Table of contents [secure communications via physical-layer and information-theoretic techniques]

2015 ◽  
Vol 103 (10) ◽  
pp. 1689-1690
2015 ◽  
Vol 103 (10) ◽  
pp. 1698-1701 ◽  
Author(s):  
Phillip A. Regalia ◽  
Ashish Khisti ◽  
Yingbin Liang ◽  
Stefano Tomasin

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 50-74
Author(s):  
Divyanshu Pandey ◽  
Adithya Venugopal ◽  
Harry Leib

Most modern communication systems, such as those intended for deployment in IoT applications or 5G and beyond networks, utilize multiple domains for transmission and reception at the physical layer. Depending on the application, these domains can include space, time, frequency, users, code sequences, and transmission media, to name a few. As such, the design criteria of future communication systems must be cognizant of the opportunities and the challenges that exist in exploiting the multi-domain nature of the signals and systems involved for information transmission. Focussing on the Physical Layer, this paper presents a novel mathematical framework using tensors, to represent, design, and analyze multi-domain systems. Various domains can be integrated into the transceiver design scheme using tensors. Tools from multi-linear algebra can be used to develop simultaneous signal processing techniques across all the domains. In particular, we present tensor partial response signaling (TPRS) which allows the introduction of controlled interference within elements of a domain and also across domains. We develop the TPRS system using the tensor contracted convolution to generate a multi-domain signal with desired spectral and cross-spectral properties across domains. In addition, by studying the information theoretic properties of the multi-domain tensor channel, we present the trade-off between different domains that can be harnessed using this framework. Numerical examples for capacity and mean square error are presented to highlight the domain trade-off revealed by the tensor formulation. Furthermore, an application of the tensor framework to MIMO Generalized Frequency Division Multiplexing (GFDM) is also presented.


2014 ◽  
Vol 33 ◽  
pp. 1460361 ◽  
Author(s):  
Lachlan J. Gunn ◽  
James M. Chappell ◽  
Andrew Allison ◽  
Derek Abbott

While information-theoretic security is often associated with the one-time pad and quantum key distribution, noisy transport media leave room for classical techniques and even covert operation. Transit times across the public internet exhibit a degree of randomness, and cannot be determined noiselessly by an eavesdropper. We demonstrate the use of these measurements for information-theoretically secure communication over the public internet.


Author(s):  
Bahzad Taha Jijo ◽  
Subhi R. M. Zeebaree ◽  
Rizgar R. Zebari ◽  
Mohammed A. M. Sadeeq ◽  
Amira B. Sallow ◽  
...  

Physical layer protection, which protects data confidentiality using information-theoretic methods, has recently attracted a lot of research attention. Using the inherent randomness of the transmission channel to ensure protection in the physical layer is the core concept behind physical layer security. In 5G wireless communication, new challenges have arisen in terms of physical layer security. This paper introduces the most recent survey on various 5G technologies, including millimeter-Wave, massive multi-input multiple outputs, microcells, beamforming, full-duplex technology, etc. The mentioned technologies have been used to solve this technology, such as attenuation, millimeter-Wave penetration, antenna array architecture, security, coverage, scalability, etc. Besides, the author has used descriptions of the techniques/algorithms, goals, problems, and meaningful outcomes, and the results obtained related to this approach were demonstrated.


Author(s):  
Rajesh K. Sharma

This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pervasive existence of wireless communication devices. In this context, the focus of this chapter is mainly on physical layer security. Some security attacks in general are briefly reviewed. Models of physical layer security, information theoretic works, and key generation methods including quantization and reconciliation are discussed. Some latest developments for enhanced security like Multiple-Input Multiple-Output (MIMO) systems, reconfigurable antennas, and multiple relay systems are also presented. Finally, some existing and emerging application scenarios of physical layer security are discussed.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4757 ◽  
Author(s):  
João Madeira ◽  
João Guerreiro ◽  
Rui Dinis ◽  
Paulo Montezuma ◽  
Luís Miguel Campos

Multi-Input, Multi-Output (MIMO) techniques are seeing widespread usage in wireless communication systems due to their large capacity gains. On the other hand, security is a concern of any wireless system, which can make schemes that implement physical layer security key in assuring secure communications. In this paper, we study the physical layer security issues of MIMO with Singular Value Decomposition (SVD) schemes, employed along with Single-Carrier with Frequency-Domain Equalization (SC-FDE) techniques. More concretely. the security potential against an unintended eavesdropper is analysed, and it is shown that the higher the distance between the eavesdropper and the transmitter or receiver, the higher the secrecy rate. In addition, in a scenario where there is Line of Sight (LOS) between all users, it is shown that the secrecy rate can be even higher than in the previous scenario. Therefore, MIMO-SVD schemes combined with SC-FDE can be an efficient option for highly secure MIMO communications.


Sign in / Sign up

Export Citation Format

Share Document