2020
DOI: 10.1109/jsyst.2020.2969044
|View full text |Cite
|
Sign up to set email alerts
|

PLC Systems Under the Presence of a Malicious Wireless Communication Device: Physical Layer Security Analyses

Abstract: This paper investigates the physical layer security (PLS) of a broadband in-home power line communication (PLC) system when a malicious wireless device tries to eavesdrop private messages exchanged between two PLC devices. Such a security issue arises when electric power circuits, which are used for data communication, are constituted by unshielded power cables. In this regard, the hybrid wiretap channel model for formulating achievable secrecy rate and secrecy outage probability is considered. Additionally, a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 36 publications
0
17
0
Order By: Relevance
“…In fact, it is well-established that data networks must present protections against threats to system-level security (e.g., credential compromise, denial of service attacks), threats to services (e.g., SMs cloning, location fraud), and threats to privacy (e.g., interception/eavesdroppers, misuse of private data). In this context, cryptography algorithms have emerged as one of the most powerful methods to protect SM data against eavesdroppers [9], [10] when they are transmitted through data networks.…”
Section: Sbrt 2021 1570727323mentioning
confidence: 99%
“…In fact, it is well-established that data networks must present protections against threats to system-level security (e.g., credential compromise, denial of service attacks), threats to services (e.g., SMs cloning, location fraud), and threats to privacy (e.g., interception/eavesdroppers, misuse of private data). In this context, cryptography algorithms have emerged as one of the most powerful methods to protect SM data against eavesdroppers [9], [10] when they are transmitted through data networks.…”
Section: Sbrt 2021 1570727323mentioning
confidence: 99%
“…Moreover, the broadcasting nature of electric power systems compromises the security of private information exchanged between PLC devices since their private signals can be eavesdropped by a malicious PLC device. Also, the use of electromagnetically unshielded power lines, which are employed in most of electric power circuits, means that a part of PLC signals leaks into the air [8], [9]. As a result, the electromagnetic field produced by PLC signals traveling over unshielded power lines can be sensed by a nearby wireless communication (WLC) device, and, as a consequence, a eavesdropper device can decode the information-carry signals that are transmitted through power lines by PLC systems.…”
Section: Introductionmentioning
confidence: 99%
“…Regarding a more realistic scenario, in which the transmitter does not know the eavesdropper's CSI, a few studies have investigated the PLS in PLC systems [9], [35]- [38]. While Salem et al [35] proposed an artificial noise scheme to improve the ergodic achievable secrecy rate in cooperative relaying PLC systems when theoretical and flat PLC channels are considered, the ergodic achievable secrecy rate and SOP for PLC and hybrid PLC/WLC single relay channels were evaluated in [36].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Only few results on the usefulness of HP-W systems have been reported in the literature, as it can still be considered an incipient technology for assisting emerging applications, such as IoT, smart grid and smart city. Regarding in-home facilities, [2] addressed statistic analysis of parameters applied to analyze the suitability of HP-W media for data communication purposes; [3] discussed a statistical model of the channel frequency response (CFR) magnitude in in-home facilities; [4] dealt with the physical layer security of PLC system threatened by a malicious wireless device, and [5] focused on energy harvesting aspects related to these channels.…”
Section: Introductionmentioning
confidence: 99%