Computational Secure Physical Layer Algorithm for MIMO Wireless Systems

被引:0
|
作者
Mesleh, Raed [1 ,2 ]
Alouneh, Sahel [1 ,3 ]
Hiari, Omar [1 ]
机构
[1] German Jordanian Univ, Sch Elect Engn & Informat Technol, Amman 11180, Jordan
[2] Princess Sumaya Univ Technol, Dept Commun Engn, Amman 11941, Jordan
[3] Al Ain Univ, Abu Dhabi 64141, U Arab Emirates
来源
IEEE SYSTEMS JOURNAL | 2024年 / 18卷 / 02期
关键词
MIMO communication; Vectors; Transmitting antennas; Wireless communication; Security; Receiving antennas; Supercomputers; MIMO; performance analysis; physical layer security; quadrature space shift keying (QSKK); quadrature spatial modulation (QSM); spatial multiplexing (SMX); space shift keying (SSK); TRANSMIT ANTENNA SELECTION; SPATIAL MODULATION; SECRECY RATE; INFORMATION; 5G; NETWORKS; DESIGN;
D O I
10.1109/JSYST.2024.3370613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A computationally secure physical layer wireless communication multiple-input-multiple-output (MIMO) system is proposed and analyzed in this article. The proposed algorithm is shown to be general for arbitrary MIMO systems, and very robust against brute-force attacks and cryptanalysis techniques. The algorithm relies on the knowledge of the wireless channel statistics between the transmitter and the legitimate receiver through channel reciprocity, which is random and varies every coherence time. Both the transmitter and the legitimate receiver create a permutation vector from the sorted powers of the channel fading paths from each transmit antenna to all receive antennas. The generated permutation vector is used to shuffle the rows of the constellation matrix creating the security key. It is reported that the number of possible combinations is huge, especially for large MIMO configurations, which makes key decryption nearly impossible even with advanced supercomputers. For illustration purposes, several MIMO techniques are considered in this study, including space shift keying (SSK), quadrature SSK, quadrature spatial modulation, and spatial multiplexing.
引用
收藏
页码:805 / 813
页数:9
相关论文
共 50 条
  • [21] Physical Layer Authentication Scheme in Beamspace MIMO Systems
    Afeef, Liza
    Furqan, Haji M.
    Arslan, Huseyin
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (07) : 1484 - 1488
  • [22] Physical layer security schemes for MIMO systems: an overview
    Melki, Reem
    Noura, Hassan N.
    Mansour, Mohammad M.
    Chehab, Ali
    WIRELESS NETWORKS, 2020, 26 (03) : 2089 - 2111
  • [23] Adaptive Physical-Layer Authentication for IoT in MIMO Communication Systems Using Support Vector Machine
    Abdrabou, Mohammed
    Gulliver, T. Aaron
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (22) : 19861 - 19873
  • [24] Secure upgraded spatial modulation for wireless transmission systems
    Rengaraj, Ramaprabha
    Loganathan, Lavanya Dhamodharan
    Konganathan, Gunaseelan
    COMPUTER NETWORKS, 2023, 226
  • [25] UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions
    Wang, Hui-Ming
    Zhang, Xu
    Jiang, Jia-Cheng
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 32 - 39
  • [26] Relay Beamforming Design for Physical Layer Secure Communication via Line Search Algorithm
    Chen, Siqi
    Sun, Cong
    CHINA COMMUNICATIONS, 2021, 18 (12) : 270 - 284
  • [27] Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems
    Zhang, Pinchang
    Shen, Yulong
    Jiang, Xiaohong
    Wu, Bin
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (04) : 2446 - 2458
  • [28] Deep Transfer Learning for Physical Layer Security in Wireless Communication Systems
    Rawat, Danda B.
    2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 289 - 296
  • [29] The Physical Layer Design for MIMO Wireless Communications System
    Liang, Tao
    Li, Wen-long
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 1235 - +
  • [30] An efficient and secure cipher scheme for MIMO-OFDM systems based on physical layer security
    Melki, Reem
    Noura, Hassan N.
    Chehab, Ali
    TELECOMMUNICATION SYSTEMS, 2022, 79 (01) : 17 - 32