1 |
Wireless Physical Layer Security with CSIT UncertaintyHyadi, Amal 09 1900 (has links)
Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one secret message intended to only one of them. In all cases, we show that by appropriately designing the coding and the transmission schemes, a secure communication can still be achieved even with an imperfect knowledge of the CSIT.
|
2 |
Performance Analysis of Cognitive Radio Networks under Spectrum Sharing and Security ConstraintsSibomana, Louis January 2016 (has links)
The cognitive radio network (CRN) concept has been proposed as a solution to the growing demand and underutilization of the radio spectrum. To improve the radio spectrum utilization, CRN technology allows the coexistence of licensed and unlicensed systems over the same spectrum. In an underlay spectrum sharing system, secondary users (SUs) transmit simultaneously with the primary users (PUs) in the same frequency band given that the interference caused by the SU to the PU remains below a tolerable interference limit. Besides the transmission power limitation, a secondary network is subject to distinct channel impairments such as fading and interference from the primary transmissions. Also, CRNs face new security threats and challenges due to their unique cognitive characteristics.This thesis analyzes the performance of underlay CRNs and underlay cognitive relay networks under spectrum sharing constraints and security constraints. Distinct SU transmit power policies are obtained considering various interference constraints such as PU outage constraint or PU peak interference power constraint. The thesis is divided into an introduction and two research parts based on peer-reviewed publications. The introduction provides an overview of radio spectrum management, basic concepts of CRNs, and physical layer security. In the first research part, we study the performance of underlay CRNs with emphasis on a multiuser environment.In Part I-A, we consider a secondary network with delay-tolerant applications and analyze the ergodic capacity. Part I-B analyzes the secondary outage capacity which characterises the maximum data rate that can be achieved over a channel for a given outage probability. In Part I-C, we consider a secondary network with delay constrained applications, and derive expressions of the outage probability and delay-limited throughput. Part I-D presents a queueing model that provides an analytical tool to evaluate the secondary packet-level performance with multiple classes of traffic considering general interarrival and service time distributions. Analytical expressions of the SU average packet transmission time, waiting time in the queue, andtime spent in the system are provided.In the second research part, we analyze the physical layer security for underlay CRNs and underlay cognitive relay networks. Analytical expressions of the probability of non-zero secrecy capacity and secrecy outage probability are derived.Part II-A considers a single hop underlay CRN in the presence of multiple eavesdroppers (EAVs) and multiple SU-Rxs. In Part II-B, an underlay cognitive relay network in the presence of multiple secondary relays and multiple EAVs is studied.Numerical examples illustrate that it is possible to exploit the physical layer characteristics to achieve both security and quality of service in CRNs while satisfying spectrum sharing constraints.
|
3 |
Physical-Layer Security in Wireless Communication SystemsBagheri-Karam, Ghadamali January 2010 (has links)
The use of wireless networks has grown significantly in contemporary
times, and continues to develop further. The broadcast nature of
wireless communications, however, makes them particularly vulnerable
to eavesdropping. Unlike traditional solutions, which usually handle
security at the application layer, the primary concern of this
dissertation is to analyze and develop solutions based on coding
techniques at the physical-layer.
First, in chapter $2$, we consider a scenario where a source node
wishes to broadcast two confidential messages to two receivers,
while a wire-tapper also receives the transmitted signal. This model
is motivated by wireless communications, where individual secure
messages are broadcast over open media and can be received by any
illegitimate receiver. The secrecy level is measured by the
equivocation rate at the eavesdropper. We first study the general
(non-degraded) broadcast channel with an eavesdropper, and present
an inner bound on the secrecy capacity region for this model. This
inner bound is based on a combination of random binning, and the
Gelfand-Pinsker binning. We further study the situation in which the
channels are degraded. For the degraded broadcast channel with an
eavesdropper, we present the secrecy capacity region. Our achievable
coding scheme is based on Cover's superposition scheme and random
binning. We refer to this scheme as the Secret Superposition Scheme.
