scispace - formally typeset
Journal ArticleDOI

A Small-Scale Wireless Distributed Cooperative Secure Communication Network Design Using Graph FIR Filters

Kotha Venugopalachary, +1 more
- Vol. 5, Iss: 4, pp 1-4
Reads0
Chats0
TLDR
In this article, a spectral graph FIR filter was proposed to achieve desired secrecy capacity at the intended receiver in the presence of single and multiple eavesdroppers in a small-scale wireless distributed cooperative secure communication network.
Abstract
This letter presents a small-scale wireless distributed cooperative secure-communication network (WDCSN) design using a novel spectral graph FIR filter to achieve desired secrecy capacity at the intended receiver in the presence of single and multiple eavesdroppers. An undirected weighted graph $\mathcal {G} (V, \mathcal {E}, W)$ , with relays, eavesdroppers, source, and destination are as nodes ( $V$ ), and circularly symmetric complex Gaussian random variables as edge weights ( $W$ ) are considered to represent the WDCSN. A graph Laplacian is used as a graph shift operator to design the proposed filter. Filter coefficients are calculated by using the least squared error as a criterion. Simulations are conducted for a two-way WDCSN to achieve the desired secrecy capacity using different graph structures considered for WDCSN. The proposed filter design's performance is quantified by using the secrecy outage probability metric. The results show that desired secrecy capacity with SOP of $10^{-2}$ is achievable using the proposed methodology, irrespective of graph structures with variable complexity. An SOP performance gain of $(60\!-\!80) \%$ is achieved over the SOP reported in the literature.

read more

Citations
More filters
Journal ArticleDOI

A Graph Entropy Measure From Urelement to Higher-Order Graphlets for Network Analysis

TL;DR: Greet as mentioned in this paper proposes a graph representation framework based on graph entropy, which considers the structural properties of graphlet topology from urelement to higher-order statistics, and defines a family of information functions based on hierarchical topological features to compute the graph entropy.
Journal ArticleDOI

A Graph Entropy Measure From Urelement to Higher-Order Graphlets for Network Analysis

TL;DR: Greet as discussed by the authors proposes a general entropy-based graph representation framework (Greet) based on four pertinent properties of graphlet topology from urelement to higher-order statistics and defines a novel family of information functions based on hierarchical topological features to compute the graph entropy, then construct a graph information entropy vector using the obtained local and global structural statistics to facilitate downstream tasks.
References
More filters
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Improving Wireless Physical Layer Security via Cooperating Relays

TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Journal ArticleDOI

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

TL;DR: This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.
Journal ArticleDOI

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

TL;DR: This survey introduces the fundamental theories of PHy-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions.
Journal ArticleDOI

A Survey on Multiple-Antenna Techniques for Physical Layer Security

TL;DR: A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Related Papers (5)