Skip to main content

2023 | Buch

Secrecy, Covertness and Authentication in Wireless Communications

Physical Layer Security Approach

insite
SUCHEN

Über dieses Buch

This book introduces the fundamentals of physical layer security (PLS) and demonstrates how a variety of PLS techniques can be applied to improve the security of wireless communication systems. In particular, this book covers three security aspects of wireless communications. It includes secrecy, i.e., preventing eavesdroppers from intercepting information from transmitted wireless signals, covertness, i.e., hiding the transmitted signals themselves from malicious wardens and authentication, i.e., authenticating the identities of communicating entities.

When discussing the secrecy of wireless communication systems, this book covers physical layer secure communication in multiple-input multiple-out (MIMO) systems based on beamforming and precoding techniques, in relay systems based on link/relay selection and in large-scale random networks based on cooperative jamming. Regarding the covertness of wireless communication systems, this book introduces physical layer covert communication in relaying systems and MIMO systems. Also, when discussing authentication in wireless communication systems, this book introduces the implementation of physical layer authentication in MIMO systems based on channel features and/or radiometric features of transceivers. In addition, this book presents security-aware routing in wireless networks based on physical layer secure communication techniques.

This book targets researchers in the fields of physical layer security and wireless communications security. Advanced-level students in electronic engineering or computer science studying these security topics will also want to purchase this book as a secondary textbook.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
In this chapter, we introduce some typical wireless communication systems and networks, such as two-hop relay systems, ad hoc networks and cellular networks, followed by the introduction of the fundamentals of the physical layer security (PLA) technology in secure wireless communication, covert wireless communication, and authentication.
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
Chapter 2. Physical Layer Secure Communications
Abstract
The PLS technology is highly promising for implementing secure communication in wireless systems due to its advantages of easy deployment, low complexity, and everlasting secrecy. In this chapter, we provide secure communication schemes based on typical PLS techniques like beamforming, precoding, link selection, as well as cooperative jamming. In Sect. 2.1, we show how to design a secure beamforming scheme to maximize the secrecy rate of two-way relay systems. In Sect. 2.2, we also focus on the two-way relay systems and present a secure precoding scheme to maximize the secrecy energy efficiency (SEE). In Sect. 2.3, we investigate effective link selection policies for two-hop cooperative wireless networks. The security-delay tradeoff issue in a two-hop wireless system based on the relay selection technique is studied in Sect. 2.4, followed by a sight-based cooperative jamming (SCJ) scheme for millimeter-wave (mmWave) systems in Sect. 2.5.
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
Chapter 3. Physical Layer Covert Communications
Abstract
While Chap. 2 shows the great potential of the PLS technology in ensuring secure wireless communication, this chapter introduces how the PLS technology can be applied to achieve covert communication in wireless systems. In particular, we focus on two-hop relay systems and examine the covertness performance of such systems under various PLS techniques. In Sect. 3.1, we investigate the interplay between legitimate nodes and malicious wardens in a two-hop two-way relay system and show the covertness performance with an emphasis on the scaling law results of covert throughput. Different from the relays considered in Sect. 3.1, Sect. 3.2 focuses on the case of FD relays that can switch between the FD mode and the HD mode. Since the timeliness of CSI is vital for covert communication, Sect. 3.3 therefore explores the impact of outdated CSI on the covertness performance of the relay systems.
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
Chapter 4. Physical Layer Authentication
Abstract
Physical layer authentication (PLA) represents another promising application of the PLS technology in wireless communications, aiming at establishing trust among communicating entities. The fundamentals and categories of PLA have been introduced in Chap. 1.​2.​3. This chapter further discusses PLA and presents concrete implementations of passive RFF-based PLA, channel-based PLA, and hybrid PLA. In Sect. 4.1, we exemplify how to use multiple radiometric features to develop an RFF-based PLA scheme in direct-sequence spread spectrum (DSSS) communication systems. In Sect. 4.2, we give an illustrative example of instantaneous channel-based PLA in massive MIMO systems. In Sect. 4.3, a hybrid PLA scheme in MIMO systems is provided, which is based on the combination of the channel-based feature in Sect. 4.2 and a radiometric feature named phase noise.
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
Chapter 5. Secure Routing
Abstract
Due to the advantages of low computational complexity, easy implementation in a distributed manner and no need to distribute/manage secret keys, applying the PLS technology to protect transmission security in various wireless communication systems has been attracting considerable academic attention recently. Existing studies on the design of PLS-based schemes mainly focus on either the single-hop (point-to-point) or two-hop relay communication systems. Although these studies have made great progress, they are not applicable to multi-hop network scenarios. In many cases, wireless nodes (devices) adopt short-range communication due to power limitations. Hence, data of a source may need to be forwarded by several intermediate nodes to reach its destination when the distance between the source and destination is far. In this context, it is essential to leverage a routing scheme to establish the route (path) for end-to-end data delivery. However, the PLS-oriented routing design for multi-hop wireless communication systems still remains largely uninvestigated and needs to be addressed carefully. This chapter introduces the PLS-based secure routing design. In Sect. 5.1, we present a security/QoS-aware route selection mechanism in multi-hop wireless ad hoc networks under different forwarding strategies. In Sect. 5.2, we show the PLS-based secure routing schemes that can achieve optimal security-QoS tradeoffs. In Sect. 5.3, we investigate the secure routing design taking into account the selfishness of cooperative jammers. The common performance metrics used in this chapter include SOP and connection outage probability (COP), where the former defines the probability that the SINR at one or more eavesdroppers is above a fixed threshold and the latter represents the probability that the SINR at the intended receiver is below a required threshold. SOP and COP serve as the metrics of security and QoS of the communication, respectively.
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
Chapter 6. Summary
Abstract
This chapter provides a summary of the whole book and presents some challenges that may hinder the real-world application of PLS techniques. Furthermore, we introduce some future directions that may be inspiring for subsequent research in this area.
Yulong Shen, Yuanyu Zhang, Xiaohong Jiang
Metadaten
Titel
Secrecy, Covertness and Authentication in Wireless Communications
verfasst von
Yulong Shen
Yuanyu Zhang
Xiaohong Jiang
Copyright-Jahr
2023
Electronic ISBN
978-3-031-38465-3
Print ISBN
978-3-031-38464-6
DOI
https://doi.org/10.1007/978-3-031-38465-3

Premium Partner