Wireless physical layer security using encryption and channel pre-compensation

In this paper we propose a scheme that provides physical layer security by combining two techniques known as encryption and channel pre-compensation. Encryption transforms the original signal constellation into a higher order constellation based on the key sequence generated by AES in counter-mode. Channel pre-compensation is performed based on the knowledge of channel, which is location specific, at the transmitter. These two techniques distort the original signal constellation which can only be recovered by the intended receiver. The proposed scheme not only makes the estimation of the constellation difficult but also the type of modulation that is used for the adversary. BER (bit error rate) is used as performance metric. We find that the adversary suffers from high BER as compared to the legitimate user; hence providing secure communication.

[1]  D. Reilly,et al.  Noise-enhanced encryption for physical layer security in an OFDM radio , 2009, 2009 IEEE Radio and Wireless Symposium.

[2]  H. Sasaoka,et al.  A Private Key Sharing Scheme Based on Multipath Time Delay in UWB Systems , 2006, 2006 International Conference on Communication Technology.

[3]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[6]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[7]  H. Sasaoka,et al.  A Scheme of Private key Agreement Based on Delay Profiles in UWB Systems , 2006, 2006 IEEE Sarnoff Symposium.

[8]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[9]  Steven W. McLaughlin,et al.  Physical-Layer Security: Combining Error Control Coding and Cryptography , 2009, 2009 IEEE International Conference on Communications.

[10]  T. Ohira ESPARSKI: Encryption Scheme Parasite Array Radiator Secret Key Implementation , 2006, 2006 International Conference on Microwaves, Radar & Wireless Communications.

[11]  Sandeep Chennakeshu,et al.  Secure information transmission for mobile radio , 2000, IEEE Communications Letters.

[12]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Hideichi Sasaoka,et al.  A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio , 2005 .

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..