Secure waveforms for 5G systems

Secure waveforms for 5G systems

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The fifth generation (5G) of cellular systems addresses challenging objectives in terms of connection speed, latency, energy consumption, traffic type, number of served users and their type (not just humans but mostly devices or even herds of animals). In this plethora of requests, a proper design of the waveforms is seen by many in the field as a key factor for the success of the new standard. This chapter will look at the possible waveform candidates from a physical layer security (PLS) point of view, providing an overview of on-going research activity on how they can be exploited to either secretly transmit a message on a wireless channel or extract a secret key between a couple of users.

Chapter Contents:

  • 14.1 Secret transmission over parallel channels
  • 14.1.1 Single user case
  • Full channel-state information at the transmitter (CSIT) and Gaussian input
  • Full CSIT and finite constellations
  • Partial CSIT and Gaussian input
  • Multiple eavesdroppers
  • 14.1.2 Multiple users case
  • Downlink
  • Uplink
  • 14.1.3 Downlink with common message
  • Power allocation for per-user encoding
  • Power allocation for per-channel encoding
  • 14.2 Secret key agreement
  • 14.2.1 Channel-model SKA over parallel channels
  • Resource allocation problem for full CSIT
  • 14.2.2 Source-model SKA over parallel channels
  • 14.3 Waveforms peculiarities
  • 14.3.1 OFDM
  • Advanced Eve's receiver
  • 14.3.2 SC-FDMA
  • 14.3.3 GFDM
  • 14.3.4 UFMC
  • 14.3.5 FBMC
  • Filter hopping FBMC
  • 14.3.6 Performance comparison
  • References

Inspec keywords: cellular radio; 5G mobile communication; telecommunication security; telecommunication traffic; next generation networks; cryptography; wireless channels

Other keywords: traffic type; PLS; secret key; number-of-served users; cellular systems; energy consumption; secure waveforms; 5G systems; physical layer security; fifth generation systems; latency; wireless channel; connection speed

Subjects: Cryptography; Mobile radio systems

Preview this chapter:
Zoom in

Secure waveforms for 5G systems, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch14-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch14-2.gif

Related content

This is a required field
Please enter a valid email address