Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
read more
Citations
Safeguarding 5G wireless communication networks using physical layer security
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
Communications in the 6G Era
References
Matrix Analysis
Communication theory of secrecy systems
The wire-tap channel
Broadcast channels with confidential messages
Related Papers (5)
Frequently Asked Questions (11)
Q2. What is the optimal solution to the problem of the secrecy rate loss?
The feedback bit allocation problem that minimizes the upper bound on the secrecy rate loss can be described as(33)The optimization of (33) is a non-linear integer programming problem, and in general the optimal solution must be obtained by an exhaustive search over with .
Q3. What is the possible ergodic secrecy rate for a Gaussian?
To represent the effect of quantized CDI on the achievable secrecy rate, the authors rewrite the actual channel direction vectors as(8) (9)where , , and and are unit-norm vectors orthogonal to and , respectively.
Q4. What is the way to determine the secrecy rate?
The authors derived an analytic expression for the ergodic secrecy rate and an upper bound for the secrecy rate loss as a function of the feedback bit allocations to the transmitter and cooperative jammer assuming random vector codebooks.
Q5. What is the way to optimize the secrecy rate?
The authors then studied the problem of optimizing the ergodic secrecy rate and the bound on secrecy rate loss as a function of the feedback allocation, assuming a fixed feedback bandwidth for the legitimate user.
Q6. What is the way to improve secrecy?
Simulations demonstrate that optimally allocating the feedback bits between the transmitter and Helper can lead to a significant improvement in secrecy.
Q7. What is the way to optimize the ergodic secrecy rate?
While difficult, optimization of the derived ergodic secrecy rate in the general case for arbitrary , , , and over the parameters , and is possible, especially since the expressions depend only on the channel distributions andthus the required computation can be performed offline.
Q8. What is the disadvantage of this approach?
The advantage of this approach is that it leads to a simpler closed-form solution, but the disadvantage is that the solution depends on a fixed value of , which must be optimized separately.
Q9. How long does the optimal feedback bit allocation remain fixed?
the optimal feedback bit allocation remains fixed as long as the channel statistics and transmit power allocations are constant.
Q10. What is the upper bound of the secrecy rate loss at the legitimate receiver?
the authors obtain the upper bound of the secrecy rate loss atthe legitimate receiver as(32)whereThe authors assume that the legitimate receiver has a fixed constraint on the total number of available feedback bits, i.e., .
Q11. What is the way to maximize the secrecy rate?
Direct maximization of the ergodic secrecy rate is difficult and requires cumbersome numerical methods, but allows one to find the optimal power assignment at the Helperin addition to the optimal feedback bit allocation.