121
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A Hybrid Scheme for Wireless Physical Layer Security Based on Encryption and Channel Pre-compensation

&

REFERENCES

  • C. E. Shannon, “Communication theory of secrecy systems,” Bell Sys. Tech. J., Vol. 28, pp. 656–715, 1948.
  • A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., Vol. 54, pp. 1355–67, Oct. 1975.
  • I. Csiszár, and J. Körner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, Vol. 24, pp. 339–48, May 1978.
  • U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, Vol. 39, no. 3, pp. 733–42, May 1993.
  • J. Barros, and M. R. D. Rodrigues, “Secrecy capacity of wireless channels,” in Proceeding of IEEE International Symposium Information Theory, Seattle, WA, Jul. 2006, pp. 356–60.
  • E. Ekrem, and S. Ulukus, “The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel,” IEEE Trans. Inf. Theory, Vol. 57, no. 4, pp. 2083–114, Apr. 2011.
  • M. Zeng, R. Zhang, and S. Cui, “On design of collaborative beamforming for two-way relay networks,” IEEE Trans. Signal Process., Vol. 59, no. 5, pp. 2284–95, May 2011.
  • E. Ekrem, and S. Ulukus, “Secrecy in cooperative relay broadcast channels,” IEEE Trans. Inf. Theory, Vol. 57, no. 1, pp. 137–55, Jan. 2011.
  • B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener “Robust key generation from signal envelopes in wireless networks,” in 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, 2007, pp. 401–10.
  • G. R. Tsouri, and D. Wulich, “Reverse piloting protocol for securing time varying wireless channels,” in Proceedings of the 7th Annual Wireless Telecommunications Symposium (WTS ‘08), Pomona, CA, Apr. 2008, pp. 125–31.
  • A. Hassan, W. Stark, J. Hershey, and S. Chennakeshu, “Cryptographic key agreement for mobile radio,” Digit. Signal Process., Vol. 6, pp. 207–12, 1996.
  • A. Kitaura, and H. Sasaoka, “A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio,” Electron. Commun. Jpn., Vol. 88, pp. 1–10, 2004.
  • Y. E. H. Shehadeh, O. Alfandi, and D. Hogrefe, “Towards robust key extraction from multipath wireless channels,” J. Commun. Netw., Vol. 14, no. 4, pp. 385–95, Aug. 2012.
  • S. C. Lin, T. H. Chang, Y. l. Yang, Y. W. P. Hong, and C. Y. Chi, “On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem,” IEEE Trans. Wireless Commun., Vol. 10(3), pp. 901–15, 2011.
  • D. Reilly, and G. S . Kanter, “Noise-enhanced encryption for physical layer security in an OFDM radio,” in IEEE Radio and Wireless Symposium, RWS ’09, San Diego, CA, Jan. 2009. pp. 344–7.
  • M. Tahir, S. P. W. Jarot, and M. U. Siddiqi, “Wireless physical layer security using encryption and channel pre-compensation,” in International Conference on Computer Applications and Industrial Electronics (ICCAIE), Kuala Lumpur, Dec.2010. pp. 304–9.
  • R. Ma, L. Dai, Z. Wang, and J. Wang, “Secure communication in TDS-OFDM system using constellation rotation and noise insertion,” IEEE Trans. Consum. Electron., Vol. 56, no. 3, pp. 1328–32, Aug. 2010.
  • M. Tahir, S. P. W. Jarot, and M. U. Siddiqi, “Wireless physical layer security using channel state information,” in International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, May 2010, pp. 1–5.
  • W. K. Harrison, and S. W. McLaughlin, “Physical-layer security: Combining error control coding and cryptography,” in IEEE International Conference on Communications, Dresden, June 2009, pp. 1–5.
  • A. Pal, S. Rao, S. S. Das, P. Balamuralidhar, and H. Reddy, “Enhancement of security of wireless networks using physical layer protection,” in MA10-1 P.VIII-1668 - P.VIII-1672 (WPMC2005) – Wireless Personal Media Communications, 2005, Aalborg.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.