A New Modulation for Intrinsically Secure Radio Channel in Wireless Systems

被引:0
|
作者
Lorenzo Mucchi
Luca Simone Ronga
Leonardo Cipriani
机构
[1] University of Florence,Department of Electronics and Telecommunications
[2] Italy,undefined
[3] CNIT – University of Florence Unit,undefined
来源
Wireless Personal Communications | 2009年 / 51卷
关键词
Security; Modulation; Noise loop; Wireless communications;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common knowledge between source and destination. A shared secret is normally mandatory in order to decide the encryption (algorithm or code or key) of the information stream. It is usual to exchange this common a priori knowledge by using a “secure” channel. Nowadays a secure wireless channel is not possible. In fact normally the common a priori knowledge is already established (but this is not secure) or by using a non-radio channel (that implies a waste of time and resource). This contribution deals with the proposal of a new modulation technique ensuring secure communication in a full wireless environment. The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. The probability of error/detection is analytically derived for the legal users and for the third unwanted listener (passive or active attacker). Both the case of passive and active attacks have also been implemented and simulated by using Matlab-Simulink software. The analytical results have been compared to the simulated ones. All the results show that the performance of the proposed scheme yields the advantage of intrinsic security, i.e., the mutual information cannot be physically demodulated (passive attack) or denied (active attack) by a third terminal.
引用
收藏
页码:67 / 80
页数:13
相关论文
共 50 条
  • [11] Automatic Modulation Recognition Through Wireless Sensor Networks in Aeronautical Wireless Channel
    Liu, Kun
    Xiang, Xin
    Liang, Yuan
    Yin, Liyan
    IEEE SENSORS JOURNAL, 2021, 21 (20) : 23125 - 23132
  • [12] Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
    Lee, Cheng-Chi
    Lin, Tsung-Hung
    Tsai, Chwei-Shyong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1375 - 1378
  • [13] A Design of Secure and Reliable Wireless Transmission Channel for Implantable Medical Devices
    Bu, Lake
    Karpovsky, Mark
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 233 - 242
  • [14] Modulation and demodulation for cooperative diversity in wireless systems
    Chen, Deqiang
    Laneman, J. Nicholas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (07) : 1785 - 1794
  • [15] Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel
    Kim, Kihong
    Hong, Jinkeun
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 337 - +
  • [16] A Novel Hierarchical Architecture Design for Secure Wireless Fieldbus Systems
    Li, Bohua
    Pei, Yukui
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [17] Computational Secure Physical Layer Algorithm for MIMO Wireless Systems
    Mesleh, Raed
    Alouneh, Sahel
    Hiari, Omar
    IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 805 - 813
  • [18] Capacity of wireless systems with channel estimation errors
    Song, S. H.
    Zhang, Q. T.
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 966 - 970
  • [19] Node Isolation of Secure Wireless Sensor Networks under a Heterogeneous Channel Model
    Eletreby, Rashad
    Yagan, Osman
    2016 54TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2016, : 86 - 92
  • [20] Secure Micro Mobility Protocol For New Generation Wireless Network
    Smaoui, Salima
    Ben Ameur, Sirine
    El Bouabidi, Imen
    Zarai, Faouzi
    Obaidat, Mohammad S.
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 895 - 900