具有多个独立干扰器的窃听信道的加密感知物理层安全

Tarig Sadig, Mehdi Maleki, N. Tran, H. Bahrami
{"title":"具有多个独立干扰器的窃听信道的加密感知物理层安全","authors":"Tarig Sadig, Mehdi Maleki, N. Tran, H. Bahrami","doi":"10.1109/WTS202356685.2023.10131796","DOIUrl":null,"url":null,"abstract":"In conventional physical layer security schemes no leakage of private information to adversary nodes is tolerated, and no assumption on the encryption of information is considered. This is a limiting assumption in physical layer security, which compromises the efficiency of such schemes. This paper introduces an approach in which a prior knowledge of encryption can be used to improve the security performance of cooperative jamming in Gaussian wiretap channels as an example of physical layer security approached. The proposed approach, however, is not limited to the considered scenario of cooperative jamming and can be applied to other scenarios. We consider a system composed of a transmitter, a receiver, and eavesdropper and several jamming nodes that work independently, and formulate an optimization problem to maximize the secrecy rate with the knowledge of encryption and attempt to solve it by driving the rate-equivocation region to constrain and determine the feasibility of the solution. We then exploit a linear approximation to solve the resulted nonconvex optimization problem to maximize the secure transmission rate. Our numerical results show that prior knowledge of encryption can be exploited to allocate the available power to the jamming nodes to significantly increase the secure transmission rate.","PeriodicalId":405032,"journal":{"name":"2023 Wireless Telecommunications Symposium (WTS)","volume":"12 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Encryption-Aware PHY Security for Wiretap Channels with Multiple Independent Jammers\",\"authors\":\"Tarig Sadig, Mehdi Maleki, N. Tran, H. Bahrami\",\"doi\":\"10.1109/WTS202356685.2023.10131796\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In conventional physical layer security schemes no leakage of private information to adversary nodes is tolerated, and no assumption on the encryption of information is considered. This is a limiting assumption in physical layer security, which compromises the efficiency of such schemes. This paper introduces an approach in which a prior knowledge of encryption can be used to improve the security performance of cooperative jamming in Gaussian wiretap channels as an example of physical layer security approached. The proposed approach, however, is not limited to the considered scenario of cooperative jamming and can be applied to other scenarios. We consider a system composed of a transmitter, a receiver, and eavesdropper and several jamming nodes that work independently, and formulate an optimization problem to maximize the secrecy rate with the knowledge of encryption and attempt to solve it by driving the rate-equivocation region to constrain and determine the feasibility of the solution. We then exploit a linear approximation to solve the resulted nonconvex optimization problem to maximize the secure transmission rate. Our numerical results show that prior knowledge of encryption can be exploited to allocate the available power to the jamming nodes to significantly increase the secure transmission rate.\",\"PeriodicalId\":405032,\"journal\":{\"name\":\"2023 Wireless Telecommunications Symposium (WTS)\",\"volume\":\"12 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Wireless Telecommunications Symposium (WTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WTS202356685.2023.10131796\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Wireless Telecommunications Symposium (WTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WTS202356685.2023.10131796","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在传统的物理层安全方案中,不允许私有信息泄露到敌对节点,也不考虑信息加密的假设。这是物理层安全性中的一个限制性假设,它损害了此类方案的效率。本文以物理层安全方法为例,介绍了一种利用加密先验知识提高高斯窃听信道协同干扰安全性能的方法。然而,所提出的方法并不局限于所考虑的协同干扰场景,也可以应用于其他场景。我们考虑一个由发射器、接收器、窃听器和几个独立工作的干扰节点组成的系统,并利用加密知识制定一个最大化保密率的优化问题,并试图通过驱动速率模糊区域来约束和确定解决方案的可行性。然后,我们利用线性逼近来解决所得到的非凸优化问题,以最大化安全传输速率。数值结果表明,利用加密的先验知识,可以将可用功率分配给干扰节点,从而显著提高安全传输速率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Encryption-Aware PHY Security for Wiretap Channels with Multiple Independent Jammers
In conventional physical layer security schemes no leakage of private information to adversary nodes is tolerated, and no assumption on the encryption of information is considered. This is a limiting assumption in physical layer security, which compromises the efficiency of such schemes. This paper introduces an approach in which a prior knowledge of encryption can be used to improve the security performance of cooperative jamming in Gaussian wiretap channels as an example of physical layer security approached. The proposed approach, however, is not limited to the considered scenario of cooperative jamming and can be applied to other scenarios. We consider a system composed of a transmitter, a receiver, and eavesdropper and several jamming nodes that work independently, and formulate an optimization problem to maximize the secrecy rate with the knowledge of encryption and attempt to solve it by driving the rate-equivocation region to constrain and determine the feasibility of the solution. We then exploit a linear approximation to solve the resulted nonconvex optimization problem to maximize the secure transmission rate. Our numerical results show that prior knowledge of encryption can be exploited to allocate the available power to the jamming nodes to significantly increase the secure transmission rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信