Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper

Detalhes bibliográficos
Autor(a) principal: Anjos, Gustavo
Data de Publicação: 2018
Outros Autores: Castanheira, Daniel, Silva, Adão, Gameiro, Atílio, Gomes, Marco, Vilela, Joao P.
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/10773/28760
Resumo: The purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different configurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas.
id RCAP_f1a4ac9b1916051250a30932527c530d
oai_identifier_str oai:ria.ua.pt:10773/28760
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropperPhysical layer securitySecrecy capacityJammingChannel reciprocityThe purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different configurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas.IEEE2020-06-30T16:21:27Z2018-06-11T00:00:00Z2018-06-11info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10773/28760eng2169-353610.1109/ACCESS.2018.2845839Anjos, GustavoCastanheira, DanielSilva, AdãoGameiro, AtílioGomes, MarcoVilela, Joao P.info:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-02-22T11:55:37Zoai:ria.ua.pt:10773/28760Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T03:01:13.714609Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
title Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
spellingShingle Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
Anjos, Gustavo
Physical layer security
Secrecy capacity
Jamming
Channel reciprocity
title_short Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
title_full Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
title_fullStr Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
title_full_unstemmed Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
title_sort Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
author Anjos, Gustavo
author_facet Anjos, Gustavo
Castanheira, Daniel
Silva, Adão
Gameiro, Atílio
Gomes, Marco
Vilela, Joao P.
author_role author
author2 Castanheira, Daniel
Silva, Adão
Gameiro, Atílio
Gomes, Marco
Vilela, Joao P.
author2_role author
author
author
author
author
dc.contributor.author.fl_str_mv Anjos, Gustavo
Castanheira, Daniel
Silva, Adão
Gameiro, Atílio
Gomes, Marco
Vilela, Joao P.
dc.subject.por.fl_str_mv Physical layer security
Secrecy capacity
Jamming
Channel reciprocity
topic Physical layer security
Secrecy capacity
Jamming
Channel reciprocity
description The purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different configurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas.
publishDate 2018
dc.date.none.fl_str_mv 2018-06-11T00:00:00Z
2018-06-11
2020-06-30T16:21:27Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10773/28760
url http://hdl.handle.net/10773/28760
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv 2169-3536
10.1109/ACCESS.2018.2845839
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv IEEE
publisher.none.fl_str_mv IEEE
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799137667867213824