http://iet.metastore.ingenta.com
1887

Secure data networks with channel uncertainty

Secure data networks with channel uncertainty

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion is inducing more concerns about the privacy and the security of the users. For many years, the security challenge has been mainly addressed at the application layer using cryptographic techniques. However, with the emergence of ad-hoc and decentralised networks and the deployment of 5G and beyond wireless communication systems, the need for less complex securing techniques had become a necessity. It is mainly for this reason that wireless physical layer security has gained much attention from the research community. What distinguishes information-theoretic security compared to other high-layer cryptographic techniques is that it exploits the randomness and the fluctuations of the wireless channel to achieve security at a remarkably reduced computational complexity. However, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In this chapter, we look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI).

Chapter Contents:

  • 2.1 Introduction
  • 2.2 Secure single-user transmission with channel uncertainty
  • 2.2.1 System model
  • 2.2.2 Wiretap channel with noisy CSIT
  • 2.2.2.1 Secrecy capacity analysis
  • 2.2.2.2 Asymptotic results
  • 2.2.3 Wiretap channel with limited CSI feedback
  • 2.2.3.1 Secrecy capacity analysis
  • 2.2.3.2 Asymptotic results
  • 2.3 Secure multi-user transmission with channel uncertainty
  • 2.3.1 System model
  • 2.3.2 Secure broadcasting with noisy CSIT
  • 2.3.2.1 Transmission of a common message
  • 2.3.2.2 Transmission of independent messages
  • 2.3.3 Secure broadcasting with limited CSI feedback
  • 2.3.3.1 Transmission of a common message
  • 2.3.3.2 Transmission of independent messages
  • 2.3.3.3 Broadcast channel with confidential messages
  • 2.4 Conclusion
  • References

Inspec keywords: wireless channels; ad hoc networks; 5G mobile communication; computational complexity; telecommunication security

Other keywords: channel state information assumption; wireless channel fluctuation; high-layer cryptographic technique; wiretap channels; ad-hoc networks; application layer; 5G deployment; channel uncertainty; wireless physical layer security; phenomenal expansion; ergodic secrecy capacity; decentralised networks; data network security; reduced computational complexity; wireless communication systems; wireless communication networks; information-theoretic security

Subjects: Mobile radio systems

Preview this chapter:
Zoom in
Zoomout

Secure data networks with channel uncertainty, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch2-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch2-2.gif

Related content

content/books/10.1049/pbte076e_ch2
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address