Securing Wireless Communications at the Physical Layer

Free download. Book file PDF easily for everyone and every device. You can download and read online Securing Wireless Communications at the Physical Layer file PDF Book only if you are registered here. And also you can download or read online all Book PDF file that related with Securing Wireless Communications at the Physical Layer book. Happy reading Securing Wireless Communications at the Physical Layer Bookeveryone. Download file Free Book PDF Securing Wireless Communications at the Physical Layer at Complete PDF Library. This Book have some digital formats such us :paperbook, ebook, kindle, epub, fb2 and another formats. Here is The CompletePDF Book Library. It's free to register here to get Book file PDF Securing Wireless Communications at the Physical Layer Pocket Guide.

Last chapter has demonstrated that wireless cooperative networks can significantly enhance the security performance at physical layer.


  • Mobile and Wireless Communications.
  • About this book.
  • Kama Sutra for 21st Century Lovers.
  • Chasing Spring presents Ray Eyes Turkey Hunters Bible: The Tips, Tactics, and Secrets of a Professional Turkey Hunter?
  • Book Subject Areas.

In this chapter, we will give a brief overview of several existing prevalent methods with respect to the cooperation within multi-antenna networks and multi-user networks, for improving the confidentiality. Specifically, we mainly focus on time reversal TR technique, spatial modulation SM technique as the representative multi-antenna cooperative strategies, and D2D transmissions as typical scenarios for investigating cooperation behavior among mobile users.

Table of Contents

The reason why we elaborate such strategies is that they have their own specific characteristics for enhancing the security performance. Typically, the signal focusing property of TR can be exploited to reduce signal leakage to unintended users, hence the secrecy performance is improved. For SM transmission, the system can achieve the same degree of security compared to the conventional MIMO system, while effectively reducing the complexity of system. Finally, there are a number of cooperative techniques can be perfectly implemented in D2D communications, and due to the social interactions among the mobile users, the issues of security can be investigated from a novel perspective.

Each of these methods will be discussed from two aspects: the basic corresponding principles of such techniques and their applications in physical layer security. Specifically, we elaborate the basic transmission models, characteristics, and their practical applications. The issues in physical layer security will be discussed with the current state of research. In wireless communications, signal leakage to unintended receivers may cause severe security risk and co-channel interference. Multiple-antenna cooperation techniques have been exploited and attracted increasing interest because of their good ability to handle the security problem.

Among the corresponding techniques, time reversal TR transmission is identified as a promising wireless technology for wide-band multi-path channels because it can focus energy spatially and temporally by exploiting multi-path propagation [1—3].


  • Recent Advances in Constraints: 12th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2007 Rocquencourt, France, June 7-8, 2007 Revised Selected Papers;
  • 1. Introduction;
  • The Strict Metrical Tradition: Variations in the Literary Iambic Pentameter From Sidney and Spenser to Matthew Arnold.
  • Build an HTML5 Game: A Developers Guide with CSS and JavaScript.

It has been revealed that the great capacity gains can be realized from multiple-input-multiple-output MIMO wireless communications [1—3]. Spatial modulation SM , a MIMO based modulation, has recently emerged as a new transmission method which can effectively reduce the system complexity [4—7]. This chapter explores the physical layer security in SM systems.

We present a secrecy rate analysis for multiple antenna receiver and eavesdropper.

1. Introduction

Targeting against passive eavesdroppers in unknown locations, we study the efficacy of active security measures through joint signal and jamming transmission without the typical requirement of eavesdropper channel information. On the other hand, under the same circumstance, we investigate the secrecy performance with space shift keying SSK and generalized space shift keying GSSK , respectively.

We demonstrate the tradeoff of secrecy rate and transmit power with active source jamming by testing the achieved secrecy rate and the bit error rate BER at different receivers, and show the different characteristics of these modulation schemes in terms of secrecy performance. Furthermore, we generalize the precoding-aided spatial modulation PSM to a multiuser downlink scenario.

By elaborately designing the precoding vector, the proposed multiuser PSM scheme has the ability of resisting a multi-antenna eavesdropper [8—11]. Device-to-Device D2D communication based storage offers a potential solution for traffic offloading from the cellular infrastructure, and mobile devices themselves can act as caching servers, i. The content requesters can ask for content items from the helpers among cellular peers without the help of eNodeB.

SECURE WIRELESS NONLINEAR COMMUNICATIONS AT THE PHYSICAL LAYER | Thales

However, the success of such content sharing via D2D links depends on physical conditions of the direct wireless links, which must be weighted against possibly additional security threats in D2D links. To realize the successful content sharing, the selected source node i. Thus, the social interaction between content helpers and content requesters is firstly investigated in this chapter. However, the direct transmission among mobile users also increases the risk of eavesdropping.

Selecting D2D users DUEs to act as friendly jammers or relays can be regarded as an effective way to eliminate the risk of eavesdropping [2, 3]. Bitte aktivieren Sie JavaScript. Si prega di abilitare JavaScript.

Physical Layer Security in Wireless Communications

English EN. English en. Deutsch de. No suggestions found. Sign in. Results Packs.

About us. Fact Sheet.

Securing Wireless Communications at the Physical Layer

Project description Future Networks. Show the project objective.

Project description

Topic s ICT Funding Scheme CP - Collaborative project generic. Website Contact the organisation. Status Closed project. Start date 1 November End date 31 October Deliverables Deliverables not available.

Publications Publications via OpenAire. Last update: 7 August Record number: Follow us on:.