PHY Security of Wiretap Channels PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download PHY Security of Wiretap Channels PDF full book. Access full book title PHY Security of Wiretap Channels by Ahmed El Shafie. Download full books in PDF and EPUB format.

PHY Security of Wiretap Channels

PHY Security of Wiretap Channels PDF Author: Ahmed El Shafie
Publisher:
ISBN:
Category : Eavesdropping
Languages : en
Pages :

Book Description
Information secrecy is crucial to a wireless communication system due to the broadcast nature of radio-frequency transmissions. Traditionally, secrecy has been provided by designing upper-layer sophisticated protocols. More specifically, the problem of securing the information from malicious eavesdropping nodes has been tackled by relying on the conventional encryption mechanism. To improve the system security, physical-layer (PHY) security has been recently recognized as a valuable tool to guarantee information-theoretic confidentiality of messages transmitted over the wireless medium. In this dissertation, we propose new efficient schemes to secure the wireless links of various wireless communications networks. We investigate both the frequency non-selective and selective channels for different relaying networks. For the frequency-selective channels, we use the orthogonal-frequency division-multiplexing (OFDM) transmission scheme to convert the channel into a set of flat-faded sub-channels where each OFDM block begins with a cyclic-prefix sequence to eliminate the inter-block interference. For frequency-selective and non-selective channels, we propose secure schemes and evaluate their performance. Our proposed artificial noise aided schemes are based on the spatial and temporal degrees of freedom provided by the multiple antennas at the legitimate nodes and the cyclic prefix of the OFDM systems, respectively. We provide in-depth analysis for the PHY security of many wireless systems architectures including single-input single-output (SISO) systems, relay-aided SISO systems, multiple-input multiple-output (MIMO) systems, and relay-aided MIMO systems. In addition, we investigate the impact of data buffers at communicating nodes as well as the presence of friendly jamming nodes on the achievable secrecy rates. The duplexity capabilities of the relay nodes are also investigated and their impacts on the achievable secrecy rates are quantified. To make the communication systems more robust against eavesdropping, we also investigate securing wireless networks in the presence of a set of untrusted relay nodes where the relay nodes are assumed to be honest but curious as in, e.g., the aggregating units in the smart grids, and the servers in governmental intelligence systems. As a case study on the impact of passive and active security attacks, we quantified the gain of our proposed encoding and secure schemes in terms of improving the demand-side management's security and reducing the monetary loss to the utility.

PHY Security of Wiretap Channels

PHY Security of Wiretap Channels PDF Author: Ahmed El Shafie
Publisher:
ISBN:
Category : Eavesdropping
Languages : en
Pages :

Book Description
Information secrecy is crucial to a wireless communication system due to the broadcast nature of radio-frequency transmissions. Traditionally, secrecy has been provided by designing upper-layer sophisticated protocols. More specifically, the problem of securing the information from malicious eavesdropping nodes has been tackled by relying on the conventional encryption mechanism. To improve the system security, physical-layer (PHY) security has been recently recognized as a valuable tool to guarantee information-theoretic confidentiality of messages transmitted over the wireless medium. In this dissertation, we propose new efficient schemes to secure the wireless links of various wireless communications networks. We investigate both the frequency non-selective and selective channels for different relaying networks. For the frequency-selective channels, we use the orthogonal-frequency division-multiplexing (OFDM) transmission scheme to convert the channel into a set of flat-faded sub-channels where each OFDM block begins with a cyclic-prefix sequence to eliminate the inter-block interference. For frequency-selective and non-selective channels, we propose secure schemes and evaluate their performance. Our proposed artificial noise aided schemes are based on the spatial and temporal degrees of freedom provided by the multiple antennas at the legitimate nodes and the cyclic prefix of the OFDM systems, respectively. We provide in-depth analysis for the PHY security of many wireless systems architectures including single-input single-output (SISO) systems, relay-aided SISO systems, multiple-input multiple-output (MIMO) systems, and relay-aided MIMO systems. In addition, we investigate the impact of data buffers at communicating nodes as well as the presence of friendly jamming nodes on the achievable secrecy rates. The duplexity capabilities of the relay nodes are also investigated and their impacts on the achievable secrecy rates are quantified. To make the communication systems more robust against eavesdropping, we also investigate securing wireless networks in the presence of a set of untrusted relay nodes where the relay nodes are assumed to be honest but curious as in, e.g., the aggregating units in the smart grids, and the servers in governmental intelligence systems. As a case study on the impact of passive and active security attacks, we quantified the gain of our proposed encoding and secure schemes in terms of improving the demand-side management's security and reducing the monetary loss to the utility.

