Abstract
In this paper, we consider the problem of multiple active and full-duplex (FD) attackers in physical-layer security of wireless communications. The attackers can eavesdrop the legitimate signal from a transmitter to a receiver and jam it at the same time with a high power. The channel realizations, pilot signals, and jamming signals of the attackers are not known at the legitimate nodes. This gives a difficulty because there are not enough degrees of freedom in the received signal space. However, we propose a novel scheme to opportunistically remove the jamming signals out of the received signals to reliably decode the legitimate signal. The numerical results show that there is a significant improvement in the secrecy rate (SR) compared to the conventional scheme. Especially, the higher the transmit power of the attackers, the better the performance of the proposed scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps.
- Author
-
Abu Al-Atta, Mariam, Said, Karim A., Mohamed, Mohamed A., and Raslan, Walid
- Subjects
- *
GAUSSIAN channels , *ADDITIVE white Gaussian noise channels , *CHAOTIC communication - Abstract
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability. Because a rising number of users are becoming connected, user data security has become a critical issue. Many chaotic communication systems have been established to address this important issue via exhibition of affordable physical-layer-security solutions. In this study, we propose a chaotic downlink NOMA (C-DL-NOMA) system over the additive white Gaussian noise and Rayleigh-fading channels to enhance the security of the DL-NOMA system. The proposed algorithm is based on a coherent analog modulation technique that combines various chaotic maps for chaotic masking of encrypted data. On the transmitter, chaotic encryption was used for transmitted data with fixed power-allocation-level control, whereas on the receiver, successive interference-cancellation demodulation was utilized to detect multiple users, after which chaotic decryption was performed. Simulation results were evaluated based on security analyses, such as statistical analysis (histogram and correlation analyses and information entropy), bit-error-rate performance, and achievable-data-rate performance. According to these security analyses and numerical results, the proposed C-DL-NOMA system outperformed traditional unencrypted NOMA systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. On secrecy performance analysis of multi-antenna STAR-RIS-assisted downlink NOMA systems.
- Author
-
Xu, Shu, Liu, Chen, Wang, Hong, Qian, Mujun, and Li, Jin
- Subjects
SIGNAL-to-noise ratio ,MIMO systems - Abstract
To accommodate the stringent requirements of enhanced coverage quality and improved spectral efficiency, simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-aided communication has been perceived as an interesting research topic. This paper investigates a downlink STAR-RIS-aided non-orthogonal multiple access (NOMA) system, where a STAR-RIS is deployed to enhance the transmission qualities between users and a multiple-antenna base station (BS). The considered STAR-RIS utilizes the energy splitting (ES) protocol to serve a pair of NOMA users located at both sides of STAR-RIS. Based on the ES protocol, each reconfigurable element can operate in the modes of transmission and reflection simultaneously. In an effort to characterize the secrecy performance, we first derive the closed-form expressions of secrecy outage probability (SOP) for STAR-RIS-aided NOMA system. Then, the asymptotic performance of the derived SOP is analyzed. For gleaning further insights, secrecy diversity order (SDO) is derived according to the asymptotic approximation in the high signal-to-noise ratio and main-to-eavesdropper ratio regimes. As a further advance, the system parameters are optimized to minimize the SOP of the system. Our analytical results demonstrate that the multiple-antenna BS has almost no impact on SDO for STAR-RIS-aided NOMA system. In simulations, it is demonstrated that the theoretical results match with the simulation results very well and the SOP of STAR-RIS-aided NOMA is less than that of conventional orthogonal multiple access (OMA) system obviously. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
43. On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems.
- Author
-
Han, Mengdie and Zhang, Jiliang
- Subjects
INTERNET of things ,RADIO transmitter fading ,ENERGY harvesting ,SOURCE code ,LINEAR network coding - Abstract
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami- m fading channels. Specifically, we consider the scenario that a power-constrained source and N (N ⩾ 1) IoT relays first harvest energy from a dedicated power beacon under a time switching mode, and then the source sends a confidential information to a legitimate user via a selected IoT relay, which forwards the decoded signal together with its own information data under a NOMA protocol to two legitimate users in the presence of an eavesdropper. Moreover, a two-stage relay selection criterion is also adopted to enhance the system's secrecy performance. As a benchmark, we also adopt a random relay selection scheme to analyze the secrecy performance. To clearly reveal the benefits of our proposed schemes, the analytical expressions for SOP under those two schemes have been obtained and validated through Monte-Carlo simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers.
