MIMO Signal Processing Algorithms for Enhanced Physical Layer Security

نویسندگان

  • Amitav Mukherjee
  • Ali A. Fakoorian
  • Jing Huang
چکیده

The use of physical layer methods for improving the security of wireless links has recently become the focus of a considerable research effort. Such methods can be used in combination with cryptography to enhance the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, or they can be used to enable secrecy in the absence of shared secret keys through the use of coding strategies, jamming or beamforming. Indeed, one of the driving forces behind the recent emergence of physical layer techniques for security is the push toward adding extra degrees of freedom in the form of multiple antennas at the transmitter and receiver of the link. Multiple-input multiple-output (MIMO) wireless systems have been extensively studied during the past two decades, and their potential gains in throughput, diversity, and range have been well quantified. MIMO approaches are now an integral part of the WiFi and 4G standards in use today. It is not surprising that MIMO architectures are useful in improving wireless security as well, since they can provide focused transmit selectivity of both information and noise toward desired and undesired receivers. In this chapter, we discuss a number of different ways that physical layer security can be achieved in wireless networks with MIMO links. We will focus primarily on signal processing related issues (e.g., beamforming, power control, resource allocation) that enable reliable reception at intended recipients and minimize data leakage to eavesdroppers, and we will consider a variety of different MIMO settings including point-to-point, broadcast, interference, and multi-hop networks. We cannot offer an exhaustive survey of such methods in just a single chapter; instead, we present a few representative approaches that illustrate

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A MIMO Based Cross-layer Approach to Augment the Security of Wireless Networks

In this work, we propose a novel MIMO-aided security scheme. By exploiting an extra dimension provided by MIMO systems for adding artificial noise to the transmission process, the physical-layer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.

متن کامل

Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation

In this paper we address physical layer security in MIMO frequency selective wireless channels in the presence of a passive eavesdropper, i.e., the associated channel is unknown to the transmitter. Signalling is based on orthogonal frequency division multiplexing (OFDM). Spatial beamforming and artificial noise broadcasting are chosen as the strategy for secure transmission. The contribution of...

متن کامل

A Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security

In recent wireless communication systems, security is ensured mainly in the upper-layer techniques such as a password or a cryptography processing. However, security needs not be restricted to the upperlayer and the addition of physical-layer security also would yield a much more robust system. Therefore, in this paper, we exploit chaos communication and propose a chaos multiple-input multiple-...

متن کامل

A New Distributed DC-Programming Method and its Applications

We propose a novel decomposition framework for the distributed optimization of Difference Convex (DC)-type nonseparable sum-utility functions subject to coupling convex constraints. A major contribution of the paper is to develop for the first time a class of (inexact) best-response-like algorithms with provable convergence, where a suitably convexified version of the original DC program is ite...

متن کامل

Physical Layer Security and Its Applications : A Survey

This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013