• Corpus ID: 237571720

Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications

  title={Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications},
  author={Zhongxiang Wei and Christos Masouros and H. Vincent Poor and Athina P. Petropulu and Lajos Hanzo Hanzo},
Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge/cloud computing, remote-Health, vehicle-to-infrastructure communications, etc. As these applications are expected to carry confidential personal data, ensuring user privacy becomes a critical issue. In contrast to traditional security and privacy designs that aim to prevent confidential information from being eavesdropped upon by adversaries… 

Figures from this paper

Interference Utilization Precoding in Multi-Cluster IoT Networks
In Internet-of-Things, downlink multi-device interference has long been considered as a harmful element deteriorating system performance, and thus the principle of the classic interference-mitigation


Physical Layer Anonymous Communications
This paper proposes a novel sender detection strategy at the receiver, and develops a corresponding anonymous precoding design to address sender’s anonymity while guaranteeing high receive signal-to-interference-plus-noise ratio (SINR) for communications.
Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding
This paper introduces the concept of PHY anonymity, and reveals that the receiver can unmask the sender’s identity by only analyzing the PHY information, i.e., the signaling patterns and the characteristics of the channel.
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
A pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service and outperform the existing schemes in terms of better trade-off between desirable security properties and computational overhead, nicely meeting the needs of WBANs.
Improving Wireless Physical Layer Security via Cooperating Relays
Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation
This work proposes a secure and anonymous communication protocol by employing identity-based encryption for encrypting packets without sacrificing anonymity, and group signature for anonymous user authentication and concludes that the protocol realizes secure andAnonymous communications between users and SPs with practical performance.
An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks
An efficient anonymous communication protocol, called MANET Anonymous Peer-to-peer Communication Protocol (MAPCP), for P2P applications over mobile ad-hoc networks (MANETs), that maintains a higher degree of anonymity than a MANET anonymous single-path routing protocol in a hostile environment.
On Anonymous Routing in Delay Tolerant Networks
A framework of anonymous routing (FAR) for DTNs, which subsumes all the original anonymous routing protocols for ad hoc networks and is able to outperform onion-based, anonymous Epidemic, and zone-based routing.
Lightweight Anonymous Authentication Protocols for RFID Systems
This paper develops a lightweight technique that generates dynamic tokens for anonymous authentication that reduces the communication overhead and online computation overhead to $O(1)$ per authentication for both tags and readers, which compares favorably with the prior art.
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
This tutorial argues for the simultaneous pivotal role of fundamental limits and coding techniques for secure communication system design.
RFAL: Adversarial Learning for RF Transmitter Identification and Classification
This paper designs and implements a generative model that learns the sample space of the I/Q values of known transmitters and uses the learned representation to generate signals that imitate the transmissions of these transmitters.