Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (31)

Search Parameters:
Keywords = wiretap network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
9 pages, 2588 KiB  
Proceeding Paper
Application of Terminal Audio Mixing in Multi-Bandwidth End-to-End Encrypted Voice Conference
by Chi-Hung Lien, Ya-Ching Tu, Sheng-Lian Liao, Juei-Chi Chu, Chia-Yu Hsieh and Jyun-Jia Jhang
Eng. Proc. 2025, 92(1), 55; https://doi.org/10.3390/engproc2025092055 - 7 May 2025
Viewed by 240
Abstract
Recently, the increasing frequency of cybersecurity incidents has raised concerns about communication security and personal privacy. In a zero-trust network environment, it is critically important to protect communication content and ensure that it is not intercepted, recorded, or stored without proper authorization. End-to-end [...] Read more.
Recently, the increasing frequency of cybersecurity incidents has raised concerns about communication security and personal privacy. In a zero-trust network environment, it is critically important to protect communication content and ensure that it is not intercepted, recorded, or stored without proper authorization. End-to-end encryption (E2EE) is a reliable solution for this purpose. The COVID-19 pandemic has accelerated the adoption of remote work and virtual meetings, making the security of voice conferences a critical issue. This study aims to explore the application of end-to-end encryption technology in voice conferences. We designed and implemented an end-to-end encrypted voice conferencing system based on terminal-side mixing to ensure security while also being applicable in low-bandwidth network environments. The developed system effectively prevented man-in-the-middle attacks and data wiretaps, while maintaining high performance and low latency. It can be used in low-bandwidth scenarios such as satellite networks. The end-to-end encryption technology, when combined with terminal-side voice mixing, significantly enhances the security and usability of voice conferences as a new solution for secure communication in the future. Full article
(This article belongs to the Proceedings of 2024 IEEE 6th Eurasia Conference on IoT, Communication and Engineering)
Show Figures

Figure 1

21 pages, 2425 KiB  
Article
Resource and Trajectory Optimization in RIS-Assisted Cognitive UAV Networks with Multiple Users Under Malicious Eavesdropping
by Juan Li, Gang Wang, Hengzhou Jin, Jing Zhou, Wei Li and Hang Hu
Electronics 2025, 14(3), 541; https://doi.org/10.3390/electronics14030541 - 29 Jan 2025
Viewed by 921
Abstract
Unmanned aerial vehicles (UAVs) have shown significant advantages in disaster relief, emergency communication, and Integrated Sensing and Communication (ISAC). However, the escalating demand for UAV spectrum is severely restricted by the scarcity of available spectrum, which in turn significantly limits communication performance. Additionally, [...] Read more.
Unmanned aerial vehicles (UAVs) have shown significant advantages in disaster relief, emergency communication, and Integrated Sensing and Communication (ISAC). However, the escalating demand for UAV spectrum is severely restricted by the scarcity of available spectrum, which in turn significantly limits communication performance. Additionally, the openness of the wireless channel poses a serious threat, such as wiretapping and jamming. Therefore, it is necessary to improve the security performance of the system. Recently, Reconfigurable Intelligent Surfaces (RIS), as a highly promising technology, has been integrated into Cognitive UAV Network. This integration enhances the legitimate signal while suppressing the eavesdropping signal. This paper investigates a RIS-assisted Cognitive UAV Network with multiple corresponding receiving users as cognitive users (CUs) in the presence of malicious eavesdroppers (Eav), in which the Cognitive UAV functions as the mobile aerial Base Station (BS) to transmit confidential messages for the users on the ground. Our primary aim is to attain the maximum secrecy bits by means of jointly optimizing the transmit power, access scheme of the CUs, the RIS phase shift matrix, and the trajectory. In light of the fact that the access scheme is an integer, the original problem proves to be a mixed integer non-convex one, which falls into the NP-hard category. To solve this problem, we propose block coordinate descent and successive convex approximation (BCD-SCA) algorithms. Firstly, we introduce the BCD algorithm to decouple the coupled variables and convert the original problem into four sub-problems for the non-convex subproblems to solve by the SCA algorithm. The results of our simulations indicate that the joint optimization scheme we have put forward not only achieves robust convergence but also outperforms conventional benchmark approaches. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAVs) Communication and Networking)
Show Figures

