-
Secrecy Capacity Maximization for a Hybrid Relay-RIS Scheme in mmWave MIMO Networks
Authors:
Edson Nobuyuki Egashira,
Diana Pamela Moya Osorio,
Nhan Thanh Nguyen,
Markku Juntti
Abstract:
The hybrid relay-reflecting intelligent surface (HR-RIS) has been recently introduced as an efficient solution to overcome the double path loss and limited beamforming diversity of the conventional fully passive reflecting surface. This motivates us to investigate the application of the HR-RIS in improving the secrecy capacity of millimeter wave multiple-input-multiple-output (MIMO) systems with t…
▽ More
The hybrid relay-reflecting intelligent surface (HR-RIS) has been recently introduced as an efficient solution to overcome the double path loss and limited beamforming diversity of the conventional fully passive reflecting surface. This motivates us to investigate the application of the HR-RIS in improving the secrecy capacity of millimeter wave multiple-input-multiple-output (MIMO) systems with the presence of multi-antenna eavesdropper. The joint optimization of the transmit beamformer and the relay-reflecting coefficients at RIS is tackled via alternating optimization. In the proposed solution, a closed-form expression for the optimal transmit beamformer at the transmitter is derived, and a metaheuristic solution based on particle swarm optimization is proposed to optimize the active and passive elements at the HR-RIS. The simulation results verify that under various scenarios, the HR-RIS provides significant improvement in the secrecy capacity with respect to the conventional passive reflecting surface.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Distributed UAV-enabled zero-forcing cooperative jamming scheme for safeguarding future wireless networks
Authors:
X. A. Flores Cabezas,
D. P. Moya Osorio,
M. Latva-aho
Abstract:
In this work, we investigate the impact of two cooperative unmanned aerial vehicle (UAV)-based jammers on the secrecy performance of a ground wireless network in the presence of an eavesdropper. For that purpose, we investigate the secrecy-area related metrics, Jamming Coverage and Jamming Efficiency. Moreover, we propose a hybrid metric, the so-called Weighted Secrecy Coverage (WSC) and a virtual…
▽ More
In this work, we investigate the impact of two cooperative unmanned aerial vehicle (UAV)-based jammers on the secrecy performance of a ground wireless network in the presence of an eavesdropper. For that purpose, we investigate the secrecy-area related metrics, Jamming Coverage and Jamming Efficiency. Moreover, we propose a hybrid metric, the so-called Weighted Secrecy Coverage (WSC) and a virtual distributed multiple-input-multiple-output (MIMO)-based zero-forcing precoding scheme to avoid the jamming effects on the legitimate receiver. For evaluating these metrics, we derive a closed-form position-based metric, the secrecy improvement. Our mathematical derivations and comparative simulations show that the proposed zero-forcing scheme leads to an improvement on the secrecy performance in terms of the WSC, and provides conditions for improvement of Jamming Efficiency. They also show positioning trends on the UAVs over a fixed orbit around the legitimate transmitter as well as power allocation trends for optimal secrecy.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Weighted Secrecy Coverage Analysis and the Impact of Friendly Jamming over UAV-Enabled Networks
Authors:
X. A. Flores Cabezas,
D. P. Moya Osorio,
M. Latva-aho
Abstract:
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by exploiting their predominant LOS links and spacial manoeuvrability to introduce a friendly jamming. In this work, we investigate the impact of two cooperative UAV-based jammers on the secrecy performance of a ground wireless wiretap channel by considering secrecy-are…
▽ More
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by exploiting their predominant LOS links and spacial manoeuvrability to introduce a friendly jamming. In this work, we investigate the impact of two cooperative UAV-based jammers on the secrecy performance of a ground wireless wiretap channel by considering secrecy-area related metrics, the jamming coverage and jamming efficiency. Moreover, we propose a hybrid metric, the so-called Weighted Secrecy Coverage (WSC) that can be used as a metric for gaining insights on the optimal deployments of the UAV jammers to provide the best exploration of jamming signals. For evaluating these metrics, we derive a closed-form position-based metric, the secrecy improvement, and propose an analogous computationally simpler metric. Our simulations show that a balanced power allocation between the two UAVs leads to the best performances, as well as a symmetrical positioning behind the line of sight between the legitimate transmitter and receiver. Moreover, there exist an optimal UAV height for the jammers. Finally, we propose a sub-optimal and simpler problem for the maximisation of the WSC.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Survey on Physical Layer Security for 5G Wireless Networks
Authors:
José David Vega Sánchez,
Luis Urquiza-Aguiar,
Martha Cecilia Paredes Paredes,
Diana Pamela Moya Osorio
Abstract:
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in p…
▽ More
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer. This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security. Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided. Finally, our work surveys physical layer security research over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter-wave communications, heterogeneous networks, non-orthogonal multiple access, and full-duplex. Also, we include the key concepts of each of the aforementioned technologies. Future fields of research and technical challenges of physical layer security are also identified.
