4,679 results on '"physical layer security"'
Search Results
2. An Effective Cooperative Jamming-Based Secure Transmission Scheme for a Mobile Scenario
- Author
-
Huang, Haidong, Huo, Yan, Gao, Qinghe, Jing, Tao, Yang, Zhiwei, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Cai, Zhipeng, editor, Takabi, Daniel, editor, Guo, Shaoyong, editor, and Zou, Yifei, editor
- Published
- 2025
- Full Text
- View/download PDF
3. SVM Multi-class Classification Method for Device Identification Using Eye Diagram Parameters
- Author
-
Yuan, Jian, Hu, Aiqun, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Chen, Xiang, editor, Wang, Xijun, editor, Lin, Shangjing, editor, and Liu, Jing, editor
- Published
- 2025
- Full Text
- View/download PDF
4. Physical Layer Security Analysis for Correlated Nakagami-m Fading Channel
- Author
-
Lato, Damepaia, Mudoi, Rajkishur, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Sharma, Bikash, editor, Do, Dinh-Thuan, editor, Sur, Samarendra Nath, editor, and Liu, Chuan-Ming, editor
- Published
- 2025
- Full Text
- View/download PDF
5. The Framework of General Channel Key Generation Based on Physical Layer
- Author
-
Zhao, Hong, Guo, Enting, Liao, Xiuheng, Sakurai, Kouichi, Su, Chunhua, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Chen, Xiaofeng, editor, and Huang, Xinyi, editor
- Published
- 2025
- Full Text
- View/download PDF
6. 用于射频指纹识别的改进多尺度残差网络.
- Author
-
凌浩然, 朱丰超, 姚敏立, and 赵建勋
- Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
7. On the trade‐off between rate and reliability for secret key generation in wireless channels.
- Author
-
Sandell, Magnus
- Subjects
- *
PHYSICAL layer security , *WIRELESS channels , *SIMULATION software , *RECIPROCITY (Psychology) - Abstract
Wireless propagation channels can be used to obtain secret keys to enhance security. By exploiting the reciprocity of the channel between legitimate users and its independence of an eavesdropper's channel, it can be quantised to produce a string of bits. The quality of these bits can be enhanced by using guard bands when quantising, which means that some samples are not used due to their poor quality. Although this increases the probability that the legitimate users produce the same bits, it also reduces the number of generated bits. We derive the optimal trade‐off between these contrasting quantities, first for a single sample and then extended to a frequency‐selective channel. The results are presented for both software simulations and hardware evaluations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Enhancement of Physical Layer Security in LoRa Networks Using Optimal Key Generation.
- Author
-
Anisah, Ida, Suwadi, Wirawan, Yuliana, Mike, and Endroyono
- Subjects
PHYSICAL layer security ,COMPUTER network security ,RECIPROCITY (Psychology) - Abstract
Physical Layer Security (PLS) uses channel parameters to generate secret keys to secure communications between legitimate users. However, implementing PLS on Long Range (LoRa) networks faces challenges such as low reciprocity, a trade-off between key disagreement and generation rates, and limited key randomness due to the many LoRa network implementations on fixed networks. This research introduced a new method for choosing optimal window lengths in Savitzky-Golay filters combined with modified SKYGlow quantizations, outperforming previous works that did not use optimal window lengths and used 4-ary quantization. Experimental results show a significant increase, with the key generation rate reaching 6.9537 bps and decreasing the key disagreement rate to 0.07827. Thus, generating a key of 128 bits takes only 18.4 s. This research significantly contributes to developing more reliable and secure SKG techniques on LoRa networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. 智能表面辅助的星地融合数能同传鲁棒安全波束成形.
- Author
-
马 彪, 赵 柏, 冯一帆, and 欧阳键
- Subjects
WIRELESS power transmission ,PHYSICAL layer security ,MULTICASTING (Computer networks) ,ENERGY harvesting ,WIRELESS communications ,SEMIDEFINITE programming - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
10. STAR-RIS 辅助通信感知一体化的多用户安全通信.
- Author
-
郝万明, 宋亚飞, and 孙钢灿
- Subjects
PHYSICAL layer security ,OPTIMIZATION algorithms ,ENERGY consumption ,ENERGY security ,SIGNAL-to-noise ratio - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
11. Covert Communications in a Hybrid DF/AF Relay System.
- Author
-
Moon, Jihwan
- Subjects
- *
PHYSICAL layer security , *TIME complexity , *DETECTORS , *PROBABILITY theory - Abstract
In this paper, we study covert communications in a hybrid decode-and-forward (DF)/ amplify-and-forward (AF) relay system. The considered relay in normal operation forwards messages from a source node to a destination node in either DF or AF mode on request. Meanwhile, the source and destination nodes also attempt to secretly exchange covert messages such as confidential or sensitive information and avoid detection by the covert message detector embedded on the relay. We first establish an optimal DF/AF mode selection criterion to maximize the covert rate based on the analyses of delay-aware achievable covert rates of individual DF and AF modes. To further reduce the time complexity, we propose a low-complexity selection criterion as well for practical use. The numerical results demonstrate the covert rate gain as high as 50% and running time gain as high as 20% for particular system parameters, which verify the effectiveness of the proposed criteria. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Amplitude‐Phase Independently Encoding Space‐Division Multiplexed Wireless Communication Using Beamforming Reconfigurable Metasurfaces.
- Author
-
Xiong, Qi, Zhang, Zuojun, Huang, Cheng, Pu, Mingbo, Luo, Jun, Guo, Yinghui, Ye, Jia, Pan, Wei, Ma, Xiaoliang, Yan, Lianshan, and Luo, Xiangang
- Subjects
- *
PHYSICAL layer security , *PHASE modulation , *AMPLITUDE modulation , *PHASE coding , *BEAMFORMING , *WIRELESS channels , *WIRELESS communications - Abstract
Wireless communications utilizing reconfigurable metasurfaces have garnered significant attention due to their capability to transmit information without traditional radio‐frequency chains. Space‐division multiplexing techniques, in particular, can be utilized to improve their channel capacity. However, most of them are only implemented through either amplitude or phase encoding. Here, a space‐division multiplexed wireless communication system with amplitude‐phase independent encoding is proposed. By designing dual beams with varying power intensity ratios, dual channels that allow for independent amplitude modulation are established. The phase between the two channels can be independently modulated based on the pattern synthesis algorithm. By using the pattern nulling technique, independent modulation between amplitude and phase can be achieved in each channel. Compared to amplitude‐only modulation, amplitude‐phase modulation offers an additional degree of freedom for carrier wave modulation, which not only increases system capacity but also enhances physical layer security through directional modulation (DM) techniques. To demonstrate this approach, sixteen scattering beams are generated using a beamforming reconfigurable metasurface, and a dual‐channel 4 amplitude phase‐shift keying (4APSK) wireless communication system is experimentally realized. This work paves the way for establishing multiple channels, potentially applicable in multi‐user wireless communications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Secure short-packet communications in power beacon-assisted IoT networks over Nakagami-m fading channels.
