Workshop on Wireless Physical Layer Security
Monday, 8 June 2015 • 09:00 – 18:00
WS-11: Wireless Physical Layer Security (WPLS)
Organizer: Eduard Jorswieck (TU Dresden, Germany)
The emergence of large-scale, dynamic, and decentralized wireless networks imposes new challenges on classical security measures such as cryptography. To this end, researchers have been seeking new solutions to complement cryptography and significantly improve the overall security of wireless communication networks. One of the most promising ideas is to exploit the physical layer characteristics of the wireless channel such as fading or noise, which are traditionally seen as impediments, for improving the security of wireless transmission against passive (e.g., eavesdropping) or active (e.g., jamming) attacks.. This emerging security technique, known as physical layer security, has drawn considerable attention in the past few years. This workshop will bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results related to physical layer security in wireless networks.
Welcome Session
Keynote-1: The Wireless Physical Layer: A Medium for Information Extraction and Exploitation
Wireless networks are becoming prolific, and the implication is that they create imprints on our environment-- new sources of information that can be examined to arrive at a variety of societal benefits and societal threats. The wireless medium allows for the creation of many new services, such location-based services as well as new forms of security services. On the other hand, it is now possible to examine the information traversing the wireless to infer information that might have previously been considered inaccessible. This talk will examine the broad implications associated with pervasive wireless connectivity, ranging from the new types of applications that can be created by tapping into the wireless fabric to new types of security and privacy threats unique to the wireless medium. After completing a high-level survey of such issues and opportunities, the talk will turn to a detailed examination of security solutions that may be devised at the physical layer. Such physical layer security activity has pulled from a broad variety of traditional research areas, ranging from traditional cryptographic security to information theoretic security, from theoretical efforts focused on understanding fundamental limits to systems efforts targeted at proving that the proposed theories can in fact be realized in real systems. The talk will examine how physical layer methods can be leveraged to develop authentication and confidentiality services. The talk will present some of the basic theories being used, as well as present systems-validation efforts that have been conducted. Lastly, we will comment on some of the potential weaknesses that exist in physical layer security and, by doing so, highlight directions for ongoing research.
Oral Session 1: Multi-Antenna Secure Transmissions
- Unitary Modulation for Secrecy Enhancement in Multi-antenna Wireless Systems with Only CSIT
- pp. 417-422
- Secure Beamforming and Artificial Noise Design in Interference Networks with Imperfect ECSI
- pp. 423-428
Keynote-2: Secure Communication under Channel Uncertainty and Adversarial Attacks
Information theoretic approaches to security have been examined as a promising complement to current cryptographic techniques. Such information theoretic approaches establish reliable communication and data confidentiality directly at the physical layer of a communication network by taking the properties of the noisy channel into account leading to unconditional security regardless of the computational capabilities of eavesdroppers. The provision of accurate channel state information is a major challenge particularly in wireless communication systems, especially information about the channels to non-legitimate eavesdroppers. In addition, there might be malevolent adversaries who jam or influence the channel of the legitimate users. This talk surveys different models for secure communication under channel uncertainty and adversarial attacks and reviews the corresponding results.
Oral Session 2: Coding and Cooperation for Secrecy
- Key Generation with A Byzantine Helper
- pp. 429-434
- Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel
- pp. 435-440
- On MMSE Properties of Codes for the Gaussian Broadcast Channel with Confidential Messages
- pp. 441-446
- Can Bob Enhance the Security of the Multiple Antenna Wiretap Channel?
- pp. 447-452
Panel-1: Wireless Physical Layer Security - Myth or Reality
Panelists: Merouane Debbah (Supelec, Huawei, France), Andreas Mueller (Bosch, Germany), Francois Delaveau (Thales, France)
Interactive Poster Session 1: Performance Analysis and New Design of Secure Communications
- Achievable Ergodic Secrecy Rate for MIMO SWIPT Wiretap Channels
- pp. 453-458
- On Directional Modulation: An Analysis of Transmission Scheme with Multiple Directions
- pp. 459-463
- Fundamental Limits of Caching in D2D Networks With Secure Delivery
- pp. 464-469
- Tomlinson-Harashima Precoding Design in MIMO Wiretap Channels Based on the MMSE Criterion
- pp. 470-474
- Multi-Phase Transmission for Secure Cognitive Radio Networks
- pp. 475-479
Interactive Poster Session 2: Performance Analysis and New Design of Secure Communications
- MIMO Wiretap Channels with Randomly Located Eavesdroppers: Large-System Analysis
- pp. 480-484
- Construction of Best Equivocation Codes with Highest Minimum Distance for Syndrome Coding
- pp. 485-490
- Feedback Based Two-Phase Transmission for Secure SIMO Communications
- pp. 491-496
- Secure Robust Resource Allocation using Full-Duplex Receivers
- pp. 497-502
- On the Individual Secrecy for Gaussian Broadcast Channels with Receiver Side Information
- pp. 503-508