Physical Layer Security in Multiuser Wireless Networks

Physical layer (PHY) security has recently gained considerable attention as an alternative option to cryptographic techniques since it can provide unconditional perfect secrecy. This chapter presents brief concept about PHY security and solutions along with quantitative measurement of secrecy performance for multiuser wireless networks. A typical transmitter in wireless communication may be required to send a confidential message to either a single or several users simultaneously. Aiming to provide comprehensive investigation of secrecy performance in such multiuser network, secure multicasting and opportunistic scheduling techniques are presented. Furthermore, to look into the effects of multiple antennas, system model under consideration employ maximal ratio combining at receiver.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Sennur Ulukus,et al.  Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper , 2009, EURASIP J. Wirel. Commun. Netw..

[3]  Jeffrey G. Andrews,et al.  Broadband wireless access with WiMax/802.16: current performance benchmarks and future potential , 2005, IEEE Communications Magazine.

[4]  Kyung Sup Kwak,et al.  Performance of opportunistic scheduling for physical layer security with transmit antenna selection , 2014, EURASIP J. Wirel. Commun. Netw..

[5]  Tharmalingam Ratnarajah,et al.  Secure wireless multicasting through Nakagami-m fading MISO channel , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[6]  Thomas Stockhammer,et al.  Reliable Multimedia Download Delivery in Cellular Broadcast Networks , 2007, IEEE Transactions on Broadcasting.

[7]  Antti Toskala,et al.  HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications , 2006 .

[8]  Syed Ali Jafar,et al.  Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.

[9]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[10]  Kyatsandra Nagananda Multiuser Wireless Networks: Cooperation and Physical-Layer Security , 2013 .

[11]  Tharmalingam Ratnarajah,et al.  On the secure outage performance for wireless multicasting through slow fading channels , 2010, 2010 IEEE Information Theory Workshop.

[12]  Jon W. Wallace Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.

[13]  Matthew S. Grob,et al.  CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users , 2000, IEEE Commun. Mag..

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Hyuckjae Lee,et al.  On multiuser secrecy rate in flat fading channel , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Kyung Sup Kwak,et al.  Secure wireless multicasting in presence of multiple eavesdroppers , 2013, 2013 13th International Symposium on Communications and Information Technologies (ISCIT).

[18]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[19]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[20]  Miguel R. D. Rodrigues,et al.  On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.

[21]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[22]  Jeffrey G. Andrews,et al.  Resource-redistributive opportunistic scheduling for wireless systems , 2009, IEEE Transactions on Wireless Communications.

[23]  Upkar Varshney,et al.  Multicast over wireless networks , 2002, CACM.

[24]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[25]  Chiung-Jang Chen,et al.  A unified capacity analysis for wireless systems with joint multiuser scheduling and antenna diversity in Nakagami fading channels , 2006, IEEE Transactions on Communications.

[26]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[27]  Roy D. Yates,et al.  Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[28]  Walid Dabbous,et al.  Multipoint Communication: A Survey of Protocols, Functions, and Mechanisms , 1997, IEEE J. Sel. Areas Commun..

[29]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[30]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.