Investigation of Physical Layer Security Method in Cooperative Communication

Authors

  • Krishna Zalavadiya  PG student in Electronics and Communication Silver Oak college of Engineering and Technology, Ahmedabad, Gujarat, India
  • Dimple Agrawal  Assistant Professor in Electronics and Communication Silver Oak College of Engineering and Technology, Ahmedabad, Gujarat, India

Keywords:

Artificial fast fading, wiretap, ciphering, physical security, MIMO-OFDM, secrecy rate

Abstract

Wireless communication system have broadcast nature which limits performance in terms of security and privacy. Physical layer security is meant to provide secure communication and having legitimate user to successfully obtain secure information. The work in present paper is to investigate various methods developed for enhancing physical layer security starting from Shannon’s wire-tap model in 1949 to recent multiple input multiple output based security models.

References

  1. Lun Dong, member, IEEE, Zhu Han, senior member, IEEE, Athina P. Petropulu, fellow, IEEE, and H. Vincent Poor, fellow, IEEE "Improving wireless physical layer security via cooperating relays" IEEE transactions on signal processing, vol. 58, no. 3, march 2010
  2. K. Harrison, and S. W. McLaughlin, "Physical-layer security: combining error control coding and cryptography," Proc. IEEE ICC, pp. 1–5, Jun. 2009.
  3. Shin, R. W. Heath, and E. J. Powers, "Blind channel estimation for MIMO-OFDM system," IEEE Trans. Wireless Commun., vol. 56, no. 2, pp. 670–685, Mar. 2007.
  4. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
  5. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, pp. 451–456, Jul. 1978.
  6. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978
  7. Khisti, G. W. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," Proc. IEEE ISIT, pp. 524–528, July 2008.
  8. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett, vol. 19, no. 6, pp. 372–375, Jun. 2012.
  9. Yang, P. L. Yeoh, M. Elkashlen, R. schober, and I. B. Collings, "Secure transmission via transmit antenna selection in MIMO wiretap channels," Proc. IEEE GLOBECOM 2012, pp. 789–794, Dec. 2012.
  10. Yu Kozai and Takahiko Saba" an artificial fast fading generation scheme for physical layer security of MIMO-OFDM systems" dept. of computer science, Chiba Institute of Technology, 2-17-1 tsudanuma, narashino, chiba 275-0016 japan,2015 IEEE.
  11. E. Shannon, "communication theory of secrecy systems", bell system technical journal, vol. 28, pp. 656-715, Oct. 1949
  12. Amal Hyadi, (student member, IEEE), Zouheir Rezki, (senior member, IEEE), and Mohamed-slim Alouini, (fellow, IEEE)." An overview of physical layer security in wireless communication systems with CSIT uncertainty" 2169-3536 2016 IEEE. Translations and content mining are permitted for academic research only.
  13. Raef Bassily, Ersen Ekrem, Xiang He, Ender Tekin, Jianwei Xie, Matthieu R. Bloch, Sennur Ulukus, and Aylin Yener, "Cooperative Security at the Physical Layer" IEEE signal processing magazine September 2013
  14. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
  15. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, no. 6, pp. 644–654, Nov. 1976
  16. Hero, "Secure space–time communication," IEEE Trans. Inform. Theory, vol. 49, no. 12, pp. 3235–3249, Dec. 2003.
  17. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, Aug. 2007. [Online]. Available: http://arxiv.org/abs/0708.4219, submitted for publication.
  18. Negi and S. Goelm, "Secret communication using artificial noise," in Proc. IEEE Vehicular Tech. Conf., Dallas, TX, Sep. 2005, vol. 3, pp. 1906–1910.
  19. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, Oct. 2007 [Online]. Available: http://aps.arxiv.org/abs/0710.1920, submitted for publication.
  20. Liu and S. Shamai, "A note on the secrecy capacity of the multi-antenna wiretap channel," IEEE Trans. Inf. Theory, Nov. 2007 [Online]. Available: http://arxiv.org/abs/0710.4105, submitted for publication.
  21. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152–2155.
  22. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. 41st Conf. Information Sciences Systems, Baltimore, MD, Mar. 2007
  23. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007.
  24. Havary-Nassab, S. Shahbazpanahi, A. Grami, and Z. Luo, "Distributed beamforming for relay networks based on second-order statistics of the channel state information," IEEE Trans. Signal Process. vol. 56, no. 9, pp. 4306–4316, Sep. 2008.
  25. Mudumbai, d. Richard, Upmanyu Madhov, h. Vincent poor, "Distributed transmit beamforming: challenges and recent progress", IEEE communications magesins
  26. Yindi Jing, Hamid Jafaekjani, "Network beamforming using relays with perfect channel information", IEEE transactions on information theory.
  27. M. Wang, T. Zheng, and X-G. Xia, "Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fading," IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94–106, Jan. 2015.
  28. B. Giannakis, J. M. Mendel, "Identification of nonminimum phase systems using higher order statistics", IEEE transaction on Acoustics, speech, and signal processing
  29. Lang tong, Guanghan Xu; T. Kailath, "Blind identification and equalization based on second-order statistics: a time domain approach" IEEE transactions on Information theory
  30. Xiaohua Li, E.P. Ratazzi, "MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks" Military Communications Conference,2005, MILCOM 2005,IEEE
  31. Xiaohua Li and Juite Hwu, E. Paul Ratazzi, "Using antenna array redundancy and Channel Diversity for Secure Wireless transmissions" Journal of Communications, Vol. 2, No. 3, May 2007
  32. Yu Kozai and Takahiko Saba" An artificial fast fading generation scheme for physical layer security of MIMO-OFDM systems" dept. of computer science, chiba institute of technology, 2-17-1 tsudanuma, narashino, chiba 275-0016 japan,2015 IEEE.
  33. Ender Tekin and Aylin Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy" 44th Annual Allerton Conference
  34. Ender Tekin, Aylin Yener, "the general Gaussian Multiple-access and Two-way wiretap Channels: Achievable Rates and Cooperative Jamming" IEEE Transactions on Information Theory
  35. E. Tekin, "The multiple access wire-tap channel: wireless secrecy and cooperative jamming" Information theory and application workshop, 2007.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Krishna Zalavadiya, Dimple Agrawal, " Investigation of Physical Layer Security Method in Cooperative Communication, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.899-907, January-February-2018.