Graphical abstract

22 pages, 454 KiB  
Article
Dual-Function Radar Communications: A Secure Optimization Approach Using Partial Group Successive Interference Cancellation
by Mengqiu Chai, Shengjie Zhao and Yuan Liu
Remote Sens. 2025, 17(3), 364; https://doi.org/10.3390/rs17030364 - 22 Jan 2025
Viewed by 990
Abstract
As one of the promising technologies of 6G, dual-function radar communication (DFRC) integrates communication and radar sensing networks. However, with the application and deployment of DFRC, its security problem has become a significantly important issue. In this paper, we consider the physical layer [...] Read more.
As one of the promising technologies of 6G, dual-function radar communication (DFRC) integrates communication and radar sensing networks. However, with the application and deployment of DFRC, its security problem has become a significantly important issue. In this paper, we consider the physical layer security of a DFRC system where the base station communicates with multiple legitimate users and simultaneously detects the sensing target of interest. The sensing target is also a potential eavesdropper wiretapping the secure transmission. To this end, we proposed a secure design based on partial group successive interference cancellation through fully leveraging the split messages and partially decoding to improve the rate increment of legitimate users. In order to maximize the radar echo signal-to-noise ratio (SNR), we formulate an optimization problem of beamforming and consider introducing new variables and relaxing the problem to solve the non-convexity of the problem. Then, we propose a joint secure beamforming and rate optimization algorithm to solve the problem. Simulation results demonstrate the effectiveness of our design in improving the sensing and secrecy performance of the considered DFRC system. Full article
Show Figures

Figure 1

22 pages, 2042 KiB  
Article
Secrecy Rate Performance Analysis of Jammer-Aided Symbiotic Radio with Sensing Errors for Fifth Generation Wireless Networks
by Muhammed Yusuf Onay
Appl. Sci. 2025, 15(1), 289; https://doi.org/10.3390/app15010289 - 31 Dec 2024
Cited by 1 | Viewed by 829
Abstract
Symbiotic radio (SR), which has recently been introduced as an effective solution for 5G wireless networks, stands out with system models that include hybrid devices that share the frequency spectrum and transmit information to the same receiver. However, the low bit rate and [...] Read more.
Symbiotic radio (SR), which has recently been introduced as an effective solution for 5G wireless networks, stands out with system models that include hybrid devices that share the frequency spectrum and transmit information to the same receiver. However, the low bit rate and the small amount of energy harvested in SR, where backscatter communication systems are integrated, make the system vulnerable to eavesdropping. To ensure security, the secrecy rate is defined as the difference between the number of bits transmitted to the receiver over the information channel and the number of bits reaching the eavesdropper (ED) over the wiretap channel. This paper is the first work that aims to maximize the secrecy rate for friendly jammer-aided SR networks with EDs over time allocation and power reflection coefficient in the presence of sensing errors. The proposed model consists of a base station (BS), a hybrid transmitter (HT) in symbiotic relationship with the BS, a WiFi access point used by the HT for energy harvesting, a jammer cooperating with the HT and BS, an information receiver, and EDs trying to access the information of the HT and BS. The simulation results provide valuable insights into the impact of system parameters on secrecy rate performance. Although taking the sensing error into account degrades the system performance, the real-world applicability of the system with sensing error is more realistic. It is also observed that the proposed system has higher performance compared to the wireless powered communication networks in the literature, which only use the energy harvest-then-transmit protocol and the power reflection coefficient is assumed to be zero. Full article
Show Figures

Figure 1

19 pages, 2438 KiB  
Article
Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers
by Fan Wang, Cuiran Li, Jianli Xie, Lin Su, Yadan Liu and Shaoyi Du
Electronics 2024, 13(4), 777; https://doi.org/10.3390/electronics13040777 - 16 Feb 2024
Cited by 2 | Viewed by 1235
Abstract
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the [...] Read more.
Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threat detection are vitally important for such networks. This paper investigates the secrecy and throughput performance of an underlay cooperative cognitive vehicular network, where a pair of secondary vehicles communicate through a direct link and the assistance of a decode-and-forward (DF) secondary relay in the presence of Poisson-distributed colluding eavesdroppers and under an interference constraint set by the primary receiver. Considering mixed Rayleigh and double-Rayleigh fading channels, we design a realistic relaying transmission scheme and derive the closed-form expressions of secrecy and throughput performance, such as the secrecy outage probability (SOP), the connection outage probability (COP), the secrecy and connection outage probability (SCOP), and the overall secrecy throughput, for traditional and proposed schemes, respectively. An asymptotic analysis is further presented in the high signal-to-noise ratio (SNR) regime. Numerical results illustrate the impacts of network parameters on secrecy and throughput and reveal that the advantages of the proposed scheme are closely related to the channel gain of the relay link compared to the direct link. Full article
(This article belongs to the Special Issue Recent Advancements in Signal and Vision Analysis)
Show Figures

