Wireless Physical Layer Security
Total Page:16
File Type:pdf, Size:1020Kb
EURASIP Journal on Wireless Communications and Networking Wireless Physical Layer Security Guest Editors: Mérouane Debbah, Hesham El-Gamal, H. Vincent Poor, and Shlomo Shamai (Shitz) Wireless Physical Layer Security EURASIP Journal on Wireless Communications and Networking Wireless Physical Layer Security Guest Editors: Merouane´ Debbah, Hesham El-Gamal, H. Vincent Poor, and Shlomo Shamai (Shitz) Copyright © 2009 Hindawi Publishing Corporation. All rights reserved. This is a special issue published in volume 2009 of “EURASIP Journal on Wireless Communications and Networking.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Editor-in-Chief Luc Vandendorpe, Universite´ catholique de Louvain, Belgium Associate Editors Thushara Abhayapala, Australia Zabih F. Ghassemlooy, UK Marc Moonen, Belgium Mohamed H. Ahmed, Canada Christian Hartmann, Germany Eric Moulines, France Farid Ahmed, USA Stefan Kaiser, Germany Sayandev Mukherjee, USA Carles Anton-Haro,´ Spain George K. Karagiannidis, Greece Kameswara Rao Namuduri, USA Anthony C. Boucouvalas, Greece Chi Chung Ko, Singapore AmiyaNayak,Canada Lin Cai, Canada Visa Koivunen, Finland Claude Oestges, Belgium Yuh-Shyan Chen, Taiwan Nicholas Kolokotronis, Greece A. Pandharipande, The Netherlands Pascal Chevalier, France Richard Kozick, USA Phillip Regalia, France Chia-Chin Chong, South Korea Sangarapillai Lambotharan, UK A. Lee Swindlehurst, USA Soura Dasgupta, USA Vincent Lau, Hong Kong George S. Tombras, Greece Ibrahim Develi, Turkey DavidI.Laurenson,UK Lang Tong, USA Petar M. Djuric,´ USA Tho Le-Ngoc, Canada Athanasios Vasilakos, Greece Mischa Dohler, Spain Wei Li, USA Ping Wang, Canada Abraham O. Fapojuwo, Canada Tongtong Li, USA Weidong Xiang, USA Michael Gastpar, USA Zhiqiang Liu, USA Xueshi Yang, USA Alex B. Gershman, Germany Stephen McLaughlin, UK Lawrence Yeung, Hong Kong Wolfgang Gerstacker, Germany Sudip Misra, India Dongmei Zhao, Canada David Gesbert, France Ingrid Moerman, Belgium Weihua Zhuang, Canada Contents Wireless Physical Layer Security,Merouane´ Debbah, Hesham El-Gamal, H. Vincent Poor, and Shlomo Shamai (Shitz) Volume 2009, Article ID 404061, 2 pages A Real Orthogonal Space-Time Coded UWB Scheme for Wireless Secure Communications, Yanbing Zhang and Huaiyu Dai Volume 2009, Article ID 571903, 8 pages An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel, Ronit Bustin, Ruoheng Liu, H. Vincent Poor, and Shlomo Shamai (Shitz) Volume 2009, Article ID 370970, 8 pages Compound Wiretap Channels, Yingbin Liang, Gerhard Kramer, H. Vincent Poor, and Shlomo Shamai (Shitz) Volume 2009, Article ID 142374, 12 pages Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer, Zhu Han, Ninoslav Marina, Merouane´ Debbah, and Are Hjørungnes Volume 2009, Article ID 452907, 10 pages Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper, Ersen Ekrem and Sennur Ulukus Volume 2009, Article ID 824235, 29 pages Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels, Vaneet Aggarwal, Lalitha Sankar, A. Robert Calderbank, and H. Vincent Poor Volume 2009, Article ID 494696, 14 pages Secret Sharing over Fast-Fading MIMO Wiretap Channels, Tan F. Wong, Matthieu Bloch, and John M. Shea Volume 2009, Article ID 506973, 17 pages Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding, Mari Kobayashi, Merouane´ Debbah, and Shlomo Shamai (Shitz) Volume 2009, Article ID 386547, 19 pages Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations, Gill R. Tsouri and Dov Wulich Volume 2009, Article ID 437824, 18 pages Two-Hop Secure Communication Using an Untrusted Relay, Xiang He and Aylin Yener Volume 2009, Article ID 305146, 13 pages Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2009, Article ID 404061, 2 pages doi:10.1155/2009/404061 Editorial Wireless Physical Layer Security Merouane´ Debbah,1 Hesham El-Gamal,2 H. Vincent Poor,3 and Shlomo Shamai (Shitz)4 1 Alcatel-Lucent Chair on Flexible Radio, Sup´elec, 3 rue Joliot-Curie, 91192 Gif-sur-Yvette Cedex, France 2 Department of Electrical & Computer Engineering, Ohio State University, 205 Dreese Labs, 2015 Neil Avenue, Columbus, OH 43210, USA 3 Department of Electrical Engineering, Princeton University, Engineering Quadrangle, Olden Street, Princeton, NJ 08544, USA 4 Department of Electrical Engineering, Technion, Technion City, Haifa 32000, Israel Correspondence should be addressed to Merouane´ Debbah, [email protected] Received 31 December 2009; Accepted 31 December 2009 Copyright © 2009 Merouane´ Debbah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The issues of privacy and security in wireless communication information theoretic security, which builds on Shannon’s networks have taken on an increasingly important role as notion of perfect secrecy, was laid in the 1970s by Wyner these networks continue to flourish worldwide. Traditionally, and later by Csiszar´ and Korner,¨ who proved seminal results security is viewed as an independent feature addressed showing that there exist channel codes guaranteeing both above the physical layer, and all widely used cryptographic robustness to transmission errors and a prescribed degree protocols are designed and implemented assuming the of data confidentiality. In the 1970s and 1980s, the impact physical layer has already been established and provides of these works was limited, partly because practical wiretap an error-free link. However, with the emergence of ad- codes were not available, but mostly due to the fact that hoc and decentralized networks, higher-layer techniques, a strictly positive secrecy capacity in the classical wiretap such as encryption, are complex and difficult to implement. channel setup requires the legitimate sender and receiver to Therefore, there has been a considerable recent attention have some advantage (in general, a better SNR) over the on studying the fundamental ability of the physical layer to attacker. In recent times, information theoretic security has provide secure wireless communications. This paradigm is witnessed a renaissance due in part to the work of Maurer in called Wireless Physical Layer Security. Physical layer security the 1990s, who proved that even when a legitimate user has is an emerging research area that explores the possibility of a worse channel than an eavesdropper, it is possible for him achieving perfect-secrecy data transmission among intended to generate a secret key through public communication over network nodes, while possibly malicious nodes that eaves- an insecure yet authenticated channel. In the past few years, drop upon the transmission obtain zero information. The significant effort has been applied to the study of information breakthrough concept behind wireless physical layer security theoretic security for wireless channel models, enhancing is to exploit the characteristics of the wireless channel, such as the classical wiretap channel and including more realistic fading or noise, to provide secrecy for wireless transmissions. assumptions which allow for opportunistic exploitation of While these characteristics have traditionally been seen as the space/time/user dimensions of wireless channels for impairments, physical layer security takes advantage of these secret communications. characteristics for improving the security and reliability of Thegoalofthisspecialissueistopresentrecentresults wireless communication systems and networks. in wireless physical layer security that capture the research Information theoretic security provides the theoretical trends in the field. The papers to be found in this issue basis behind wireless physical layer security. Historically, provide the reader with a good overview of these trends. 2 EURASIP Journal on Wireless Communications and Networking This special issue collects 10 papers clustered into two et al. studies the frequency-selective broadcast channel with groups: papers dealing with information theoretic aspects confidential messages, in which the transmitter sends a and papers focusing on practical scenarios. confidential message to the first receiver and a common mes- The first group of papers provides information theoretic sage to both receivers. A practical Vandermonde precoding results for wireless physical layer security. The first of approach is provided for which the achievable rate region is these, by Bustin et al., derives a closed-form expression studied. for the secrecy capacity of the multiple-input multiple output (MIMO) Gaussian wiretap channel, under a power- Acknowledgments covariance constraint. The proof uses a clever relationship between information theory and estimation theory in the We would like to thank the authors of all submitted papers Gaussian channel that can be extended to other types of (both those that were accepted and those that, regrettably, MIMO channels. The paper by Ekrem et al. characterizes could not be included) for considering our special issue for the secrecy capacity region between a single transmitter and disseminating their work. We extend our gratitude to the multiple receivers