Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper
Autor(a) principal: | |
---|---|
Data de Publicação: | 2018 |
Outros Autores: | , , , , |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10773/28760 |
Resumo: | The purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different configurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas. |
id |
RCAP_f1a4ac9b1916051250a30932527c530d |
---|---|
oai_identifier_str |
oai:ria.ua.pt:10773/28760 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropperPhysical layer securitySecrecy capacityJammingChannel reciprocityThe purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different configurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas.IEEE2020-06-30T16:21:27Z2018-06-11T00:00:00Z2018-06-11info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10773/28760eng2169-353610.1109/ACCESS.2018.2845839Anjos, GustavoCastanheira, DanielSilva, AdãoGameiro, AtílioGomes, MarcoVilela, Joao P.info:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-02-22T11:55:37Zoai:ria.ua.pt:10773/28760Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T03:01:13.714609Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
title |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
spellingShingle |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper Anjos, Gustavo Physical layer security Secrecy capacity Jamming Channel reciprocity |
title_short |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
title_full |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
title_fullStr |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
title_full_unstemmed |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
title_sort |
Exploiting the reciprocal channel for discrete jamming to secure wireless communications against multiple-antenna eavesdropper |
author |
Anjos, Gustavo |
author_facet |
Anjos, Gustavo Castanheira, Daniel Silva, Adão Gameiro, Atílio Gomes, Marco Vilela, Joao P. |
author_role |
author |
author2 |
Castanheira, Daniel Silva, Adão Gameiro, Atílio Gomes, Marco Vilela, Joao P. |
author2_role |
author author author author author |
dc.contributor.author.fl_str_mv |
Anjos, Gustavo Castanheira, Daniel Silva, Adão Gameiro, Atílio Gomes, Marco Vilela, Joao P. |
dc.subject.por.fl_str_mv |
Physical layer security Secrecy capacity Jamming Channel reciprocity |
topic |
Physical layer security Secrecy capacity Jamming Channel reciprocity |
description |
The purpose of this paper is to advance the current state of physical layer security through the design and analysis of a discrete jamming scheme that exploits the reciprocal characteristic of the wireless channel with the aim to create equivocation to a passive multiple-antenna eavesdropper. Closed form solutions of the secrecy capacity for different configurations of the jamming component were obtained and successfully compare with the simulation results. Furthermore, the secrecy level provided by the developed scheme is analyzed taking into account the number of bits extracted from the channel. The asymptotic study of the proposed secrecy technique allowed to conclude that in the high-power regime, full secrecy is obtained even considering that the eavesdropper is equipped with an unlimited number of antennas. |
publishDate |
2018 |
dc.date.none.fl_str_mv |
2018-06-11T00:00:00Z 2018-06-11 2020-06-30T16:21:27Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10773/28760 |
url |
http://hdl.handle.net/10773/28760 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
2169-3536 10.1109/ACCESS.2018.2845839 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
IEEE |
publisher.none.fl_str_mv |
IEEE |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799137667867213824 |