Recent advances on physical layer security for wireless communications

Wireless communications are naturally exposed to important security risks due to their broadcast nature. In contrast with wired communications, no physical medium is isolating the transmission surroundings to a specific path. Traditional methods to reach the goals of communications security rely on...

Full description

Bibliographic Details
Published:
Online Access:http://hdl.handle.net/2047/D20291186
id ndltd-NEU--neu-cj82rm33n
record_format oai_dc
spelling ndltd-NEU--neu-cj82rm33n2021-04-13T05:14:17ZRecent advances on physical layer security for wireless communicationsWireless communications are naturally exposed to important security risks due to their broadcast nature. In contrast with wired communications, no physical medium is isolating the transmission surroundings to a specific path. Traditional methods to reach the goals of communications security rely on algorithms at protocol stack level, which are based on mathematically derived cryptographic protocols. With the tremendous proliferation of wireless devices, and the increase in computational power available for decryption, traditional cryptographic measures may be compromised. To protect communications at the lowest level, physical layer (PHY) security methods have been proposed recently. These techniques aim to ensure secure communications by exploiting the unique characteristics of the physical medium between communicating nodes, effectively reducing the decryption capabilities of an eavesdropper to intercept transmissions. This thesis explains within a general framework the most important PHY layer security schemes. First we explore approaches which utilize the knowledge of the unique channel between communicating nodes to distort a transmitted signal with various kinds of randomizations, in such a way that the intended receivers are unaffected by the distortion, but any other observer will be exposed to it. These techniques, however, introduce several trade-offs between transmission resources and the effectiveness in achieving secrecy. Of particular interest for this investigation is a class of methods which can be referred to as "security enhancing techniques", in which minimal priors about the potential eavesdroppers locations and capabilities are assumed. In this thesis, a wave-based approach to the communication secrecy problem is introduced. An interesting perspective is provided by studying the relation between electromagnetic theory and information theory, the so-called electromagnetic information theory. This allows to properly identify the unavoidable limitations imposed by the laws of electromagnetics to our ability to communicate securely. The proposed model can be extended to the analysis of different signal distortion methodologies and different channel conditions. The resulting approach is highly relevant to the study of PHY layer security methods since it is physically fundamental as well as architecture independent, which leads to a consolidating point of view of the secrecy problem. In addition, the thesis presents computer simulation results which shed insight on the security possibilities and limitations of three different security scenarios, which are termed MISO (multiple-input, single-output) (with single eavesdropper), MISOME (multiple-input, single-output, multiple eavesdropper), and MIMOME (multiple-input, multiple-output, multiple-eavesdropper).http://hdl.handle.net/2047/D20291186
collection NDLTD
sources NDLTD
description Wireless communications are naturally exposed to important security risks due to their broadcast nature. In contrast with wired communications, no physical medium is isolating the transmission surroundings to a specific path. Traditional methods to reach the goals of communications security rely on algorithms at protocol stack level, which are based on mathematically derived cryptographic protocols. With the tremendous proliferation of wireless devices, and the increase in computational power available for decryption, traditional cryptographic measures may be compromised. To protect communications at the lowest level, physical layer (PHY) security methods have been proposed recently. These techniques aim to ensure secure communications by exploiting the unique characteristics of the physical medium between communicating nodes, effectively reducing the decryption capabilities of an eavesdropper to intercept transmissions. This thesis explains within a general framework the most important PHY layer security schemes. First we explore approaches which utilize the knowledge of the unique channel between communicating nodes to distort a transmitted signal with various kinds of randomizations, in such a way that the intended receivers are unaffected by the distortion, but any other observer will be exposed to it. These techniques, however, introduce several trade-offs between transmission resources and the effectiveness in achieving secrecy. Of particular interest for this investigation is a class of methods which can be referred to as "security enhancing techniques", in which minimal priors about the potential eavesdroppers locations and capabilities are assumed. In this thesis, a wave-based approach to the communication secrecy problem is introduced. An interesting perspective is provided by studying the relation between electromagnetic theory and information theory, the so-called electromagnetic information theory. This allows to properly identify the unavoidable limitations imposed by the laws of electromagnetics to our ability to communicate securely. The proposed model can be extended to the analysis of different signal distortion methodologies and different channel conditions. The resulting approach is highly relevant to the study of PHY layer security methods since it is physically fundamental as well as architecture independent, which leads to a consolidating point of view of the secrecy problem. In addition, the thesis presents computer simulation results which shed insight on the security possibilities and limitations of three different security scenarios, which are termed MISO (multiple-input, single-output) (with single eavesdropper), MISOME (multiple-input, single-output, multiple eavesdropper), and MIMOME (multiple-input, multiple-output, multiple-eavesdropper).
title Recent advances on physical layer security for wireless communications
spellingShingle Recent advances on physical layer security for wireless communications
title_short Recent advances on physical layer security for wireless communications
title_full Recent advances on physical layer security for wireless communications
title_fullStr Recent advances on physical layer security for wireless communications
title_full_unstemmed Recent advances on physical layer security for wireless communications
title_sort recent advances on physical layer security for wireless communications
publishDate
url http://hdl.handle.net/2047/D20291186
_version_ 1719395790680489984