Physical layer security in power line communication networks: an emerging scenario, other than wireless
نویسندگان
چکیده
This chapter digs into the secrecy provided and guaranteed at the physical layer, named physical layer security (PLS), over power line communication (PLC) channels for in-home networks. The PLC scenario peculiarities are briefly discussed in terms of channel characteristics and noise features. The effects of the channel properties on the performance are evaluated, in terms of the achievable secrecy rate, starting from the single-input single-output (SISO) scheme with additive white Gaussian noise. The results are also compared to the more common wireless scenario, namely a scenario where the channels are independent and experience Rayleigh fading as a consequence of rich scattering. Furthermore, the performance improvement attainable with the use of multiple-input multiple-output (MIMO) transmission is discussed. The effect of increasing the transmission band 2–30 MHz to 2–86 MHz and the effect of colored spatially correlated noise is also investigated.Moreover, a non uniform power allocation strategy, provided by the application of an alternating optimization (AO) approach is evaluated. A comparison with the channel capacity, achieved without secrecy constraints, is also performed. The experimental results are provided relying on measured noise and channel responses.
منابع مشابه
Physical Layer Security in PLC Networks: An Emerging Scenario, Other Than Wireless
We consider the secure transmission of information over power line communication (PLC) networks. The focus is on the secrecy guaranteed at the physical layer, named physical layer security (PLS). Although PLS has been deeply investigated for the wireless case, it is not the same for the PLC environment. Thus, starting from the knowledge in the wireless context, we extend the results to typical ...
متن کاملA Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملMulticast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach
Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IET Communications
دوره 8 شماره
صفحات -
تاریخ انتشار 2014