- Author
-
Xie, Yuncong and Ren, Pinyi
- Subjects
- *
ERROR probability , *REMOTE control , *SEARCH algorithms , *RELIABILITY in engineering , *TRANSMISSION of sound , *STOCHASTIC geometry - Abstract
In this article, we focus on the pilot-assisted transmission design for secure ultra-reliable and low-latency communication (URLLC) systems, which has not yet been studied in the existing literatures. In each transmission period of this system, the multi-antenna controller sends confidential URLLC messages integrated with artificial noise (AN) to a single-antenna actuator for some mission-critical operations (e.g., remote control), and while an unknown number of passive eavesdroppers attempt to intercept this confidential message in a non-colluding manner. Since the conventional ergodic secrecy capacity is not accurate to describe the maximal achievable secrecy rate of URLLC with short blocklength coding, we establish the concept of achievable effective secrecy rate (AESR) to measure the secrecy performance of our URLLC system, which is defined as the average number of information bits can be transmitted per channel use under given reliability and information leakage constraints. Due to the exact expression of AESR has an intractable form, we derive a closed-form approximation on the AESR to simplify the calculation, via leveraging the Laplace approximation and Gaussian-Chebyshev quadrature method. Following by this approximation, we propose an efficient two-dimensional search algorithm to determine the optimal transmission parameters that maximize the AESR, i.e., the training pilot length and the power allocation ratio between confidential data signals and AN. Furthermore, the asymptotic performance of AESR in the high-SNR regime is also analyzed to gain more insights. Numerical results validate the accuracy of theoretical approximations presented in this paper, and illustrate how the particular system parameters impact the AESR of our considered URLLC system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks.
- Author
-
Zheng, Tong-Xing, Wen, Yating, Liu, Hao-Wen, Ju, Ying, Wang, Hui-Ming, Wong, Kai-Kit, and Yuan, Jinhong
- Abstract
In this paper, we investigate physical-layer security of the uplink millimeter wave communications for a cellular vehicle-to-everything (C-V2X) network comprised of a large number of base stations (BSs) and different categories of V2X nodes, including vehicles, pedestrians, and road side units. Considering the dynamic change and randomness of the topology of the C-V2X network, we model the roadways, the V2X nodes on each roadway, and the BSs by a Poisson line process, a 1D Poisson point process (PPP), and a 2D PPP, respectively. We propose two uplink association schemes for a typical vehicle, namely, the smallest-distance association (SDA) scheme and the largest-power association (LPA) scheme, and we establish a tractable analytical framework to comprehensively assess the security performance of the uplink transmission, by leveraging the stochastic geometry theory. Specifically, for each association scheme, we first obtain new expressions for the association probability of the typical vehicle, and then derive the overall connection outage probability and secrecy outage probability by calculating the Laplace transform of the aggregate interference power. Numerical results are presented to validate our theoretical analysis, and we also provide interesting insights into how the security performance is influenced by various system parameters, including the densities of V2X nodes and BSs. Moreover, we show that the LPA scheme outperforms the SDA scheme in terms of secrecy throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Physical-Layer Security of Underlay MIMO-D2D Communications by Null Steering Method Over Nakagami- m and Norton Fading Channels.
- Author
-
Kumar, Ajay, Majhi, Sudhan, and Wu, Hsiao-Chun
- Abstract
Underlay device-to-device (D2D) communication network is becoming a promising solution for the fifth generation (5G) and beyond wireless technology. It exploits the proximity of the D2D pairs and improves the overall network’s latency, capacity, and spectral efficiency by sharing/reusing the existing cellular resources. However, due to the frequency-sharing/reusing, the security of the device users (DUs) and the cellular users (CUs) becomes vulnerable. This paper presents a novel physical-layer security (PLS) scheme for the underlay multiple-input multiple-output (MIMO) D2D communications in the presence of multiple eavesdroppers. The proposed new PLS scheme can significantly reduce the information leakage for both CUs and DUs by adopting a null steering scheme at the transmitter. A signal alignment technique is also employed to eradicate the stringent requirement of a larger number of transmitter antennas than that of the receiver antennas. A generalized nonlinear optimization problem has been formulated to improve the PLS performance for MIMO-D2D communications. A closed-form and generalized analytical expression of the secrecy outage probability for CUs and DUs is derived over the imperfect Nakagami- $m$ and Norton fading channels. Theoretical and simulation results of our proposed new PLS scheme have shown significant improvement in the secrecy capacity and secrecy outage probability for both CUs and DUs in comparison with the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks.