- Author
-
Chen, Dechuan, Li, Jin, Hu, Jianwei, Zhang, Xingang, Zhang, Shuai, and Wang, Dong
- Subjects
- *
PHYSICAL layer security , *ENERGY harvesting , *SIGNAL-to-noise ratio , *RADIO transmitter fading , *INTERNET of things , *ACTUATORS - Abstract
In this work, we investigate short-packet communications in power beacon (PB)-assisted Internet-of-Things (IoT) networks, where an energy-constrained actuator first harvests energy from a dedicated PB, and then transmits confidential signals to a desired controller in the presence of an eavesdropper. We derive a closed-form lower bound approximation expression for the average achievable effective secrecy rate (AESR) over Nakagami-m fading channels. To gain more insights, we also present the asymptotic average AESR in the high signal-to-noise ratio (SNR) regime. Specifically, analytical results indicate that an average AESR floor appears with the increase of SNR. Moreover, a low complexity one-dimensional search method is employed to maximize the average AESR by optimizing the energy harvesting length. Monte-Carlo simulations are provided to corroborate our analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Efficient and secure message authentication algorithm at the physical layer.
- Author
-
Noura, Hassan N., Melki, Reem, Chehab, Ali, and Hernandez Fernandez, Javier
- Subjects
- *
PHYSICAL layer security , *DATA integrity , *CONFIDENTIAL communications - Abstract
Message authentication, which refers to source authentication and message integrity, is an essential security service, especially in emerging networks such as peer-to-peer, Device-to-Device, LPWAN (such as NB-IoT, LTE-M or SigFox) and vehicle to vehicle. Traditionally, message authentication schemes handled at upper layers of the protocol stack. Such schemes require multiple rounds and multiple operations per round, which results in a considerable overhead in terms of latency and required resources. Recently, many research works have shifted towards investigating the design of new security solutions at the physical layer (PLS). Although data confidentiality and device authentication schemes have been introduced at the physical layer, yet, no PLS message authentication scheme has been presented. In this paper, we propose a dynamic message authentication algorithm (keyed hash function) that makes use of a secret session key in addition to the random characteristics of the physical channel. Moreover, the cryptographic primitives are dynamic and get updated in a lightweight manner for every input frame symbol. Security and performance analysis were conducted to validate the efficiency and robustness of the proposed scheme. The results confirmed that the proposed authentication scheme exhibits a high level of security with minimum overhead in terms of delay. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Improving physical layer security in distributed multiple‐input multiple‐output dual‐function radar‐communication systems.
- Author
-
Jebali, Safieh, Keshavarz, Hengameh, and Hoseini, Nilufar
- Subjects
- *
WIRELESS sensor network security , *RADAR signal processing , *MIMO radar , *PHYSICAL layer security , *ANTENNAS (Electronics) , *CHANNEL capacity (Telecommunications) - Abstract
A distributed multiple‐input multiple‐output (MIMO) dual‐function radar‐communication (D‐MIMO DFRC) system is composed of multiple distributed dual‐function transmitters, multiple radar receivers and multiple communication receivers, which is capable of performing communication and radar tasks simultaneously. In a DFRC system, the goal is on optimising both the sum ‐rate in communication receivers and detection/localisation performance in radar receivers. The secrecy rate is maximised in D‐MIMO DFRC systems by decreasing the eavesdropper data rate as much as possible with a two‐step antenna selection method while maintaining optimal radar performance. In the first step of the proposed method, all transmitter antennas have been classified into groups based on their distance from each other, and each group is called a cluster. Then, a cluster of distributed transmitter antennas is selected based on path fading effects. In the second step of this method, the antenna selection algorithm is performed in the pre‐selected cluster based on channel capacity information utilising QR decomposition. The results show that this antenna selection method, along with low computational complexity and high performance, leads to the maximisation of the secrecy rate. In DFRC systems, it is desirable to minimise the total transmit power while satisfying system requirements to provide low probability of interception (LPI). Finally, after antenna selection, a power allocation strategy is also applied on the selected antennas to optimise the total transmit power and to maximise throughput in communication radar receivers simultaneously, and as a result it leads to provide LPI. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Ultra-Reliable and Low-Latency Wireless Hierarchical Federated Learning: Performance Analysis †.
- Author
-
Zhang, Haonan, Xu, Peng, and Dai, Bin
- Subjects
- *
FEDERATED learning , *PHYSICAL layer security , *WIRELESS communications , *EAVESDROPPING , *5G networks - Abstract
Wireless hierarchical federated learning (WHFL) is an implementation of wireless federated Learning (WFL) on a cloud–edge–client hierarchical architecture that accelerates model training and achieves more favorable trade-offs between communication and computation. However, due to the broadcast nature of wireless communication, the WHFL is susceptible to eavesdropping during the training process. Apart from this, recently ultra-reliable and low-latency communication (URLLC) has received much attention since it serves as a critical communication service in current 5G and upcoming 6G, and this motivates us to study the URLLC-WHFL in the presence of physical layer security (PLS) issue. In this paper, we propose a secure finite block-length (FBL) approach for the multi-antenna URLLC-WHFL, and characterize the relationship between privacy, utility, and PLS of the proposed scheme. Simulation results show that when the eavesdropper's CSI is perfectly known by the edge server, our proposed FBL approach not only almost achieves perfect secrecy but also does not affect learning performance, and further shows the robustness of our schemes against imperfect CSI of the eavesdropper's channel. This paper provides a new method for the URLLC-WHFL in the presence of PLS. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies.
- Author
-
Song, Xinkang, Wang, Xiang, Li, Xin, Zhao, Shanghong, and Tian, Qin
- Subjects
PHYSICAL layer security ,MONTE Carlo method ,TELECOMMUNICATION systems ,EAVESDROPPING ,COLLUSION - Abstract
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links, with the destination employing the maximal-ratio combining (MRC) scheme. A non-cooperative target (NCT) is assumed to have eavesdropping capabilities for RF and FSO signals in both collusion and non-collusion strategies. The Nakagami-m distribution models fading RF links, while FSO links are characterized by the Málaga ( M ) distribution. Exact closed-form expressions for the system's secrecy outage probability (SOP) and effective secrecy throughput (EST) are derived based on the generalized Meijer G-function with two variables. Asymptotic expressions for the SOP are also obtained under high-signal-to-noise-ratio (SNR) regimes. These conclusions are validated through Monte Carlo simulations. The superiority of the hybrid RF/FSO system in improving the communication security of a single link is confirmed in its comparison with conventional means of RF communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. A simple chaotic base encryption scheme for securing OFDM-PON communications.
