
Physical layer security in power line communication networks: an emerging scenario, other than wireless
Author(s) -
Pittolo Alberto,
Tonello Andrea M.
Publication year - 2014
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2013.0472
Subject(s) - physical layer , computer science , secrecy , channel (broadcasting) , wireless network , wireless , computer network , node (physics) , context (archaeology) , secure communication , power line communication , power (physics) , telecommunications , encryption , computer security , engineering , paleontology , physics , structural engineering , quantum mechanics , biology
The authors consider the secure transmission of information over power line communication (PLC) networks. The focus is on the secrecy guaranteed at the physical layer, named physical layer security (PLS). Although PLS has been deeply investigated for the wireless case, it is not the same for the PLC environment. Thus, starting from the knowledge in the wireless context, the authors extend the results to typical PLC scenarios. In particular, the PLC channel statistics is evaluated and a performance comparison among PLC and wireless channels is performed, in terms of secrecy rate distribution. For the PLC case, the secrecy rate distribution, under a total power constraint, is evaluated for both optimal and uniform power distributions in broadband channels. To provide experimental evidence, the authors consider channel measures obtained in an in‐home measurement campaign. The underlying network presents a tree topology, which introduces frequency and spatial correlation among channels, and suffers from the keyhole effect, generated by branches that depart from the same node. As shown by the numerical results, these effects can reduce the secrecy rate. Finally, the authors evaluate the secrecy rate region for the multi‐user broadcast channel considering both simulated channel realisations and experimental channel measures.