Alternative Codes and Phase Rotation Extensions for Alternating Space-Time Coding-Based Physical Layer Security

被引:3
作者
Cribbs, Michael R. [1 ]
Romero, Ric A. [1 ]
Ha, Tri T. [1 ]
机构
[1] Naval Postgrad Sch, Dept Elect & Comp Engn, Monterey, CA 93943 USA
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2021年 / 2卷
关键词
Buildings; Security; Three-dimensional displays; Bit error rate; Signal processing algorithms; Physical layer security; Decoding; Key equivocation; key residue class; message equivocation; phase rotation; physical layer security; space-time coding; COMMUNICATION; ALGORITHM;
D O I
10.1109/OJCOMS.2021.3075910
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this article, several extensions to an alternating space-time (ST) code (STC) physical layer security (PLS) scheme from the literature are proposed. These contributions include alternative orthogonal STCs as well as non-orthogonal and spatially-multiplexed (SM) STCs for improved bandwidth efficiency. Phase rotation (PR) algorithms are provided to build very large sets of unique alternative STCs for use with this scheme. Decoding methods are discussed for alternating non-orthogonal and SM STCs. Monte Carlo simulations are provided to compare bit error rate (BER) performance between different decoding methods. Secrecy system nomenclature is adapted to the alternative STCs and proposed algorithms. Information-theoretic security analysis including message and key equivocation is provided along with expected eavesdropper BER based on an assumed attack methodology. A comparison of security offered by the alternating STC PLS scheme with and without incorporation of proposed PR algorithms is performed. Substantially greater exhaustive key search attack complexity is achieved by using the PR algorithms proposed in this article.
引用
收藏
页码:1123 / 1143
页数:21
相关论文
共 38 条
[1]   Closest point search in lattices [J].
Agrell, E ;
Eriksson, T ;
Vardy, A ;
Zeger, K .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (08) :2201-2214
[2]   A simple transmit diversity technique for wireless communications [J].
Alamouti, SM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (08) :1451-1458
[3]   Secure Space-Time Block Coding without Transmitter CSI [J].
Allen, T. ;
Cheng, J. ;
Al-Dhahir, N. .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (06) :573-576
[4]  
[Anonymous], 2012, P MILCOM 2012 2012 I
[5]  
[Anonymous], 2018, 802162017 IEEE
[6]  
[Anonymous], MATLAB DOC
[7]  
Barbero LG, 2006, 2006 IEEE 7TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, P169
[8]  
Bäro S, 2000, GLOB TELECOMM CONF, P1067, DOI 10.1109/GLOCOM.2000.891301
[9]   Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper [J].
Chen, Bin ;
Zhu, Chunsheng ;
Li, Wei ;
Wei, Jibo ;
Leung, Victor C. M. ;
Yang, Laurence T. .
IEEE ACCESS, 2016, 4 :3016-3025
[10]  
Cribbs M., 2020, P IEEE 21 INT WORKSH, P1