A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation

Improving confidentiality is a main concern in most wireless transmission systems. Traditionally, confidentiality is guaranteed by means of encryption, where transmitted data are encrypted prior to transmission and only the intended receiver(s) can decrypt them. However, encryption/decryption process involves high complexity and heavy signaling in the key distribution/agreement protocols. Thus, aiming toward overcoming complexity, physical-layer security has been proposed as a promising candidate to improve confidentiality against eavesdroppers by exploiting physical-layer techniques. In this paper, we propose a physical-layer security scheme that adapts the modulation type based on the channel phase in order to secure the transmitted data. Moreover, the phase of the transmitted signal is adjusted in order to improve the immunity against eavesdroppers. The proposed scheme has been designed to achieve high robustness against channel estimation errors. The performance of the proposed scheme is evaluated through analysis and simulations in order to demonstrate the significant improvement in the confidentiality.

[1]  Dieter Hogrefe,et al.  An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless Channels , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[2]  Sri Parameswaran,et al.  Reconfigurable Convolutional Codec for Physical Layer Communication Security Application , 2014, 2014 IEEE Military Communications Conference.

[3]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[5]  Liang Tang,et al.  Dynamic reconfigurable puncturing for secure wireless communication , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[6]  Jin Zhang,et al.  MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation , 2015, IEEE Transactions on Information Forensics and Security.

[7]  G.S. Smith,et al.  A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.

[8]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[9]  Ranjan K. Mallik,et al.  Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  Alexandros G. Fragkiadakis,et al.  Lightweight and secure encryption using channel measurements , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[13]  Srdjan Capkun,et al.  Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.

[14]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[15]  Mohammad Iftekhar Husain,et al.  CD-PHY: Physical layer security in wireless networks through constellation diversity , 2011, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[18]  Yuanyuan Gao,et al.  One transmission scheme based on variable MSK modulator for wireless physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[19]  G. Wornell,et al.  Secure Transmission with Multiple Antennas: The MIMOME Channel , 2008 .

[20]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[21]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[22]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[23]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[24]  Milica Stojanovic,et al.  Analysis of the impact of channel estimation errors on the performance of a decision-feedback equalizer in fading multipath channels , 1995, IEEE Trans. Commun..