- Author
-
Ridha, Oday A.L.A, Jabori, Hiba Abd Alwahab, and Mohammed, Husam Abduldaem
- Subjects
QUADRATURE amplitude modulation ,PASSIVE optical networks ,PHYSICAL layer security ,SINGLE-mode optical fibers ,ORTHOGONAL systems - Abstract
Optical communications and their security have been got a great attention. In this work, a simple, low cost and secure optical system integrating orthogonal frequency division multiplexing-based passive optical network (OFDM-PON) and chaotic theory is proposed. In the proposed system, a novel scheme of quadrature amplitude modulation (QAM) encryption method is adopted. For privacy of image and video encryption, the process of encryption consists of two processes and a 3D chaotic system is employed. The chaotic system is used to generate the encryption sequences. In the first stage, the first generated chaotic sequence is XORed with the incoming data. While in the second stage, the QAM symbol is remapped using the other two generated chaotic sequences. Generally, the proposed system is designed to provide secure data, videos, and images transmission. The proposed system is simulated and evaluated with a transmission of a 10 Gb/s along 50 km single-mode fiber (SMF). The performance of the proposed system showed that there is a performance enhancement in terms of Peak to average power ratio (PAPR) and bit error rate (BER). The BER of unauthorized user is around 0.6147, while the PAPR is reduced to approximately half. The proposed system is simple and doesn't require complex computations. It requires simple analog multiplexers for its implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Physical Layer Security of Ground-to-UAV Communication in the Presence of an Aerial Eavesdropper Outside the Guard Zone.
- Author
-
Anastasov, Jelena, Cvetković, Aleksandra, Panajotović, Aleksandra, Milović, Daniela, Milić, Dejan, and Milošević, Nenad
- Subjects
PHYSICAL layer security ,MATHEMATICAL forms ,CONFIDENTIAL communications ,INTERNET of things ,COMPUTER simulation - Abstract
In this work, we determine the physical layer security (PLS) metrics for ground-to-unmanned aerial vehicle (UAV) link in the presence of a suspicious UAV, which intends to overhear confidential transmission. The ground node sends data up to the UAV, which is positioned exactly above the transmitter and is able to spot an aerial eavesdropper according to the predefined horizontal and/or vertical guard distance. However, the attacker tries to intercept the channel transmission outside of marked zone. The main and wiretap channel are both assumed to be subjected to Fisher-Snedecor fading process. Under such system/channel scenario, the average secrecy capacity, lower bound of secrecy outage probability, intercept probability and non-zero secrecy capacity are characterized in terms of mathematical tractable forms. In addition, numerical and simulation results are presented to verify the correctness of theoretical ones. The impact of different positions of UAVs (their heights and mutual distances) and various conditions over channels on the secrecy transmission is analysed and discussed in details. The proposed PLS scenario can be utilized in Internet of Things environments, with UAV as a data collector, to enhance the security of energy-aware or disaster-stricken transmissions. All obtained results can be helpful in prediction of positioning UAV to achive low probability of interception of confidential communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. V2I Physical Layer Security Beamforming with Antenna Hardware Impairments under RIS Assistance.
- Author
-
Zerong Tang, Tiecheng Song, and Jing Hu
- Subjects
OPTIMIZATION algorithms ,PHYSICAL layer security ,SEMIDEFINITE programming ,ANTENNAS (Electronics) ,BEAMFORMING ,COMMUNICATION models - Abstract
The Internet of Vehicles (IoV) will carry a large amount of security and privacy-related data, which makes the secure communication between the IoV terminals increasingly critical. This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communication with Reconfigurable Intelligent Surface (RIS) assistance, taking into account hardware impairments. A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS. Based on this model, we propose to maximize the V2I physical-layer security transmission rate. To solve the coupled non-convex optimization problem, an alternating optimization algorithm based on second-order cone programming and semidefinite relaxation is proposed to obtain the optimal V2I base station transmit precoding and RIS reflect phase shift matrix. Finally, simulation results are presented to verify the convergence and superiority of our proposed algorithm while analyzing the impact of system parameters on the V2I physical-layer security transmission rate. The simulation results further demonstrate that the proposed robust beamforming algorithm considering hardware impairments will achieve an average performance improvement of 0.7 dB over a non-robustly designed algorithm. Furthermore, increasing the number of RIS reflective units from 10 to 50 results in an almost 2 dB enhancement in secure transmission rate. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. A novel PLS technique for secure ESM based MIMO systems.
- Author
-
Rengaraj, Ramaprabha, Konganathan, Gunaseelan, and Loganathan, Lavanya Dhamotharan
- Subjects
PHYSICAL layer security ,SIGNAL-to-noise ratio ,ADAPTIVE modulation ,SPATIAL systems ,MIMO systems - Abstract
Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due to the use of limited radio frequency chains. In this work, a novel physical layer security scheme with enhanced spatial modulation (ESM) and secret key generation using multi-level adaptive threshold binary-coded decimal quantization algorithm is introduced. The proposed method, as SPACESM, enhances spectral efficiency using ESM and achieves confidentiality by adaptively selecting and shuffling the codebook in ESM. For selection of ESM codebook, SPACESM uses physical layer signature called channel signal to noise ratio (SNR) and for shuffling of codebook and rotation of transmit vector, secret key is generated at the transmitter and receiver separately by threshold-based quantization algorithm, which uses channel state information. Adaptive modulation technique selects the modulation order for different SNR. The performance of the proposed method is evaluated in terms of confidentiality, spectral efficiency, and robustness of secret key through MATLAB simulation.The proposed SPACESM technique provides 2 bpcu improvement for both N t = 2 and N t = 4 with M = 64 than the existing SM. Also it provides 3 dB and 4 dB SNR gain than SM for N t = 2 and N t = 4 respectively. Similarly, it provides 2 dB and 4 dB SNR gain than the SMX technique for N t = 2 and N t = 4 respectively. In summary, the proposed method outperforms than the SMX and SM technique in all aspects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Enhancing physical layer security via information hiding and chaotic frequency-hopping signal.
- Author
-
Fan, MingQuan
- Subjects
PHYSICAL layer security ,FREQUENCY shift keying ,TELECOMMUNICATION satellites ,WIRELESS communications ,BINARY sequences - Abstract
With the development of super computation ability and invention of quantum computer, safeguarding network layer data confidentiality by computation based encryption method suffers great impact. As a result, people pay more attention to safeguarding data confidentiality in physical layer of wireless satellite communication system. In this paper, a groundbreaking method for enhancing physical layer security (PLS) by information hiding technology is proposed, that is, embedding secret information into chaotic frequency-hopping signal by multilevel frequency shift keying (MFSK) modulation. First, the secret information to be transmitted is encrypted with chaotic binary sequence. Secondly, according to frequency-hopping pattern and chaotic address sequence, select suitable modulation order and specific frequency point corresponding to each encrypted data block. Finally, the encrypted information is embedded into frequency-hopping Sine signal by MFSK modulation. Experimental results indicate that the proposed scheme is robust against various jamming attacks, such as power attenuation, noise adding, single-tone jamming, key exhaustive search, etc. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. 分布式卫星系统中的物理层安全波束成形算法.