- Author
-
Sun, Yifu, An, Kang, Zhu, Yonggang, Zheng, Gan, Wong, Kai-Kit, Chatzinotas, Symeon, Yin, Haifan, and Liu, Pengtao
- Abstract
Wireless communications are increasingly vulnerable to simultaneous jamming and eavesdropping attacks due to the inherent broadcast nature of wireless channels. With this focus, due to the potential of reconfigurable intelligent surface (RIS) in substantially saving power consumption and boosting information security, this paper is the first work to investigate the effect of the RIS-assisted wireless transmitter in improving both the spectrum efficiency and the security of multi-user cellular network. Specifically, with the imperfect angular channel state information (CSI), we aim to address the worst-case sum rate maximization problem by jointly designing the receive decoder at the users, both the digital precoder and the artificial noise (AN) at the base station (BS), and the analog precoder at the RIS, while meeting the minimum achievable rate constraint, the maximum wiretap rate requirement, and the maximum power constraint. To address the non-convexity of the formulated problem, we first propose an alternative optimization (AO) method to obtain an efficient solution. In particular, a heuristic scheme is proposed to convert the imperfect angular CSI into a robust one and facilitate the developing a closed-form solution to the receive decoder. Then, after reformulating the original problem into a tractable one by exploiting the majorization-minimization (MM) method, the digital precoder and AN can be addressed by the quadratically constrained quadratic programming (QCQP), and the RIS-aided analog precoder is solved by the proposed price mechanism-based Riemannian manifold optimization (RMO). To further reduce the computational complexity of the proposed AO method and gain more insights, we develop a low-complexity monotonic optimization algorithm combined with the dual method (MO-dual) to identify the closed-form solution. Numerical simulations using realistic RIS and communication models demonstrate the superiority and validity of our proposed schemes over the existing benchmark schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Secure Transmit Beamforming for Radar-Communication Systems Using NOMA.
- Author
-
Luo, Dongqi, Ye, Zixuan, and Zhu, Jihong
- Abstract
This letter focuses on the physical layer security of dual-functional radar-communication (DFRC) systems and proposes a novel non-orthogonal multiple-access (NOMA)-based secure transmission beamforming method. The proposed method prevents eavesdropping by concealing the confidential information of the legitimate users in the radar beam, and the legitimate users can remove the interference by successive interference cancellation (SIC). We formulate the problem as a non-convex optimization problem and then decompose it into two sub-problems, where the first sub-problem enjoys a closed-form solution, and the other is solved iteratively. Numerical results verify the effectiveness of our method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. One-Bit Statistical ECSI Learning for Single-Group Multicast Secure Beamforming.
- Author
-
Fan, Simeng, Xu, Jing, Xue, Jiang, and Zhang, Yizhai
- Abstract
This letter investigates a binary learning mechanism for statistical eavesdroppers’ channel state information (SECSI), in which the transmitter utilizes one-bit signal-to-noise-ratio feedback to constantly learn the channel correlation matrices of the eavesdropping links without any prior SECSI. Correspondingly, with the updated SECSI estimate, the optimal single-group multicast secure beamforming (SGMC-SBF) is determined and probed continually for multicast secrecy rate maximization. Simulation results show that this convergent cognitive strategy could not only achieve higher ergodic multicast secrecy rate than the worst-case robust SGMC-SBF with imperfect SECSI, but also approach the ideal performance achieved by perfect SECSI. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Impact of Outdated CSI on the Secure Communication in Untrusted In-Band Full-Duplex Relay Networks
- Author
-
Jin-Taek Lim, Taehoon Kim, and Inkyu Bang
- Subjects
Physical-layer security ,untrusted relay ,full-duplex ,outdated channel state information ,artificial noise ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To provide reliable connectivity in recent and future wireless communication systems, it is necessary to deploy several relay nodes. Further, a full-duplex (FD) technique has been in the spotlight since it can significantly improve spectral efficiency, and thus recent studies in relaying networks have considered FD relays. In relaying networks, confidentiality between the source and destination nodes from the relay node should be carefully kept since the relay node cannot be fully trusted, so called untrusted relay node. To this end, in this paper, we consider physical-layer security taking into account an untrusted FD relay node. We investigate a secure relaying protocol against the untrusted relay node where the destination generates artificial noise to prevent the untrusted relay from decoding the source information. We derive the analytical expression of the lower bound of the ergodic secrecy rate ( $\bar {R}$ ). We find two main factors affecting the secrecy performance: residual self-interference (RSI) at the FD-available nodes (i.e., relay and destination), and outdated channel state information (CSI) at the destination. Thereafter, we evaluate their effects on $\bar {R}$ and suggest the algorithm to find the sub-optimal artificial noise power level at the destination for maximizing $\bar {R}$ . Through simulations, we have verified our mathematical derivation and shown that our secure relaying protocol can achieve near-optimal secrecy performance. Numerical results imply that the artificial noise power level should be carefully considered when the channel is severely outdated and RSI is irresistible.
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.