Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving

In this paper, we present a novel eavesdropping-resilient OFDM system through sorted subcarrier interleaving. The transmitter interleaves subcarriers in each OFDM signal according to its dynamic channel state information (CSI) to the legitimate receiver. More specifically, subcarriers are interleaved according to the sorted order of their instantaneous channel gains that are observed at the transmitter. Based on channel reciprocity, the legitimate receiver can derive the interleaving pattern initiated by the transmitter through its local channel estimate, and then de-interleave the received signals. In contrast, since spatially separated wireless channels in rich multipath environments are independent of each other, an eavesdropper at a third location cannot follow the dynamic subcarrier interleaving permutation, and thus fails to eavesdrop this transmission. Considering the imperfect reciprocity of noisy channel estimates at the legitimate terminals, only a subset of subcarriers in each OFDM signal is involved in the interleaving. A subcarrier selection algorithm is investigated to realize a trade-off between the eavesdropping resilience and transmission reliability. Theoretical analysis and Monte Carlo simulations have been provided to validate the proposed system. Compared with prior security enhancement schemes, the proposed approach requires only minor modifications to off-the-shelf systems and avoids additional resource consumption.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Mohamed-Slim Alouini,et al.  On the difference of two chi-square variates with application to outage probability computation , 2001, IEEE Trans. Commun..

[3]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[4]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[5]  Elena Costa,et al.  Low-Complexity Interleaved Subcarrier Allocation in Multicarrier Multiple-Access Systems , 2007, IEEE Transactions on Communications.

[6]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[7]  Akbar Rahman,et al.  Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[8]  Herbert A. David,et al.  Order Statistics , 2011, International Encyclopedia of Statistical Science.

[9]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[10]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[11]  Xiang Li,et al.  Generalized anti-eavesdropping space-time network coding for cooperative communications , 2013, WCNC.

[12]  H. Vincent Poor,et al.  Faster than Nyquist interference assisted secret communication for OFDM systems , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[13]  V. K. Jones,et al.  Channel estimation for wireless OFDM systems , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[14]  Xianbin Wang,et al.  Dynamic Subcarrier Coordinate Interleaving for Eavesdropping Prevention in OFDM Systems , 2014, IEEE Communications Letters.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[17]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[18]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[19]  Vincent K. N. Lau,et al.  Performance analysis of adaptive interleaving for OFDM systems , 2002, IEEE Trans. Veh. Technol..

[20]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[21]  Wei-Jian Lin,et al.  An integrating channel coding and cryptography design for OFDM based WLANs , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[22]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[23]  Yiyan Wu,et al.  COFDM: an overview , 1995, IEEE Trans. Broadcast..

[24]  Linglong Dai,et al.  Secure communication in TDS-OFDM system using constellation rotation and noise insertion , 2010, IEEE Transactions on Consumer Electronics.

[25]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[26]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.