A collaborative physical layer security scheme

High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.

[1]  Fotini-Niovi Pavlidou,et al.  Enhancement of transmission security for OFDM based systems , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[2]  Chintha Tellambura,et al.  Semiblind Channel Estimation and Data Detection for OFDM Systems With Optimal Pilot Design , 2007, IEEE Transactions on Communications.

[3]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[4]  Xiaohong Jiang,et al.  Outage Secrecy Capacity Over Correlated Fading Channels at High SNR , 2012 .

[5]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  L. Van der Perre,et al.  Impact of front-end non-idealities on bit error rate performance of WLAN-OFDM transceivers , 2000, RAWCON 2000. 2000 IEEE Radio and Wireless Conference (Cat. No.00EX404).

[7]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[8]  Ananthram Swami,et al.  PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.

[9]  Chao Chen,et al.  Information Security of PHY Layer in Wireless Networks , 2016, J. Sensors.

[10]  Per Ola Börjesson,et al.  OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.

[11]  Dov Wulich,et al.  Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations , 2009, EURASIP J. Wirel. Commun. Netw..

[12]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[13]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[14]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[15]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[16]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[17]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[18]  S. Alireza Banani,et al.  OFDM With Iterative Blind Channel Estimation , 2010, IEEE Transactions on Vehicular Technology.

[19]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[20]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[21]  Lang Tong,et al.  Blind channel estimation using the second-order statistics: asymptotic performance and limitations , 1997, IEEE Trans. Signal Process..