Our converse proof is based on a combination of the converse proof
of the conventional degraded broadcast channel and Csiszar Lemma. We
then assume that the channels are Additive White Gaussian Noise and
show that the Secret Superposition Scheme with Gaussian codebook is
optimal. The converse proof is based on Costa's entropy power
inequality. Finally, we use a broadcast strategy for the slowly
fading wire-tap channel when only the eavesdropper's channel is
fixed and known at the transmitter. We derive the optimum power
allocation for the coding layers, which maximizes the total average
rate.
Second, in chapter $3$ , we consider the
Multiple-Input-Multiple-Output (MIMO) scenario of a broadcast
channel where a wiretapper also receives the transmitted signal via
another MIMO channel. First, we assume that the channels are
degraded and the wiretapper has the worst channel. We establish the
capacity region of this scenario. Our achievability scheme is the
Secret Superposition Coding. For the outerbound, we use notion of
the enhanced channels to show that the secret superposition of
Gaussian codes is optimal. We show that we only need to enhance the
channels of the legitimate receivers, and the channel of the
eavesdropper remains unchanged. We then extend the result of the
degraded case to a non-degraded case. We show that the secret
superposition of Gaussian codes, along with successive decoding,
cannot work when the channels are not degraded. We develop a Secret
Dirty Paper Coding scheme and show that it is optimal for this
channel. We then present a corollary generalizing the capacity
region of the two receivers case to the case of multiple receivers.
Finally, we investigate a scenario which frequently occurs in the
practice of wireless networks. In this scenario, the transmitter and
the eavesdropper have multiple antennae, while both intended
receivers have a single antenna (representing resource limited
mobile units). We characterize the secrecy capacity region in terms
of generalized eigenvalues of the receivers' channels and the
eavesdropper's channel. We refer to this configuration as the MISOME
case. We then present a corollary generalizing the results of the
two receivers case to multiple receivers. In the high SNR regime, we
show that the capacity region is a convex closure of rectangular
regions.
Finally, in chapter $4$, we consider a $K$-user secure Gaussian
Multiple-Access-Channel with an external eavesdropper. We establish
an achievable rate region for the secure discrete memoryless MAC.
Thereafter, we prove the secrecy sum capacity of the degraded
Gaussian MIMO MAC using Gaussian codebooks. For the non-degraded
Gaussian MIMO MAC, we propose an algorithm inspired by the
interference alignment technique to achieve the largest possible
total Secure-Degrees-of-Freedom . When all the terminals are
equipped with a single antenna, Gaussian codebooks have shown to be
inefficient in providing a positive S-DoF. Instead, we propose a
novel secure coding scheme to achieve a positive S-DoF in the single
antenna MAC. This scheme converts the single-antenna system into a
multiple-dimension system with fractional dimensions. The
achievability scheme is based on the alignment of signals into a
small sub-space at the eavesdropper, and the simultaneous separation
of the signals at the intended receiver. We use tools from the field
of Diophantine Approximation in number theory to analyze the
probability of error in the coding scheme. We prove that the total
S-DoF of $\frac{K-1}{K}$ can be achieved for almost all channel
gains. For the other channel gains, we propose a multi-layer coding
scheme to achieve a positive S-DoF. As a function of channel gains,
therefore, the achievable S-DoF is discontinued.
|
4 |
Design and Analysis of Security Schemes for Low-cost RFID SystemsChai, Qi 01 1900 (has links)
With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides an indispensable foundation to realize ubiquitous computing and machine perception. However, the catching and exclusive characteristics of RFID systems introduce growing security and privacy concerns. To address these issues are particularly challenging for low-cost RFID systems, where tags are extremely constrained in resources, power and cost. The primary reasons are: (1) the security requirements of low-cost RFID systems are even more rigorous due to large operation range and mass deployment; and (2) the passive tags' modest capabilities and the necessity to keep their prices low present a novel problem that goes beyond the well-studied problems of traditional cryptography. This thesis presents our research results on the design and the analysis of security schemes for low-cost RFID systems.