- Author
-
邵一焓, 王 薇, 王子宁, 黄庶沛, and 韩 略
- Subjects
ARTIFICIAL satellites ,PHYSICAL layer security ,BEAMFORMING ,COMPUTATIONAL complexity ,ALGORITHMS - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
24. Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model.
- Author
-
Alhoraibi, Lamia, Alghazzawi, Daniyal, and Alhebshi, Reemah
- Subjects
- *
MACHINE learning , *PHYSICAL layer security , *GENERATIVE adversarial networks , *GLOBAL Positioning System , *WIRELESS communications , *DEEP learning - Abstract
Advancements in wireless communication and automation have revolutionized mobility systems, notably through autonomous vehicles and unmanned aerial vehicles (UAVs). UAV spatial coordinates, determined via Global Positioning System (GPS) signals, are susceptible to cyberattacks due to unencrypted and unauthenticated transmissions with GPS spoofing being a significant threat. To mitigate these vulnerabilities, intrusion detection systems (IDSs) for UAVs have been developed and enhanced using machine learning (ML) algorithms. However, Adversarial Machine Learning (AML) has introduced new risks by exploiting ML models. This study presents a UAV-IDS employing AML methodology to enhance the detection and classification of GPS spoofing attacks. The key contribution is the development of an AML detection model that significantly improves UAV system robustness and security. Our findings indicate that the model achieves a detection accuracy of 98%, demonstrating its effectiveness in managing large-scale datasets and complex tasks. This study emphasizes the importance of physical layer security for enhancing IDSs in UAVs by introducing a novel detection model centered on an adversarial training defense method and advanced deep learning techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes.
- Author
-
Shi, Chenhao, Hu, Yulin, Zhu, Yao, and Schmeink, Anke
- Subjects
- *
PHYSICAL layer security , *EDGE computing , *MOBILE computing , *ENERGY consumption , *COMPUTER systems - Abstract
Energy efficiency and physical-layer security are crucial considerations in the advancement of mobile edge computing systems. This paper addresses the trade-off between secure-reliability and energy consumption in finite blocklength (FBL) communications. Specifically, we examine a three-node scenario involving a user, a legitimate edge computing server, and an eavesdropper, where the user offloads sensitive data to the edge server while facing potential eavesdropping threats. We propose an optimization framework aimed at minimizing energy consumption while ensuring secure-reliability by decomposing the problem into manageable subproblems. By demonstrating the convexity of the objective function concerning the variables, we establish the existence of an optimal parameter selection for the problem. This implies that practical optimization of parameters can significantly enhance system performance. Our numerical results demonstrate that the application of FBL regime and retransmission mechanism can effectively reduce the energy consumption of the system while ensuring secure-reliability. For the quantitative analyses, the retransmission mechanism is 33.1% better than no retransmission, and the FBL regime is 13.1% better than infinite blocklength (IBL) coding. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Intelligent jamming detection‐based robust principal components analysis in communication system for security and defense.
- Author
-
Moumena, Ahmed and Saim Haddache, Imane
- Subjects
- *
PHYSICAL layer security , *GLOBAL Positioning System , *PRINCIPAL components analysis , *RECEIVER operating characteristic curves , *WIRELESS communications - Abstract
Threats to physical layer security from jamming attacks make wireless cognitive communication systems vulnerable. Global Positioning System signal is vulnerable to these attacks. Over the last decade, several types of jamming detection techniques have been proposed, antijamming‐based classical and machine learning (ML) techniques. Most of these techniques are inefficient in detecting jammers. Thus, there is a great need for efficient and quickest jamming detection technique‐based classifier using receiver operating characteristic (ROC) curve for different threshold values with high accuracy. In this work, we compare the efficiency of the proposed orthogonal distance (OD) and score distance (SD) method‐based robust principal component analysis (PCA) in ML classification in detecting jamming signals. Two hypotheses are proposed to distinguish between the presence and absence attack problem. Using this compressed data matrix obtained from modulated wideband converter (MWC) structure via centralized cooperation directly as input of the proposed classifier combined‐based ROC curve for real‐time detection scenarios. The performance of this proposed algorithm‐based robust PCA was evaluated and compared using the detection anomaly rate (DAR%), and false alarm rate (FAR%), area under curve (AUC), and accuracy. The performance of obtained results is good. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. 准静态环境下的回溯加扰密钥生成算法.
- Author
-
王丹, 方磊, 何斌, and 陈发堂
- Abstract
Physical layer security techniques utilize the wireless channel environment to dynamically generate keys, however, in quasi-static environment, slow channel transformation leads to insufficient key randomness and security. Here, a Backtracking Scrambled Key Generation (BSKG) algorithm is proposed. First, the real and imaginary parts of the channel coefficients are split and quantized to generate a longer key, which is reconciled, then the sum of the inconsistent indexes between the current key and previous key is used to generate a scrambling code to scramble the current key. Simulation shows that, compared with the existing multi-dimensional information and artificial randomness key generation method, the proposed algorithm has higher key generation rate and security, and the key leakage rate is close to 0. 5 with the increase of the one-time pad key generation times, even if more relevant channel coefficients have been eavesdropped. The upper bounds on the probability of successful eavesdropping and their variations with the number of key generation N for general and bad channel conditions are estimated using semantic security and information-theoretic inequalities, respectively, when giving certain parameters, the upper bounds for these two cases turn out to be 2-77N and 2-23N. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.
- Author
-
Fu, Shiming, Ling, Tong, Yang, Jun, and Li, Yong
- Subjects
- *
PHYSICAL layer security , *SIGNAL-to-noise ratio , *TOPOLOGY , *LINEAR network coding - Abstract
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. A novel security‐based adaptive reconfigurable intelligent surfaces assisted clustering strategy.
- Author
-
Tian, Yue and Zheng, Xiaofan
- Subjects
- *
WIRELESS communications security , *PHYSICAL layer security , *PROBABILITY density function , *OPTICAL communications , *WIRELESS communications - Abstract
Reconfigurable intelligent surfaces (RISs) have attracted a great deal of interest due to the potential contributions to the next‐generation wireless networks. This letter proposes an enhancement to the physical layer security (PLS) of a multi‐hop RIS‐assisted underwater optical wireless communication (UOWC) system. Owing to the complexity of the underwater environment, a security‐based adaptive RIS (SA‐RIS) clustering strategy, which aims to reflect optical signals among clusters to improve the performance of the overall system, is evaluated. By combining the underwater channel model, the closed‐form expressions of probability density function (PDF) and cumulative distribution function (CDF) are derived. Moreover, by increasing the numbers of RIS clusters, the performance metrics such as secrecy outage probability (SOP) and average secrecy capacity (ASC) are evaluated under different scenarios. The obtained results demonstrated that, in contrast to the case without preventing the eavesdropper, the proposed strategy in evasion scenarios could improve the SOP significantly. It can be concluded that the system secrecy performances are further improved by assigning different RIS clusters with proper channel quality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Survey on 5G Physical Layer Security Threats and Countermeasures.
