Adaptive Physical Layer Security Framework for Wireless Systems

Maintaining security in wireless systems has been a challenge due to the broadcast nature of wireless communication channels. Many methods have been proposed as countermeasures to eavesdropping attacks, which stand as one of the most important secrecy attack types that use the vulnerabilities of wireless channels. The majority of these methods come with the cost of additional power consumption for maintaining secrecy. In order to provide a framework that can enable a tradeoff between energy efficiency and secrecy, we provide a flexible adaptive physical layer security approach that enables tunable security levels for distinct bit streams of a single user. Our main motivation stems from the fact that not all data bits within a single bit steam require the same amount of security. The proposed adaptive power optimization framework allows the assignment of different secrecy rate constraints for distinct data streams. Via simulations, we show that the proposed approach can increase the power efficiency compared to the non-adaptive physical layer security solution, while satisfying the required secrecy constraints.

[1]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[2]  Inkyu Lee,et al.  Design of unequal error protection for MIMO-OFDM systems with hierarchical signal constellations , 2007, Journal of Communications and Networks.

[3]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[4]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[5]  John M. Cioffi,et al.  Optimal Resource Allocation for OFDMA Downlink Systems , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  R. J. Green,et al.  Energy conscious adaptive security scheme for optical wireless , 2012, 2012 14th International Conference on Transparent Optical Networks (ICTON).

[7]  João M. F. Xavier,et al.  Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.

[8]  George Orwell,et al.  Animal farm , 2014, Nature.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[11]  Gerd Ascheid,et al.  Filter Optimization Aided Interference Management with Improved Secrecy , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[12]  Tharmalingam Ratnarajah,et al.  Secrecy capacity and secure outage performance for rayleigh fading simo channel , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[14]  Nicolae Tapus,et al.  Adaptive Security Framework for Wireless Sensor Networks , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[15]  J.A.C. Bingham,et al.  Multicarrier modulation for data transmission: an idea whose time has come , 1990, IEEE Communications Magazine.

[16]  Oscar C. Au,et al.  A tutorial on image/video coding standards , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[19]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[20]  Jean-Marie Bonnin,et al.  Towards adaptive security mechanisms in 3GPP EPS/LTE networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).