Motivated by the recent attention on exploiting physical layer resources in the design of security schemes, we investigate how to solve the eavesdropping, modification and one particular type of relay attacks toward the tag-to-reader communication in passive RFID systems without requiring lightweight ciphers. To this end, we propose a novel physical layer scheme, called Backscatter modulation- and Uncoordinated frequency hopping-assisted Physical Layer Enhancement (BUPLE). The idea behind it is to use the amplitude of the carrier to transmit messages as normal, while to utilize its periodically varied frequency to hide the transmission from the eavesdropper/relayer and to exploit a random sequence modulated to the carrier's phase to defeat malicious modifications. We further improve its eavesdropping resistance through the coding in the physical layer, since BUPLE ensures that the tag-to-eavesdropper channel is strictly noisier than the tag-to-reader channel. Three practical Wiretap Channel Codes (WCCs) for passive tags are then proposed: two of them are constructed from linear error correcting codes, and the other one is constructed from a resilient vector Boolean function. The security and usability of BUPLE in conjunction with WCCs are further confirmed by our proof-of-concept implementation and testing.
Eavesdropping the communication between a legitimate reader and a victim tag to obtain raw data is a basic tool for the adversary. However, given the fundamentality of eavesdropping attacks, there are limited prior work investigating its intension and extension for passive RFID systems. To this end, we firstly identified a brand-new attack, working at physical layer, against backscattered RFID communications, called unidirectional active eavesdropping, which defeats the customary impression that eavesdropping is a ``passive" attack. To launch this attack, the adversary transmits an un-modulated carrier (called blank carrier) at a certain frequency while a valid reader and a tag interacts at another frequency channel. Once the tag modulates the amplitude of reader's signal, it causes fluctuations on the blank carrier as well. By carefully examining the amplitude of the backscattered versions of the blank carrier and the reader's carrier, the adversary could intercept the ongoing reader-tag communication with either significantly lower bit error rate or from a significantly greater distance away. Our concept is demonstrated and empirically analyzed towards a popular low-cost RFID system, i.e., EPC Gen2. Although active eavesdropping in general is not trivial to be prohibited, for a particular type of active eavesdropper, namely a greedy proactive eavesdropper, we propose a simple countermeasure without introducing extra cost to current RFID systems.
The needs of cryptographic primitives on constraint devices keep increasing with the growing pervasiveness of these devices. One recent design of the lightweight block cipher is Hummingbird-2. We study its cryptographic strength under a novel technique we developed, called Differential Sequence Attack (DSA), and present the first cryptanalytic result on this cipher. In particular, our full attack can be divided into two phases: preparation phase and key recovery phase. During the key recovery phase, we exploit the fact that the differential sequence for the last round of Hummingbird-2 can be retrieved by querying the full cipher, due to which, the search space of the secret key can be significantly reduced. Thus, by attacking the encryption (decryption resp.) of Hummingbird-2, our algorithm recovers 36-bit (another 28-bit resp.) out of 128-bit key with $2^{68}$ ($2^{60}$ resp.) time complexity if particular differential conditions of the internal states and of the keys at one round can be imposed. Additionally, the rest 64-bit of the key can be exhaustively searched and the overall time complexity is dominated by $2^{68}$. During the preparation phase, by investing $2^{81}$ effort in time, the adversary is able to create the differential conditions required in the key recovery phase with at least 0.5 probability.
As an additional effort, we examine the cryptanalytic strength of another lightweight candidate known as A2U2, which is the most lightweight cryptographic primitive proposed so far for low-cost tags. Our chosen-plaintext-attack fully breaks this cipher by recovering its secret key with only querying the encryption twice on the victim tag and solving 32 sparse systems of linear equations (where each system has 56 unknowns and around 28 unknowns can be directly obtained without computation) in the worst case, which takes around 0.16 second on a Thinkpad T410 laptop.
|
5 |
Wireless Physical Layer Security: On the Performance Limit of Secret-Key AgreementZorgui, Marwen 05 1900 (has links)
Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems.
In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message.
In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then characterize it. We show that the impact of the secrecy constraint is to reduce the effective number of transmit antennas by the number of antennas at the eavesdropper. Toward this characterization, we provide several schemes achieving the DMT and we highlight disparities between coding for the wiretap channel and coding for secret-key agreement.