Figure 1

21 pages, 416 KiB  
Article
A Numerical Study on the Capacity Region of a Three-Layer Wiretap Network
by Jiahong Wu, Nan Liu and Wei Kang
Entropy 2023, 25(12), 1566; https://doi.org/10.3390/e25121566 - 21 Nov 2023
Viewed by 1229
Abstract
In this paper, we study a three-layer wiretap network including the source node in the top layer, N nodes in the middle layer and L sink nodes in the bottom layer. Each sink node recovers the message generated from the source node correctly [...] Read more.
In this paper, we study a three-layer wiretap network including the source node in the top layer, N nodes in the middle layer and L sink nodes in the bottom layer. Each sink node recovers the message generated from the source node correctly via the middle layer nodes that it has access to. Furthermore, it is required that an eavesdropper eavesdropping a subset of the channels between the top layer and the middle layer learns absolutely nothing about the message. For each pair of decoding and eavesdropping patterns, we are interested in finding the capacity region consisting of (N+1)-tuples, with the first element being the size of the message successfully transmitted and the remaining elements being the capacity of the N channels from the source node to the middle layer nodes. This problem can be seen as a generalization of the secret sharing problem. We show that when the number of middle layer nodes is no larger than four, the capacity region is fully characterized as a polyhedral cone. When such a number is 5, we find the capacity regions for 74,222 decoding and eavesdropping patterns. For the remaining 274 cases, linear capacity regions are found. The proving steps are: (1) Characterizing the Shannon region, an outer bound of the capacity region; (2) Characterizing the common information region, an outer bound of the linear capacity region; (3) Finding linear schemes that achieve the Shannon region or the common information region. Full article
(This article belongs to the Special Issue Advances in Information and Coding Theory II)
Show Figures

Figure 1

13 pages, 2070 KiB  
Article
Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel
by Daniel Harman, Karl Knapp, Tyler Sweat, Philip Lundrigan, Michael Rice and Willie Harrison
Entropy 2023, 25(10), 1397; https://doi.org/10.3390/e25101397 - 29 Sep 2023
Viewed by 1473
Abstract
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap channel using channel sounding measurements to analyze the [...] Read more.
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap channel using channel sounding measurements to analyze the potential for secure communication in a real-world scenario. A multi-input, multi-output, multi-eavesdropper (MIMOME) system is deployed using orthogonal frequency division multiplexing (OFDM) over an 802.11n wireless network. Channel state information (CSI) measurements were taken in an indoor environment to analyze time-varying scenarios and spatial variations. It is shown that secrecy capacity is highly affected by environmental changes, such as foot traffic, network congestion, and propagation characteristics of the physical environment. We also present a numerical method for calculating MIMOME secrecy capacity in general and comment on the use of OFDM with regard to calculating secrecy capacity. Full article
(This article belongs to the Special Issue Information Security and Privacy: From IoT to IoV)
Show Figures

Figure 1

9 pages, 1636 KiB  
Article
Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code
by Rongwo Xu, Leiming Sun, Jianhua Ji, Ke Wang and Yufeng Song
Entropy 2023, 25(10), 1384; https://doi.org/10.3390/e25101384 - 26 Sep 2023
Cited by 1 | Viewed by 1580
Abstract
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate the physical layer security of an imperfect security system. [...] Read more.
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate the physical layer security of an imperfect security system. Furthermore, secrecy capacity cannot quantitatively evaluate the amount of information leakage to the eavesdropper. Based on the channel model of an optical CDMA network using wiretap code, the information leakage rate is analyzed to evaluate the physical layer security. The numerical results show that the information leakage rate can quantitatively evaluate the physical layer security of an optical CDMA wiretap channel, and it is related to transmission distance, eavesdropping position, confidential information rate and optical code. Full article
(This article belongs to the Special Issue Forward Error Correction for Optical CDMA Networks)
Show Figures

