Physical Layer Security in Wireless Networks

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: closed (16 June 2016) | Viewed by 22692

Special Issue Editor


E-Mail Website
Guest Editor
Department of Information Engineering, University of Firenze, Via S. Marta 3, 50139 Firenze, Italy
Interests: physical layer security; UWB positioning systems; visible light communications; molecular communications; body area networks; 6G; 5G; networks for healthcare applications
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

I’m delighted to introduce you to this Special Issue on physical layer security in wireless networks. Please consider submitting your original work to this journal.

The today’s domination of Wireless Communications, as an universal way to access information for every human around the world, presents a major risk for society, not only because of widely recognized security leaks in the current wireless radio access technologies, but also for the larger and larger amounts of information over a medium (the air), which can be easily eavesdropped on. All of the security solutions implemented today rely on bit level cryptographic techniques and associated protocols at various levels of the data processing stack. These solutions are based on the assumption that the attacker has limited computational power, which becomes to be less and less true (think of today’s advances in quantum computing). In addition, the economic importance of protections within public networks will increase greatly in the future, and although enhanced cryptographic protections exist, they incur high constraints and additional costs for users. New security approaches are issued from information theory fundamentals and focus, but are not limited to, the secrecy capacity of the propagation channel.

This Special Issue aims to further scientific research in both theoretical and practical approaches to physical-layer security. It will accept original research papers that report the latest results and advances in this area. The papers will be peer-reviewed and selected on the basis of their quality and relevance to the topic of this Special Issue. Particularly, we would like to encourage submissions that present new ideas, as well as experimental and/or practical implementation results. Topics include, but are not limited to:

  • Information theoretic approaches
  • Secrecy capacity of wireless channels
  • Practical code design
  • Secure modulations
  • Optical physical layer security
  • “Friendly” jamming approaches for security
  • Jamming (“unfriendly”) resistance
  • Relay-based and cooperative secure communications
  • Game theory for wireless physical layer security
  • Secret-key generation and agreement over wireless channels
  • Cross-layer security mechanisms incorporating cryptography and physical layer aspects
  • Physical layer security for low-resource devices
  • Physical layer security applied to visible light communications
  • Advanced signal processing for physical layer security
  • Physical layer authentication
  • Experimental results on practical implementations of physical layer security techniques

Assistant Professor Dr. Lorenzo Mucchi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • physical layer security
  • secrecy capacity
  • coding for secrecy
  • enhanced privacy
  • encryption

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

1003 KiB  
Article
A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks
by Fabio Ciabini, Simone Morosi, Lorenzo Mucchi and Luca Simone Ronga
Information 2016, 7(4), 60; https://doi.org/10.3390/info7040060 - 27 Oct 2016
Cited by 2 | Viewed by 4275
Abstract
Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This [...] Read more.
Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP) cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS) sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Show Figures

Figure 1

3424 KiB  
Article
The Role of Physical Layer Security in IoT: A Novel Perspective
by Tommaso Pecorella, Luca Brilli and Lorenzo Mucchi
Information 2016, 7(3), 49; https://doi.org/10.3390/info7030049 - 02 Aug 2016
Cited by 61 | Viewed by 8878
Abstract
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. [...] Read more.
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Show Figures

Figure 1

2244 KiB  
Article
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
by Weijia Lei and Meihui Zhan
Information 2016, 7(3), 38; https://doi.org/10.3390/info7030038 - 13 Jul 2016
Cited by 1 | Viewed by 4354
Abstract
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into [...] Read more.
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards information, and the other converts the received signal into energy. Beamforming is used by the relay to prevent the eavesdropper from intercepting confidential information. For the purpose of maximizing the secrecy rate, antenna grouping and beamforming vectors are designed. A low complexity scheme of antenna grouping is presented. The simulation results show that the secrecy rate can be significantly improved by arranging part of the antennas for energy harvesting, and part for forwarding and optimizing the beamforming vector at the relay. The antenna grouping scheme significantly reduces the computational complexity at the cost of acceptable performance loss. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Show Figures

Figure 1

330 KiB  
Article
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
by Rafael F. Schaefer, Holger Boche and H. Vincent Poor
Information 2016, 7(2), 24; https://doi.org/10.3390/info7020024 - 12 May 2016
Cited by 7 | Viewed by 3990
Abstract
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legitimate users know only that the true [...] Read more.
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legitimate users know only that the true channel realization comes from a pre-specified uncertainty set and that it varies from channel use to channel use in an arbitrary and unknown manner. This concept not only captures the case of channel uncertainty, but also models scenarios in which malevolent adversaries influence or jam the transmission of the legitimate users. For secure communication over orthogonal arbitrarily varying wiretap channels (AVWCs) it has been shown that the phenomenon of super-activation occurs; that is, there are orthogonal AVWCs, each having zero secrecy capacity, which allow for transmission with positive rate if they are used together. It is shown that for such orthogonal AVWCs super-activation is generic in the sense that whenever super-activation is possible, it is possible for all AVWCs in a certain neighborhood as well. As a consequence, a super-activated AVWC is robust and continuous in the uncertainty set, although a single AVWC might not be. Moreover, it is shown that the question of super-activation and the continuity of the secrecy capacity solely depends on the legitimate link. Accordingly, the single-user AVC is subsequently studied and it is shown that in this case, super-activation for non-secure message transmission is not possible making it a unique feature of secure communication over AVWCs. However, the capacity for message transmission of the single-user AVC is shown to be super-additive including a complete characterization. Such knowledge is important for medium access control and in particular resource allocation as it determines the overall performance of a system. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Show Figures

Figure 1

Back to TopTop