In the second part of the present work, we consider a fast-fading setting in which the wireless channels change during each channel use. We consider a correlated environment where transmit, legitimate receiver and eavesdropper antennas are correlated. We characterize the optimal strategy achieving the highest secret-key rate. We also identify the impact of correlation matrices and illustrate our analysis with various numerical results. Finally, we study the system from an energy-efficiency point of view and evaluate relevant metrics as the minimum energy required for sharing a secret-key bit and the wideband slope.
|
6 |
Physical-Layer Security in Wireless Communication SystemsBagheri-Karam, Ghadamali January 2010 (has links)
The use of wireless networks has grown significantly in contemporary
times, and continues to develop further. The broadcast nature of
wireless communications, however, makes them particularly vulnerable
to eavesdropping. Unlike traditional solutions, which usually handle
security at the application layer, the primary concern of this
dissertation is to analyze and develop solutions based on coding
techniques at the physical-layer.
First, in chapter $2$, we consider a scenario where a source node
wishes to broadcast two confidential messages to two receivers,
while a wire-tapper also receives the transmitted signal. This model
is motivated by wireless communications, where individual secure
messages are broadcast over open media and can be received by any
illegitimate receiver. The secrecy level is measured by the
equivocation rate at the eavesdropper. We first study the general
(non-degraded) broadcast channel with an eavesdropper, and present
an inner bound on the secrecy capacity region for this model. This
inner bound is based on a combination of random binning, and the
Gelfand-Pinsker binning. We further study the situation in which the
channels are degraded. For the degraded broadcast channel with an
eavesdropper, we present the secrecy capacity region. Our achievable
coding scheme is based on Cover's superposition scheme and random
binning. We refer to this scheme as the Secret Superposition Scheme.
Our converse proof is based on a combination of the converse proof
of the conventional degraded broadcast channel and Csiszar Lemma. We
then assume that the channels are Additive White Gaussian Noise and
show that the Secret Superposition Scheme with Gaussian codebook is
optimal. The converse proof is based on Costa's entropy power
inequality. Finally, we use a broadcast strategy for the slowly
fading wire-tap channel when only the eavesdropper's channel is
fixed and known at the transmitter. We derive the optimum power
allocation for the coding layers, which maximizes the total average
rate.
Second, in chapter $3$ , we consider the
Multiple-Input-Multiple-Output (MIMO) scenario of a broadcast
channel where a wiretapper also receives the transmitted signal via
another MIMO channel. First, we assume that the channels are
degraded and the wiretapper has the worst channel. We establish the
capacity region of this scenario. Our achievability scheme is the
Secret Superposition Coding. For the outerbound, we use notion of
the enhanced channels to show that the secret superposition of
Gaussian codes is optimal. We show that we only need to enhance the
channels of the legitimate receivers, and the channel of the
eavesdropper remains unchanged. We then extend the result of the
degraded case to a non-degraded case. We show that the secret
superposition of Gaussian codes, along with successive decoding,
cannot work when the channels are not degraded. We develop a Secret
Dirty Paper Coding scheme and show that it is optimal for this
channel. We then present a corollary generalizing the capacity
region of the two receivers case to the case of multiple receivers.
Finally, we investigate a scenario which frequently occurs in the
practice of wireless networks. In this scenario, the transmitter and
the eavesdropper have multiple antennae, while both intended
receivers have a single antenna (representing resource limited
mobile units). We characterize the secrecy capacity region in terms
of generalized eigenvalues of the receivers' channels and the
eavesdropper's channel. We refer to this configuration as the MISOME
case. We then present a corollary generalizing the results of the
two receivers case to multiple receivers. In the high SNR regime, we
show that the capacity region is a convex closure of rectangular
regions.
Finally, in chapter $4$, we consider a $K$-user secure Gaussian
Multiple-Access-Channel with an external eavesdropper. We establish
an achievable rate region for the secure discrete memoryless MAC.
