Learning Radio Maps for Physical-Layer Security in the Radio Access

被引:9
|
作者
Utkovski, Zoran [1 ]
Agostini, Patrick [1 ]
Frey, Matthias [2 ]
Bjelakovic, Igor [2 ]
Stanczak, Slawomir [1 ,2 ]
机构
[1] Heinrich Hertz Inst Nachrichtentech Berlin GmbH, Fraunhofer Inst Telecommun, Einsteinufer 37, D-10587 Berlin, Germany
[2] Tech Univ Berlin, Einsteinufer 27, D-10587 Berlin, Germany
关键词
D O I
10.1109/spawc.2019.8815467
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While there is an evident trend towards "strengthening" the notion of secrecy in information-theoretic analyses, there remains the question of the assumptions under which the promises of physical-layer security may be delivered. A critical aspect here is the level of knowledge of the inherently uncertain wireless environment, required in order to be able to guarantee a certain security performance. A general observation is that the strictness of the notion of physical-layer security increases the focus on the design assumptions of the physical layer and the adequacy of secure transmission strategies. Guided by these insights, we propose a probabilistic secrecy characterization that captures the uncertainty in the communication model coming from the unknown channel state information of the eavesdropper's channel (e.g. due to Eve's unknown position in the wireless environment). Integral to our concept is the use of any-to-any radio maps as underlying context information for the probabilistic secrecy characterization. The radio maps are learned by using recent machine-learning advances in network channel gain cartography. The resulting secrecy maps provide the key ingredient in the integration of physical-layer security in the radio access, and represent a valuable tool for secure radio access system design. The statistical characterization relates to the concept of spatial availability of services in wireless networks, by indicating the locations in a given area where the secrecy-related performance would surmount a given threshold with a guaranteed level of confidence. In this sense, it provides a quality-of-service (QoS) notion for physical-layer security in a spatial context.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
    Zou, Yulong
    Wang, Xianbin
    Shen, Weiming
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (12) : 5103 - 5113
  • [2] On physical-layer security for primary system in underlay cognitive radio networks
    Xie, Ping
    Zhang, Moli
    Zhang, Gaoyuan
    Zheng, Ruijuan
    Xing, Ling
    Wu, Qingtao
    [J]. IET NETWORKS, 2018, 7 (02) : 68 - 73
  • [3] Improving physical-layer security for primary users in cognitive radio networks
    Xu, Ding
    Li, Qun
    [J]. IET COMMUNICATIONS, 2017, 11 (15) : 2303 - 2310
  • [4] An Overview and Future Directions on Physical-Layer Security for Cognitive Radio Networks
    Tashman, Deemah H.
    Hamouda, Walaa
    [J]. IEEE NETWORK, 2021, 35 (03): : 205 - 211
  • [5] Open Radio Access Network RIC Empowered Reconfigurable Intelligent Surface: A Physical-Layer Security Perspective
    Lien, Shao-Yu
    Tseng, Chih-Cheng
    Hung, Wei-Cheng
    Tsai, Cheng-You
    Liu, Ting-Yu
    Deng, Der-Jiunn
    Lin, Yuan-Chun
    Lin, Shih-Cheng
    Chang, Chia-Chan
    Chang, Sheng-Fuh
    [J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 615 - 625
  • [6] No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments
    Sankhe, Kunal
    Belgiovine, Mauro
    Zhou, Fan
    Angioloni, Luca
    Restuccia, Frank
    D'Oro, Salvatore
    Melodia, Tommaso
    Ioannidis, Stratis
    Chowdhury, Kaushik
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (01) : 165 - 178
  • [7] Evaluating Physical-Layer Security for Secondary Users in Cognitive Radio Systems with Attackers
    Rawat, Danda B.
    Malomo, Olumide
    Bajracharya, Chandra
    Song, Min
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 659 - 665
  • [8] Wireless Communication Security: Physical-Layer Techniques Exploiting Radio and Propagation Characteristics
    Jensen, Michael A.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION TECHNOLOGY AND SYSTEMS (ICWITS), 2012,
  • [9] Linear physical-layer network coding for fifth generation radio access networks
    Burr, Alister G.
    Fang, Dong
    [J]. 2015 1st URSI Atlantic Radio Science Conference (URSI AT-RASC), 2015,
  • [10] Destination-assisted Jamming for Physical-Layer Security in SWIPT Cognitive Radio Systems
    Su, Runcong
    Wang, Ying
    Sun, Ruijin
    [J]. 2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,