Special Issue "Physical Layer Security in Wireless Networks"

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: closed (16 June 2016)

Special Issue Editor

Guest Editor
Assistant Professor Dr. Lorenzo Mucchi

Department of Information Engineering, University of Florence, Italy
Website | E-Mail
Interests: physical layer security; visible light commuications; biometric encryption; wireless body area networks

Special Issue Information

Dear Colleagues,

I’m delighted to introduce you to this Special Issue on physical layer security in wireless networks. Please consider submitting your original work to this journal.

The today’s domination of Wireless Communications, as an universal way to access information for every human around the world, presents a major risk for society, not only because of widely recognized security leaks in the current wireless radio access technologies, but also for the larger and larger amounts of information over a medium (the air), which can be easily eavesdropped on. All of the security solutions implemented today rely on bit level cryptographic techniques and associated protocols at various levels of the data processing stack. These solutions are based on the assumption that the attacker has limited computational power, which becomes to be less and less true (think of today’s advances in quantum computing). In addition, the economic importance of protections within public networks will increase greatly in the future, and although enhanced cryptographic protections exist, they incur high constraints and additional costs for users. New security approaches are issued from information theory fundamentals and focus, but are not limited to, the secrecy capacity of the propagation channel.

This Special Issue aims to further scientific research in both theoretical and practical approaches to physical-layer security. It will accept original research papers that report the latest results and advances in this area. The papers will be peer-reviewed and selected on the basis of their quality and relevance to the topic of this Special Issue. Particularly, we would like to encourage submissions that present new ideas, as well as experimental and/or practical implementation results. Topics include, but are not limited to:

  • Information theoretic approaches
  • Secrecy capacity of wireless channels
  • Practical code design
  • Secure modulations
  • Optical physical layer security
  • “Friendly” jamming approaches for security
  • Jamming (“unfriendly”) resistance
  • Relay-based and cooperative secure communications
  • Game theory for wireless physical layer security
  • Secret-key generation and agreement over wireless channels
  • Cross-layer security mechanisms incorporating cryptography and physical layer aspects
  • Physical layer security for low-resource devices
  • Physical layer security applied to visible light communications
  • Advanced signal processing for physical layer security
  • Physical layer authentication
  • Experimental results on practical implementations of physical layer security techniques

Assistant Professor Dr. Lorenzo Mucchi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • physical layer security
  • secrecy capacity
  • coding for secrecy
  • enhanced privacy
  • encryption

Published Papers (4 papers)

View options order results:
result details:
Displaying articles 1-4
Export citation of selected articles as:

Research

Open AccessArticle A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks
Information 2016, 7(4), 60; doi:10.3390/info7040060
Received: 27 June 2016 / Revised: 30 September 2016 / Accepted: 17 October 2016 / Published: 27 October 2016
PDF Full-text (1003 KB) | HTML Full-text | XML Full-text
Abstract
Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This
[...] Read more.
Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP) cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS) sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Figures

Figure 1

Open AccessArticle The Role of Physical Layer Security in IoT: A Novel Perspective
Information 2016, 7(3), 49; doi:10.3390/info7030049
Received: 16 June 2016 / Revised: 22 July 2016 / Accepted: 27 July 2016 / Published: 2 August 2016
Cited by 2 | PDF Full-text (3424 KB) | HTML Full-text | XML Full-text
Abstract
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem.
[...] Read more.
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Figures

Figure 1

Open AccessArticle Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
Information 2016, 7(3), 38; doi:10.3390/info7030038
Received: 27 April 2016 / Revised: 29 June 2016 / Accepted: 1 July 2016 / Published: 13 July 2016
PDF Full-text (2244 KB) | HTML Full-text | XML Full-text
Abstract
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into
[...] Read more.
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards information, and the other converts the received signal into energy. Beamforming is used by the relay to prevent the eavesdropper from intercepting confidential information. For the purpose of maximizing the secrecy rate, antenna grouping and beamforming vectors are designed. A low complexity scheme of antenna grouping is presented. The simulation results show that the secrecy rate can be significantly improved by arranging part of the antennas for energy harvesting, and part for forwarding and optimizing the beamforming vector at the relay. The antenna grouping scheme significantly reduces the computational complexity at the cost of acceptable performance loss. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Figures

Figure 1

Open AccessArticle Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
Information 2016, 7(2), 24; doi:10.3390/info7020024
Received: 28 January 2016 / Revised: 25 April 2016 / Accepted: 27 April 2016 / Published: 12 May 2016
PDF Full-text (330 KB) | HTML Full-text | XML Full-text
Abstract
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legitimate users know only that the true
[...] Read more.
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legitimate users know only that the true channel realization comes from a pre-specified uncertainty set and that it varies from channel use to channel use in an arbitrary and unknown manner. This concept not only captures the case of channel uncertainty, but also models scenarios in which malevolent adversaries influence or jam the transmission of the legitimate users. For secure communication over orthogonal arbitrarily varying wiretap channels (AVWCs) it has been shown that the phenomenon of super-activation occurs; that is, there are orthogonal AVWCs, each having zero secrecy capacity, which allow for transmission with positive rate if they are used together. It is shown that for such orthogonal AVWCs super-activation is generic in the sense that whenever super-activation is possible, it is possible for all AVWCs in a certain neighborhood as well. As a consequence, a super-activated AVWC is robust and continuous in the uncertainty set, although a single AVWC might not be. Moreover, it is shown that the question of super-activation and the continuity of the secrecy capacity solely depends on the legitimate link. Accordingly, the single-user AVC is subsequently studied and it is shown that in this case, super-activation for non-secure message transmission is not possible making it a unique feature of secure communication over AVWCs. However, the capacity for message transmission of the single-user AVC is shown to be super-additive including a complete characterization. Such knowledge is important for medium access control and in particular resource allocation as it determines the overall performance of a system. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Figures

Figure 1

Journal Contact

MDPI AG
Information Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
E-Mail: 
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to Information Edit a special issue Review for Information
loading...
Back to Top