4.5 Article

Secure transmission in wireless ad-hoc networks without CSI at the destination

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Power Allocation for Cooperative Jamming Against a Strategic Eavesdropper Over Parallel Channels

Zhifan Xu et al.

Summary: This paper investigates the allocation of jamming power by a friendly interferer to eavesdropping channels in order to enhance the secrecy level of a wireless network. The optimal power allocation policy is obtained by solving a convex optimization problem when all channels used for secret communication are threatened by eavesdropping attacks. A non-zero-sum game is proposed to help the friendly interferer predict and focus on the targets selected by the eavesdropper. The paper provides conditions under which the eavesdropper's equilibrium strategy is deterministic and presents an algorithm for computing an equilibrium power allocation strategy.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Electrical & Electronic

Full-Duplex Constant-Envelope Jamceiver and Self-Interference Suppression by Highpass Filter: Experimental Validation for Wi-Fi Security

Jaakko Marin et al.

Summary: Unauthorized access to data has long been a recognized risk in wireless systems, and recent developments have focused on utilizing jamming for protection. This paper presents an experimental study on a full-duplex jammer-receiver that can interfere with and receive the same radio resources simultaneously. The results validate the feasibility of preventing eavesdropping with continuous low-power jamming in both lab and real-world scenarios.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2023)

Article Computer Science, Theory & Methods

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security

Yuanyu Zhang et al.

Summary: This paper proposes a Sight-based Cooperative Jamming (SCJ) scheme to enhance the physical layer security (PLS) performance of mmWave ad hoc communications. By exploiting the signal difference between Non-Light-of-Sight (NLoS) and Line-of-Sight (LoS) mmWave links, the scheme selects potential jammers to generate artificial noise, improving secrecy performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Engineering, Electrical & Electronic

Secure Transmit Beamforming for Radar-Communication System Without Eavesdropper CSI

Dongqi Luo et al.

Summary: This article investigates the transmit beamforming security in the dual-functional radar-communication system and proposes the long-term eavesdropping SINR as a tractable security metric. It also explores the sum rate maximization and jamming power maximization transmission schemes.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications

Huanqi Yang et al.

Summary: This paper presents Vehicle-Key, a secret key generation system for securing LoRa-enabled IoV communications. It utilizes a deep learning model to achieve channel prediction and quantization, and proposes an autoencoder-based reconciliation method to improve the key agreement rate. Extensive real-world experiments demonstrate that Vehicle-Key significantly improves the key agreement rate and key generation rate compared to the state-of-the-art approaches.

2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022) (2022)

Article Engineering, Electrical & Electronic

Energy Efficient Artificial Noise-Aided Precoding Designs for Secured Visible Light Communication Systems

Thanh V. Pham et al.

Summary: This article focuses on the designs of physical layer security (PLS) in visible light communication systems, specifically looking at how to use artificial noise-aided precoding to address the presence of multiple unauthorized users. Different design approaches are proposed considering unknown and known unauthorized users' channel state information (CSI), and two sub-optimal yet low-complexity methods, Concave-Convex Procedure (CCP) and Semidefinite Relaxation (SDR), are examined to solve the non-convex design problem. Extensive numerical results are presented to demonstrate the feasibility and performance of each design with practical parameters.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Bipartite Graph Matching Based Secret Key Generation

Hongbo Liu et al.

Summary: The generation of physical layer secret key using wireless channel reciprocity has been proven feasible in various RF systems, but existing quantization techniques often lead to inconsistent results and mismatched secret bits. A new approach of solving a bipartite graph matching problem for secret key agreement shows promise in mitigating these issues.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) (2021)

Article Computer Science, Theory & Methods

Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI

Hongliang He et al.

Summary: This paper proposes a novel cooperative jamming scheme to improve security in multiple access wiretap channels, where users use their own CSI to design artificial noise to eliminate eavesdroppers' ability to intercept legitimate information. The interference between users plays a key role in achieving security by ensuring that artificial noise from different users helps each other. The study considers both non-collusion and collusion scenarios of eavesdroppers, and shows that positive secrecy sum-rate can be achieved by the proposed scheme.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

Physical Layer Security of Spatially Modulated Sparse-Code Multiple Access in Aeronautical Ad-hoc Networking

Yusha Liu et al.

Summary: This paper proposes a CQI-mapped SM-SCMA scheme to improve the throughput and enhance security in AANETs by exploiting the joint benefits of spatial modulation and SCMA. By generating a physical-layer secret key based on CQI, ensuring the secure exchange of confidential information in AANETs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Theory & Methods

Multiuser MIMO Concept for Physical Layer Security in Multibeam Satellite Systems

Matthias G. Schraml et al.

Summary: In satellite communication downlinks, a precoding algorithm is proposed in this paper to secure the data of multiple users and optimize the minimum secrecy capacity. By introducing artificial noise, a positive secrecy effect is achieved, even if the number of eavesdroppers exceeds the number of beams. Multiple-reflector antenna design shows higher secrecy and throughput performance compared to single-reflector design.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems

Inkyu Bang et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks

Quanzhong Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

LoRa-Key: Secure Key Generation System for LoRa-Based Network

Weitao Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Telecommunications

Self-Interference Cancellation Scheme for Secure AF Satellite Communication Based on FH-MWFRFT

Ruiyang Xu et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Joint Artificial Noise and Repetition Coding for Secure Wireless Communications in TDD Systems

Hongliang He et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Secrecy-Oriented Antenna Assignment Optimization at Full-Duplex Receiver With Self-Interference

Tianwen Guo et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2018)

Article Computer Science, Theory & Methods

Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMO

Marcus Karlsson et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

A Game With Randomly Distributed Eavesdroppers in Wireless Ad Hoc Networks: A Secrecy EE Perspective

Younggap Kwon et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Secure Communications in Millimeter Wave Ad Hoc Networks

Yongxu Zhu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

Tong-Xing Zheng et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Theory & Methods

Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach

Yansha Deng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Engineering, Electrical & Electronic

Secrecy-Enhancing Signaling Schemes for Fast-Varying Wiretap Channels With Only CSI at the Transmitter

Pang-Chang Lan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks

Xuanyu Cao et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2016)

Article Computer Science, Theory & Methods

Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs

Biao Han et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)

Article Computer Science, Information Systems

The capacity of discrete-time memoryless Rayleigh-Fading channels

IC Abou-Faycal et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2001)