A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation

被引:54
作者
Althunibat, Saud [1 ]
Sucasas, Victor [2 ]
Rodriguez, Jonathan [2 ]
机构
[1] Al Hussein Bin Talal Univ, Maan 11821, Jordan
[2] Inst Telecomunicacoes, P-1049001 Aveiro, Portugal
基金
欧盟地平线“2020”;
关键词
Adaptive modulation; data confidentiality; physical-layer security; security; wireless communications; WIRELESS NETWORKS; COMMUNICATION; CHANNELS;
D O I
10.1109/TVT.2017.2737885
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Improving confidentiality is a main concern in most wireless transmission systems. Traditionally, confidentiality is guaranteed by means of encryption, where transmitted data are encrypted prior to transmission and only the intended receiver(s) can decrypt them. However, encryption/decryption process involves high complexity and heavy signaling in the key distribution/agreement protocols. Thus, aiming toward overcoming complexity, physical-layer security has been proposed as a promising candidate to improve confidentiality against eavesdroppers by exploiting physical-layer techniques. In this paper, we propose a physical-layer security scheme that adapts the modulation type based on the channel phase in order to secure the transmitted data. Moreover, the phase of the transmitted signal is adjusted in order to improve the immunity against eavesdroppers. The proposed scheme has been designed to achieve high robustness against channel estimation errors. The performance of the proposed scheme is evaluated through analysis and simulations in order to demonstrate the significant improvement in the confidentiality.
引用
收藏
页码:9931 / 9942
页数:12
相关论文
共 24 条
[1]   Physical Layer Network Security in the Full-Duplex Relay System [J].
Chen, Gaojie ;
Gong, Yu ;
Xiao, Pei ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :574-583
[2]   Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach [J].
Deng, Yansha ;
Wang, Lifeng ;
Elkashlan, Maged ;
Nallanathan, Arumugam ;
Mallik, Ranjan K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1128-1138
[3]  
El Hajj Shehadeh Y, 2011, P IFIP NTMS, P1, DOI [10.1109/NTMS.2011.5720584, DOI 10.1109/NTMS.2011.5720584]
[4]  
Fragkiadakis A., 2014, P 4 INT C WIR COMM V, P1
[5]  
Husain M.I., 2012, P MILCOM 2012 2012 I, P1
[6]   Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel [J].
Khisti, Ashish ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) :5515-5532
[7]   Multiple-access channels with confidential messages [J].
Liang, Yingbin ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (03) :976-1002
[8]   Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness [J].
Liu, Yanpei ;
Draper, Stark C. ;
Sayeed, Akbar M. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) :1484-1497
[9]   Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey [J].
Mukherjee, Amitav ;
Fakoorian, S. Ali A. ;
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1550-1573
[10]  
Paar C., 2009, Understanding Cryptography: A Textbook for Students and Practitioners