- Author
-
Harvanek, Michal, Bolcek, Jan, Kufa, Jan, Polak, Ladislav, Simka, Marek, and Marsalek, Roman
- Subjects
- *
PHYSICAL layer security , *TIME complexity , *SECURITY systems , *SOFTWARE frameworks , *DATA transmission systems - Abstract
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the respective countermeasures are implemented to secure data transmissions, the attacks have become increasingly sophisticated on the one hand, but at the same time the system complexity can open up expanded opportunities for security and privacy breaches. After an in-depth summary of possible entry points to attacks to mobile networks, this paper first briefly reviews the basic principles of the physical layer implementation of 4G/5G systems, then gives an overview of possible attacks from a physical layer perspective. It also provides an overview of the software frameworks and hardware tool-software defined radios currently in use for experimenting with 4G/5G mobile networks, and it discusses their basic capabilities. In the final part, the paper summarizes the currently most promising families of techniques to detect illegitimate base stations—the machine-learning-based, localization-based, and behavior-based methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Dynamic Time Allocation Based Physical Layer Security for Jammer-Aided Symbiotic Radio Networks.
- Author
-
ONAY, Muhammed Yusuf
- Subjects
PHYSICAL layer security ,RADIO networks ,TIME management ,ENERGY consumption ,BACKSCATTERING ,RADIO frequency allocation - Abstract
Symbiotic Radio Networks (SRNs) have emerged as an important communication protocol to solve the increasing energy demand and spectrum resource shortage. However, the low bit rates of the devices working in SRNs during backscatter communication, where the surrounding radio frequency resources are used by subsystems different from the main system, make SRNs very vulnerable to external attacks such as eavesdropping and jamming. To solve this problem, the Physical Layer Security (PLS) for SRNs with Signal Emitter (SE), user, jammer, receiver and eavesdropper (ED) is analyzed. While the SE conveys its information to the receiver, the user assists the SE in part of the time period and transmits its information to the receiver in the other part. While ED is overhearing SE and user's information over the wiretap channel, the jammer is trying to prevent ED with the signal it emits. This model, in which the secrecy rate is maximized over time parameters, is the first approach in which PLS analysis is carried out in the presence of a cooperative jammer when the perfect/imperfect Successive Interference Cancellation (SIC) technique is used at the receiver. Numerical results show that the existence of a symbiotic relationship between the user and the SE increases the secrecy rate of the system compared to the non-symbiotic situation. Moreover, adopting the perfect SIC technique at the receiver without energy constraint at the user resulted in a significant increase in PLS performance compared to the imperfect SIC under energy constraint. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. 非 非 理想CSI下IRS辅助 MISO 保密速率最大化方法.
- Author
-
彭 艺, 张 宇, and 杨青青
- Subjects
WIRELESS communications ,SEMIDEFINITE programming ,PHYSICAL layer security ,BEAMFORMING ,MISO - Abstract
Copyright of Journal of Jilin University (Science Edition) / Jilin Daxue Xuebao (Lixue Ban) is the property of Zhongguo Xue shu qi Kan (Guang Pan Ban) Dian zi Za zhi She and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
33. Gas Sensor Physically Unclonable Function-Based Lightweight Bidirectional Authentication Protocol for Gas Sensor Networks.
- Author
-
Hu, Shuang, Wang, Pengjun, He, Haonan, Zhang, Yuejun, and Li, Xiangyu
- Subjects
GAS detectors ,SENSOR networks ,PHYSICAL layer security ,SENSOR arrays ,DATA security - Abstract
In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonable functions (GS-PUFs) with authentication technology to guarantee the reliability of data from sensor nodes. A sensor PUF array is constructed by preparing gas sensors to enhance the data security of the physical layer and reduce hardware resource consumption. The authentication part of the protocol mainly uses lightweight encryption methods, consisting of PUF data, one-way cryptographic hash functions, and iso-or functions, to reduce the computational overhead of the authentication process. The protocol security is enhanced by encrypting the GS-PUF response as an irreversible hash value and verifying the hash value by the user, server, and sensor node to complete bidirectional authentication. The test results demonstrate that the protocol, verified through the ProVerif formal tool, can resist impersonation, replay, node tampering, and cloning attacks. Among the compared schemes, this protocol offers the highest security and the least resource overhead, making it effectively applicable in the Internet of Things and other fields. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Weighted Secrecy Sum Rate Optimization for Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface-Assisted Multiple-Input Single-Output Systems.
- Author
-
Wu, Baoliang and Wu, Yue
- Subjects
PHYSICAL layer security ,OPTIMIZATION algorithms ,MISO - Abstract
The study investigates the effectiveness of a novel Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface (STAR-RIS) technology in enhancing the physical layer security of Multiple-Input Single-Output (MISO) systems. To address the complexity of the security challenge, we examine two distinct phase shift strategies, namely, the coupled phase scheme and the independent phase scheme. The coupled paradigm focuses on optimizing weighted sum secrecy rate (WSSR) through a customized Block Coordinate Descent (BCD) approach integrated with path tracking, aiming to achieve a balanced security enhancement. Furthermore, for the independent phase shift paradigm, an optimization algorithm based on the Concave–Convex Procedure (CCCP) is explored to provide a flexible security solution. The numerical results validate the superior performance of STAR-RIS, confirming its potential as a robust security enhancer for MISO systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. RIS-Assisted MIMO Secure Communication Schemes Based on Fixed and Dynamic Subarray Partition.
- Author
-
Wang, Suzhen, Zhi, Hui, Tian, Changlin, and Wu, Hongcheng
- Subjects
PARTICLE swarm optimization ,PHYSICAL layer security ,REFLECTANCE ,ASSIGNMENT problems (Programming) ,COMBINATORIAL optimization - Abstract
The subarray partition of reconfigurable intelligent surface (RIS) can reduce the complexity and hardware cost of the RIS architecture while achieving satisfactory performance, which has great practical significance. However, existing RIS subarray partition methods do not consider the scenario with eavesdropper and are not suitable for such scenario. Therefore, this paper discusses the joint optimization design of subarray partition and reflection coefficients to maximize the system secrecy rate in the multi-antenna eavesdropper scenario. Since this problem is a nonconvex combinatorial optimization problem, we solve it by alternating optimization, and propose RIS-assisted MIMO secure communication schemes based on fixed and dynamic subarray partition respectively. In fixed subarray partition scheme, the closed expressions of the optimal transmit covariance matrix and the optimal reflection coefficients are obtained through theoretical analysis, where the reflection coefficients are optimized by coordinate descent method. The fixed subarray partition scheme is not limited by the subarray structure and the number of subarray units. In dynamic subarray partition scheme, we transform the subarray partition optimization problem into a task assignment problem, and propose an improved discrete particle swarm optimization (DPSO) algorithm to solve it. Simulations and analyses show that compared with the without partition scheme, two proposed schemes can achieve a satisfactory secrecy rate while reducing system complexity and hardware cost. In addition, the dynamic subarray partition scheme has better secrecy rate performance and better stability than fixed subarray partition scheme, but its implementation is more complex. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Energy‐efficient physical layer security schemes for low Earth orbit satellite systems.
