The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the challenges in designing dual communication and radar systems employing multi-carrier waveforms is addressing the separate radar and communication objectives. This challenge becomes more difficult when one considers that such a system would be the target of malicious attacks, especially those involving interference. In this paper, to gain insight into the problem, a game-theoretical model...
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices,...
In order to counteract hostile communication based on the advanced Orthogonal Frequency Division Multiplexing (OFDM) technology, an efficient and unrecognizable jamming technique by failing the OFDM cyclic prefix (CP) functionality is developed in the paper. CP is introduced into OFDM systems to prevent interference caused by the multipath fading, as long as it is no shorter than the channel delay...
In this paper, we study channel-aware (CA) randomization for secure transmissions in a multicarrier system based on partial channel state information (CSI). In order to see the performance gain by CA randomization, we consider the secrecy rate and show that i) a positive secrecy rate can be obtained even if the channel to an adversary is stochastically more capable than the channel to a legitimate...
From the perspective of national security, legitimate government agencies have long been committed to enforcing powerful surveillance measures on suspicious individuals or communications. This paper investigates a wireless legitimate surveillance system, where a full-duplex multi-antenna legitimate monitor aims to eavesdrop on a dubious communication link between a suspicious pair via proactive jamming...
We introduce a new scheme that integrates the Time Compression OverLap-Add (TC-OLA) spread spectrum technique into radar systems, more specifically the Linear Frequency Modulation Pulse Compression (LFM-PC) radar. This technique increases the signal to noise ratio (SNR) and, as a consequence, enables a greater processing gain compared to the traditional radar LFM-PC systems. In addition, TC-OLA allows...
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and passive eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon their own information...
We study the Gaussian multiple access channel in presence of an adversary, who is simultaneously able to eavesdrop and jam, i.e., an active wiretapper. We assume that the adversary has a power constraint, which she can utilize to have any arbitrary jamming strategy. The multiple access channel between the legitimate transmitters and the receiver thus becomes arbitrarily varying. We derive inner and...
In this work, we focus on the partially connected interference network with confidential messages, and study the secure degrees of freedom with no channel state information at the transmitters (CSIT). Prior works on fully connected interference networks with full CSIT have shown that the secure degrees of freedom scales linearly with the number of users. With no CSIT, however, the secure degrees of...
Pilot spoofing attack is a serious threat to timedivision duplex (TDD) orthogonal frequency division multiplexing (TDD-OFDM) system. By employing identical pilot tones as a legitimate receiver, an adversary can contaminate the uplink channel estimation between a transceiver pair. To solve this problem, we in this paper propose an independent component analysis (ICA) based channel estimation and identification...
To protect confidential communications from eavesdropping attacks in wireless networks, we propose a novel anti-eavesdropping scheme named AE-Shelter. In our proposed scheme, we place a number of friendly jammers at a circular boundary to protect legitimate communications. The jammers sending artificial noise can mitigate the eavesdropping capability of wiretapping the confidential information. We...
In this paper we address a sum secrecy rate maximization problem for a multi-carrier and MIMO communication system. We consider the case that the receiver is capable of full-duplex (FD) operation and simultaneously sends jamming signal to a potential eavesdropper. In particular, we simultaneously take advantage of the spatial and frequency diversity in the system in order to obtain a higher level...
The work in this manuscript proposes to enhance the secrecy level of wireless systems through the use of a jamming technique that uses uncorrelated reciprocal channel estimations from the legitimate channel as a common random source to select discrete jamming signals in both sides of the legitimate link. After that selection, these jamming signals are combined with data at the legitimate transmitter,...
We study the transmission of confidential messages across a wireless broadcast channel with K > 2 receivers and K helpers. The goal is to transmit all messages reliably to their intended receivers while keeping them confidential from the unintended receivers. We design a codebook based on nested lattice structure, cooperative jamming, lattice alignment, and i.i.d. coding. Moreover, we exploit the...
In this paper, we consider a secure wireless powered device-to-device (D2D) communication in the presence of the multiple eavesdroppers, where a smart hybrid base station (BS) in cellular network not only charges for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. Although the cellular networks...
In this paper, we discuss some conditions for LPI signals, and propose a system with multiple users requiring these LPI properties using the optimal families of polyphase sequences recently discovered by Park et. al. We discuss and prove the bound on the key space for candidates, and conclude that our system is more secure than those employing encrypted sequences using AES-128 against brute-force...
We study a two-user symmetric interference channel (IC) with common and private message under security constraints. In this model, one transmitter wants to send a common message to both receivers, while the other transmitter wants to send a private message to one receiver and needs to be protected from the unintended receiver. We first establish an inner bound on the secrecy rate region for the case...
We consider the problem of secrecy rate maximization in a multi-input multi-output multi-eavesdropper (MIMOME) wiretap channel and present an exact solution. A general system model with a multi-antenna eavesdropper and a multi-antenna full-duplex receiver is considered. In particular, we perform joint beamforming and artificial noise optimization in an effort to maximize the achievable secrecy rate...
Self-interference cancellation technologies enable full-duplex operation at the eavesdropper. In addition to wiretapping, the eavesdropper simultaneously tries to reduce the secrecy rate of the illegitimate transmitter-receiver pair by jamming its receiver. On the other hand, the transmitter-receiver pair aims to increase its secrecy rate. To examine the power decision processes between the transmitter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.