Thereafter, we prove the secrecy sum capacity of the degraded
Gaussian MIMO MAC using Gaussian codebooks. For the non-degraded
Gaussian MIMO MAC, we propose an algorithm inspired by the
interference alignment technique to achieve the largest possible
total Secure-Degrees-of-Freedom . When all the terminals are
equipped with a single antenna, Gaussian codebooks have shown to be
inefficient in providing a positive S-DoF. Instead, we propose a
novel secure coding scheme to achieve a positive S-DoF in the single
antenna MAC. This scheme converts the single-antenna system into a
multiple-dimension system with fractional dimensions. The
achievability scheme is based on the alignment of signals into a
small sub-space at the eavesdropper, and the simultaneous separation
of the signals at the intended receiver. We use tools from the field
of Diophantine Approximation in number theory to analyze the
probability of error in the coding scheme. We prove that the total
S-DoF of $\frac{K-1}{K}$ can be achieved for almost all channel
gains. For the other channel gains, we propose a multi-layer coding
scheme to achieve a positive S-DoF. As a function of channel gains,
therefore, the achievable S-DoF is discontinued.
|
7 |
Design and Analysis of Security Schemes for Low-cost RFID SystemsChai, Qi 01 1900 (has links)
With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides an indispensable foundation to realize ubiquitous computing and machine perception. However, the catching and exclusive characteristics of RFID systems introduce growing security and privacy concerns. To address these issues are particularly challenging for low-cost RFID systems, where tags are extremely constrained in resources, power and cost. The primary reasons are: (1) the security requirements of low-cost RFID systems are even more rigorous due to large operation range and mass deployment; and (2) the passive tags' modest capabilities and the necessity to keep their prices low present a novel problem that goes beyond the well-studied problems of traditional cryptography. This thesis presents our research results on the design and the analysis of security schemes for low-cost RFID systems.
Motivated by the recent attention on exploiting physical layer resources in the design of security schemes, we investigate how to solve the eavesdropping, modification and one particular type of relay attacks toward the tag-to-reader communication in passive RFID systems without requiring lightweight ciphers. To this end, we propose a novel physical layer scheme, called Backscatter modulation- and Uncoordinated frequency hopping-assisted Physical Layer Enhancement (BUPLE). The idea behind it is to use the amplitude of the carrier to transmit messages as normal, while to utilize its periodically varied frequency to hide the transmission from the eavesdropper/relayer and to exploit a random sequence modulated to the carrier's phase to defeat malicious modifications. We further improve its eavesdropping resistance through the coding in the physical layer, since BUPLE ensures that the tag-to-eavesdropper channel is strictly noisier than the tag-to-reader channel. Three practical Wiretap Channel Codes (WCCs) for passive tags are then proposed: two of them are constructed from linear error correcting codes, and the other one is constructed from a resilient vector Boolean function. The security and usability of BUPLE in conjunction with WCCs are further confirmed by our proof-of-concept implementation and testing.
Eavesdropping the communication between a legitimate reader and a victim tag to obtain raw data is a basic tool for the adversary. However, given the fundamentality of eavesdropping attacks, there are limited prior work investigating its intension and extension for passive RFID systems. To this end, we firstly identified a brand-new attack, working at physical layer, against backscattered RFID communications, called unidirectional active eavesdropping, which defeats the customary impression that eavesdropping is a ``passive" attack. To launch this attack, the adversary transmits an un-modulated carrier (called blank carrier) at a certain frequency while a valid reader and a tag interacts at another frequency channel. Once the tag modulates the amplitude of reader's signal, it causes fluctuations on the blank carrier as well. By carefully examining the amplitude of the backscattered versions of the blank carrier and the reader's carrier, the adversary could intercept the ongoing reader-tag communication with either significantly lower bit error rate or from a significantly greater distance away. Our concept is demonstrated and empirically analyzed towards a popular low-cost RFID system, i.e., EPC Gen2. Although active eavesdropping in general is not trivial to be prohibited, for a particular type of active eavesdropper, namely a greedy proactive eavesdropper, we propose a simple countermeasure without introducing extra cost to current RFID systems.