Figure 1

21 pages, 3893 KiB  
Article
A Secure Cooperative Transmission of Image Super-Resolution in Wireless Relay Networks
by Hien-Thuan Duong, Ca V. Phan, Quoc-Tuan Vien and Tuan T. Nguyen
Electronics 2023, 12(18), 3764; https://doi.org/10.3390/electronics12183764 - 6 Sep 2023
Cited by 2 | Viewed by 1092
Abstract
The image transmission over wireless media experiences not only unavailable performance loss caused by the environment and hardware issues, but also information leakage to eavesdroppers who can overhear and attempt to recover the images. This paper proposes a secure cooperative relaying (SCR) protocol [...] Read more.
The image transmission over wireless media experiences not only unavailable performance loss caused by the environment and hardware issues, but also information leakage to eavesdroppers who can overhear and attempt to recover the images. This paper proposes a secure cooperative relaying (SCR) protocol for the image communications in wireless relay networks (WRNs) where Alice sends high-resolution (HR) images to Bob with the assistance of a relaying user named Relay, and in the presence of an eavesdropper named Eve. In order to enhance the security of the image communications, random linear network coding (RLNC) is employed at both Alice and Relay to conceal the original images from Eve with RLNC coefficient matrices and reference images in the shared image datastore. Furthermore, the original HR images are downscaled at Alice to save transmission bandwidth and image super-resolution (ISR) is adopted at Bob due to its capability to recover the HR images from their low-resolution (LR) version, while still maintaining the image quality. In the proposed SCR protocol, Bob can decode both the original images transmitted from Alice over the direct link and the images forwarded by Relay over the relaying links. Simulation results show that the SCR protocol achieves a considerably higher performance at Bob than at Eve since Eve does not know the coefficient matrices and reference images used at Alice and Relay for the RLNC. The SCR protocol is also shown to outperform the counterpart secure direct transmission protocol without the relaying links and secure relaying transmission without the direct link. Additionally, an increased scaling factor can save the transmission bandwidth for a slight change in the image quality. Moreover, the impacts of direct, relaying and wiretap links are evaluated, verifying the effectiveness of the SCR protocol with the employment of Relay to assist the image communications between Alice and Bob in the WRNs. Full article
(This article belongs to the Special Issue Intelligent Unmanned Vehicles for Image Capturing and Sensing)
Show Figures

Figure 1

36 pages, 3911 KiB  
Review
A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security
by Mulugeta Kassaw Tefera, Zengwang Jin and Shengbing Zhang
Sensors 2022, 22(9), 3589; https://doi.org/10.3390/s22093589 - 9 May 2022
Cited by 8 | Viewed by 4129
Abstract
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the [...] Read more.
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS design and optimization that are based on artificial intelligence (AI) and machine learning (ML) have been corroborated to outperform traditional security technologies. This will allow future 5G networks to be more intelligent and robust in order to significantly improve the performance of system design over traditional security methods. With the objective of advancing future PLS research, this review paper presents an elaborate discussion on the design and optimization approaches of wireless PLS techniques. In particular, we focus on both signal processing and information-theoretic security approaches to investigate the optimization techniques and system designs of PLS strategies. The review begins with the fundamental concepts that are associated with PLS, including a discussion on conventional cryptographic techniques and wiretap channel models. We then move on to discuss the performance metrics and basic optimization schemes that are typically adopted in PLS design strategies. The research directions for secure system designs and optimization problems are then reviewed in terms of signal processing, resource allocation and node/antenna selection. Thereafter, the applications of AI and ML technologies in the optimization and design of PLS systems are discussed. In this context, the ML- and AI-based solutions that pertain to end-to-end physical layer joint optimization, secure resource allocation and signal processing methods are presented. We finally conclude with discussions on future trends and technical challenges that are related to the topics of PLS system design and the benefits of AI technologies. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

31 pages, 1029 KiB  
Article
Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints
by Suneel Yadav, Anshul Pandey, Dinh-Thuan Do, Byung Moo Lee and Adão Silva
Sensors 2021, 21(21), 7160; https://doi.org/10.3390/s21217160 - 28 Oct 2021
Cited by 1 | Viewed by 2594
Abstract
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and [...] Read more.
Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of ΘlnΩm2Ωe2 for large Ωm and Ωe, where Ωm and Ωe are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings. Full article
(This article belongs to the Special Issue Transmission Techniques for Future Global Mobile Systems)
Show Figures

