The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive heterogeneous cellular networks (CHCNs) and multi-user multiple-input multiple-output (MU-MIMO) are both promising technologies in the future network where wireless transmissions are inherently vulnerable to security breaches. Under an interference constraint set by the primary user, this study examines the impact of MU-MIMO technology on secure communication between cognitive base stations...
This paper investigates the secrecy performance of half-duplex relay networks. First, we establish a relay broadcasting wiretap channel model using a half-duplex relay with multiple antennas and derive the instantaneous secrecy capacity of this system. With convex optimization, the upper bound on the capacity region is provided. Second, we give the expression for the ergodic secrecy rate and analyze...
The mutual interference induced by the hybrid links can bring the secrecy gain for device-to-device (D2D) communication underlaying cellular networks, where there have been few works on studying its impact on the secrecy performance of the accessed D2D pairs. In this paper, our aim is to mainly analyze the secrecy performance gain of the accessed D2D pair brought by the mutual interference.Firstly,an...
This paper proposes a novel anti-eavesdropping scheme by introducing artificial noise caused by friendly jammers deployed in wireless networks. In particular, we propose an analytical model to quantify the eavesdropping risk of wireless network with friendly jammers. Our approach considers both large-scale path loss and Rayleigh fading. Our numerical results show that the eavesdropping risk of wireless...
Information security is a critical yet challenging issue for wireless communications. In this paper, we investigate this problem from a networked perspective. Specifically, we consider a wireless network where there coexists users with and without security concerns, which respectively maximize the secrecy rate and transmission rate. To enhance wireless security, we give the security-oriented user...
In this paper, weighted fractional Fourier transform (WFRFT) is employed to safeguard the physical layer (PHY) security of wireless communications. By leveraging the features of WFRFT, we propose a PHY security modulation scheme, which significantly degrades the equivalent signal-to-noise ratio (SNR) of the unauthorized receiver while imposing no impact on the legitimate receiver. With the proposed...
This paper investigates cooperative jamming for secure connection in wireless networks. A cooperative jamming strategy is proposed to thwart eavesdroppers anywhere in the network, even if they are located close to the source or the destination. The basic idea is to defeat eavesdroppers by a divide and conquer strategy, and exploit the helpful interference from the source and the destination to circumvent...
This paper investigates single relay selection problem for secure communication in a cooperative system with multiple full-duplex decode-and-forward relays, in which an eavesdropper may overhear the source confidential message through relays' transmission. We propose an opportunistic relay selection scheme which selects the relay that maximizes the system secrecy capacity. We then evaluate performance...
The paper investigates a decode-and-forward buffer-aided relay selection for an underlay cognitive radio network in the presence of an eavesdropper. The secondary users operating on the same band used by primary user, so the QoS of primary user should be guaranteed. Eavesdropper can intercept the information transmission from the secondary transmitter or relay to the corresponding receiver, which...
In this paper, we investigate the problem of placing small cell base stations (SCBSs) in adversarial heterogeneous wireless networks. We consider a continuum of wireless users facing potential eavesdropping and jamming attacks. For each such attack, we first propose a suitable utility function for the wireless users. Then, we propose a novel optimal placement algorithm for finding the optimal locations...
Most of current physical-layer security techniques rely on a degraded eavesdropper, thus warranting some sort of advantage that can be relied upon to achieve higher levels of security. We consider instead non-degraded eavesdroppers, that possess equal or better capabilities than legitimate receivers. Under this challenging setup, most of current physical-layer security techniques become hard to administer...
Information security of industrial wireless network of Industrial Control System (ICS), which is at a stage of rapid development, has gradually become a hot research. Through the analysis of typical framework of industrial wireless network and factors of network node trust transmission, the corresponding relationship of encourage factor, trust value and current cooperation frequency is proposed in...
In this paper, we consider the broadcast channel with confidential messages and eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates to multiple potentially malicious users, in the presence of external eavesdroppers randomly located according to a Poisson point process (PPP). By using techniques from stochastic geometry and random matrix theory, we obtain explicit expressions...
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic...
This paper deals with the use of jamming transmission for physical layer security in wireless networks with power constraints. An approach that incorporates a dirty-paper coding (DPC) design with the jamming process under a total power constraint is investigated. The proposed scheme enables both the source and the jammer nodes to create intentional interference on the eavesdropper node and significantly...
Channel assignment is the key problem in the research of the next-generation wireless mesh networks (WMN) in which each node may be equipped with multiple radio interfaces, each capable of running in one of several modes and one of several channels. Recent research indicates that the use of channel assignment technology could reduce the interference and increase the throughout of WMN effectively....
Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide...
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of the information from the eavesdropper. We profile...
With the development of high rate data transmission technology via distribution line communication, the electric power, data, voice and video can be transferred in the same electric power distribution network, and the technology will be put in operation widely in the future. However the traditional technology of power line communication is not adaptable to the complex and harsh environment of distribution...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.