| Literature DB >> 32375240 |
Joseph Henry Anajemba1, Yue Tang1, Celestine Iwendi2, Akpesiri Ohwoekevwo3, Gautam Srivastava4,5, Ohyun Jo6.
Abstract
In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper's information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.Entities:
Keywords: 5G; IoT; MIMOME; jamming; physical layer security; privacy capacity
Year: 2020 PMID: 32375240 PMCID: PMC7249050 DOI: 10.3390/s20092609
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A Wiretap Channel for Privacy Capacity model.
Figure 2A single-antenna three-node wireless transmission with a full-duplex destination.
Figure 3Realized privacy capacity against eavesdroppers under power and rate constraints.
Figure 4Realized privacy capacity for Source-to-Destination transmission under power and rate constraints.
Figure 5Maximum realized privacy capacity for multiple destinations transmission.
Figure 6Source-to-Destination data rate for multiple destinations transmission.
Figure 7Maximum realized privacy capacity for multiple sources transmission.
Figure 8Source-to-Destination data rate for multiple sources transmission.
Figure 9Performance of the algorithms under different power constraints.
Figure 10Performance of the algorithms with different rate constraints for dB.
Figure 11Comparison of versus with different parameters.