References of "Kaddoum, Georges"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailAn overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
Kong, Long UL; Ai, Yun; Lei, Lei UL et al

in EURASIP Journal on Wireless Communications and Networking volume (2021), (1), 194

Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques ... [more ▼]

Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed. [less ▲]

Detailed reference viewed: 29 (2 UL)
Full Text
Peer Reviewed
See detailJoint Radio Resource Management and Link Adaptation for Multicasting 802.11ax-based WLAN Systems
Ha, Vu Nguyen UL; Kaddoum, Georges; Poitau, Gwenael

in IEEE Transactions on Wireless Communications (2021)

Adopting OFDMA and MU-MIMO techniques for both downlink and uplink IEEE 802.11ax will help next-generation WLANs efficiently cope with large numbers of devices but will also raise some research challenges ... [more ▼]

Adopting OFDMA and MU-MIMO techniques for both downlink and uplink IEEE 802.11ax will help next-generation WLANs efficiently cope with large numbers of devices but will also raise some research challenges. One of these is how to optimize the channelization, resource allocation, beamforming design, and MCS selection jointly for IEEE 802.11ax-based WLANs. In this paper, this technical requirement is formulated as a mixed-integer non-linear programming problem maximizing the total system throughput for the WLANs consisting of unicast users with multicast groups. A novel two-stage solution approach is proposed to solve this challenging problem. The first stage aims to determine the precoding vectors under unit-power constraints. These temporary precoders help re-form the main problem into a joint power and radio resource allocation one. Then, two low-complexity algorithms are proposed to cope with the new problem in stage two. The first is developed based on the well-known compressed sensing method while the second seeks to optimize each of the optimizing variables alternatively until reaching converged outcomes. The outcomes corresponding to the two stages are then integrated to achieve the complete solution. Numerical results are provided to confirm the superior performance of the proposed algorithms over benchmarks. [less ▲]

Detailed reference viewed: 68 (17 UL)
Full Text
Peer Reviewed
See detailAn Overview of Information-Theoretic Secrecy Analysis over Classical Wiretap Fading Channels
Kong; Ai, Yun; Lei, Lei et al

in EURASIP Journal on Wireless Communications and Networking (2021)

An alternative or supplementary approach named as physical layer security has been recently proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an ... [more ▼]

An alternative or supplementary approach named as physical layer security has been recently proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview of secrecy performance investigations over the classic Alice-Bob-Eve wiretap fading channels is conducted. On the basis of the classic wiretap channel model, we have comprehensively listed and thereafter compared the existing works on physical layer secrecy analysis considering the small-scale, large-scale, composite, and cascaded fading channel models. Exact secrecy metrics expressions, including secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZ), and average secrecy capacity (ASC), and secrecy bounds, including the lower bound of SOP and ergodic secrecy capacity, are presented. In order to encompass the aforementioned four kinds of fading channel models with a more generic and flexible distribution, the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H- function distributions are three useful candidates to largely include the above-mentioned four kinds of fading channel models. It is shown that all they are flexible and general when assisting the secrecy analysis to obtain closed-form expressions. Their advantages and limitations are also highlighted. Conclusively, these three approaches are proven to provide a unified secrecy analysis framework and can cover all types of independent wiretap fading channel models. Apart from those, revisiting the existing secrecy enhancement techniques based on our system configuration, the on-off transmission scheme, artificial noise (AN) & artificial fast fading (AFF), jamming approach, antenna selection, and security region are presented. [less ▲]

Detailed reference viewed: 36 (3 UL)
Peer Reviewed
See detailAn Overview of Generic Tools for Information-Theoretic Secrecy Performance Analysis over Wiretap Fading Channels
Kong, Long UL; Ai, Yun; Lei, Lei UL et al

E-print/Working paper (2020)

An alternative or supplementary approach named as physical layer security has been proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview ... [more ▼]

An alternative or supplementary approach named as physical layer security has been proposed to afford an extra security layer on top of the conventional cryptography technique. In this paper, an overview of secrecy performance investigations over the classic Alice-Bob-Eve wiretap fading channels is conducted. On the basis of the classic wiretap channel model, we have comprehensively listed and thereafter compared the existing works on physical layer secrecy analysis considering the small-scale, large-scale, composite, and cascaded fading channel models. Exact secrecy metrics expressions, including secrecy outage probability (SOP), the probability of non-zero secrecy capacity (PNZ), average secrecy capacity (ASC), and secrecy bounds, including the lower bound of SOP and ergodic secrecy capacity, are presented. In order to encompass the aforementioned four kinds of fading channel models with a more \textit{generic} and \textit{flexible} distribution, the mixture gamma (MG), mixture of Gaussian (MoG), and Fox's $H$-function distributions are three useful candidates to largely include the above-mentioned four kinds of fading channel models. It is shown that they are flexible and general when assisting the secrecy analysis to obtain closed-form expressions. Their advantages and limitations are also highlighted. Conclusively, these three approaches are proven to provide a unified secrecy analysis framework and can cover all types of independent wiretap fading channel models. Apart from those, revisiting the existing secrecy enhancement techniques based on our system configuration, the on-off transmission scheme, jamming approach (including artificial noise (AN) & artificial fast fading (AFF)), antenna selection, and security region are presented. [less ▲]

Detailed reference viewed: 40 (6 UL)