scispace - formally typeset
Journal ArticleDOI: 10.1109/LSENS.2021.3068047

A Small-Scale Wireless Distributed Cooperative Secure Communication Network Design Using Graph FIR Filters

23 Mar 2021-Vol. 5, Iss: 4, pp 1-4
Abstract: This letter presents a small-scale wireless distributed cooperative secure-communication network (WDCSN) design using a novel spectral graph FIR filter to achieve desired secrecy capacity at the intended receiver in the presence of single and multiple eavesdroppers. An undirected weighted graph $\mathcal {G} (V, \mathcal {E}, W)$ , with relays, eavesdroppers, source, and destination are as nodes ( $V$ ), and circularly symmetric complex Gaussian random variables as edge weights ( $W$ ) are considered to represent the WDCSN. A graph Laplacian is used as a graph shift operator to design the proposed filter. Filter coefficients are calculated by using the least squared error as a criterion. Simulations are conducted for a two-way WDCSN to achieve the desired secrecy capacity using different graph structures considered for WDCSN. The proposed filter design's performance is quantified by using the secrecy outage probability metric. The results show that desired secrecy capacity with SOP of $10^{-2}$ is achievable using the proposed methodology, irrespective of graph structures with variable complexity. An SOP performance gain of $(60\!-\!80) \%$ is achieved over the SOP reported in the literature. more

Topics: Graph (abstract data type) (62%), Laplacian matrix (57%), Filter (video) (55%) more

Journal ArticleDOI: 10.1109/COMST.2015.2444095
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services. more

Topics: The Internet (53%), Emerging technologies (50%), Big data (50%)

4,809 Citations

Journal ArticleDOI: 10.1109/TSP.2009.2038412
Lun Dong1, Zhu Han2, Athina P. Petropulu3, H.V. Poor4Institutions (4)
Abstract: Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design can significantly improve the performance of secure wireless communications. more

Topics: Relay (56%), Jamming (52%), Wireless (52%) more

1,294 Citations

Journal ArticleDOI: 10.1109/COMST.2016.2598968
Yiliang Liu1, Hsiao-Hwa Chen2, Liangmin Wang3Institutions (3)
Abstract: Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions. more

Topics: Security service (64%), Wireless Transport Layer Security (63%), Network Access Control (62%) more

391 Citations

Open accessJournal ArticleDOI: 10.1109/JSAC.2018.2825560
Yongpeng Wu1, Ashish Khisti2, Chengshan Xiao3, Giuseppe Caire4  +2 moreInstitutions (6)
Abstract: Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution toward 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed. more

  • TABLE VIII: Physical Layer Security of NOMA
    TABLE VIII: Physical Layer Security of NOMA
  • TABLE V: Secure Massive MIMO with Active Eavesdropper
    TABLE V: Secure Massive MIMO with Active Eavesdropper
  • TABLE XI: Secure Communications with Full Duplex Base Station
    TABLE XI: Secure Communications with Full Duplex Base Station
  • Fig. 4: Secrecy connectivity probability of mmWave cellular networks. Experimental results extracted from [69].θb, Ms, ms denote the beam width of the main lobe, the array gain of the main lob, and the array gain of the sidelobe of the
    Fig. 4: Secrecy connectivity probability of mmWave cellular networks. Experimental results extracted from [69].θb, Ms, ms denote the beam width of the main lobe, the array gain of the main lob, and the array gain of the sidelobe of the
  • Fig. 3: Downlink secure communication for the mmWave cellular network
    Fig. 3: Downlink secure communication for the mmWave cellular network
  • + 11

Topics: Physical layer (58%), Network security (55%), Heterogeneous network (50%)

329 Citations

Journal ArticleDOI: 10.1109/COMST.2016.2633387
Abstract: As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer security to improve secrecy performance via exploiting spatial degrees of freedom. This paper provides a comprehensive survey on various multiple-antenna techniques in physical layer security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified. more

Topics: Wireless Transport Layer Security (59%), Wireless security (58%), Physical layer (57%) more

314 Citations