Irregular Quadrature Amplitude Modulation for Adaptive Physical-Layer Security

被引:0
作者
Searle, Hunter [1 ]
Gomes, Marco A. C. [2 ]
Vilela, Joao P. [3 ,4 ]
Harrison, Willie K. [1 ]
机构
[1] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
[2] Univ Coimbra, Dept Elect & Comp Engn, Inst Telecomunicacoes, Coimbra, Portugal
[3] Univ Coimbra, CISUC, Coimbra, Portugal
[4] Univ Coimbra, Dept Informat Engn, Coimbra, Portugal
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
基金
美国国家科学基金会;
关键词
quadrature amplitude modulation; physical-layer security; security gap; coset coding; COMMUNICATION; SECRECY;
D O I
10.1109/globecom38437.2019.9013808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose adding an irregular quadrature amplitude modulation (QAM) constellation to a wireless transmission scheme in order to obtain greater control over the signal-to-noise ratio (SNR) required to successfully decode the signal. By altering the separation between adjacent symbols, the minimum required SNR is raised without degradation in the performance of the scheme. This allows the system to adapt to preferable channel conditions for the authorized user, making it harder for eavesdroppers to intercept and decode the transmission, thus making the communication safer. In addition, we show that by overlaying a coset code onto the QAM constellation, a new, stronger security gap metric can be further improved. Results show the effectiveness of this strategy with an interleaved coding for secrecy with a hidden key (ICSHK) scheme.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
[Anonymous], 2018, P IEEE WIR COMM NETW
[2]  
[Anonymous], 2018, EURASIP Journal on Wireless Communications and Networking
[3]  
Asghar MH, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P427, DOI 10.1109/CCAA.2015.7148413
[4]   Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis [J].
Baldi, Marco ;
Bianchi, Marco ;
Chiaraluce, Franco .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :883-894
[5]  
Bloch M., 2011, Physical-Layer Security: From Information Theory to Security Engineering
[6]  
Durisi G., 2015, CORR
[7]   Toward Massive, Ultrareliable, and Low-Latency Wireless Communication With Short Packets [J].
Durisi, Giuseppe ;
Koch, Tobias ;
Popovski, Petar .
PROCEEDINGS OF THE IEEE, 2016, 104 (09) :1711-1726
[8]   Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks [J].
Hu, Lin ;
Wen, Hong ;
Wu, Bin ;
Tang, Jie ;
Pan, Fei .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (03) :524-527
[9]  
Lu Tan, 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010), P376, DOI 10.1109/ICACTE.2010.5579543
[10]  
Moon TK, 2005, ERROR CORRECTION CODING: MATHEMATICAL METHODS AND ALGORITHMS