The authors consider the secure transmission of information over power line communication (PLC) networks. The focus is on the secrecy guaranteed at the physical layer, named physical layer security (PLS). Although PLS has been deeply investigated for the wireless case, it is not the same for the PLC environment. Thus, starting from the knowledge in the wireless context, the authors extend the results to typical PLC scenarios. In particular, the PLC channel statistics is evaluated and a performance comparison among PLC and wireless channels is performed, in terms of secrecy rate distribution. For the PLC case, the secrecy rate distribution, under a total power constraint, is evaluated for both optimal and uniform power distributions in broadband channels. To provide experimental evidence, the authors consider channel measures obtained in an in-home measurement campaign. The underlying network presents a tree topology, which introduces frequency and spatial correlation among channels, and suffers from the keyhole effect, generated by branches that depart from the same node. As shown by the numerical results, these effects can reduce the secrecy rate. Finally, the authors evaluate the secrecy rate region for the multi-user broadcast channel considering both simulated channel realisations and experimental channel measures.
References
-
-
1)
-
19. Li, Z., Yates, R., Trappe, W.: ‘Securing wireless communications at the physical layer’. Secrecy Capacity of Independent Parallel Channels, Springer US, 2010, pp. 1–18, .
-
2)
-
11. Barros, J., Rodrigues, M.R.D.: ‘Secrecy capacity of wireless channels’. Proc. IEEE Int. Symp. Information Theory, July 2006, pp. 356–360.
-
3)
-
D. Chizhik ,
G.J. Foschini ,
R.A. Valenzuela
.
Capacities of multi-element transmit and receive antennas: correlations and keyholes.
IET Electron. Lett.
,
13 ,
1099 -
1100
-
4)
-
22. Versolatto, F., Tonello, A.M.: ‘PLC channel characterization up to 300 MHz: frequency response and line impedance’. Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2012), Anaheim, California, USA, 3–7 December 2012, pp. 3525–3530.
-
5)
-
9. Lampe, L., Vinck, A.J.H.: ‘Cooperative multihop power line communications’. Proc. 16th IEEE Int. Symp. Power Line Communications and its Applications (ISPLC 2012), Vancouver, BC, Canada, 27–30 March 2012, pp. 1–6.
-
6)
-
15. Pittolo, A., Tonello, A.M.: ‘Physical layer security in PLC networks: achievable secrecy rate and channel effects’. Proc. 17th IEEE Int. Symp. Power Line Communications and its Applications (ISPLC 2013), Johannesburg, South Africa, 24–27 March 2013, pp. 273–278.
-
7)
-
8)
-
21. Boyd, S., Vandenberghe, L.: Convex optimization, (Cambridge University Press, 2004). .
-
9)
-
12. Jorswieck, E.A., Wolf, A., Gerbracht, S.: ‘Trends in telecommunications technologies’. InTech: Secrecy on the Physical Layer in Wireless Networks, March 2010, pp. 413–435, .
-
10)
-
14. Tonello, A.M., Versolatto, F.: ‘Bottom-up statistical PLC channel modeling – Part ii: Inferring the statistics’, IEEE Trans. Power Deliv., 2010, 25, (4), pp. 2356–2363 (doi: 10.1109/TPWRD.2010.2053561).
-
11)
-
19. Li, Z., Yates, R., Trappe, W.: ‘Securing wireless communications at the physical layer’. Secrecy Capacity of Independent Parallel Channels, Springer US, 2010, pp. 1–18, .
-
12)
-
I. Kalet
.
The multitone channel.
IEEE Trans. Commun.
,
2 ,
119 -
124
-
13)
-
P. Almers ,
F. Tufvesson ,
A.F. Molisch
.
Keyhole effect in MIMO wireless channels: measurements and theory.
IEEE Trans. Wirel. Commun.
,
12 ,
3596 -
3604
-
14)
-
S. Galli ,
O. Logvinov
.
Recent developments in the standardization of power line communications within the IEEE.
IEEE Commun. Mag.
,
7 ,
64 -
71
-
15)
-
I. Csiszar ,
J. Korner
.
Broadcast channels with confidential messages.
IEEE Trans. Inf. Theory
,
3 ,
339 -
348
-
16)
-
S.K. Leung-Yan-Cheong ,
M.E. Hellman
.
Gaussian wiretap channel.
IEEE Trans. Inf. Theory
,
4 ,
451 -
456
-
17)
-
23. Jorswieck, E.A., Gerbracht, S.: ‘Secrecy rate region of downlink OFDM systems: efficient resource allocation’. Proc. 14th Int. OFDM-Workshop (InOWo 2009), Hamburg, Germany, 2009.
-
18)
-
17. Wyner, A.D.: ‘The wire-tap channel’, The Bell Syst. Tech. J., 1975, 54, (8), pp. 1355–1387 (doi: 10.1002/j.1538-7305.1975.tb02040.x).
-
19)
-
20. Jorswieck, E.A., Wolf, A.: ‘Resource allocation for the wire-tap multi-carrier broadcast channel’. Proc. Int. Conf. Telecommunications (ICT 2008), 2008, pp. 1–6.
-
20)
-
13. Tonello, A.M., Versolatto, F.: ‘Bottom-up statistical PLC channel modeling – Part i: Random topology model and efficient transfer function computation’, IEEE Trans. Power Deliv., 2011, 26, (2), pp. 891–898 (doi: 10.1109/TPWRD.2010.2096518).
-
21)
-
4. Shannon, C.E.: ‘Communication theory of secrecy systems’, Bell Syst. Tech. J., 1949, 28, (4), pp. 656–715 (doi: 10.1002/j.1538-7305.1949.tb00928.x).
-
22)
-
3. Shiu, Y.-S., Chang, S.Y., Wu, H.-C., Huang, S.C.-H., Chen, H.-H.: ‘Physical layer security in wireless networks: a tutorial’, IEEE Wirel. Commun., 2011, 18, (2), pp. 66–74 (doi: 10.1109/MWC.2011.5751298).
-
23)
-
10. Liang, Y., Poor, H.V.: ‘Secure communication over fading channels’. Proc. 44th Annual Allerton Conf. Communication, Control and Computing, University of Illinois, Monticello, IL, 27–29 September 2006. .
-
24)
-
24. Myung, I.J.: ‘Tutorial on maximum likelihood estimation’, J. Math. Psychol., 2003, 47, (1), pp. 90–100 [ (doi: 10.1016/S0022-2496(02)00028-7).
-
25)
-
D. Chizhik
.
Key-holes, correlations, and capacities of multielement transmit and receive antennas.
IEEE Trans. Wirel. Commun.
,
361 -
368
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2013.0472
Related content
content/journals/10.1049/iet-com.2013.0472
pub_keyword,iet_inspecKeyword,pub_concept
6
6