A4 Refereed article in a conference publication

Wireless physical layer security using channel state information




AuthorsTahir M, Jarot S, Siddiqi M

Conference nameIn this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a higher order signal constellation with the help of conventional encryption method and then using channel knowledge (i.e. amplitude and phase variation), which is location specific, to distort the constellation of encrypted data. This scheme not only makes

Publishing placeIn this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a

Publication year2010

Journal name in sourceInternational Conference on Computer and Communication Engineering, ICCCE{'}10

DOIhttps://doi.org/10.1109/ICCCE.2010.5556862

Web address http://www.scopus.com/inward/record.url?eid=2-s2.0-77957822106&partnerID=MN8TOARS


Abstract

In this paper we consider the problem of secure communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper. We propose a scheme that provides security based on transforming the basic signal constellation to a higher order signal constellation with the help of conventional encryption method and then using channel knowledge (i.e. amplitude and phase variation), which is location specific, to distort the constellation of encrypted data. This scheme not only makes the estimation of the constellation difficult but also the type of modulation that is used for the adversary. BER (bit error rate) is used as performance metric. We find that the adversary suffers from high BER as compared to its legitimate counterpart.



Last updated on 2024-26-11 at 13:14