Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017)
- 57 Downloads
Wi-Fi has become a predominant means of communication. However, the problem of unauthorized access to Wi-Fi network has become increasingly severe. Physical-layer security is emerging as a promising approach for supporting new and existing security services. Using properties of physical-layer communication channels in security mechanisms can potentially enhance conventional security services and assist in mitigating threats that challenge the capabilities of conventional cryptographic mechanisms, such as spoofing attack, relay attacks, ad-hoc key establishment and key-less secure communication. However, significant challenges, including security evaluation and guarantees, remain to be solved to realize practical physical-layer security mechanisms.
The aim of this Special Issue is to publish the state-of-the-art research results demonstrating both theoretical and practical approaches to physical-layer security. Through a peer-review process, we have accepted 13 papers from a total of 25 papers submitted to this special issue, which means an acceptance rate of 52%.
The first paper entitled “Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter” y employs a helpful jammer to secure information transmission of a secondary transmitter. Then, its efficacy through secrecy outage probability under practical considerations consisting of exponentially distributed interference from primary transmitter, peak transmission power limitation, interference power limitation, and Rayleigh fading channels are analytically assessed. Finally, results are provided to illustrate significant security performance improvement thanks to exploiting the jammer while considerable security performance degradation due to interference from primary transmitter.
The second paper entitled “An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks” proposes an IUI suppression scheme that based on the auxiliary antenna at the downlink user. The single-cell simulation results show that the average achievable rate of the proposed IUI suppression scheme significantly outperforms the existing schemes especially when the cell radius is small and can nearly approach the performance of the ideal FD case with IUI perfectly suppressed.
In the third paper entitled “Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions” investigates radio frequency energy harvesting in wireless sensor networks using non-orthogonal multiple access uplink transmission regarding a probable secrecy outage during the transmission between sensor nodes and base station in the presence of eavesdroppers.
The fourth paper focused “Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers”, where the author proposes three source privacy protection schemes, which are based on clustering methodology, to protect contextual privacy.
In the fifth paper entitled “Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic”, the authors propose a novel anomaly detection system for underwater acoustic sensor network localization. The results indicate that anomaly detection systems offer an acceptable accuracy with high true positive rate and F-Score.
In the sixth paper entitled “Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference”, the authors propose a novel adaptive packet delivery (APD) algorithm that enables ZigBee links to achieve enhanced performance under the presence of heavy Wi-Fi traffic.
In the seventh paper entitled “A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration”, the authors design and implement a semi-fragile watermark based on cat transformation, mostly used to locate tamper and recover for the transformed image and plain-image.
The rapid development of the Unmanned Aerial Vehicle (UAV) brings much convenience to our life. However, security and privacy problems caused by UAVs are gradually exposed. The eighth paper entitled “Security and Privacy Issues of UAV: A Survey” analyzes UAV safety from three aspects, including sensors, communications and multi-UAVs.
Software-Defined Networking (SDN) has been proposed as a promising way for its centralized network control and management. The ninth paper entitled “Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks” designs a monitoring loop of link latency by using both LLDP and Echo probing modules. The tenth paper entitled “WECAN: An Efficient West-East Control Associated Network for Large-Scale SDN Systems” proposes an efficient West-East Control Associated Network for enabling communication between different SDN entities.
It is a hot topic to protect the data of the wireless network stored in the cloud. In the eleventh paper entitle “Confusing-Keyword Based Secure Search over Encrypted Cloud Data”, the authors present a privacy protection scheme based on confusing keyword.
The twelfth paper entitled “Applying Improved Convolutional Neural Network in Image Classification” presents an integrated optimization method of simulated annealing (SA) and Gaussian convolution based on Convolutional Neural Network.
The last paper entitled “Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System”, where the authors systematically analyzed the effects of the filter parameters on communication performance in FMT modulation. Based on the simulated and real-world results, they recommend performance specifications for the roll-off factor and filter order for FMT modulation in the VDES.
The guest editors are thankful to our reviewers for their effort in reviewing the manuscripts. We also thank the Edit-in-Chief, Dr. Imrich Chlamtac for his supportive guidance during the entire process.