Implementing Physical Layer Security Using Transmitters with Constellation Shaping

In wireless communication systems privacy among users contents is a crucial security requirement such as power and spectral efficiency. Spectral and power efficiencies are attainable with power efficient transmission schemes where constellations are decomposed into several BPSK (Bi Phase Shift Keying), being each one amplified and transmitted independently by an antenna. Besides that, due to constellation shaping on the desired transmission direction performed by these transmitters, some kind of physical layer security is assured as well. Under this approach, security is achieved by constellation shaping of the transmitted constellation since each user must know the transmitter configuration parameters associated to the constellation shaping, i.e., the direction in which the constellation is optimized, otherwise the received data would be meaningless. Commonly, security is assured by encrypted algorithms implemented by higher layers, such as private and public encrypted keys. However, system security can be improved with physical layer security schemes since they can be complemented with other security schemes from higher layers. Simulation results show the effectiveness of the proposed approach.

[1]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[2]  Mário Marques da Silva,et al.  MIMO Processing for 4G and Beyond: Fundamentals and Evolution , 2014 .

[3]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.

[4]  Paulo Montezuma,et al.  Design of TC-OQAM schemes using a generalised nonlinear OQPSK-type format , 1999 .

[5]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[6]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[7]  Bruce Schneier,et al.  Cryptographic Design Vulnerabilities , 1998, Computer.

[8]  F. Amoroso,et al.  Simplified MSK Signaling Technique , 1977, IEEE Trans. Commun..

[9]  Paulo Montezuma,et al.  Iterative Frequency-Domain Equalization for general constellations , 2010, 2010 IEEE Sarnoff Symposium.

[10]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[11]  Marko Beko,et al.  Robust Frequency-Domain Receivers for a Transmission Technique with Directivity at the Constellation Level , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[12]  Alessandro Barenghi,et al.  Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.

[13]  Marko Beko,et al.  On the Use of Multiple Grossly Nonlinear Amplifiers for Highly Efficient Linear Amplification of Multilevel Constellations , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).