Weitere Artikel dieser Ausgabe durch Wischen aufrufen
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.
U.S. National Bureau of Standards (NBS) : Data Encryption Standard. Federal Information Processing Standards Publication 46 (FIPS-46), 1977
Simon MK, Omura JK, Scholtz RA, Levitt BK: Spread Spectrum Communications Handbook. McGraw-Hill, New York, NY, USA; 2002.
Potlapally NR, Ravi S, Raghunathan A, Jha NK: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 2006, 5(2):128-143. CrossRef
Yang H, Luo H, Ye F, Lu S, Zhang L: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 2004, 11(1):38-47. 10.1109/MWC.2004.1269716 CrossRef
Eltoweissy M, Moharrum M, Mukkamala R: Dynamic key management in sensor networks. IEEE Communications Magazine 2006, 44(4):122-130. CrossRef
Guimarães G, Souto E, Sadok D, Kelner J: Evaluation of security mechanisms in wireless sensor networks. Proceedings of the IEEE Systems Communications (ISWCS '05), August 2005 428-433.
Ozarow LH, Wyner AD: Wire-tap channel II. Bell System Technical Journal 1984, 63: 2135-2157. MATH
Liang Y, Poor HV: Secure communication over fading channels. Proceedings of the 44th Annual Allerton Conference on Communication Control, and Computing, September 2006, Monticello, Ill, USA
Liang Y, Poor HV, Shamai S: Secrecy capacity region of fading broadcast channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France 1291-1295.
Liang Y, Poor HV, Shamai S: Secrecy capacity region of parallel broadcast channels. Proceedings of the IEEE Information Theory and Applications Workshop (ITA '07), February 2007, San Diego, Calif, USA 245-250.
Debbah M, Kobayashi M: On the secrecy capacity of frequency-selective fading channels: a practical vandermonde approach. Proceedings of IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '08), September 2008, Cannes, France 1-5.
Azimi-Sadjadi B, Kiayias A, Mercado A, Yener B: Robust key generation from signal envelopes in wireless networks. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), October 2007, Alexandria, Va, USA
Aono T, Higuchi K, Ohira T, Komiyama B, Sasaoka H: Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 2005, 53(11):3776-3784. CrossRef
Koorapaty H, Hassan AA, Chennakeshu S: Secure information transmission for mobile radio. IEEE Communications Letters 2000, 4(2):52-55. 10.1109/4234.824754 CrossRef
Tsouri GR, Wulich D: Reverse piloting protocol for securing time varying wireless channels. Proceedings of the 7th Annual Wireless Telecommunications Symposium (WTS '08), April 2008, Pomona, Calif, USA 125-131.
Tsouri GR, Wulich D: Joint Constellation Multiple Access—PCT patent pending. SigNexT Comm., (WO/2007/039908), http://www.wipo.int/pctdb/en/wo.jsp?IA=WO2007039908
Goldsmith A: Wireless Communications. Cambridge University Press, Cambridge, UK; 2006.
Verdu S: Multiuser Detection. Cambridge University Press, Cambridge, UK; 1998. MATH
Larsson EG, Vojcic BR: Cooperative transmit diversity based on superposition modulation. IEEE Communications Letters 2005, 9(9):778-780. 10.1109/LCOMM.2005.1506700 CrossRef
Brännström FN, Aulin TM, Rasmussen LK: Constellation-constrained capacity for trellis code multiple access systems. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '01), December 2001, San Antonio, Tex, USA 2: 791-795. CrossRef
Brännström FN, Aulin TM, Rasmussen LK: Capacity considerations for trellis code multiple access systems. Proceedings of the IEEE Information Theory Workshop, September 2001, Cairns, Australia 153-155.
Brännström FN, Aulin TM, Rasmussen LK: Iterative detectors for trellis-code multiple-access. IEEE Transactions on Communications 2002, 50(9):1478-1485. 10.1109/TCOMM.2002.802563 CrossRef
Ross JAF, Taylor DP: Vector assignment scheme for M+N users in N-Dimensional global additive channel. IEEE Electronic Letters 1992, 28(17):1634-1636. 10.1049/el:19921040 CrossRef
Lee WC: Mobile Communication Engineering. McGraw-Hill, New York, NY, USA; 1982.
Proakis JG: Digital Communication. McGraw Hill, New York, NY, USA; 2000.
Papoulis A: Probability, Random Variables, and Stochastic Processes. 3rd edition. McGraw-Hill, New York, NY, USA; 1991. MATH
Tsouri GR, Wulich D: Wireless channel access through jointly formed signal constellations. Proceedings of the IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '06), September 2006, San Diego, Calif, USA 1-5.
Lee EA, Messerschmitt DG: Digital Communication. Kluwer Academic Publishers, Dordrecht, The Netherlands; 1988. CrossRef
Vanhaverbeke F: Digital communications through oversaturated channels, Ph.D. thesis. Ghent University, Ghent, Belgium; 2005. http://telin.ugent.be/~fv/eigen_publicaties.html
Tsouri GR, Wulich D: A Physical transmission security layer for wireless multiple access communication systems. Proceedings of the European Signal Processing Conference (EUSIPCO '07), September 2007, Poznan, Poland
Verdú S: Capacity region of gaussian CDMA channels: the symbol- synchronous case. Proceedings of 24th Allerton Conference on Communication, Control and Computing, October 1986, Urbana, Ill, USA 1025-1034.
IEEE : Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Standard 802.16e, November 2005
ANSI/SCTE 79-1 : Data Over Cable Systems 2.0, Part 1: Radio Frequency Interface. 2003.
Li Y: Pilot-symbol-aided channel estimation for OFDM in wireless systems. IEEE Transactions on Vehicular Technology 2000, 49(4):1207-1215. 10.1109/25.875230 CrossRef
Edfors O, Sandell M, Beek JJD, Wilson SK, Borjesson PO: OFDM channel estimation by singular value decomposition. IEEE Transactions on Communications 1998, 46(7):931-939. 10.1109/26.701321 CrossRef
Berriche L, Abed-Meraim K, Belfiore JC: Cramer-rao bounds for MIMO channel estimation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), May 2004, Montreal, Canada 4: 397-400.
Tang X, Alouini MS, Goldsmith AJ: Effect of channel estimation error on MQAM BER performance in rayleigh fading. IEEE Transactions on Communications 1999, 47(12):1856-1864. 10.1109/26.809706 CrossRef
Shafik RA, Rahman MS, Islam AHMR, Ashraf NS: On the error vector magnitude as a performance metric and comparative analysis. Proceedings of the 2nd International Conference on Emerging Technologies (ICET '06), November 2006, Islamabad, Pakistan 27-31.
Pinto JL, Darwazeh I: Error vector magnitude relation to magnitude and phase distortion in 8-PSK systems. Electronics Letters 2001, 37(7):437-438. 10.1049/el:20010291 CrossRef
- Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
Gill R. Tsouri
- Springer International Publishing
- EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA, Product Lifecycle Management/© Eisenhans | vege | Fotolia