IEEE ICC’14 Workshop on Wireless Physical Layer Security

Tuesday 10 June

 

9:00 Opening Remarks

 

9:00 – 9:50 Morning Keynote (Chair: Eduard Jorswieck)

·        Security by the Physical Layer: A Promising Direction for Next Generation Wireless Network Design

Aylin Yener (Pennsylvania State University, USA)

Physical layer security aims to provide secure communication guarantees built in to the network design at its foundation. The promise of absolute data confidentiality is particularly relevant in the context of wireless systems operating in an open broadcast medium. Having its roots in existence results in information theory and incubated in the information theory community for close to a decade, wireless physical layer security research has grown to be a vibrant area in communications, information theory, coding theory and signal processing for communications. The richness of the research questions and the resulting new insights makes physical layer security a promising direction for next generation wireless systems. The current research effort has thus started to look at solutions towards bridging the gap from the theoretical constructs to more practically relevant communication scenarios. In this talk we will provide an overview of the advancements since 2005, and the resulting design insights. These include insights related to inducing judicious interference for confidentiality, i.e. cooperative jamming, structured signaling, multiantenna signaling strategies and merits of feedback. We will then overview some of the more recent advancements towards relaxing some of the idealized assumptions in earlier problem constructs, notably the channel state information in multiantenna channels with secrecy constraints, as well as research efforts towards getting close to practical system design. We will conclude with remaining challenges and open problems in the area.

 

9:54 – 10:30 Technical Session 1: Wiretap Channels I (Chair: Eduard Jorswieck)

·        Arbitrarily Varying Wiretap Channels with Finite Coordination Resources

Holger Boche (Technical University Munich, Germany); Rafael F. Schaefer (Princeton University, USA)

·        Information Embedding on Actions in Wiretap Channel

Xinxing Yin (Shanghai Jiao Tong University, P.R. China); Liang Pang (Shanghai Jiao Tong University, P.R. China); Zhi Xue (Shanghai Jiao Tong University, P.R. China)

 

10:30 – 11:00 Coffee Break

 

11:00 – 12:30 Technical Session 2: Pre-Coding and Processing for Secrecy (Chair: Xiangyun Zhou)

·        Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages

Marco Baldi (Università Politecnica delle Marche, Italy); Nicola Maturo (Università Politecnica delle Marche, Italy); Giacomo Ricciutelli (Università Politecnica delle Marche, Italy); Franco Chiaraluce (Università Politecnica delle Marche, Italy)

·        Parallel Distributed Neyman-Pearson Detection with Privacy Constraints

Zuxing Li (KTH Royal Institute of Technology, Sweden); Tobias J. Oechtering (KTH Royal Institute of Technology, Sweden); Joakim Jaldén (KTH Royal Institute of Technology, Sweden)

·        Fundamental Limits of Caching with Secure Delivery

Avik Sengupta (Virginia Tech, USA); Ravi Tandon (Virginia Tech, USA); T. Charles Clancy (Virginia Tech, USA)

·        A New Scheme to Improve the Secrecy Throughput under the Constraints of Secrecy Outage Probability and Average Transmit Power

Pengcheng Mu (Xi'an Jiaotong University, P.R. China); Peizhi Yang (Xi'an Jiaotong University, P.R. China); Bo Wang (Xi'an Jiaotong University, P.R. China); Hui-Ming Wang (Xi'an Jiaotong University, P.R. China); Qinye Yin (Xi'an Jiaotong University, P.R. China)

·        Secret-key generation from wireless channels: Mind the reflections

Hendrik Vogt (RUB, Germany); Aydin Sezgin (RUB, Germany)

 

12:30 – 2:00 Lunch Break

 

2:00 – 2:50 Afternoon Keynote (Chair: Eduard Jorswieck)

·        Practical Physical-Layer Security

João Barros (University of Porto, Portugal)

As the Internet evolves into an immense jungle of people, computers, mobile devices, sensors, vehicles and networked infrastructures, bringing forward unexpected technologies, applications, products and services, the proposed security sub-systems seem strangely "deja vu", relying on variations of established techniques such as hashing, symmetric encryption, public-key cryptography or access control policies. But is this really all that it takes to secure the internet of things, smart grids or intelligent transportation systems, to name just a few of the envisioned future internet environments? In this keynote, we shall address this question from the point of view of physical-layer security and its potential application in specific case studies such as vehicular networking, distributed sensing, and network coded systems. Our ultimate goal is to point at ways to ensure that such technologies can be well integrated in the protocol stacks of the (hopefully) secure internet of the future.

 

2:54– 3:30 Technical Session 3: Wiretap Channels II (Chair: Eduard Jorswieck)

·        Secrecy Outage Performance of MISO Wiretap Channels with Outdated CSI

Nuwan S. Ferdinand (University of Oulu, Finland); Daniel Benevides da Costa (Federal University of Ceara (UFC), Brazil); André Almeida (Federal University of Ceará, Brazil); Matti Latva-aho (UoOulu, Finland)

·        Gaussian wiretap channels with correlated sources: approaching capacity region within a constant gap

Yanling Chen (Ruhr-University Bochum, Germany); Hendrik Vogt (RUB, Germany); Aydin Sezgin (RUB, Germany)

 

3:30 – 4:00 Coffee Break

 

4:00– 5:30 Technical Session 4: Signal Processing and Resource Allocation for Secrecy (Chair: Xiangyun Zhou)

·        Power Efficient and Secure Multiuser Communication Systems with Wireless Information and Power Transfer

Shiyang Leng (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany); Derrick Wing Kwan Ng (Friedrich-Alexander-University Erlangen-Nürnberg, Germany); Robert Schober (University of British Columbia, Canada)

·        Time-domain Artificial Noise Generation Technique Using Time-domain And Frequency-domain Processing for Physical Layer Security in MIMO-OFDM systems

Tomoki Akitaya (Chiba Institute of Technology, Japan); Shunta Asano (Chiba Institute of Technology, Japan); Takahiko Saba (Chiba Institute of Technology, Japan)

·        Secure Communication in Frequency Selective Channels with Fade-Avoiding Subchannel Usage

Ertugrul Guvenkaya (University of South Florida, USA); Huseyin Arslan (University of South Florida, USA)

·        Joint Relay Selection and Artificial Jamming Power Allocation for Secure DF Relay Networks

Chao Wang (Xi'an Jiaotong University, P.R. China); Hui-Ming Wang (Xi'an Jiaotong University, P.R. China)

·        Secrecy Transmission With a Helper: To Relay or Not to Relay

Hao Deng (Xi'an Jiaotong University, P.R. China); Hui-Ming Wang (Xi'an Jiaotong University, P.R. China); Wenjie Wang (Xi'an Jiaotong University, P.R. China); Qinye Yin (Xi'an Jiaotong University, P.R. China)

 

5:30 Closing Remarks