Figure 1

16 pages, 1956 KiB  
Article
Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels
by Srđan Maričić, Nenad Milošević, Dejan Drajić, Dejan Milić and Jelena Anastasov
Electronics 2021, 10(12), 1368; https://doi.org/10.3390/electronics10121368 - 8 Jun 2021
Cited by 5 | Viewed by 3795
Abstract
In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by [...] Read more.
In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by Fisher–Snedecor F fading. The path loss among active nodes is also considered. The exact intercept probability expressions are derived recalling an optimal scheduling scheme (OS), a scheduling policy based on a specific cumulative distribution function (CS), and round-robin scheduling as a baseline. The asymptotic behavior of the intercept metric is also presented in a simpler form with acceptable accuracy. The secrecy diversity orders are defined and the security–reliability tradeoff of WSN is specified. Numerical results are provided to demonstrate the interplay of various main/wiretap channel conditions, the distances among nodes, the number of active sensors, and the average main-to-eavesdropper’s signal ratio in order to upgrade the quality of the WSN secrecy performance. Additionally, the impact of the outage probability on the intercept probability is defined for a variety of scenarios under which either the CS or OS scheme could be selected as suitable for PLS enhancement. The obtained results are verified by independent Monte Carlo simulations. Full article
(This article belongs to the Special Issue Advances in Wireless Networks and Mobile Systems)
Show Figures

Figure 1

19 pages, 347 KiB  
Article
Secure Polar Coding for the Primitive Relay Wiretap Channel
by Manos Athanasakos and George Karagiannidis
Entropy 2021, 23(4), 442; https://doi.org/10.3390/e23040442 - 9 Apr 2021
Viewed by 2137
Abstract
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown [...] Read more.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy. Full article
(This article belongs to the Special Issue Information-Theoretic Approach to Privacy and Security)
Show Figures

Figure 1

12 pages, 1577 KiB  
Communication
Physical-Layer Security Improvement with Reconfigurable Intelligent Surfaces for 6G Wireless Communication Systems
by Janghyuk Youn, Woong Son and Bang Chul Jung
Sensors 2021, 21(4), 1439; https://doi.org/10.3390/s21041439 - 19 Feb 2021
Cited by 16 | Viewed by 5109
Abstract
Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to [...] Read more.
Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates. Full article
(This article belongs to the Special Issue Advanced Antenna Techniques for IoT and 5G Applications)
Show Figures

Figure 1

17 pages, 5358 KiB  
Article
Dependable Wireless System with Shortened Code Using Distance Information between Integrated Terminals
by Yasuharu Amezawa and Ryuji Kohno
Telecom 2020, 1(3), 266-282; https://doi.org/10.3390/telecom1030018 - 7 Dec 2020
Viewed by 2782
Abstract
Since wireless systems allow for easier access to communication paths than wired systems, it is necessary to improve their dependability against cyberterrorists. To make wireless systems more dependable, additional measures at the lower layer are required, in addition to those at the upper [...] Read more.
Since wireless systems allow for easier access to communication paths than wired systems, it is necessary to improve their dependability against cyberterrorists. To make wireless systems more dependable, additional measures at the lower layer are required, in addition to those at the upper layers. Our proposal uses an integrated terminal-like cellular phone which has multiple radio access technologies (RATs) such as cellular, wireless local area network (LAN), Bluetooth, and an ultra-wide band (UWB). We propose to communicate information encoded by shortened code using multiple RATs. Redundancy by RATs and their error correction capability can simultaneously improve wiretap resistance and attack resistance. A codeword of shortened code is obtained by removing a part of a codeword of popular code. A decoder can improve the error correction capability if the removed part is known. By using shortened codes, the dependability can be further enhanced because the error correction capability between the legitimate receiver and the cyberterrorist can make a difference. To do this, it is necessary to securely share the removed part between the sender and receiver. Our proposal is to securely measure the distance between the sender and receiver using UWB and use it as the removed part. It was confirmed that the secrecy capacity is improved. Full article
Show Figures

Figure 1

Back to TopTop