• 제목/요약/키워드: Secrecy Capacity

검색결과 28건 처리시간 0.028초

A Secure MQAM Scheme Based on Signal Constellation Hopping

  • Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2246-2260
    • /
    • 2014
  • In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.

Physical Layer Secrecy Performance of RF-EH Networks with Multiple Eavesdroppers

  • Truong, Tien-Vu;Vo, Nhan-Van;Ha, Dac-Binh;Tran, Duc-Dung
    • Journal of information and communication convergence engineering
    • /
    • 제14권3호
    • /
    • pp.171-176
    • /
    • 2016
  • In this study, we investigate the physical layer secrecy performance of RF energy harvesting (EH) networks over Rayleigh fading channels. The RF-EH system considered here consists of one power transfer station, one source, one destination, and multiple passive eavesdroppers. The source harvests energy from the power transfer station and transmits the information to the destination by using a time switching-based relaying protocol. The eavesdroppers try to extract the transmitted information without an active attack. By using the statistical characteristics of the signal-to-noise ratio (SNR), the exact closed-form expressions of the existence probability of the secrecy capacity and the secrecy outage probability are derived. Further, we analyze the secrecy performance of the system with respect to various system parameters, such as the location of the system elements and the number of eavesdroppers. Finally, the equivalent Monte Carlo simulation results are provided to confirm the correctness of our calculations.

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2019년도 춘계학술대회
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

다중 사용자 다중 경로 페이딩 채널에서 분산 안테나 시스템을 위한 주파수 영역 Equal-Gain-Combining TR 기법의 Capacity와 Secrecy Rate 분석 (Capacity and Secrecy Rate Analysis of a Frequency-Domain Equal-Gain-Combining TR Scheme for Distributed Antenna Systems in Multi-User Multi-Path Fading Channels)

  • 김명석;이충용
    • 전자공학회논문지
    • /
    • 제49권10호
    • /
    • pp.47-53
    • /
    • 2012
  • 시간 반전 (time-reversal, TR) 전처리 기법은 유효 채널의 전력을 특정 시간으로 집중시키는 역할을 하며, 이를 통해 단일 탭 수신기의 수신 성능을 향상시킬 수 있다. 선형 블록 전처리 형태를 가지는 주파수 영역 동일 이득 결합 (frequency-domain equal-gain-combining, FD-EGC) TR 기법은 기존의 TR 기법에 비해 temporal focusing 성능이 뛰어나다. 또한, FD-EGC는 분산 안테나 시스템 (distributed antenna systems, DAS)에서 minimum mean square error 수신기의 수신 성능을 향상시킨다. 본 논문에서는 이러한 FD-EGC의 수신 성능 분석에 그치지 않고, capacity 성능을 분석하는 것에 중점을 두었다. 우선, DAS에서 FD-EGC의 capacity를 유도하였으며, 안테나 수에 따라 capacity가 증가함을 보였다. 이어 정보 이론적 보안 측면에서 secrecy rate를 유도하였으며, 이를 통해 FD-EGC가 다른 사용자에게 보안을 유지하면서도 목표 사용자에게는 많은 양의 정보를 전송할 수 있음을 보였다.

Power allocation-Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

  • Nayak, V. Narasimha;Gurrala, Kiran Kumar
    • ETRI Journal
    • /
    • 제43권4호
    • /
    • pp.758-768
    • /
    • 2021
  • In this work, the secrecy of a typical wireless cooperative dual-hop non-orthogonal multiple access (NOMA)-enabled decode-and-forward (DF) relay network is investigated with the impact of collaborative and non-collaborative eavesdropping. The system model consists of a source that broadcasts the multiplexed signal to two NOMA users via a DF relay, and information security against the eavesdropper nodes is provided by a helpful jammer. The performance metric is secrecy rate and ergodic secrecy capacity is approximated analytically. In addition, a differential evolution algorithm-based power allocation scheme is proposed to find the optimal power allocation factors for relay, jammer, and NOMA users by employing different jamming schemes. Furthermore, the secrecy rate analysis is validated at the NOMA users by adopting different jamming schemes such as without jamming (WJ) or conventional relaying, jamming (J), and with control jamming (CJ). Simulation results demonstrate the superiority of CJ over the J and WJ schemes. Finally, the proposed power allocation outperforms the fixed power allocation under all conditions considered in this work.