- Author
-
Chan, Satya, Kim, Sooyoung, Kim, Hee Wook, Ku, Bon‐Jun, and Oh, Daesub
- Subjects
LOW earth orbit satellites ,PHYSICAL layer security ,SECURITY systems ,ORBITS (Astronomy) ,NOISE - Abstract
Summary: This paper introduces four proposals to enhance physical layer security (PLS) in low Earth orbit (LEO) satellite systems. The first proposal leverages the Alamouti code aided by artificial noise (AN) and involves the collaborative use of two LEO satellites, ensuring secure downlink transmission. Its efficiency is further enhanced when implementing a power‐balanced Alamouti code. The second PLS proposal capitalizes on an reconfigurable intelligent surface (RIS) to introduce interference to potential eavesdroppers. As the RIS manages the reflected channel, this security measure is achieved without necessitating additional transmit power or receiver operations. The third proposal integrates the first and second solutions, resulting in improved secrecy rates compared to the individual proposals, nearly reaching the maximum achievable rate. The fourth proposal is based on a relay‐based method, securing all transmission links from the satellite to the relay and from the satellite and relay to the legitimate user. The secrecy performance simulation results presented in the paper demonstrate the remarkable effectiveness of the proposed solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Physical Layer Security of 6G Vehicular Networks with UAV Systems: First Order Secrecy Metrics, Optimization, and Bounds.
- Author
-
Kavaiya, Sagar, Mewada, Hiren, Patel, Sagarkumar, Chauhan, Dharmendra, Almalki, Faris A., and Mujlid, Hana Mohammed
- Subjects
PHYSICAL layer security ,DRONE aircraft ,SECURITY systems ,EAVESDROPPING ,CRYPTOGRAPHY - Abstract
The mobility and connective capabilities of unmanned aerial vehicles (UAVs) are becoming more and more important in defense, commercial, and research domains. However, their open communication makes UAVs susceptible to undesirable passive attacks such as eavesdropping or jamming. Recently, the inefficiency of traditional cryptography-based techniques has led to the addition of Physical Layer Security (PLS). This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments, proposing a solution to complement the conventional cryptography approach. Initially, we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems, namely hybrid outage probability (HOP) and secrecy outage probability (SOP) over 2 × 2 Nakagami- m channels. Later, we propose a novel technique for mitigating passive eavesdropping, which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds. Finally, we conduct an analysis of bounded HOP and SOP using the interactive Nakagami- m channel, considering the multiple-input-multiple-output configuration of the UAV system. The findings indicate that 2 × 2 Nakagami- m is a suitable fading model under constant velocity for trustworthy receivers and eavesdroppers. The results indicate that UAV mobility has some influence on an eavesdropper's intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Secrecy capacity of hybrid FSO-RF communication links.
- Author
-
Sharma, Hemant Kumar and Kumbhani, Brijesh
- Abstract
In this paper, we analyze the secrecy capacity of hybrid communication links comprising cascaded free space optical (FSO) and radio frequency (RF) wireless systems. We consider the system in which FSO links are used as the medium of data transmission for the first hop followed by RF links for relaying the data to the destination. We consider Gamma–Gamma distributed channel gain for the FSO links and Nakagami-m fading distribution for the RF communication link. This takes care of both the line of sight (LOS) and non-LOS conditions for the RF link. We derive closed-form expressions for end-to-end secrecy capacity. The closed-form expressions are derived by representing the incomplete gamma function in the form of Meijer's G-function. Further, closed-form solutions to the integrals involving the product of two Meijer's G-functions are obtained. The analytical expressions have been validated through results obtained from simulations. A close agreement between the simulation and the analytical results is observed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Secure data rate maximization for full-duplex UAV-enabled base station
- Author
-
Chunlong He, Xinjie Li, Yin Huang, Jianzhen Lin, Gongbin Qian, and Xingquan Li
- Subjects
UAV relay ,Physical layer security ,Full-duplex UAV ,Power optimization ,Trajectory optimization ,Information technology ,T58.5-58.64 - Abstract
Unmanned Aerial Vehicle (UAV) is an air base station featuring flexible deployment and mobility. It can significantly improve the communication quality of the system due to its line-of-sight channel connection with ground devices. However, due to the openness of UAV-to-Ground channels, the communication between ground users’ devices and UAV is easily eavesdropped. In this paper, we aim to improve the security of communication system by using full-duplex UAV as a mobile air base station. The UAV sends interference signals to eavesdroppers and receives signals from ground devices. We jointly optimize the scheduling between the UAV and ground devices, the transmission power of the UAV and ground devices, as well as the trajectory of the UAV to maximize the minimum average security communication data rate. This optimization problem is mixed with integers and non-convex expressions. Therefore, this problem is not a standard convex optimization problem, which can not be solved with standard methods. With this in mind, we propose an effective algorithm which solves this problem iteratively by applying Successive Convex Approximation (SCA), variable relaxation and substitution. Finally, numerical results demonstrate the effectiveness of the proposed algorithm.
- Published
- 2024
- Full Text
- View/download PDF
40. Secure short-packet communications in power beacon-assisted IoT networks over Nakagami-m fading channels
- Author
-
Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang, Shuai Zhang, and Dong Wang
- Subjects
Short-packet communications ,PB ,Physical layer security ,Average AESR ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract In this work, we investigate short-packet communications in power beacon (PB)-assisted Internet-of-Things (IoT) networks, where an energy-constrained actuator first harvests energy from a dedicated PB, and then transmits confidential signals to a desired controller in the presence of an eavesdropper. We derive a closed-form lower bound approximation expression for the average achievable effective secrecy rate (AESR) over Nakagami-m fading channels. To gain more insights, we also present the asymptotic average AESR in the high signal-to-noise ratio (SNR) regime. Specifically, analytical results indicate that an average AESR floor appears with the increase of SNR. Moreover, a low complexity one-dimensional search method is employed to maximize the average AESR by optimizing the energy harvesting length. Monte-Carlo simulations are provided to corroborate our analysis.
