Journal Article

# A Small-Scale Wireless Distributed Cooperative Secure Communication Network Design Using Graph FIR Filters

23 Mar 2021-Vol. 5, Iss: 4, pp 1-4
Abstract: This letter presents a small-scale wireless distributed cooperative secure-communication network (WDCSN) design using a novel spectral graph FIR filter to achieve desired secrecy capacity at the intended receiver in the presence of single and multiple eavesdroppers. An undirected weighted graph $\mathcal {G} (V, \mathcal {E}, W)$ , with relays, eavesdroppers, source, and destination are as nodes ( $V$ ), and circularly symmetric complex Gaussian random variables as edge weights ( $W$ ) are considered to represent the WDCSN. A graph Laplacian is used as a graph shift operator to design the proposed filter. Filter coefficients are calculated by using the least squared error as a criterion. Simulations are conducted for a two-way WDCSN to achieve the desired secrecy capacity using different graph structures considered for WDCSN. The proposed filter design's performance is quantified by using the secrecy outage probability metric. The results show that desired secrecy capacity with SOP of $10^{-2}$ is achievable using the proposed methodology, irrespective of graph structures with variable complexity. An SOP performance gain of $(60\!-\!80) \%$ is achieved over the SOP reported in the literature.

Topics: , Laplacian matrix (57%), Filter (video) (55%) ...read more
##### References
More

Journal Article
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.

Topics: The Internet (53%), , Big data (50%)

4,809 Citations

Journal Article
Lun Dong1, Zhu Han2, Athina P. Petropulu3, H.V. Poor4Institutions (4)
Abstract: Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design can significantly improve the performance of secure wireless communications.

Topics: Relay (56%), Jamming (52%), Wireless (52%) ...read more

1,294 Citations

Journal Article
Yiliang Liu1, Hsiao-Hwa Chen2, Liangmin Wang3Institutions (3)
Abstract: Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions.

Topics: Security service (64%), ,  ...read more

391 Citations

Open accessJournal Article
Yongpeng Wu1, Ashish Khisti2, Chengshan Xiao3, Giuseppe Caire4  +2 moreInstitutions (6)
Abstract: Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution toward 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.

• + 11

Topics: Physical layer (58%), Network security (55%),

329 Citations

Journal Article
Abstract: As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer security to improve secrecy performance via exploiting spatial degrees of freedom. This paper provides a comprehensive survey on various multiple-antenna techniques in physical layer security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.

Topics: , Wireless security (58%), Physical layer (57%) ...read more

314 Citations

##### Network Information
###### Related Papers (5)
13 Apr 2008

Deepti Chafekar, V.S.A. Kumart +3 more

View PDF
01 Jun 2013, IEEE Transactions on Information Theory

Swarnendu Kar, Pramod K. Varshney

07 Aug 2012

Min Kyung An, Nhat X. Lam +2 more

01 Mar 2019, IEEE Transactions on Communications

Khoa N. Le, Theodoros A. Tsiftsis

15 Apr 2015, IEEE Transactions on Signal Processing

Juan Augusto Maya, Leonardo Rey Vega +1 more