협력 무선인지 네트워크에서의 보안 채널 용량 분석 (On the Secrecy Capacity in Cooperative Cognitive Radio Networks)

  • 누엔반딘;김현민;신오순
    • 한국통신학회논문지
    • /
    • 제39B권11호
    • /
    • pp.803-809
    • /
    • 2014
  • 본 논문에서는 면허 사용자와 감청 사용자가 존재하는 인지무선 네트워크에서 릴레이 선택 기능을 이용한 물리 계층 보안 시스템을 제안하고 성능을 분석한다. 먼저 감청에 대한 보안성 확보를 위해 수신기 측에서의 채널 정보를 이용하는 기회적 최적 릴레이 선택 방법과 다중 안테나 다이버지시티를 이용하는 시스템을 제안한다. 이러한 시스템에서 인지무선 네트워크의 보안 outage 확률을 정의하고 수학적으로 정확한 확률 식을 유도한다. 아울러 송신전력에 제한이 없는 경우에 대한 점근적 outage 확률을 구한다. 수치 해석 결과를 제시함으로써 유도한 확률식의 정확성을 검증한다.

에너지 하베스팅 네트워크에서 최소 요구 보안 용량을 최대화하기 위한 시간 전환 기반의 아날로그 네트워크 코딩 (Time Switching-based Analog Network Coding for Maximizing the Minimum Required Secrecy Capacity in Energy Harvesting Networks)

  • 이기송;최현호
    • 한국정보통신학회논문지
    • /
    • 제21권11호
    • /
    • pp.2022-2028
    • /
    • 2017
  • 최근 사물 인터넷 기술의 발달로 인해 사용되는 센서의 수가 늘어남에 따라 센서의 전원 부족 및 사적인 정보의 유출이 심각한 문제로 여겨지고 있다. 이러한 문제들을 해결하기 위해 외부의 RF 신호로부터 전력을 수집하는 RF 에너지 하베스팅과 물리계층 보안 기술의 중요성이 점차 커지고 있다. 본 논문에서는 소스가 전송하는 신호로부터 에너지 하베스팅이 가능한 릴레이가 존재하는 무선 네트워크에서 정보 보안을 향상시키기 위한 시간 전환 기반 네트워크 아날로그 코딩 기법을 제안한다. 소스가 전송하는 신호를 도청하려는 도청자가 존재하는 2-hop 릴레이 네트워크를 모델링하고, 수학적 분석을 통해 최소 요구 보안 용량을 최대화 할 수 있는 최적의 시간 전환 비율을 찾았다. 다양한 환경에서 시뮬레이션을 통해 제안 방안이 기존 방안에 비해 최소 요구 보안 용량을 개선함을 보인다.

Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation

  • Sun, Gangcan;Liu, Mengge;Han, Zhuo;Zhao, Chuanyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.422-436
    • /
    • 2020
  • In this paper, we investigate the impact of antenna correlation on secure transmission in a multi-eavesdropper single-input multiple-output (SIMO) system, where the receiver and eavesdroppers are equipped with correlated antennas. Based on the practical passive eavesdropping system, the new closed-form expressions of secrecy outage probability (SOP) and non-zero secrecy capacity probability are derived to explore the effect of antenna correlation on the system with multiple eavesdroppers. To further analyze the secrecy performance of the investigated system, we theoretically derive the expression of asymptotic SOP to clearly show the diversity order and array gain. Finally, Monte Carlo simulations verify the effectiveness of our theoretical results.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.