- Published
- 2024
- Full Text
- View/download PDF
41. Dynamic Time Allocation Based Physical Layer Security for Jammer-Aided Symbiotic Radio Networks
- Author
-
M. Y. Onay
- Subjects
symbiotic radio networks ,sixth generation (6g) ,physical layer security ,eavesdropper ,jammer ,imperfect successive interference cancellation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Symbiotic Radio Networks (SRNs) have emerged as an important communication protocol to solve the increasing energy demand and spectrum resource shortage. However, the low bit rates of the devices working in SRNs during backscatter communication, where the surrounding radio frequency resources are used by subsystems different from the main system, make SRNs very vulnerable to external attacks such as eavesdropping and jamming. To solve this problem, the Physical Layer Security (PLS) for SRNs with Signal Emitter (SE), user, jammer, receiver and eavesdropper (ED) is analyzed. While the SE conveys its information to the receiver, the user assists the SE in part of the time period and transmits its information to the receiver in the other part. While ED is overhearing SE and user's information over the wiretap channel, the jammer is trying to prevent ED with the signal it emits. This model, in which the secrecy rate is maximized over time parameters, is the first approach in which PLS analysis is carried out in the presence of a cooperative jammer when the perfect/imperfect Successive Interference Cancellation (SIC) technique is used at the receiver. Numerical results show that the existence of a symbiotic relationship between the user and the SE increases the secrecy rate of the system compared to the non-symbiotic situation. Moreover, adopting the perfect SIC technique at the receiver without energy constraint at the user resulted in a significant increase in PLS performance compared to the imperfect SIC under energy constraint.
- Published
- 2024
42. Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes
- Author
-
Chenhao Shi, Yulin Hu, Yao Zhu, and Anke Schmeink
- Subjects
Edge computing ,Finite blocklength regime ,Retransmission ,Physical layer security ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract Energy efficiency and physical-layer security are crucial considerations in the advancement of mobile edge computing systems. This paper addresses the trade-off between secure-reliability and energy consumption in finite blocklength (FBL) communications. Specifically, we examine a three-node scenario involving a user, a legitimate edge computing server, and an eavesdropper, where the user offloads sensitive data to the edge server while facing potential eavesdropping threats. We propose an optimization framework aimed at minimizing energy consumption while ensuring secure-reliability by decomposing the problem into manageable subproblems. By demonstrating the convexity of the objective function concerning the variables, we establish the existence of an optimal parameter selection for the problem. This implies that practical optimization of parameters can significantly enhance system performance. Our numerical results demonstrate that the application of FBL regime and retransmission mechanism can effectively reduce the energy consumption of the system while ensuring secure-reliability. For the quantitative analyses, the retransmission mechanism is 33.1% better than no retransmission, and the FBL regime is 13.1% better than infinite blocklength (IBL) coding.
- Published
- 2024
- Full Text
- View/download PDF
43. Secure transmission scheme for millimeter-wave Internet of vehicles with multiple base stations and users
- Author
-
JU Ying, CHEN Yuchao, TIAN Suheng, LIU Lei, LI Zan, PEI Qingqi, and WANG Mingyang
- Subjects
millimeter-wave Internet of vehicles ,multi-agent ,physical layer security ,deep reinforcement learning ,Telecommunication ,TK5101-6720 - Abstract
For the timeliness of millimeter-wave secure beamforming in mobile scenarios and the robustness of secure connections in millimeter-wave dynamic eavesdropping scenarios, a multi-agent secure cooperative communication scheme based on a dueling double deep Q network (D3QN)-deep deterministic policy gradient (DDPG) algorithm was proposed to address communication security issues. The scheme utilized road side unit (RSU)-assisted cooperative jamming technology to reduce the eavesdropper’s reception quality of confidential signals. The optimization problem was formulated to maximize the total secrecy rate of all legitimate vehicles by optimizing the joint base station and beam connection control of the VUs, the selection of the jamming RSUs, and the cooperative jamming direction and transmit power of RSUs. Furthermore, for the challenges posed by the high dynamics of vehicular networks, the scheme achieved a fusion of real-time discrete and continuous decision-making by creating a VU agent grounded in D3QN and an RSU agent harnessing D3QN-DDPG capabilities. Finally, through multi-dimensional performance analysis and scheme comparison experiments, simulation results demonstrate the effectiveness of the proposed scheme.
- Published
- 2024
- Full Text
- View/download PDF
44. A RSBU-LSTM network for radio frequency fingerprint identification relying on multiple features
- Author
-
Haoran Ling, Fengchao Zhu, and Minli Yao
- Subjects
Physical layer security ,Radio frequency fingerprint identification ,Deep learning ,Residual shrinkage building units ,Long short-term memory ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract Radio frequency fingerprint identification (RFFI) can distinguish highly similar wireless communication devices to protect physical layer security and improve the security of wireless networks effectively, which has been widely used for spectrum management and physical layer secure communication. However, most RFFI methods show a degradation of performance under low signal-to-noise ratio (SNR) environments. In this paper, we propose a RSBU-LSTM network relying on multiple features to improve the identification accuracy with low SNR. Firstly, we use multiple features of in-phase (I), quadrature (Q), and phase as inputs. Then, we use multiple Residual Shrinkage Building Units (RSBUs) to extract the correlation features within the cycle of signals and preserve as many features as possible in low SNR environments. Finally, we use the long short-term memory (LSTM) to extract the relevant features of the signals of non-adjacent cycles. The experimental results show that the proposed network can effectively complete RFFI in low SNR environments and show better performance than other models used for comparison.
- Published
- 2024
- Full Text
- View/download PDF
45. Effects of co-channel interference on RIS empowered wireless networks amid multiple eavesdropping attempts
- Author
-
Md. Roisul Ajom Ruku, Md. Ibrahim, A.S.M. Badrudduza, Imran Shafique Ansari, Waqas Khalid, and Heejung Yu
- Subjects
Reconfigurable intelligent surface ,Physical layer security ,Co-channel interference ,Secrecy outage probability ,Information technology ,T58.5-58.64 - Abstract
In this study, the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination is investigated. In particular, three critical issues in the design of secure RIS-assisted networks are examined: effects of interferers, operation of multiple eavesdroppers (colluding and non-colluding), and benefit of RISs. To examine their effects, the analytical expressions of secrecy outage probability are derived in a closed form. Additionally, asymptotic analyses at a high signal-to-noise ratio (SNR) regime are provided. Finally, the analytical results are validated through numerical simulations.