△ Less
Submitted 14 June, 2020;
originally announced June 2020.
-
Information-Theoretic Security of MIMO Networks under $κ$-$μ$ Shadowed Fading Channels
Authors:
José David Vega Sánchez,
D. P. Moya Osorio,
F. Javier López-Martínez,
Martha Cecilia Paredes Paredes,
Luis Urquiza-Aguiar
Abstract:
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper. Specifically, we concentrate on the $κ$-$μ$ shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for much better tractability…
▽ More
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper. Specifically, we concentrate on the $κ$-$μ$ shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for much better tractability than other state-of-the-art fading models. By considering transmit antenna selection and maximal ratio combining reception at the legitimate and eavesdropper's receiver sides, we study two relevant scenarios $(i)$ the transmitter does not know the eavesdropper's channel state information (CSI), and $(ii)$ the transmitter has knowledge of the CSI of the eavesdropper link. For this purpose, we first obtain novel and tractable expressions for the statistics of the maximum of independent and identically distributed (i.i.d.) variates related to the legitimate path. Based on these results, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the average secrecy capacity (ASC) to assess the secrecy performance in passive and active eavesdrop** scenarios, respectively. Moreover, we develop analytical asymptotic expressions of the SOP and ASC at the high signal-to-noise ratio regime. In all instances, secrecy performance metrics are characterized in closed-form, without requiring the evaluation of Meijer or Fox functions. Some useful insights on how the different propagation conditions and the number of antennas impact the secrecy performance are also provided.
△ Less
Submitted 30 June, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
Six Key Enablers for Machine Type Communication in 6G
Authors:
Nurul Huda Mahmood,
Hirley Alves,
Onel Alcaraz López,
Mohammad Shehab,
Diana P. Moya Osorio,
Matti Latva-aho
Abstract:
While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type…
▽ More
While 5G is being rolled out in different parts of the globe, few research groups around the world $-$ such as the Finnish 6G Flagship program $-$ have already started posing the question: \textit{What will 6G be?} The 6G vision is a data-driven society, enabled by near instant unlimited wireless connectivity. Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important cornerstone of 6G development. This article presents an over-arching vision for machine type communication in 6G. In this regard, some relevant performance indicators are first anticipated, followed by a presentation of six key enabling technologies.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
On the Statistics of the Ratio of Non-Constrained Arbitrary α-μ Random Variables: a General Framework and Applications
Authors:
J. D. Vega Sánchez,
D. P. Moya Osorio,
E. E. Benitez Olivo,
H. Alves,
M. C. P. Paredes,
L. Urquiza-Aguiar
Abstract:
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general in the sense that are valid for non constrained arb…
▽ More
In this paper, we derive closed-form exact expressions for the main statistics of the ratio of squared alpha-mu random variables, which are of interest in many scenarios for future wireless networks where generalized distributions are more suitable to fit with field data. Importantly, different from previous proposals, our expressions are general in the sense that are valid for non constrained arbitrary values of the parameters of the alpha-mu distribution. Thus, the probability density function, cumulative distribution function, moment generating function, and higher order moments are given in terms of both (i) theFox H-function for which we provide a portable and efficient Wolfram Mathematica code and (ii) easily computable series expansions. Our expressions can be used straightforwardly in the performance analysis of a number of wireless communication systems, including either interference-limited scenarios, spectrum sharing, full-duplex or physical-layer security networks, for which we present the application of the proposed framework. Moreover, closed-form expressions for some classical distributions, derived as special cases from the alpha-mu distribution, are provided as byproducts. The validity of the proposed expressions is confirmed via Monte Carlo simulations.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.