A4 Refereed article in a conference publication
Wireless physical layer security using channel state information
Authors: Tahir M, Jarot S, Siddiqi M
Conference name: In this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a higher order signal constellation with the help of conventional encryption method and then using channel knowledge (i.e. amplitude and phase variation), which is location specific, to distort the constellation of encrypted data. This scheme not only makes
Publishing place: In this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a
Publication year: 2010
Journal name in source: International Conference on Computer and Communication Engineering, ICCCE{'}10
DOI: https://doi.org/10.1109/ICCCE.2010.5556862
Web address : http://www.scopus.com/inward/record.url?eid=2-s2.0-77957822106&partnerID=MN8TOARS
In this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a higher order signal constellation with the help of conventional encryption method and then using channel knowledge (i.e. amplitude and phase variation), which is location specific, to distort the constellation of encrypted data. This scheme not only makes the estimation of the constellation difficult but also the type of modulation that is used for the adversary. BER (bit error rate) is used as performance metric. We find that the adversary suffers from high BER as compared to its legitimate counterpart.