- Published
- 2024
- Full Text
- View/download PDF
46. Research on the Teaching of Laser Chaotic Communication Based on Optisystem and Matlab Software.
- Author
-
Zhou, Xuefang, Li, Minjun, Bi, Meihua, Yang, Guowei, and Hu, Miao
- Subjects
CHAOTIC communication ,OPTICAL fiber networks ,PHYSICAL layer security ,TELECOMMUNICATION systems ,COMMUNICATION education - Abstract
The utilization of chaotic optical communication, a physical layer security technology, has the potential to enhance the security of optical fiber networks. In this paper, we take knowledge acquired while teaching "A chaotic security system based on phase-intensity (P-I) electro-optic feedback" as an example and, in detail, introduce a teaching implementation process based on the combination of Optisystem and Matlab. Firstly, based on the Lang–Kobayashi (L-K) laser equation, the generation mechanism of electro-optic feedback chaos was explained. Secondly, the P-I electro-optic feedback chaos was analyzed theoretically with the help of Matlab. Finally, a laser chaotic optical communication system based on electro-optic feedback was built with the help of Optisystem (15.0.0) software, and the performance of the communication was simulated and analyzed through the design of system parameters. The teaching design model and facilitate the concretization of the abstract theory of "the principle of chaos generated by electro-optic feedback, the composition of chaotic optical communication system and the performance index of chaotic communication system". Through after-class exercises and questionnaire surveys, it was verified that the teaching method is widely recognized by students and that it effectively improves the teaching effect of the course of laser chaotic communication and the students' academic research ability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Secure Beamforming Design for UAV-Empowered Integrated Sensing and Communication.
- Author
-
Chen, Chuang and Zhu, Qi
- Subjects
OPTIMIZATION algorithms ,PHYSICAL layer security ,DRONE aircraft ,QUALITY of service ,BEAMFORMING - Abstract
Integrated sensing and communication (ISAC) systems assisted by unmanned aerial vehicles (UAVs) are susceptible to eavesdropping, making secure information transmission a critical area of research. We propose a joint optimization algorithm to improve the security of UAV-assisted ISAC systems through coordinated adjustments of transmit beamforming and UAV position. The optimization problem aims to minimize the maximum eavesdropping signal-to-interference-plus-noise ratio (SINR) across multiple legitimate users while adhering to three distinct constraints: service quality for legitimate users, sensing requirements for detecting eavesdroppers, and limitations on system transmit power. To address the non-convex optimization challenge effectively, the problem is decomposed into sub-problems focusing on the optimization of transmit beamforming and UAV position. These sub-problems are solved using semidefinite relaxation (SDR), the Dinkelbach method, and successive convex approximation (SCA), with iterative alternation achieving optimal values for the transmit beamforming and UAV position while also proving the convergence of the algorithm. Lastly, simulation results illustrate that the proposed algorithm markedly improves the system's security performance while preserving its communication and sensing capabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Secrecy Performance Analysis of Cooperative NOMA with AF and DF Protocol over Rayleigh Channel.
- Author
-
Ashwini, K. and Jagadeesh, V. K.
- Subjects
PHYSICAL layer security ,RAYLEIGH fading channels ,SIGNALS & signaling ,PROBABILITY theory ,RAYLEIGH model - Abstract
The article examined the physical layer security of cooperative non-orthogonal multiple access (NOMA) network over Rayleigh fading channels by considering one eavesdropper. Relaying techniques like decode-and-forward (DF) and amplify–and–forward (AF) protocols are analyzed. The secrecy rate and secrecy outage probability of the system considering NOMA-AF and NOMA-DF systems were derived. Two cases were considered for the analysis, one system model where a near user operates as relay, forwarding the signal to far user; another where a relay is used in forwarding the signal to both users. Simulation results were obtained for different values of power allocation coefficients. These results show that the system model proposed in case 2 provides a better secrecy performance result than NOMA based models proposed in case 1 under both relaying techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Enhancing internet of things security using entropy-informed RF-DNA fingerprint learning from Gabor-based images.
- Author
-
Taha, Mohamed A., Fadul, Mohamed M. K., Tyler, Joshua H., Reising, Donald R., and Loveless, T. Daniel
- Subjects
PHYSICAL layer security ,INTERNET security ,DEEP learning ,ACCESS control ,INTERNET of things ,BIOMETRIC identification - Abstract
Internet of Things (IoT) deployments are anticipated to reach 29.42 billion by the end of 2030 at an average growth rate of 16% over the next 6 years. These deployments represent an overall growth of 201.4% in operational IoT devices from 2020 to 2030. This growth is alarming because IoT devices have permeated all aspects of our daily lives, and most lack adequate security. IoT-connected systems and infrastructures can be secured using device identification and authentication, two effective identity-based access control mechanisms. Physical Layer Security (PLS) is an alternative or augmentation to cryptographic and other higher-layer security schemes often used for device identification and authentication. PLS does not compromise spectral and energy efficiency or reduce throughput. Specific Emitter Identification (SEI) is a PLS scheme capable of uniquely identifying senders by passively learning emitter-specific features unintentionally imparted on the signals during their formation and transmission by the sender's radio frequency (RF) front end. This work focuses on image-based SEI because it produces deep learning (DL) models that are less sensitive to external factors and better generalize to different operating conditions. More specifically, this work focuses on reducing the computational cost and memory requirements of image-based SEI with little to no reduction in performance by selecting the most informative portions of each image using entropy. These image portions or tiles reduce memory storage requirements by 92.8% and the DL training time by 81% while achieving an average percent correct classification performance of 91% and higher for SNR values of 15 dB and higher with individual emitter performance no lower than 87.7% at the same SNR. Compared with another state-of-the-art time-frequency (TF)-based SEI approach, our approach results in superior performance for all investigated signal-to-noise ratio conditions, the largest improvement being 21.7% at 9 dB and requires 43% less data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Detecting malicious pilot contamination in multiuser massive MIMO using decision trees.
- Author
-
da Cruz, Pedro Ivo, Leandro, Dimitri, Spadini, Tito, Suyama, Ricardo, and Loiola, Murilo Bellezoni
- Subjects
PHYSICAL layer security ,WIRELESS communications ,DECISION trees ,LIKELIHOOD ratio tests ,MACHINE learning ,MIMO systems - Abstract
Massive multiple-input multiple-output (MMIMO) is essential to modern wireless communication systems, like 5G and 6G, but it is vulnerable to active eavesdropping attacks. One type of such attack is the pilot contamination attack (PCA), where a malicious user copies pilot signals from an authentic user during uplink, intentionally interfering with the base station's (BS) channel estimation accuracy. In this work, we propose to use a Decision Tree (DT) algorithm for PCA detection at the BS in a multi-user system. We present a methodology to generate training data for the DT classifier and select the best DT according to their depth. Then, we simulate different scenarios that could be encountered in practice and compare the DT to a classical technique based on likelihood ratio testing (LRT) submitted to the same scenarios. The results revealed that a DT with only one level of depth is sufficient to outperform the LRT. The DT shows a good performance regarding the probability of detection in noisy scenarios and when the malicious user transmits with low power, in which case the LRT fails to detect the PCA. We also show that the reason for the good performance of the DT is its ability to compute a threshold that separates PCA data from non-PCA data better than the LRT's threshold. Moreover, the DT does not necessitate prior knowledge of noise power or assumptions regarding the signal power of malicious users, prerequisites typically essential for LRT and other hypothesis testing methodologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.