The needs of cryptographic primitives on constraint devices keep increasing with the growing pervasiveness of these devices. One recent design of the lightweight block cipher is Hummingbird-2. We study its cryptographic strength under a novel technique we developed, called Differential Sequence Attack (DSA), and present the first cryptanalytic result on this cipher. In particular, our full attack can be divided into two phases: preparation phase and key recovery phase. During the key recovery phase, we exploit the fact that the differential sequence for the last round of Hummingbird-2 can be retrieved by querying the full cipher, due to which, the search space of the secret key can be significantly reduced. Thus, by attacking the encryption (decryption resp.) of Hummingbird-2, our algorithm recovers 36-bit (another 28-bit resp.) out of 128-bit key with $2^{68}$ ($2^{60}$ resp.) time complexity if particular differential conditions of the internal states and of the keys at one round can be imposed. Additionally, the rest 64-bit of the key can be exhaustively searched and the overall time complexity is dominated by $2^{68}$. During the preparation phase, by investing $2^{81}$ effort in time, the adversary is able to create the differential conditions required in the key recovery phase with at least 0.5 probability.
As an additional effort, we examine the cryptanalytic strength of another lightweight candidate known as A2U2, which is the most lightweight cryptographic primitive proposed so far for low-cost tags. Our chosen-plaintext-attack fully breaks this cipher by recovering its secret key with only querying the encryption twice on the victim tag and solving 32 sparse systems of linear equations (where each system has 56 unknowns and around 28 unknowns can be directly obtained without computation) in the worst case, which takes around 0.16 second on a Thinkpad T410 laptop.
|
8 |
Enhancing physical layer security in wireless networks with cooperative approachesLiu, Weigang January 2016 (has links)
Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement due to the application of the FFR is limited by the capacity of the legitimate channel.
|
9 |
Physical layer security in emerging wireless transmission systemsBao, Tingnan 06 July 2020 (has links)
Traditional cryptographic encryption techniques at higher layers require a certain form of information sharing between the transmitter and the legitimate user to achieve security. Besides, it also assumes that the eavesdropper has an insufficient computational capability to decrypt the ciphertext without the shared information. However, traditional cryptographic encryption techniques may be insufficient or even not suit- able in wireless communication systems. Physical layer security (PLS) can enhance the security of wireless communications by leveraging the physical nature of wireless transmission. Thus, in this thesis, we study the PLS performance in emerging wireless transmission systems. The thesis consists of two main parts.
We first consider the PLS design and analysis for ground-based networks em- ploying random unitary beamforming (RUB) scheme at the transmitter. With RUB technique, the transmitter serves multiple users with pre-designed beamforming vectors, selected using limited channel state information (CSI). We study multiple-input single-output single-eavesdropper (MISOSE) transmission system, multi-user multiple-input multiple-output single-eavesdropper (MU-MIMOSE) transmission system, and massive multiple-input multiple-output multiple-eavesdropper (massive MI- MOME) transmission system. The closed-form expressions of ergodic secrecy rate and the secrecy outage probability (SOP) for these transmission scenarios are derived. Besides, the effect of artificial noise (AN) on secrecy performance of RUB-based transmission is also investigated. Numerical results are presented to illustrate the trade-off between performance and complexity of the resulting PLS design.
We then investigate the PLS design and analysis for unmanned aerial vehicle (UAV)-based networks. We first study the secrecy performance of UAV-assisted relaying transmission systems in the presence of a single ground eavesdropper. We derive the closed-form expressions of ergodic secrecy rate and intercept probability. When multiple aerial and ground eavesdroppers are located in the UAV-assisted relaying transmission system, directional beamforming technique is applied to enhance the secrecy performance. Assuming the most general κ-μ shadowed fading channel, the SOP performance is obtained in the closed-form expression. Exploiting the derived expressions, we investigate the impact of different parameters on secrecy performance. Besides, we utilize a deep learning approach in UAV-based network analysis. Numerical results show that our proposed deep learning approach can predict secrecy performance with high accuracy and short running time. / Graduate
|
10 |
Attacks and Counterattacks on Physical Layer PrimitivesQIAO, YUE 23 October 2017 (has links)
No description available.
|
Page generated in 0.1032 seconds