Advances in Cryptology -- CRYPTO 2012

Advances in Cryptology -- CRYPTO 2012 PDF Author: Reihaneh Safavi-Naini
Publisher: Springer
ISBN: 3642320090
Category : Computers
Languages : en
Pages : 902

Book Description
This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Physical Layer Security - Wiretap Channels with Active Adversary

Physical Layer Security - Wiretap Channels with Active Adversary PDF Author: Carsten Rudolf Janda
Publisher:
ISBN: 9783844091625
Category :
Languages : en
Pages : 0

Book Description


Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications PDF Author: Xiangyun Zhou
Publisher: CRC Press
ISBN: 1466567015
Category : Computers
Languages : en
Pages : 308

Book Description
Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.

Coding Techniques for Information-theoretic Strong Secrecy on Wiretap Channels

Coding Techniques for Information-theoretic Strong Secrecy on Wiretap Channels PDF Author: Arunkumar Subramanian
Publisher:
ISBN:
Category : Data protection
Languages : en
Pages :

Book Description
Traditional solutions to information security in communication systems act in the application layer and are oblivious to the effects in the physical layer. Physical-layer security methods, of which information-theoretic security is a special case, try to extract security from the random effects in the physical layer. In information-theoretic security, there are two asymptotic notions of secrecy---weak and strong secrecy.

Physical-Layer Security

Physical-Layer Security PDF Author: Matthieu Bloch
Publisher: Cambridge University Press
ISBN: 1139496298
Category : Technology & Engineering
Languages : en
Pages : 347

Book Description
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.

Trusted Communications with Physical Layer Security for 5G and Beyond

Trusted Communications with Physical Layer Security for 5G and Beyond PDF Author: Trung Q. Duong
Publisher: IET
ISBN: 1785612352
Category : Computers
Languages : en
Pages : 577

Book Description
Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches

On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches PDF Author: Hong Wen
Publisher:
ISBN:
Category : Wireless communication systems
Languages : en
Pages : 111

