Filters








279 Hits in 4.8 sec

Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication [article]

Huihui Wu, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang
2021 arXiv   pre-print
This paper explores a new secure wireless communication paradigm where the physical layer security technology is applied to counteract both the detection and eavesdropping attacks, such that the critical  ...  Finally, numerical results are provided to illustrate the achievable performances under the new secure communication paradigm.  ...  CONCLUSION This paper explores a new secure wireless communication paradigm, where the physical layer security technology is applied to ensure both the covertness and secrecy of the communication.  ... 
arXiv:2008.00147v2 fatcat:nart2pvdf5ayxpvdegaeonoywe

Secrecy Energy-Efficient UAV Communication via Trajectory Design and Power Control

An Li, Huohuo Han, Chuanxin Yu, Stefan Panic
2021 Wireless Communications and Mobile Computing  
This paper investigates the problem of maximizing the secrecy energy efficiency (SEE) for unmanned aerial vehicle- (UAV-) to-ground wireless communication system, in which a fixed-wing UAV tries to transmit  ...  covert information to a terrestrial legitimate destination receiver with multiple terrestrial eavesdroppers.  ...  Acknowledgments This work was partly supported by the Foundation for Distinguished Young Talents  ... 
doi:10.1155/2021/9969311 fatcat:l6o3xue2rbgrzo6m262xbozajm

Intelligent Reflecting Surface for Wireless Communication Security and Privacy [article]

Shihao Yan, Xiaobo Zhou, Derrick Wing Kwan Ng, Jinhong Yuan, Naofal Al-Dhahir
2021 arXiv   pre-print
the theories of physical layer security and covert communications, respectively.  ...  Intelligent reflection surface (IRS) is emerging as a promising technique for future wireless communications.  ...  In this article, we demonstrated its potential in achieving wireless communication security and privacy by summarizing some major benefits brought by IRS into physical layer security and covert communications  ... 
arXiv:2103.16696v2 fatcat:a53am5wfyjf2rpi4tltir6fjuy

From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems

Krystian Grzesiak, Zbigniew Piotrowski
2021 Sensors  
As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques.  ...  security) and LPD (low probability of detection) issues.  ...  Acknowledgments: The authors would like to express their great appreciation to the Sensors journal Editors and anonymous Reviewers for their valuable suggestions, which have improved the manuscript quality  ... 
doi:10.3390/s21082752 pmid:33924708 fatcat:tyktdyteone4vdbqdcrl7dzej4

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
5G networks must provide a highly resilient, secure, and privacy-protected platform to support the emergence of new business and technologies expected from the so-called vertical-industry paradigm.  ...  In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios.  ...  .: Safeguarding MTC at the PHY: Potentials and Challenges FIGURE 1 . 1 Security threats and requirements for secure and covert wireless communications.  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

Context-Aware Security for 6G Wireless The Role of Physical Layer Security [article]

Arsenia Chorti, Andre Noll Barreto, Stefan Kopsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard Fettweis, H. Vincent Poor
2022 arXiv   pre-print
The combination of these enhanced traits can give rise to a new breed of context-aware security protocols, following the quality of security (QoSec) paradigm.  ...  The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to the ability to achieve high precision localization.  ...  In parallel, as we move gradually away from the standard client-server networking paradigm and enter a new era of truly end-to-end (E2E) quality of service (QoS), service level agreements (SLAs) in the  ... 
arXiv:2101.01536v2 fatcat:q2wy5rpeefdufiupcxr42yhlyi

PHY-Aided Secure Communication via Weighted Fractional Fourier Transform

Lei Ni, Xinyu Da, Hang Hu, Yuan Liang, Ruiyang Xu
2018 Wireless Communications and Mobile Computing  
In addition, by adding phase rotation (PR) factors to each branch of the WFRFT system, a new unitary matrix with the encryption properties is constructed, and hence, the satellite communications secrecy  ...  A weighted fractional Fourier transform (WFRFT) based on channel state information (CSI), aiming to safeguard the physical (PHY) layer security of wireless communication system, is proposed.  ...  Acknowledgments This work is supported by the National Natural Science Foundation of China under Grant 61571460, Grant 61671475, and Grant 60972042 and in part by the National Post-Doctoral Program for  ... 
doi:10.1155/2018/7963451 fatcat:gf42ll62ifa6rms63qdjs43cae

Wireless Information-Theoretic Security - Part I: Theoretical Aspects [article]

Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin
2006 arXiv   pre-print
Practical schemes for wireless information-theoretic security are presented in Part II, which in some cases comes close to the secrecy capacity limits given in this paper.  ...  In sharp contrast with known results for Gaussian wiretap channels (without feedback), our contribution shows that in the presence of fading information-theoretic security is achievable even when the eavesdropper  ...  This is the case, for example in a Time Division Multiple Access (TDMA) environment, when Eve is not a covert eavesdropper, but simply another user interacting with the wireless network, thus sending communication  ... 
arXiv:cs/0611120v1 fatcat:bhwyaxchxvharfbybfx4p5p22q

Physical Layer Security for UAV Communications in 5G and Beyond Networks [article]

Jue Wang, Xuanxuan Wang, Ruifeng Gao, Chengleyang Lei, Wei Feng, Ning Ge, Shi Jin, Tony Q. S. Quek
2021 arXiv   pre-print
In this paper, a comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective.  ...  Recently, physical layer security (PLS), which exploits the inherent randomness of the wireless channels for secure communications, has been introduced to UAV systems as an important complement to the  ...  jamming power to maximize the eavesdropping rate. 4) Covert Communications and Wireless Surveillance: Covert communications and wireless surveillance have been widely investigated for UAV systems.  ... 
arXiv:2105.11332v1 fatcat:d6oidecjcbaxrdz3kezdjxpypa

Guest Editorial Special Issue on UAV Communications in 5G and Beyond Networks—Part II

Qingqing Wu, Jie Xu, Yong Zeng, Derrick Wing Kwan Ng, Naofal Al-Dhahir, Robert Schober, A. Lee Swindlehurst
2021 IEEE Journal on Selected Areas in Communications  
SECURITY IN UAV COMMUNICATION NETWORKS The article "Optimal transmit power and flying location for UAV covert wireless communications" jointly optimizes the flying location and wireless communication transmit  ...  power for a UAV conducting covert operations.  ... 
doi:10.1109/jsac.2021.3090897 fatcat:22i7u6tzevb6vgdrwflhzsv34u

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  Hero examined the utility of space-time block coding for covert communications in [33] , and designed CSI-informed transmission strategies to achieve either a low probability of intercept (defined in  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  Hero examined the utility of space-time block coding for covert communications in [33] , and designed CSI-informed transmission strategies to achieve either a low probability of intercept (defined in  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Energy- and Cost-Efficient Physical Layer Security in the Era of IoT: The Role of Interference

Zhongxiang Wei, Christos Masouros, Fan Liu, Symeon Chatzinotas, Bjorn Ottersten
2020 IEEE Communications Magazine  
Covert communication [7] Cooperative jamming [2] Anti-attack [1] Graph theory [2] Beamforming [4] Compressed sensing [5] Bit flipping [5] PHY encryption [6] Constellation rotation [5] Noise aggregation  ...  Zhongxiang Wei, Christos Masouros, and Fan Liu are with University College London; Symeon Chatzinotas and Björn Ottersten are with the University of Luxembourg.  ...  Since IoT is expected to carry important and private information, a high level of PHY security is critical for wireless communications in IoT, as a complement for traditional security techniques that are  ... 
doi:10.1109/mcom.001.1900716 fatcat:kdqwnk7qfba3zc5bpk5zejys7y

Anonymous Networking Amidst Eavesdroppers

Parvathinathan Venkitasubramaniam, Ting He, Lang Tong
2008 IEEE Transactions on Information Theory  
The problem of security against packet timing based traffic analysis in wireless networks is considered in this work.  ...  Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity.  ...  The throughput-anonymity tradeoff we obtain reiterates the known paradigm of inverse relationship between communication rate and secrecy in covert channels.  ... 
doi:10.1109/tit.2008.921660 fatcat:kys2qj3z2vb4jfu34qd33csc34

A Repeated Games-Based Secure Multiple-Channels Communications Scheme for Secondary Users with Randomly Attacking Eavesdroppers

Van-Hiep Vu, Huynh Thien, Insoo Koo
2019 Applied Sciences  
In this paper, we focus on improving the secrecy performance of CR communications in a decentralized, multiple-channel manner while various eavesdroppers (EVs) try to listen to their private information  ...  In the paper, we propose a repeated games-based scheme that can provide the best channel for the SU to avoid eavesdropping attacks and also minimize interference from other SUs that compete for the same  ...  To address these emerging issues, researchers have been developing new paradigms in network design.  ... 
doi:10.3390/app9050868 fatcat:mztcg4pydjhk7glrbp7sgrhq2q
« Previous Showing results 1 — 15 out of 279 results