121
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A Hybrid Scheme for Wireless Physical Layer Security Based on Encryption and Channel Pre-compensation

&
 

ABSTRACT

In this paper, a hybrid scheme to provide wireless physical layer security based on encryption and wireless channel pre-compensation is presented. The physical layer security is provided by converting the signal constellation into a higher order constellation by using conventional encryption (symmetric key encryption) and then using channel state information (i.e. amplitude and phase variation), which is location specific, to further encrypt the constellation before transmission. Since detection and demodulation are based upon the known signal constellation, which is not known in advance in our case, it becomes difficult for the eavesdropper to determine the original signal constellation. The data intercepted by the eavesdropper is unintelligible due to the combined effect of encryption and pre-compensation. Using bit error rate (BER) as performance metric, it is found that the eavesdropper suffers from high BER as compared to its legitimate counterpart hence providing secure communication. The developed scheme was tested with existing wireless communication standard IEEE 802.11 to show the practical application of the scheme.

Additional information

Notes on contributors

Mohammad Tahir

M. Tahir received his bachelor degree (B.Tech) in electronics and communication from the Integral University, Lucknow, India, and master degree (MS) in communication engineering from the International Islamic University, Malaysia. He is currently pursuing his PhD from International Islamic University. His research interests are in cognitive radio, software defined radio, game theory, physical layer security, MIMO and OFDM.

E-mail: [email protected]

Mohammad Umar Siddiqi

Mohammad Umar Siddiqi received his BS and MS degrees from Aligarh Muslim University in 1966 and 1971, respectively, and PhD degree from IIT Kanpur. Currently, he is a professor in the Faculty of Engineering at International Islamic University, Malaysia. He has published more than 100 papers in international journals and conferences. His research interests are in error-control coding, cryptography and information security.

E-mail: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.