Book Description
Due to the broadcast nature, wireless links are open to malicious intrusions from outsiders, which makes the security issues a critical concern in the wireless communicationsover them. Physical-layer security techniques, which are based on the Shannon's unconditional secrecy model, are effective in addressing the security issue while meeting the required performance level. According to the Wyner's wiretap channel model, to achieve unconditionally security communication, the first step is to build up a wiretap channel with better channel quality between the legitimate communication peers than that of the eavesdropper; and the second step is to employ a robust security code to ensure that the legitimate users experience negligible errors while the eavesdropper is subject to 0.5 error probability. Motivated by this idea, in this thesis, we build wiretap channels for the single antenna systems without resorting to the spatial degree in commonly observed the multiple-input multiple-output (MIMO) systems. Firstly, to build effective wiretap channels, we design a novel scheme, called multi-round two-way communications (MRTWC). By taking feedback mechanisms into the design of Low Density Parity Check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination to keep the eavesdropper ignorant while adding redundancy with the LDPC codes so that the legitimate receiver can correctly receive and decode the signals. Then, the channel BERs are specifically quantified according to the crossover probability in the case of Binary Symmetric Channel (BSC), or the Signal to Noise Ratio (SNR) in the case of AWGN and Rayleigh channels. Thus, the novel scheme can be utilized to address the security and reliability. Meanwhile, we develop a cross-layer approach to building the wiretap channel, which is suitable for high dynamic scenarios. By taking advantage of multiple parameters freedom in the discrete fractional Fourier transform (DFRFT) for single antenna systems, the proposed scheme introduces a distortion parameter instead of a general signal parameter for wireless networks based on DFRFT. The transmitter randomly flip-flops the uses of the distortion parameter and the general signal parameter to confuse the eavesdropper. An upper-layer cipher sequence will be employed to control the flip-flops. This cryptographic sequence in the higher layer is combined with the physical layer security scheme with random parameter fipping in DFRFT to guarantee security advantages over the main communication channel. As the efforts on the second step, this thesis introduces a novel approach to generate security codes, which can be used for encoding with low complexity by taking advantage of a matrix general inverse algorithm. The novel constructions of the security codes are based on binary and non-binary resilient functions. With the proposed security codes, we prove that our novel security codes can ensure 0.5 error probability seen by the wiretapper while close to zero by the intended receiver if the error probability of the wiretapper's channel is over a derived threshold. Therefore, the unconditionally secure communication of legitimate partners can be guaranteed. It has been proved mathematically that the non-binary security codes could achieve closer to the security capacity bound than any other reported short-length security codes under BSC. Finally, we develop the framework of associating the wiretap channel building approach with the security codes. The advantages between legitimate partners are extended via developing the security codes on top of our cross-layer DFRFT and feedback MRTWC security communication model. In this way, the proposed system could ensure almost zero information obtained by the eavesdroppers while still keeping rather lower error transmissions for legitimate users. Extensive experiments are carried out to verify the proposed security schemes and demonstrate the feasibility and implement ability. An USRP testbed is also constructed, under which the physical layer security mechanisms are implemented and tested. Our study shows that our proposed security schemes can be implemented in practical communications settings.

Physical-Layer Security

Physical-Layer Security PDF Author: Mustapha El-Halabi
Publisher:
ISBN:
Category :
Languages : en
Pages : 90

Book Description
Data security is of such paramount importance that security measures have been implemented across all layers of a communication network. One layer at which security has not been fully developed and studied is the physical layer, the lowest layer of the protocol stack. Towards establishing fundamental limits of secure communications at the physical layer, we address in this dissertation two main problems. First, we study secure communication in the wide-band regime, and second we study the role of known interference in secure communication. The concept of channel capacity per unit cost was introduced by Verd[u] in 1990 to study the limits of cost-efficient wide-band communication. It was shown that orthogonal signaling can achieve the channel capacity per unit cost of memoryless stationary channels with a zero-cost input letter. The first part of this dissertation introduces the concept of secrecy capacity per unit cost to study cost-efficient wide- band secrecy communication. For degraded memoryless stationary wiretap channels, it is shown that an orthogonal coding scheme with randomized pulse position and constant pulse shape achieves the secrecy capacity per unit cost with a zero-cost input letter. For general memoryless stationary wiretap channels, the performance of orthogonal codes is studied, and the benefit of further randomizing the pulse shape is demonstrated via a simple example. Furthermore, the problem of secure communication in a MIMO setting is considered, and a single-letter expression for the secrecy capacity per unit cost is obtained for the MIMO wiretap channel. Recently there has been a lot of success in using the deterministic approach to provide approximate characterization of Gaussian network capacity. The second part of this dissertation takes a deterministic view and revisits the problem of wiretap channel with side information. A precise characterization of the secrecy capacity is obtained for a linear deterministic model, which naturally suggests a coding scheme which we show to achieve the secrecy capacity of the degraded Gaussian model (dubbed as "secret writing on dirty paper") to within half a bit. The success of this approach allowed its application to the problem of "secret key agreement via dirty paper coding", where also a suggested coding scheme achieves the secret-key capacity to within half a bit. The electronic version of this dissertation is accessible from http://hdl.handle.net/1969.1/151822

Securing Wireless Communications at the Physical Layer

Securing Wireless Communications at the Physical Layer PDF Author: Ruoheng Liu
Publisher: Springer Science & Business Media
ISBN: 1441913858
Category : Technology & Engineering
Languages : en
Pages : 403

Book Description
This book focuses specifically on physical layer security, a burgeoning topic in security. It consists of contributions from the leading research groups in this emerging area, and for the first time important high-impact results are collected together.