Physical Layer Security in Wireless Networks with Passive and Active Eavesdroppers

被引:0
|
作者
Chorti, Arsenia [1 ]
Perlaza, Samir M. [1 ]
Han, Zhu
Poor, H. Vincent [1 ]
机构
[1] Princeton Univ, Dep EE, Princeton, NJ 08544 USA
来源
2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2012年
关键词
SECRECY CAPACITY; CHANNELS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security is becoming an increasingly important issue in wireless communications, to which physical layer approaches can contribute by providing addition resources for securing confidential messages. In this paper, the resilience of multi-user networks to passive and active eavesdropping is investigated. In particular, average secrecy capacities are evaluated in scenarios involving a base station and several terminals, some of which constitute passive or active eavesdroppers. Network resources (e.g. power) are allocated by the base station based on the available channel state information. The average secrecy capacity of such a network is evaluated in the following cases: (i) in the presence of passive eavesdroppers when no side information is available to the base station; (ii) in the presence of passive eavesdroppers with side information available; and (iii) in the presence of a single active eavesdropper with side information available. This investigation demonstrates that substantial secrecy rates are attainable in the presence of passive eavesdroppers as long as minimal side information, e.g. a statistical characterization of the number of potential eavesdroppers, is available to the base station. On the other hand, it is further found that active eavesdroppers can potentially compromise such networks unless statistical inference is employed to restrict their ability to attack.
引用
收藏
页码:4868 / 4873
页数:6
相关论文
共 50 条
  • [41] Study of Physical Layer Security in mmWave Satellite Networks
    Xiao, Ke
    Zhang, Shaowei
    Michel, Kadoch
    Li, Chen
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [42] Physical Layer Security for Cooperative Relaying in Broadcast Networks
    Chen, Liang
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 91 - 96
  • [43] Secrecy Analysis in Wireless Network With Passive Eavesdroppers by Using Partial Cooperation
    Atallah, Michael
    Kaddoum, Georges
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (07) : 7225 - 7230
  • [44] Physical Layer Security Analysis of Multi-Hop Hybrid RF/FSO System in Presence of Multiple Eavesdroppers
    Pattanayak, Dipti R. R.
    Dwivedi, Vivek K. K.
    Karwal, Vikram
    Yadav, Pankaj K. K.
    Singh, Ghanshyam
    IEEE PHOTONICS JOURNAL, 2022, 14 (06):
  • [45] Reliable and Secure Cooperative Communication for Wireless Sensor Networks Making Use of Cooperative Jamming with Physical Layer Security
    Rohokale, Vandana Milind
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (03) : 595 - 610
  • [46] Reliable and Secure Cooperative Communication for Wireless Sensor Networks Making Use of Cooperative Jamming with Physical Layer Security
    Vandana Milind Rohokale
    Neeli Rashmi Prasad
    Ramjee Prasad
    Wireless Personal Communications, 2013, 73 : 595 - 610
  • [47] Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks
    Moosavi, Hussein
    Bui, Francis Minhthang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 1928 - 1939
  • [48] Multi-Antenna Relay Aided Wireless Physical Layer Security
    Chen, Xiaoming
    Zhong, Caijun
    Yuen, Chau
    Chen, Hsiao-Hwa
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) : 40 - +
  • [49] Deep Transfer Learning for Physical Layer Security in Wireless Communication Systems
    Rawat, Danda B.
    2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 289 - 296
  • [50] Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security
    Liu, Yupeng
    Li, Jiangyuan
    Petropulu, Athina P.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 682 - 694